WO2019127834A1 - 交易事件的处理方法、装置、终端设备及介质 - Google Patents

交易事件的处理方法、装置、终端设备及介质 Download PDF

Info

Publication number
WO2019127834A1
WO2019127834A1 PCT/CN2018/074875 CN2018074875W WO2019127834A1 WO 2019127834 A1 WO2019127834 A1 WO 2019127834A1 CN 2018074875 W CN2018074875 W CN 2018074875W WO 2019127834 A1 WO2019127834 A1 WO 2019127834A1
Authority
WO
WIPO (PCT)
Prior art keywords
risk
transaction
transaction request
attribute value
control rule
Prior art date
Application number
PCT/CN2018/074875
Other languages
English (en)
French (fr)
Inventor
郑细书
刘潜
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019127834A1 publication Critical patent/WO2019127834A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Definitions

  • the present application belongs to the field of Internet technologies, and in particular, to a method, an apparatus, a terminal device, and a medium for processing a transaction event.
  • the e-commerce platform will detect the user's payment transaction process to execute the wind. Control processing. For example, when it is detected that the user's transfer amount is large, the transaction is intercepted.
  • this kind of risk control method can only passively control the situation in the consumption scene or payment scenario, and the judgment condition is single. As long as the threshold threshold cannot be accurately defined, it is difficult to effectively identify the abnormal transaction behavior, thus leading to the current wind control method. There is a high rate of false positives, which also has a large impact on the legitimate trading operations of users.
  • the embodiment of the present application provides a method, a device, a terminal device, and a medium for processing a transaction event, so as to solve the problem that the transaction misinterpretation rate is high due to the inability to effectively identify an abnormal transaction behavior in the prior art.
  • a first aspect of the embodiments of the present application provides a method for processing a transaction event, including:
  • the risk assessment level includes a security level or a dangerous level
  • risk assessment level of any of the risk control rule sets is a dangerous level, determining a risk behavior type corresponding to the risk control rule set as a risk behavior type of the transaction event;
  • a second aspect of the embodiments of the present application provides a processing device for a transaction event, including:
  • a first acquiring unit configured to acquire a preset plurality of wind control rule sets when the transaction event is detected, where the wind control rule set includes multiple wind control conditions
  • a second acquiring unit configured to acquire a first attribute value and a second attribute value associated with the risk control condition of the transaction request account, where the first attribute value is pre-generated according to historical behavior information of the transaction request account, The second attribute value is generated according to the real-time transaction information of the transaction event;
  • an output unit configured to perform an operation process on the first attribute value and the second attribute value corresponding to the wind control condition in each of the wind control rule sets, to output each of the risk control rule sets Risk assessment level, which includes a safety level or a dangerous level;
  • a determining unit configured to determine, according to the risk assessment level of any of the risk control rule sets, a risk behavior type corresponding to the risk control rule set as a risk behavior type of the transaction event ;
  • a feedback unit configured to perform a feedback operation on the transaction request account according to the determined preset feedback manner of the type of the risk behavior.
  • a third aspect of the embodiments of the present application provides a terminal device, including a memory and a processor, where the computer stores computer readable instructions executable on the processor, the processor executing the computer
  • the steps of the processing method of the transaction event as described in the first aspect are implemented when the instruction is read.
  • a fourth aspect of the embodiments of the present application provides a computer readable storage medium storing computer readable instructions, the computer readable instructions being executed by a processor to implement the first aspect as described in the first aspect The steps of the processing method of the transaction event.
  • the risk behavior types existing in the current transaction event are determined through different sets of risk control rules, thereby avoiding the problem that the judgment condition is single and improving the abnormal transaction.
  • the risk status of the transaction request account is initially evaluated, and the active risk control process is realized.
  • the attribute values obtained by synthesizing the historical behavior information and the real-time transaction information are used to jointly determine whether the transaction event has a risk behavior, and the abnormal transaction behavior is realized.
  • FIG. 1 is a flowchart of an implementation of a method for processing a transaction event according to an embodiment of the present application
  • FIG. 2 is a specific implementation flowchart of a method S103 for processing a transaction event according to an embodiment of the present application
  • FIG. 3 is a specific implementation flowchart of a method S105 for processing a transaction event according to an embodiment of the present application
  • FIG. 4 is a specific implementation flowchart of a method S102 for processing a transaction event according to an embodiment of the present application
  • FIG. 5 is a flowchart of a specific implementation of a method S102 for processing a transaction event according to another embodiment of the present application
  • FIG. 6 is a structural block diagram of a processing device for processing a transaction event according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a terminal device according to an embodiment of the present application.
  • FIG. 1 is a flowchart showing an implementation process of a transaction event processing method provided by an embodiment of the present application, where the method process includes steps S101 to S105.
  • the specific implementation principles of each step are as follows:
  • a transaction event is triggered according to a transaction operation of the user on the e-commerce platform.
  • Trading operations include transfer operations and payment operations.
  • a transaction request issued by any transaction request account is received, a plurality of pre-stored risk control rule sets are read. Among them, each risk control rule set corresponds to a risk behavior type. Types of risk behavior include, but are not limited to, types of fraudulent registration, stolen accounts, malicious cashouts, and malicious swearing.
  • Each wind control rule set includes a plurality of wind control conditions, each of which is associated with one or more attribute types. For example, if the risk control condition is to determine whether the transaction request account is an account registered in the last three days, the attribute type associated with the risk control condition is the registration time of the transaction request account; if the risk control condition is a real-time network for determining the transaction request account. Whether the address is the same as the network address at the time of the last login, the attribute type associated with the risk control condition is the real-time network address of the transaction request account and the historical network address.
  • S102 Acquire a first attribute value and a second attribute value that are associated with the risk control condition by the transaction request account, where the first attribute value is pre-generated according to historical behavior information of the transaction request account, and the second attribute value is The real-time transaction information of the transaction event is generated.
  • the attribute value corresponding to each attribute type of the transaction request account is read.
  • the attribute value pre-generated according to the historical behavior information of the transaction request account is referred to as the first attribute value
  • the attribute value determined according to the real-time transaction information of the transaction event is referred to as the second attribute. value. It is worth noting that the first attribute value and the second attribute value do not have an association in a logical order.
  • the attribute type associated with the risk control condition is the real-time network address of the transaction request account and the historical network address
  • the real-time network address of the transaction request account is 192.168.1.2
  • the historical network address is 192.168.1.1
  • "192.168.1.1” is the information determined according to the historical login behavior of the transaction request account, and therefore, it is the above first attribute value
  • "192.168.1.2” is the information determined according to the current real-time login behavior, the above The second attribute value.
  • S103 Perform an operation process on the first attribute value and the second attribute value corresponding to the wind control condition in each of the wind control rule sets to output a risk assessment of each of the risk control rule sets Level, the risk assessment level includes a security level or a dangerous level.
  • the wind control condition for each wind control condition, if each attribute value associated with the wind control condition has been acquired, the wind control condition is used to determine the obtained attribute values to output the wind control condition. Corresponding one output value. After the respective output values in the wind control rule set are processed again, the risk assessment level of the wind control rule set can be output.
  • the risk assessment level includes a safety level or a dangerous level.
  • the foregoing S103 specifically includes:
  • S1031 When the risk behavior type corresponding to the risk control rule set is a fake registration behavior, calculate the location according to the first attribute value and/or the second attribute value associated with each of the risk control conditions. A first output value of the wind control condition, the first output value being a logical truth value or a logical false value.
  • each transaction request account that has collected the risk of counterfeiting registration behavior is analyzed to determine a condition that each attribute value of the transaction request account satisfies, and the condition is converted and stored as a counterfeit registration behavior.
  • the attribute value associated with each wind control condition is input into the wind control condition, and the judgment result is "yes” or "no".
