WO2020057300A1 - Transaction monitoring method, device, and apparatus - Google Patents

Transaction monitoring method, device, and apparatus Download PDF

Info

Publication number
WO2020057300A1
WO2020057300A1 PCT/CN2019/100680 CN2019100680W WO2020057300A1 WO 2020057300 A1 WO2020057300 A1 WO 2020057300A1 CN 2019100680 W CN2019100680 W CN 2019100680W WO 2020057300 A1 WO2020057300 A1 WO 2020057300A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
risk
target transaction
management
control
Prior art date
Application number
PCT/CN2019/100680
Other languages
French (fr)
Chinese (zh)
Inventor
罗马慧
王子廷
李白昱
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2020057300A1 publication Critical patent/WO2020057300A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • This specification relates to the field of computer technology, and in particular, to a method, device, and device for controlling transactions.
  • the purpose of the embodiments of the present specification is to provide a method, device, and device for transaction control, so as to provide a solution that can balance the user experience and awaken the security awareness of the user, so as to control the fraud risk of the user's transaction and reduce the loss of user resources. .
  • a method for managing and controlling transactions provided by the embodiments of this specification, the method includes:
  • the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction
  • the management and control interaction strategy is executed to obtain a transaction result of the target transaction.
  • the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined time period and re-identifying the transaction risk within a predetermined time period.
  • the first risk management category is the first time that transaction risk is identified within a predetermined period of time
  • the generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
  • a corresponding management and control interaction strategy is generated.
  • the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
  • the risk guiding strategy includes a risk revealing strategy and a risk exhausting guiding strategy.
  • the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package
  • the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information
  • the seller information in the transaction includes account dimension information of the seller.
  • the first risk management category is to re-identify transaction risks within a predetermined period of time
  • the generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
  • the method further includes:
  • the collected report information is stored to record the target transaction between the buyer and the seller, and the risks associated with the transaction with the seller.
  • the method further includes:
  • the target transaction is stopped, and a notification message of the target transaction failure is output.
  • a transaction management device provided in the embodiments of the present specification, the device includes:
  • a data acquisition module for acquiring transaction data corresponding to a transaction request
  • a risk category determination module configured to identify, according to the transaction data, a risk management and control category to which a target transaction corresponding to the transaction request belongs, and obtain a first risk management and control category to which the target transaction belongs;
  • An interaction strategy generating module is configured to generate a management interaction strategy corresponding to the transaction request based on a first risk management category to which the target transaction belongs, where the management interaction strategy is a strategy for performing transaction risk management and control through data interaction;
  • An execution module is configured to execute the management and control interaction strategy to obtain a transaction result of the target transaction.
  • the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined time period and re-identifying the transaction risk within a predetermined time period.
  • the first risk management category is the first time that transaction risk is identified within a predetermined period of time
  • the interaction strategy generation module includes:
  • a first fraud type determining unit configured to obtain scene information of the target transaction, and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
  • a first interaction strategy generating unit is configured to generate a corresponding management and interaction strategy based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
  • the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
  • the risk guiding strategy includes a risk revealing strategy and a risk exhausting guiding strategy.
  • the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package
  • the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information
  • the seller information in the transaction includes account dimension information of the seller.
  • the first risk management category is to re-identify transaction risks within a predetermined period of time
  • the interaction strategy generation module includes:
  • a second fraud type determining unit configured to obtain scene information of the target transaction and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
  • a second interaction strategy generating unit is configured to generate corresponding security awareness test information based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
  • the apparatus further includes:
  • a report information collection module configured to collect report information based on the target transaction when a report instruction for the target transaction is received
  • the report information storage module is configured to store collected report information to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
  • the apparatus further includes:
  • the transaction stopping module is configured to stop the target transaction if it is determined that the target transaction has transaction risks, and output a notification message that the target transaction fails.
  • An embodiment of this specification provides a transaction management and control device.
  • the target transaction management and control device includes:
  • a memory arranged to store computer-executable instructions which, when executed, cause the processor to:
  • a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