  • Each judgment result is converted into a logic value according to the judgment result of the preset wind control condition and the correspondence relationship between the logic values. Wherein, the logical value is a logical true value "1" or a logical false value "0".
  • S1032 Acquire a logical operation model of the wind control rule set, where the logical operation model records operation logic between each of the first output values.
  • S1033 Perform logical operation processing on each of the first output values in sequence based on the logical operation model to obtain a second output value.
  • each wind control rule set has a corresponding logical operation model for performing logical operation processing on the logical values output by the respective wind control conditions included therein.
  • the logical operation model records the arithmetic logic between the logical values output by each wind control condition. For example, if the operation logic is "((the output value of the wind control condition 1 and the output value of the wind control condition 2) or the output value of the wind control condition 3) and the output value of the wind control condition 4, then each wind control condition will be After the output value is input to the logical operation model, the model output value can be obtained by the above operation logic.
  • the output value of the wind control condition is referred to as the first output value
  • the model output value is referred to as the second output value.
  • the second output value obtained by performing a logical operation on the first output value is also a logical value.
  • the obtained second output value is a logically true value, it is determined that the current transaction event satisfies the risk control rule set, that is, the possibility that the current transaction event has a high false registration behavior occurs, so the transaction event The risk assessment level of the risk control rule set is output as dangerous. If the obtained second output value is a logical false value, it is determined that the current transaction event does not satisfy the risk control rule set, that is, the possibility that the current transaction event has a lower false registration behavior occurs, so The transaction event is output as a security level at the risk assessment level of the risk control rule set.
  • each output value of the wind control condition is separately calculated, and the logical operation model of the wind control rule set is used to perform logical operation processing on each output value, thereby ensuring that the final output result is also a logical value. Since the logical value only contains the logical truth value and the logical false value, and the risk assessment level of the risk control rule set only exists in the security level and the dangerous level, the risk assessment level can be confirmed according to the logical value of the output, which can improve the risk assessment.
  • the calculation efficiency of the level in addition, if the logical value of the output is displayed, the manager can directly and quickly understand the risk assessment level of the current risk control rule set, thereby improving the work efficiency.
  • the risk assessment level of each risk control rule set is determined, and each wind control rule set whose risk assessment level is dangerous is selected.
  • the risk behavior type corresponding to each wind control rule set obtained by the screening is read, and the risk behavior type is determined as the risk behavior type existing in the current transaction event.
  • the transaction request account "Apple” issues a transaction request for transferring 5000 yuan
  • the attribute values corresponding to Apple are respectively input into the respective risk control rule sets, and the obtained risk control rule sets A and C are evaluated. All are dangerous, and the risk behavior type corresponding to the risk control rule set A is malicious cashout, and the risk behavior type corresponding to the risk control rule set C is the pseudo-registration behavior, then the transaction event of the “Apple” can be determined. There may be behavioral risks of fraudulent registration and malicious cash out.
  • S105 Perform a feedback operation on the transaction request account according to the determined preset feedback manner of the risk behavior type.
  • Each type of risk behavior is pre-set with a feedback method.
  • the above feedback mode indicates how the current response to the transaction request needs to be performed.
  • the feedback methods include, but are not limited to, freezing the transaction request account, SMS reminding the account registration user, confirming the real identity of the transaction request user, and delaying the arrival time.
  • the preset feedback operation of the risk behavior type is performed only when there is any risk behavior type of the transaction event.
  • FIG. 3 shows a specific implementation process of the processing method S105 of the transaction event provided by the embodiment of the present application, which is described in detail as follows:
  • S1051 Change the account status of the transaction request account to a frozen state.
  • the account status of each trading account includes the normal status and the frozen status. Among them, in the frozen state, the user will not be able to perform any transaction operations through its trading account, including transfer operations and payment operations, and even include query operations.
  • the account status is changed from a normal state to a frozen state.
  • the freeze request message is sent to the transaction request account to respond to the transaction request.
  • S1052 Generate a return visit task for the transaction request account, and assign the return visit task to a preset agent account, so that the corresponding agent performs confirmation of the legality of the transaction event according to the return visit task.
  • a return visit task matching the transaction request account is generated on the preset platform. After the return visit task is assigned to the preset agent account, the corresponding agent will perform a manual return visit to contact the registered user by telephone according to the registration information of the transaction request account, and confirm whether the user triggers the above transaction event, and Confirm the legal identity of the user.
  • the agent confirms that the registered user of the transaction request account is a legitimate user and confirms that the transaction event is a normal transaction event
  • the legal confirmation information about the transaction event sent by the agent may be received.
  • the account status of the transaction request account is reset to change it to the normal state.
  • the first attribute value generated based on the user's historical behavior information is avoided in the subsequent transaction process. The judgment of the risk behavior type is again affected, and each of the pre-stored first attribute values is reset to restore to the default first attribute value that the transaction account should have in the legal transaction state.
  • the risk behavior types existing in the current transaction event are determined through different sets of risk control rules, thereby avoiding the problem that the judgment condition is single and improving the abnormal transaction.
  • the risk status of the transaction request account is initially evaluated, and the active risk control process is realized.
  • the attribute values obtained by synthesizing the historical behavior information and the real-time transaction information are used to jointly determine whether the transaction event has a risk behavior, and the abnormal transaction behavior is realized.
  • FIG. 4 shows a specific implementation process of the processing method S102 of the transaction time provided by the embodiment of the present application, which is described in detail as follows:
  • S1021 Record, at a time when the transaction request account registration is completed, record network address information and identity verification information associated with the transaction request account, where the identity verification information packet is attribute information.
  • the source network address information carried by the registration request is identified.
  • the authentication information input by the registered user for uniquely identifying the identity such as identity card information, passport information, or bank card account information, is received.
  • an external interface matching the type of the certificate is invoked, the authenticity of the registered user is confirmed, and the identity information of the identity, that is, the information of the issuance of the identity document is obtained.
  • the correspondence between the identity verification information and the network address information obtained in the registration process and the transaction account is stored in association.
  • the corresponding relationship between the transaction request account and its authentication information and network address information is also pre-stored.
  • S1022 Generate one of the first attribute values associated with the risk control condition by the transaction request account according to the matching degree between the identity attribution information and the network address information.
  • the matching degree of the identity locality information and the network address information is calculated. Specifically, according to the network address information, a geographical area in which the transaction request account is located when registering may be determined. If the geographical area at the time of registration has an inclusion relationship with the geographical area where the identity attribute is located, the identity locality information matches the network address information. Wherein, when the two are the same geographical area, the identity of the identity and the network address information are the highest.
  • the network address information of the registration request and the identity verification information are obtained, and an attribute value for describing the identity verification information and the network address information matching degree is generated in advance, so that the receiving
  • a transaction requests a transaction request issued by an account, it is no longer necessary to recalculate the attribute value associated with the risk control condition, thereby improving the recognition efficiency of the type of the wind event behavior of the transaction event; since the transaction event is not triggered before, and the risk control condition
  • the associated first attribute values have been generated, thus implementing active risk control, thereby achieving cross-scenario risk prevention and control between transaction scenarios and non-transaction scenarios.
  • the foregoing S102 specifically includes:
  • S1023 Acquire login device information of the transaction request account.
  • the currently received transaction request is parsed to extract real-time login device information of the transaction request user from among various parameters carried in the transaction request.
  • S1024 Parsing the login device information to determine a terminal type of the transaction requesting end, where the terminal type is a relay device or a non-relay device.
  • the login device information is identified according to a preset algorithm to determine the terminal type of the transaction request end.
  • Terminal types include relay devices or non-relay devices.
  • the relay device may be, for example, a device such as a modem pool (ModemPOOL) or a simulator
  • the non-relay device may be, for example, a device such as a mobile phone or a computer.
  • S1025 Generate, according to the terminal type of the transaction requesting end, one of the second attribute values associated with the risk control condition by the transaction request account.
  • the set of risk control rules corresponding to the counterfeiting registration behavior there is a risk control condition associated with the terminal type. If the detected terminal type is a relay device, determining an output value of the wind control condition as a logical true value, determining an output value of the wind control condition as a logical false value, and inputting the output value into the wind control rule The logical operation model corresponding to the set.
  • the arithmetic logic recorded by the logical operation model is "((the output value of the wind control condition 1 and the output value of the wind control condition 2) or the output value of the wind control condition 3) or the output value of the wind control condition 4",
  • the wind control condition 4 is the above-mentioned wind control condition associated with the terminal type, thereby ensuring that only the transaction request issued by the relay device exists, and the logical operation model outputs a logical truth value to determine that the transaction event has a counterfeit registration behavior. risk.
  • the parameter information carried in the registration request is also parsed to determine the terminal type of the transaction request account, and the logical output value corresponding to the terminal type is stored.
  • the operation logic of the record is “((the output value of the wind control condition 1 and the output value of the wind control condition 2) or the output value of the wind control condition 3) or the wind control The output value of the condition 4 or the output value of the wind control condition 5, wherein the wind control condition 5 is a wind control condition associated with the terminal type at the time of registration.
  • the relay device since fraudulent persons who perform the pseudo-registration behavior generally perform large-scale centralized crimes in a short period of time, the relay device is usually used for bulk registration or transaction, and normal legitimate transaction users usually do not use.
  • the relay device therefore, as long as the relay device is identified during the registration process or during the transaction, an attribute value associated with the terminal type is generated, so that the logical operation model can directly determine the risk of the counterfeit registration behavior of the transaction event based on the attribute value. Therefore, the recognition accuracy of the transaction risk and the recognition efficiency are improved.
  • FIG. 6 is a structural block diagram of a processing device for processing a transaction event provided by the embodiment of the present application. For the convenience of description, only the related to the embodiment of the present application is shown. section.
  • the apparatus includes:
  • the first obtaining unit 61 is configured to acquire a preset plurality of wind control rule sets when the transaction event is detected, where the wind control rule set includes multiple wind control conditions.
  • a second acquiring unit 62 configured to acquire a first attribute value and a second attribute value associated with the risk control condition of the transaction request account, where the first attribute value is pre-generated according to historical behavior information of the transaction request account.
  • the second attribute value is generated based on real-time transaction information of the transaction event.
  • the output unit 63 is configured to perform an operation process on the first attribute value and the second attribute value corresponding to the wind control condition in each of the wind control rule sets to output each of the risk control rules
  • the set of risk assessment levels including the security level or the dangerous level.
  • a determining unit 64 configured to determine, when the risk assessment level of any of the risk control rule sets is a dangerous level, the risk behavior type corresponding to the risk control rule set as a risk behavior of the transaction event Types of.
  • the feedback unit 65 is configured to perform a feedback operation on the transaction request account according to the determined preset feedback manner of the risk behavior type.
  • the first obtaining unit 62 includes:
  • a recording subunit configured to record network address information and identity verification information associated with the transaction request account at a time when the transaction request account registration is completed, the identity verification information packet identity locality information.
  • a first generating subunit configured to generate one of the first attribute values associated with the risk control condition by the transaction request account according to the matching degree between the identity territorial information and the network address information.
  • the output unit 63 includes:
  • a calculating subunit configured to: when the risk behavior type corresponding to the risk control rule set is a fake registration behavior, the first attribute value and/or the second attribute associated with each of the wind control conditions And a first output value of the wind control condition, the first output value being a logical truth value or a logical false value.
  • a first acquiring subunit configured to acquire a logical operation model of the wind control rule set, where the logical operation model records operation logic between each of the first output values.
  • an operation subunit configured to perform logical operation processing on each of the first output values in sequence based on the logic operation model to obtain a second output value.
  • Determining a subunit if the second output value is a logical true value, determining that the risk assessment level of the risk control rule set is a dangerous level; if the second output value is a logical false value, determining the The risk assessment level of the risk control rule set is safety level.
  • the feedback unit 65 includes:
  • the change subunit is configured to change the account status of the transaction request account to a frozen state.
  • a second generating sub-unit configured to generate a return visit task for the transaction request account, and assign the return visit task to a preset agent account, so that the corresponding agent performs legality of the transaction event according to the return visit task Confirmation.
  • a reset subunit configured to revoke the frozen state if the legal confirmation information about the transaction event is received, and reset the first attribute value of the transaction request account associated with the risk condition to Defaults.
  • the first obtaining unit 62 includes:
  • a second obtaining subunit configured to acquire login device information of the transaction request account.
  • the parsing subunit is configured to parse the login device information to determine a terminal type of the transaction requesting end, where the terminal type is a relay device or a non-relay device.
  • a third generating subunit configured to generate, according to the terminal type of the transaction requesting end, one of the second attribute values associated with the risk control condition by the transaction request account.
  • FIG. 7 is a schematic diagram of a terminal device according to an embodiment of the present application.
  • the terminal device 7 of this embodiment includes a processor 70 and a memory 71 in which computer readable instructions 72 operable on the processor 70, such as processing of transaction events, are stored. program.
  • the processor 70 executes the computer readable instructions 72 to implement the steps in the processing method embodiments of the various transaction events described above, such as steps 101 through 105 shown in FIG.
  • the processor 70 when executing the computer readable instructions 72, implements the functions of the various modules/units in the various apparatus embodiments described above, such as the functions of the units 61-65 shown in FIG.
  • the computer readable instructions 72 may be partitioned into one or more modules/units that are stored in the memory 71 and executed by the processor 70, To complete this application.
  • the one or more modules/units may be a series of computer readable instruction segments capable of performing a particular function for describing the execution of the computer readable instructions 72 in the terminal device 7.
  • the terminal device 7 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server.
  • the terminal device may include, but is not limited to, the processor 70 and the memory 71. It will be understood by those skilled in the art that FIG. 7 is only an example of the terminal device 7, and does not constitute a limitation of the terminal device 7, and may include more or less components than those illustrated, or combine some components or different components.
  • the terminal device may further include an input/output device, a network access device, a bus, and the like.
  • the so-called processor 70 can be a central processing unit (Central Processing Unit, CPU), can also be other general-purpose processors, digital signal processors (DSP), application specific integrated circuits (Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 71 may be an internal storage unit of the terminal device 7, such as a hard disk or a memory of the terminal device 7.
  • the memory 71 may also be an external storage device of the terminal device 7, for example, a plug-in hard disk provided on the terminal device 7, a smart memory card (SMC), and a secure digital (SD). Card, flash card, etc. Further, the memory 71 may also include both an internal storage unit of the terminal device 7 and an external storage device.
  • the memory 71 is configured to store the computer readable instructions and other programs and data required by the terminal device.
  • the memory 71 can also be used to temporarily store data that has been output or is about to be output.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本方案提供了一种交易事件的处理方法、装置、终端设备及介质,适用于互联网技术领域,该方法包括:获取预设的多个风控规则集;获取交易请求账号与风控条件关联的第一属性值以及第二属性值;分别对每个风控规则集中的风控条件对应的第一属性值以及第二属性值进行运算处理,以输出每一风控规则集的风险评估等级;若存在任一风控规则集的风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为交易事件所存在的风险行为类型;根据确定出的风险行为类型的预设反馈方式,执行对交易请求账号的反馈操作。本方案提高了异常交易行为的识别准确率,在非支付场景下,也能预先对交易请求账号的风险状态进行初步的评估,实现了主动式的风控处理。

Description

交易事件的处理方法、装置、终端设备及介质
本申请要求于2017年12月26日提交中国专利局、申请号为201711431074.0 、发明名称为“交易事件的处理方法、终端设备及介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请属于互联网技术领域,尤其涉及一种交易事件的处理方法、装置、终端设备及介质。
背景技术
电商平台的发展给人们生活带来了极大的便利,然而,不法分子为了能够在电商交易过程中获取更大的利益,目前出现了多种类型的风险诈骗行为,例如伪冒注册、盗账户、恶意套现以及恶意薅羊毛等诈骗行为。
由于风险诈骗真实存在时,只有消费、支付等交易行为能够直接导致用户的利益受损,因而为了降低风险诈骗行为出现的可能性,电商平台会对用户的支付交易过程进行检测,以执行风控处理。例如,当检测到用户的转账额度较大时,对此次的交易进行拦截。然而,这种风控方式只能被动的在消费场景或者支付场景做风控,并且判断条件单一,只要无法准确界定限额阈值,就难以有效地识别异常交易行为,因而导致了目前的风控方法存在较高的误拦率,由此也对用户的合法交易操作造成了较大的影响。
技术问题
有鉴于此,本申请实施例提供了一种交易事件的处理方法、装置、终端设备及介质,以解决现有技术中无法有效地识别异常交易行为而导致交易误拦率较高的问题。
技术解决方案
本申请实施例的第一方面提供了一种交易事件的处理方法,包括:
当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件;
获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成;
分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级;
若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型;
根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
本申请实施例的第二方面提供了一种交易事件的处理装置,包括:
第一获取单元,用于当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件;
第二获取单元,用于获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成;
输出单元,用于分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级;
确定单元,用于若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型;
反馈单元,用于根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
本申请实施例的第三方面提供了一种终端设备,包括存储器以及处理器,所述存储器中存储有可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如第一方面所述的交易事件的处理方法的步骤。
本申请实施例的第四方面提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令被处理器执行时实现如第一方面所述的交易事件的处理方法的步骤。
有益效果
本申请实施例中,由于风控规则集包含多个风控条件,因而通过不同的风控规则集来确定当前交易事件所存在的风险行为类型,避免了判断条件单一的问题,提高了异常交易行为的识别准确率;另外,交易请求账号与各个风控条件关联的属性值包括基于交易请求账号的历史行为信息所预先生成的属性值,由此使得在非支付场景之下,也能预先对交易请求账号的风险状态进行初步的评估,实现了主动式的风控处理;通过综合历史行为信息以及实时交易信息所得到的属性值来共同判定交易事件是否存在风险行为,实现了对异常交易行为更为有效的检测,因此降低了交易的误拦率;并且,当交易事件对应不同的风险行为类型时,执行的反馈方式也是不同的,即,不一定要拦截交易请求,因而本申请实施例也保证了在合理进行风险控制的同时,降低了对用户交易的影响。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的交易事件的处理方法的实现流程图;
图2是本申请实施例提供的交易事件的处理方法S103的具体实现流程图;
图3是本申请实施例提供的交易事件的处理方法S105的具体实现流程图;
图4是本申请实施例提供的交易事件的处理方法S102的具体实现流程图;
图5是本申请另一实施例提供的交易事件的处理方法S102的具体实现流程图;
图6是本申请实施例提供的交易事件的处理装置的结构框图;
图7是本申请实施例提供的终端设备的示意图。
本发明的实施方式
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。
为了说明本申请所述的技术方案,下面通过具体实施例来进行说明。
图1示出了本申请实施例提供的交易事件的处理方法的实现流程,该方法流程包括步骤S101至S105。各步骤的具体实现原理如下:
S101:当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件。
本申请实施例中,根据用户在电商平台上的交易操作来触发交易事件。交易操作包括转账操作以及付款操作。当接收到任一交易请求账号发出的交易请求时,读取预存储的多个风控规则集。其中,每一风控规则集对应一项风险行为类型。风险行为类型包括但不限于伪冒注册行为、盗账户、恶意套现以及恶意薅羊毛等类型。
每一风控规则集包含多条风控条件,每一风控条件与一个或多个属性类型关联。例如,若风控条件为判断交易请求账号是否为最近三天内注册的账号,则与该风控条件关联的属性类型为交易请求账号的注册时间;若风控条件为判断交易请求账号的实时网络地址是否与上一次登录时的网络地址相同,则与该风控条件关联的属性类型为交易请求账号的实时网络地址以及历史网络地址。
S102:获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成。
本申请实施例中,根据每一风控规则集中每一风控条件所关联的属性类型,读取交易请求账号在各属性类型上所对应的属性值。
为了便于区分各个属性值的类别,将根据交易请求账号的历史行为信息所预先生成的属性值称为第一属性值,将根据交易事件的实时交易信息称所确定的属性值称为第二属性值。值得注意的是,第一属性值以及第二属性值并不存在逻辑顺序上的关联。
例如,在上述示例中,与风控条件关联的属性类型为交易请求账号的实时网络地址以及历史网络地址时,若交易请求账号的实时网络地址为192.168.1.2,历史网络地址为192.168.1.1,则“192.168.1.1”即为根据交易请求账号的历史登录行为来确定的信息,因此,其为上述第一属性值;“192.168.1.2”为根据当前的实时登录行为来确定的信息,其上述第二属性值。
S103:分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级。
本申请实施例中,对于每一风控条件,若该风控条件所关联的各个属性值已获取完毕,则利用该风控条件来对得到的各个属性值进行判断处理,以输出风控条件对应的一个输出值。将风控规则集中的各个输出值再次进行运算处理后,可输出风控规则集的风险评估等级。风险评估等级包括安全级或危险级。
下面以伪冒注册行为这一风险行为类型所对应的一个风控规则集为例,对上述S103的具体实现流程进行阐述。如图2所示,上述S103具体包括:
S1031:当所述风控规则集对应的风险行为类型为伪冒注册行为时,根据每一所述风控条件所关联的所述第一属性值和/或所述第二属性值,计算所述风控条件的第一输出值,所述第一输出值为逻辑真值或逻辑假值。
本申请实施例中,对收集得到的出现过仿冒注册行为风险的各个交易请求账号进行分析,以确定出交易请求账号的各个属性值所共同满足的条件,将这个条件转换并存储为仿冒注册行为所对应的风控规则集中的各个风控条件。这些风控条件例如可以是“最近一小时内所转出的累积金额是否超过5000元”、“一小时内的转账次数是否大于两次”以及“交易请求账号是否为3天内新注册的账号”。将每一风控条件关联的属性值输入该风控条件,得出判断结果为“是”或“否”。根据预设的风控条件的判断结果以及逻辑值之间的对应关系,将每一判断结果转换为逻辑值。其中,逻辑值为逻辑真值“1”或逻辑假值“0”。
例如,对于“一小时内的转账次数是否大于两次”这一风控条件,若判断结果为“是”,且预设的该风控条件的判断结果以及逻辑值之间的对应关系为:“是—逻辑真值”、“否—逻辑假值”,则该判断结果在转换后所得到的逻辑值即为逻辑真值。
S1032:获取所述风控规则集的逻辑运算模型,所述逻辑运算模型记录各个所述第一输出值之间的运算逻辑。
S1033:基于所述逻辑运算模型依次对各个所述第一输出值进行逻辑运算处理,以得到第二输出值。
本申请实施例中,每一风控规则集存在对应的一个逻辑运算模型,以用于对其所包含的各个风控条件所输出的逻辑值进行逻辑运算处理。逻辑运算模型记录了各个风控条件所输出的逻辑值之间的运算逻辑。例如,若运算逻辑为“((风控条件1的输出值 and 风控条件2的输出值) or 风控条件3的输出值) and 风控条件4的输出值”,则将各个风控条件的输出值输入逻辑运算模型后,通过上述运算逻辑可得到模型输出值。
为了区分模型输出值以及每一风控条件的输出值,将风控条件的输出值称为第一输出值,将模型输出值称为第二输出值。
由于第一输出值为逻辑值,故对第一输出值进行逻辑运算处理后所得到的第二输出值也为逻辑值。
S1034:若所述第二输出值为逻辑真值,则确定所述风控规则集的风险评估等级为危险级;若所述第二输出值为逻辑假值,则确定所述风控规则集的风险评估等级为安全级。
若得到的第二输出值为逻辑真值,则确定当前交易事件满足这一风控规则集,即,判断当前的交易事件存在较高的伪冒注册行为发生的可能性,故将该交易事件在该风控规则集的风险评估等级输出为危险级。若得到的第二输出值为逻辑假值,则确定当前交易事件并不满足这一风控规则集,即,判断当前的交易事件存在较低的伪冒注册行为发生的可能性,故将该交易事件在该风控规则集的风险评估等级输出为安全级。
本申请实施例中,通过分别计算风控条件的各个输出值,并利用风控规则集的逻辑运算模型来对该各个输出值进行逻辑运算处理,保证了得到的最终输出结果也为逻辑值。由于逻辑值仅包含逻辑真值以及逻辑假值,且风控规则集的风险评估等级也仅存在安全级以及危险级两种情况,因此根据输出的逻辑值来确认风险评估等级,能够提高风险评估等级的计算效率;另外,若将输出的逻辑值进行展示,可使得管理人员直接、快速得了解到当前风控规则集的风险评估等级,由此也提高了工作效率。
S104:若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型。
本申请实施例中,确定每一风控规则集的风险评估等级,并从中筛选出风险评估等级为危险级的各个风控规则集。读取筛选得到的每一风控规则集所分别对应的风险行为类型,将该风险行为类型确定为当前时刻的交易事件所存在的风险行为类型。
示例性地,若交易请求账号“Apple”发出转账5000元的交易请求,则将Apple所对应的各属性值分别输入各个风控规则集后,得到的风控规则集A和C的风险评估等级均为危险级,且风控规则集A所对应的风险行为类型为恶意套现,风控规则集C所对应的风险行为类型为伪冒注册行为,则能够确定出此次“Apple”的交易事件可能存在伪冒注册行为和恶意套现的行为风险。
S105:根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
每一风险行为类型预设有一种反馈方式。上述反馈方式表示当前需要对交易请求所执行的响应方式。反馈方式包括但不限于冻结交易请求账号、短信提醒账号注册用户、电话确认交易请求用户的真实身份以及延迟到账时间等。
本申请实施例中,仅当交易事件存在任一风险行为类型时,才执行该风险行为类型的预设反馈操作。
作为本申请的一个实施例,图3示出了本申请实施例提供的交易事件的处理方法S105的具体实现流程,详述如下:
S1051:将所述交易请求账号的账户状态变更为冻结状态。
每一交易账号的账户状态包括正常状态以及冻结状态。其中,在冻结状态下,用户将无法通过其交易账号进行任何交易操作,包括转账操作以及付款操作等,甚至包括查询操作。
本申请实施例中,若检测到当前交易请求账号满足某一类型的风险行为特征,则将其账户状态从正常状态变更为冻结状态。
优选地,向交易请求账号发出冻结提示信息,以对该交易请求进行响应。
S1052:生成关于所述交易请求账号的回访任务,并将所述回访任务分配至预设的坐席人员账户,以使对应的坐席人员根据所述回访任务进行交易事件合法性的确认。
本申请实施例中,在预设平台生成一与交易请求账号匹配的回访任务。将回访任务分配至预设的坐席人员账户后,对应的坐席人员会进行手动回访,以根据交易请求账号的注册信息,通过电话回访联系注册用户,并确认该用户是否触发了上述交易事件,以及确认该用户的合法身份信息。
S1053:若接收到关于所述交易事件的合法确认信息,则撤销所述冻结状态,并将所述交易请求账号与所述风险条件关联的所述第一属性值重置为默认值。
若坐席人员确认交易请求账号的注册用户为合法用户以及确认上述交易事件为正常交易事件,则可接收到坐席人员发出的关于该交易事件的合法确认信息。此时,重置交易请求账号的账户状态,以将其变更为正常状态。并且,由于基于当前交易请求账号的各个第一属性值以及第二属性值所确定的风险行为类型出现了错误,因而为了避免基于用户的历史行为信息所生成的第一属性值在后续交易过程中再次影响了风险行为类型的判断,将预存储的各个第一属性值进行重置处理,以恢复至交易账号在合法交易状态下所应当具备的默认第一属性值。
本申请实施例中,由于风控规则集包含多个风控条件,因而通过不同的风控规则集来确定当前交易事件所存在的风险行为类型,避免了判断条件单一的问题,提高了异常交易行为的识别准确率;另外,交易请求账号与各个风控条件关联的属性值包括基于交易请求账号的历史行为信息所预先生成的属性值,由此使得在非支付场景之下,也能预先对交易请求账号的风险状态进行初步的评估,实现了主动式的风控处理;通过综合历史行为信息以及实时交易信息所得到的属性值来共同判定交易事件是否存在风险行为,实现了对异常交易行为更为有效的检测,因此降低了交易的误拦率;并且,当交易事件对应不同的风险行为类型时,执行的反馈方式也是不同的,即,不一定要拦截交易请求,因而本申请实施例也保证了在合理进行风险控制的同时,降低了对用户交易的影响。
作为本申请的一个实施例,图4示出了本申请实施例提供的交易时间的处理方法S102的具体实现流程,详述如下:
S1021:在所述交易请求账号注册完成的时刻,记录所述交易请求账号所关联的网络地址信息以及身份验证信息,所述身份验证信息包身份属地信息。
本申请实施例中,在接收账号注册请求时,会对该注册请求所携带的来源网络地址信息进行识别。另外,在账号注册过程中,接收注册用户所输入的用于唯一识别其身份的身份验证信息,例如,身份证信息、护照信息或银行卡账号信息等。根据身份验证信息所对应的证件类型,调用与该证件类型匹配的外部接口,对注册用户的身份真实性进行确认,并获取其身份属地信息,即,身份证件的签发地信息。
本申请实施例中,在交易账号注册完成时,将注册过程中所获取得到的上述身份验证信息、网络地址信息与该交易账号的对应关系进行关联存储。
同理,对于当前交易事件的交易请求账号,在其注册完成时,也同样预存储有该交易请求账号及其身份验证信息和网络地址信息的对应关系。
S1022:根据所述身份属地信息与所述网络地址信息的匹配度,生成所述交易请求账号与所述风控条件关联的其中一个所述第一属性值。
本申请实施例中,在存储交易请求账号的身份验证信息以及网络地址信息时,计算身份属地信息以及网络地址信息的匹配程度。具体地,根据网络地址信息,可确定出该交易请求账号在注册时,其所处的一个地理区域。若注册时的地理区域与身份属地所在的地理区域存在包含关系,则身份属地信息与网络地址信息匹配。其中,当二者为相同的地理区域时,身份属地信息与网络地址信息的匹配度最高。
根据身份属地信息与网络地址信息的匹配度,生成用于量化该匹配度的数值,并将该数值输出为交易请求账号在“身份属地信息与网络地址信息的匹配度”这一属性类型上所对应的第一属性值。
本申请实施例中,通过在交易账号注册完成时,获取注册请求的网络地址信息以及身份验证信息,并预先生成用于描述身份验证信息以及网络地址信息匹配度的属性值,使得在接收到任一交易请求账号所发出的交易请求时,不用再重新计算该与风控条件关联的该属性值,提高了对交易事件风控行为类型的识别效率;由于交易事件未触发之前,与风控条件关联的各个第一属性值都已生成,因而实现了主动式地风险控制,由此也实现了在交易场景以及非交易场景之间的跨场景风险防控。
作为本申请的另一个实施例,如图5所示,上述S102具体还包括:
S1023:获取所述交易请求账号的登录设备信息。
本申请实施例中,对当前接收到的交易请求进行解析处理,以从交易请求所携带的各项参数中,提取出交易请求用户的实时的登录设备信息。
S1024:对所述登录设备信息进行解析,以确定交易请求端的终端类型,所述终端类型为中继设备或非中继设备。
由于登录设备不同时,交易请求所携带的登录设备信息的后缀信息或者关键字符也会不同,因此,根据预设算法对上述登录设备信息进行识别,以确定出交易请求端的终端类型。终端类型包括中继设备或非中继设备。
示例性地,中继设备例如可以是猫池(ModemPOOL)或模拟器等设备,非中继设备例如可以是手机或电脑等设备。
S1025:根据交易请求端的终端类型,生成所述交易请求账号与所述风控条件关联的其中一个所述第二属性值。
本申请实施例中,在仿冒注册行为所对应的风控规则集中,存在与终端类型关联的一风控条件。若检测得到的终端类型为中继设备,则将该风控条件的输出值确定为逻辑真值,将该风控条件的输出值确定为逻辑假值,并将该输出值输入该风控规则集所对应的逻辑运算模型中。此时,逻辑运算模型所记录的运算逻辑为“((风控条件1的输出值 and 风控条件2的输出值) or 风控条件3的输出值) or 风控条件4的输出值”,其中,风控条件4即上述与终端类型关联的风控条件,由此保证了只有存在中继设备所发出的交易请求,逻辑运算模型便输出逻辑真值,以确定交易事件存在仿冒注册行为的风险。
优选地,在交易请求账号注册完成时,也对注册请求所携带的参数信息进行解析,以确定出交易请求账号的终端类型,并将其终端类型对应的逻辑输出值进行存储。此时,仿冒注册行为所对应的逻辑运算模型中,记录的运算逻辑为“((风控条件1的输出值 and 风控条件2的输出值) or 风控条件3的输出值) or 风控条件4的输出值 or风控条件5的输出值”,其中,风控条件5即与注册时候的终端类型相关联的风控条件。
本申请实施例中,由于实施伪冒注册行为的欺诈分子一般是短时间内进行大规模的集中作案,因而通常会使用中继设备进行批量注册或交易,而正常的合法交易用户通常不会使用中继设备,因此,只要在识别出注册过程或者交易过程中存在中继设备,则生成与终端类型关联的属性值,使得逻辑运算模型基于该属性值能够直接确定交易事件存在仿冒注册行为的风险,因而提高了交易风险的识别准确率以及识别效率。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
对应于上文实施例所述的交易事件的处理方法,图6示出了本申请实施例提供的交易事件的处理装置的结构框图,为了便于说明,仅示出了与本申请实施例相关的部分。
参照图6,该装置包括:
第一获取单元61,用于当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件。
第二获取单元62,用于获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成。
输出单元63,用于分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级。
确定单元64,用于若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型。
反馈单元65,用于根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
可选地,所述第一获取单元62包括:
记录子单元,用于在所述交易请求账号注册完成的时刻,记录所述交易请求账号所关联的网络地址信息以及身份验证信息,所述身份验证信息包身份属地信息。
第一生成子单元,用于根据所述身份属地信息与所述网络地址信息的匹配度,生成所述交易请求账号与所述风控条件关联的其中一个所述第一属性值。
可选地,所述输出单元63包括:
计算子单元,用于当所述风控规则集对应的风险行为类型为伪冒注册行为时,根据每一所述风控条件所关联的所述第一属性值和/或所述第二属性值,计算所述风控条件的第一输出值,所述第一输出值为逻辑真值或逻辑假值。
第一获取子单元,用于获取所述风控规则集的逻辑运算模型,所述逻辑运算模型记录各个所述第一输出值之间的运算逻辑。
运算子单元,用于基于所述逻辑运算模型依次对各个所述第一输出值进行逻辑运算处理,以得到第二输出值。
确定子单元,用于若所述第二输出值为逻辑真值,则确定所述风控规则集的风险评估等级为危险级;若所述第二输出值为逻辑假值,则确定所述风控规则集的风险评估等级为安全级。
可选地,所述反馈单元65包括:
变更子单元,用于将所述交易请求账号的账户状态变更为冻结状态。
第二生成子单元,用于生成关于所述交易请求账号的回访任务,并将所述回访任务分配至预设的坐席人员账户,以使对应的坐席人员根据所述回访任务进行交易事件合法性的确认。
重置子单元,用于若接收到关于所述交易事件的合法确认信息,则撤销所述冻结状态,并将所述交易请求账号与所述风险条件关联的所述第一属性值重置为默认值。
可选地,所述第一获取单元62包括:
第二获取子单元,用于获取所述交易请求账号的登录设备信息。
解析子单元,用于对所述登录设备信息进行解析,以确定交易请求端的终端类型,所述终端类型为中继设备或非中继设备。
第三生成子单元,用于根据交易请求端的终端类型,生成所述交易请求账号与所述风控条件关联的其中一个所述第二属性值。
图7是本申请一实施例提供的终端设备的示意图。如图7所示,该实施例的终端设备7包括:处理器70以及存储器71,所述存储器71中存储有可在所述处理器70上运行的计算机可读指令72,例如交易事件的处理程序。所述处理器70执行所述计算机可读指令72时实现上述各个交易事件的处理方法实施例中的步骤,例如图1所示的步骤101至105。或者,所述处理器70执行所述计算机可读指令72时实现上述各装置实施例中各模块/单元的功能,例如图6所示单元61至65的功能。
示例性的,所述计算机可读指令72可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器71中,并由所述处理器70执行,以完成本申请。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机可读指令段,该指令段用于描述所述计算机可读指令72在所述终端设备7中的执行过程。
所述终端设备7可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述终端设备可包括,但不仅限于处理器70和存储器71。本领域技术人员可以理解,图7仅仅是终端设备7的示例,并不构成对终端设备7的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述终端设备还可以包括输入输出设备、网络接入设备、总线等。
所称处理器70可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
所述存储器71可以是所述终端设备7的内部存储单元,例如终端设备7的硬盘或内存。所述存储器71也可以是所述终端设备7的外部存储设备,例如所述终端设备7上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器71还可以既包括所述终端设备7的内部存储单元也包括外部存储设备。所述存储器71用于存储所述计算机可读指令以及所述终端设备所需的其他程序和数据。所述存储器71还可以用于暂时地存储已经输出或者将要输出的数据。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (20)

  1. 一种交易事件的处理方法,其特征在于,包括:
    当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件;
    获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成;
    分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级;
    若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型;
    根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
  2. 如权利要求1所述的交易事件的处理方法,其特征在于,所述获取交易请求账号与各个所述风控条件关联的第一属性值以及第二属性值,包括:
    在所述交易请求账号注册完成的时刻,记录所述交易请求账号所关联的网络地址信息以及身份验证信息,所述身份验证信息包身份属地信息;
    根据所述身份属地信息与所述网络地址信息的匹配度,生成所述交易请求账号与所述风控条件关联的其中一个所述第一属性值。
  3. 如权利要求1所述的交易事件的处理方法,其特征在于,所述分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,包括:
    当所述风控规则集对应的风险行为类型为伪冒注册行为时,根据每一所述风控条件所关联的所述第一属性值和/或所述第二属性值,计算所述风控条件的第一输出值,所述第一输出值为逻辑真值或逻辑假值;
    获取所述风控规则集的逻辑运算模型,所述逻辑运算模型记录各个所述第一输出值之间的运算逻辑;
    基于所述逻辑运算模型依次对各个所述第一输出值进行逻辑运算处理,以得到第二输出值;
    若所述第二输出值为逻辑真值,则确定所述风控规则集的风险评估等级为危险级;若所述第二输出值为逻辑假值,则确定所述风控规则集的风险评估等级为安全级。
  4. 如权利要求1所述的处理方法,其特征在于,所述根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作,包括:
    将所述交易请求账号的账户状态变更为冻结状态;
    生成关于所述交易请求账号的回访任务,并将所述回访任务分配至预设的坐席人员账户,以使对应的坐席人员根据所述回访任务进行交易事件合法性的确认;
    若接收到关于所述交易事件的合法确认信息,则撤销所述冻结状态,并将所述交易请求账号与所述风险条件关联的所述第一属性值重置为默认值。
  5. 如权利要求1所述的交易事件的处理方法,其特征在于,所述获取交易请求账号与各个所述风控条件关联的第一属性值以及第二属性值,包括:
    获取所述交易请求账号的登录设备信息;
    对所述登录设备信息进行解析,以确定交易请求端的终端类型,所述终端类型为中继设备或非中继设备;
    根据交易请求端的终端类型,生成所述交易请求账号与所述风控条件关联的其中一个所述第二属性值。
  6. 一种交易事件的处理装置,其特征在于,包括:
    第一获取单元,用于当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件;
    第二获取单元,用于获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成;
    输出单元,用于分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级;
    确定单元,用于若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型;
    反馈单元,用于根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
  7. 根据权利要求6所述的交易事件的处理装置,其特征在于,所述第一获取单元包括:
    记录子单元,用于在所述交易请求账号注册完成的时刻,记录所述交易请求账号所关联的网络地址信息以及身份验证信息,所述身份验证信息包身份属地信息;
    第一生成子单元,用于根据所述身份属地信息与所述网络地址信息的匹配度,生成所述交易请求账号与所述风控条件关联的其中一个所述第一属性值。
  8. 根据权利要求6所述的交易事件的处理装置,其特征在于,所述输出单元包括:
    计算子单元,用于当所述风控规则集对应的风险行为类型为伪冒注册行为时,根据每一所述风控条件所关联的所述第一属性值和/或所述第二属性值,计算所述风控条件的第一输出值,所述第一输出值为逻辑真值或逻辑假值;
    第一获取子单元,用于获取所述风控规则集的逻辑运算模型,所述逻辑运算模型记录各个所述第一输出值之间的运算逻辑;
    运算子单元,用于基于所述逻辑运算模型依次对各个所述第一输出值进行逻辑运算处理,以得到第二输出值;
    确定子单元,用于若所述第二输出值为逻辑真值,则确定所述风控规则集的风险评估等级为危险级;若所述第二输出值为逻辑假值,则确定所述风控规则集的风险评估等级为安全级。
  9. 根据权利要求6所述的交易事件的处理装置,其特征在于,所述反馈单元包括:
    变更子单元,用于将所述交易请求账号的账户状态变更为冻结状态;
    第二生成子单元,用于生成关于所述交易请求账号的回访任务,并将所述回访任务分配至预设的坐席人员账户,以使对应的坐席人员根据所述回访任务进行交易事件合法性的确认;
    重置子单元,用于若接收到关于所述交易事件的合法确认信息,则撤销所述冻结状态,并将所述交易请求账号与所述风险条件关联的所述第一属性值重置为默认值。
  10. 根据权利要求6所述的交易事件的处理装置,其特征在于,所述第一获取单元包括:
    第二获取子单元,用于获取所述交易请求账号的登录设备信息;
    解析子单元,用于对所述登录设备信息进行解析,以确定交易请求端的终端类型,所述终端类型为中继设备或非中继设备;
    第三生成子单元,用于根据交易请求端的终端类型,生成所述交易请求账号与所述风控条件关联的其中一个所述第二属性值。
  11. 一种终端设备,其特征在于,包括存储器以及处理器,所述存储器中存储有可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
    当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件;
    获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成;
    分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级;
    若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型;
    根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
  12. 根据权利要求11所述的终端设备,其特征在于,所述获取交易请求账号与各个所述风控条件关联的第一属性值以及第二属性值,包括:
    在所述交易请求账号注册完成的时刻,记录所述交易请求账号所关联的网络地址信息以及身份验证信息,所述身份验证信息包身份属地信息;
    根据所述身份属地信息与所述网络地址信息的匹配度,生成所述交易请求账号与所述风控条件关联的其中一个所述第一属性值。
  13. 根据权利要求11所述的终端设备,其特征在于,所述分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,包括:
    当所述风控规则集对应的风险行为类型为伪冒注册行为时,根据每一所述风控条件所关联的所述第一属性值和/或所述第二属性值,计算所述风控条件的第一输出值,所述第一输出值为逻辑真值或逻辑假值;
    获取所述风控规则集的逻辑运算模型,所述逻辑运算模型记录各个所述第一输出值之间的运算逻辑;
    基于所述逻辑运算模型依次对各个所述第一输出值进行逻辑运算处理,以得到第二输出值;
    若所述第二输出值为逻辑真值,则确定所述风控规则集的风险评估等级为危险级;若所述第二输出值为逻辑假值,则确定所述风控规则集的风险评估等级为安全级。
  14. 根据权利要求11所述的终端设备,其特征在于,所述根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作,包括:
    将所述交易请求账号的账户状态变更为冻结状态;
    生成关于所述交易请求账号的回访任务,并将所述回访任务分配至预设的坐席人员账户,以使对应的坐席人员根据所述回访任务进行交易事件合法性的确认;
    若接收到关于所述交易事件的合法确认信息,则撤销所述冻结状态,并将所述交易请求账号与所述风险条件关联的所述第一属性值重置为默认值。
  15. 根据权利要求11所述的终端设备,其特征在于,所述获取交易请求账号与各个所述风控条件关联的第一属性值以及第二属性值,包括:
    获取所述交易请求账号的登录设备信息;
    对所述登录设备信息进行解析,以确定交易请求端的终端类型,所述终端类型为中继设备或非中继设备;
    根据交易请求端的终端类型,生成所述交易请求账号与所述风控条件关联的其中一个所述第二属性值。
  16. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被至少一个处理器执行时实现如下步骤:
    当检测到交易事件发生时,获取预设的多个风控规则集,所述风控规则集包含多个风控条件;
    获取交易请求账号与所述风控条件关联的第一属性值以及第二属性值,所述第一属性值根据所述交易请求账号的历史行为信息预先生成,所述第二属性值根据所述交易事件的实时交易信息生成;
    分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,所述风险评估等级包括安全级或危险级;
    若存在任一所述风控规则集的所述风险评估等级为危险级,则将该风控规则集所对应的风险行为类型确定为所述交易事件所存在的风险行为类型;
    根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作。
  17. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述获取交易请求账号与各个所述风控条件关联的第一属性值以及第二属性值,具体包括:
    在所述交易请求账号注册完成的时刻,记录所述交易请求账号所关联的网络地址信息以及身份验证信息,所述身份验证信息包身份属地信息;
    根据所述身份属地信息与所述网络地址信息的匹配度,生成所述交易请求账号与所述风控条件关联的其中一个所述第一属性值。
  18. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述分别对每个所述风控规则集中的所述风控条件对应的所述第一属性值以及所述第二属性值进行运算处理,以输出每一所述风控规则集的风险评估等级,具体包括:
    当所述风控规则集对应的风险行为类型为伪冒注册行为时,根据每一所述风控条件所关联的所述第一属性值和/或所述第二属性值,计算所述风控条件的第一输出值,所述第一输出值为逻辑真值或逻辑假值;
    获取所述风控规则集的逻辑运算模型,所述逻辑运算模型记录各个所述第一输出值之间的运算逻辑;
    基于所述逻辑运算模型依次对各个所述第一输出值进行逻辑运算处理,以得到第二输出值;
    若所述第二输出值为逻辑真值,则确定所述风控规则集的风险评估等级为危险级;若所述第二输出值为逻辑假值,则确定所述风控规则集的风险评估等级为安全级。
  19. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作,包括:
    将所述交易请求账号的账户状态变更为冻结状态;
    生成关于所述交易请求账号的回访任务,并将所述回访任务分配至预设的坐席人员账户,以使对应的坐席人员根据所述回访任务进行交易事件合法性的确认;
    若接收到关于所述交易事件的合法确认信息,则撤销所述冻结状态,并将所述交易请求账号与所述风险条件关联的所述第一属性值重置为默认值。
  20. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述根据确定出的所述风险行为类型的预设反馈方式,执行对所述交易请求账号的反馈操作,具体包括:
    获取所述交易请求账号的登录设备信息;
    对所述登录设备信息进行解析,以确定交易请求端的终端类型,所述终端类型为中继设备或非中继设备;
    根据交易请求端的终端类型,生成所述交易请求账号与所述风控条件关联的其中一个所述第二属性值。
PCT/CN2018/074875 2017-12-26 2018-01-31 交易事件的处理方法、装置、终端设备及介质 WO2019127834A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711431074.0A CN108062629B (zh) 2017-12-26 2017-12-26 交易事件的处理方法、终端设备及介质
CN201711431074.0 2017-12-26

Publications (1)

Publication Number Publication Date
WO2019127834A1 true WO2019127834A1 (zh) 2019-07-04

Family

ID=62140284

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/074875 WO2019127834A1 (zh) 2017-12-26 2018-01-31 交易事件的处理方法、装置、终端设备及介质

Country Status (2)

Country Link
CN (1) CN108062629B (zh)
WO (1) WO2019127834A1 (zh)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875388A (zh) * 2018-05-31 2018-11-23 康键信息技术(深圳)有限公司 实时风险控制方法、装置及计算机可读存储介质
CN109064175B (zh) * 2018-06-11 2022-08-12 创新先进技术有限公司 一种账户盗用风险防控方法及装置
CN109146660B (zh) * 2018-06-28 2021-05-07 招联消费金融有限公司 数据处理方法及装置
CN109063977B (zh) * 2018-07-12 2022-05-03 中国银联股份有限公司 一种无感式交易风险监测方法及装置
CN109063920B (zh) * 2018-08-20 2022-05-27 创新先进技术有限公司 一种交易风险识别方法、装置、及计算机设备
CN109978317A (zh) * 2018-09-17 2019-07-05 招商银行股份有限公司 异常交易处理方法、互动平台及计算机可读存储介质
CN109376999A (zh) * 2018-09-20 2019-02-22 阿里巴巴集团控股有限公司 一种交易的管控方法、装置及设备
CN109325857A (zh) * 2018-09-20 2019-02-12 上海龙弈信息科技有限公司 一种金融安全管理及风险控制处理系统及其运行方法
CN109377003A (zh) * 2018-09-21 2019-02-22 泰康保险集团股份有限公司 风险控制方法及装置、计算机可读存储介质、电子设备
CN110033362B (zh) * 2018-11-14 2023-07-18 创新先进技术有限公司 一种打款方法、装置及设备
CN109766265A (zh) * 2018-12-15 2019-05-17 深圳壹账通智能科技有限公司 智能运维方法、装置、计算机设备及存储介质
CN109769218A (zh) * 2018-12-26 2019-05-17 中国银联股份有限公司 一种交易通知方法、装置、终端设备和介质
CN110046997A (zh) * 2019-01-31 2019-07-23 阿里巴巴集团控股有限公司 一种交易风险评估方法、装置和电子设备
CN110033268B (zh) * 2019-02-26 2024-01-09 创新先进技术有限公司 转账中的风控方法、装置及设备
CN110245941B (zh) * 2019-04-25 2023-06-30 创新先进技术有限公司 一种交易风险识别方法及装置
CN110147967B (zh) * 2019-05-28 2023-05-30 创新先进技术有限公司 风险防控方法及装置
CN110570188A (zh) * 2019-08-15 2019-12-13 阿里巴巴集团控股有限公司 用于处理交易请求的方法和系统
CN110570189B (zh) * 2019-08-15 2023-06-16 创新先进技术有限公司 账户风险防控方法和系统
CN110738571A (zh) * 2019-10-23 2020-01-31 腾讯科技(深圳)有限公司 一种交易风险控制的方法以及相关装置
CN111107057B (zh) * 2019-11-28 2022-06-14 泰康保险集团股份有限公司 异常用户账号检测方法、装置、设备及存储介质
US20200226606A1 (en) * 2020-03-26 2020-07-16 Alipay Labs (singapore) Pte. Ltd. Method and system for maximizing risk-detection coverage with constraint
CN111461730B (zh) * 2020-03-31 2022-08-05 支付宝(杭州)信息技术有限公司 一种风控方法、装置、系统和电子设备
CN111401914B (zh) * 2020-04-02 2022-07-22 支付宝(杭州)信息技术有限公司 风险评估模型的训练、风险评估方法及装置
CN113095891A (zh) * 2021-04-29 2021-07-09 中国邮政储蓄银行股份有限公司 一种数据处理方法、装置、存储介质及电子装置
CN113344453A (zh) * 2021-07-05 2021-09-03 湖南快乐阳光互动娱乐传媒有限公司 一种风险监控方法、装置、系统、存储介质和设备
CN113992429B (zh) * 2021-12-22 2022-04-29 支付宝(杭州)信息技术有限公司 一种事件的处理方法、装置及设备
CN115086086B (zh) * 2022-08-19 2022-11-11 湖南三湘银行股份有限公司 数据安全的分布式监测方法及装置
CN116797226B (zh) * 2023-03-09 2024-02-09 保山咖啡产业发展有限公司 一种基于大数据的咖啡现货交易的信息安全的评估方法

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107316134A (zh) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 一种风险控制方法、装置、服务器及存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101976419A (zh) * 2010-10-19 2011-02-16 中国工商银行股份有限公司 交易数据的风险监控处理方法和系统
CN102194177A (zh) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 一种用于在线支付风险控制的系统
CN103514566A (zh) * 2013-10-15 2014-01-15 国家电网公司 一种风险控制系统及方法
CN103745345A (zh) * 2014-01-27 2014-04-23 上海坤士合生信息科技有限公司 应用于交易平台实现金融信息分级安全处理的系统及方法
CN104966199B (zh) * 2014-11-27 2017-04-12 深圳市腾讯计算机系统有限公司 一种数据处理方法、客户端及支付平台
CN105590158A (zh) * 2014-12-30 2016-05-18 中国银联股份有限公司 交易风险实时控制系统
US20170308900A1 (en) * 2016-04-20 2017-10-26 Mastercard International Incorporated System and method for scoring cross border transactions

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107316134A (zh) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 一种风险控制方法、装置、服务器及存储介质

Also Published As

Publication number Publication date
CN108062629A (zh) 2018-05-22
CN108062629B (zh) 2021-07-09

Similar Documents

Publication Publication Date Title
WO2019127834A1 (zh) 交易事件的处理方法、装置、终端设备及介质
US10853812B2 (en) Blockchain transaction safety
KR102151862B1 (ko) 서비스 처리 방법 및 장치
RU2670030C2 (ru) Способы и системы для определения нестандартной пользовательской активности
JP5793629B2 (ja) 不正リスクアドバイザー
WO2019154115A1 (zh) 一种资源转移监测方法及装置
JP5090437B2 (ja) 不正分析用スマートクッキー
US20080010678A1 (en) Authentication Proxy
JP6438534B2 (ja) 安全なオンラインバンキングトランザクションを実行するためのシステム及び方法
WO2016058556A1 (zh) 一种业务处理方法及装置
TW201828212A (zh) 調整風險參數的方法、風險識別方法及裝置
US20160260089A1 (en) Secure account management using tokens
WO2020038036A1 (zh) 一种基于区块链存证的识别证据真实性的方法及装置
TWI701932B (zh) 一種身份認證方法、伺服器及用戶端設備
KR102259838B1 (ko) 암호화폐 블랙리스트 구축 장치 및 방법
CN110705988A (zh) 受侵害行为的交互式阻断方法和系统
CN109862006A (zh) 一种区块链系统接入方法、装置及系统
US20220366513A1 (en) Method and apparatus for check fraud detection through check image analysis
US20240089128A1 (en) Blockchain monitoring platform
US20230061605A1 (en) Systems and methods for intelligent fraud detection
US20240119456A1 (en) Method and system for fraud prevention
CN115713339A (zh) 一种数据量子计算管控方法、装置、设备及计算机介质
CN117201144A (zh) 基于人工智能的请求处理方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18893944

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/10/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18893944

Country of ref document: EP

Kind code of ref document: A1