  • the management and control interaction strategy is executed to obtain a transaction result of the target transaction.
  • the embodiments of the present specification obtain transaction data corresponding to the transaction request, and according to the transaction data, identify the risk management and control category to which the target transaction corresponding to the transaction request belongs, and obtain the target transaction. Based on the first risk management category of the target transaction, and then a management and control interaction strategy corresponding to the transaction request can be generated based on the first risk management and control category to which the target transaction belongs. Manage and control the interaction strategy to obtain the transaction results of the target transaction.
  • the server first determines the risk control category to which the target transaction belongs through the corresponding transaction data, and based on the obtained risk control
  • the category generates corresponding management and control interaction strategies, so that the user's security awareness can be determined based on the risk management and control category, and differentiated and interactive transaction risk management and control based on the degree of risk, awakening users with different security awareness to the security awareness of the target transaction. L operation of the user experience, and improves the success rate of pay, reduce the capital loss resulting from fraud.
  • FIG. 1 is an embodiment of a transaction management method of this specification
  • FIG. 2 is a schematic structural diagram of a transaction management system in this specification
  • FIG. 3 is another embodiment of a method for controlling transactions in this specification
  • FIG. 4 is a schematic diagram of a logical process of a transaction management method in this specification.
  • FIG. 5 is an embodiment of a transaction control device of this specification
  • FIG. 6 is an embodiment of a transaction management and control device of this specification.
  • the embodiments of the present specification provide a method, a device, and a device for controlling transactions.
  • an embodiment of the present specification provides a method for managing and controlling transactions.
  • the execution subject of the method may be a terminal device or a server, and the terminal device may be a device such as a personal computer.
  • the server can be an independent server or a server cluster composed of multiple servers, and the server can be a background server for a certain business (such as financial services), or a website (such as an online shopping website or Payment applications, etc.).
  • This method can be used for risk management and control of arbitrary transactions, and differentiated and interactive risk management and control based on user security awareness and risk level.
  • the execution subject is the server
  • the situation of the terminal device can be processed according to the following related content, which is not repeated here.
  • the method may specifically include the following steps:
  • step S102 the transaction data corresponding to the transaction request is acquired.
  • the transaction request may be a request for a buyer and a seller to trigger a transaction based on an arbitrary transaction, for example, a transaction request triggered based on a transfer, or a transaction request triggered based on scanning a QR code for payment.
  • the transaction data may include data related to the transaction corresponding to the above transaction request, such as relevant information of the seller, relevant information of the buyer, and relevant information of the transaction scenario, etc., which can be specifically determined according to the actual situation, which is not limited in the embodiments of this specification. .
  • the embodiments of the present specification provide a feasible processing method, which may specifically include the following:
  • a transaction usually requires the user's terminal device and server to complete together.
  • the user's terminal device can be installed with an application for performing the above transaction.
  • the application can be started.
  • the terminal The device can launch the application, and send a data acquisition request to the background server of the application, and can present the data acquired by the data acquisition request through the application.
  • the user can provide data provided by the application, and related information provided by the seller.
  • Information (such as a transaction link or graphic code) triggers the terminal device to generate a transaction request.
  • the terminal device may send the transaction request to the server. After the server receives the transaction request, the server may obtain relevant data (that is, transaction data) of the transaction corresponding to the transaction request, such as buyer account information and seller account information.
  • a payment application is installed in the user's terminal device.
  • the payment application can include the option of scanning the graphic code for payment, and the user can click the option.
  • the terminal device can start the camera.
  • the payment application can display the scanning interface.
  • the user can move the scanning interface to the location of the graphic code provided by the seller.
  • the terminal device can obtain the relevant information of the seller by scanning the graphic code (such as The seller's account information, etc.), and can display the relevant information of the seller and the resource input box.
  • the user can enter the resource value (such as the transaction amount, etc.) in the resource input box. After the input is completed, he can click the payment button.
  • the terminal device can generate a transaction request and send it to the server.
  • the server can obtain the relevant transaction data (that is, transaction data) according to the transaction request, such as the buyer (that is, the user's account).
  • Information, seller's account information and transaction scenario information i.e. transfer to A given account and so on.
  • step S104 according to the transaction data, the risk management control category to which the target transaction corresponding to the transaction request belongs is identified, and the first risk management control category to which the target transaction belongs is obtained.
  • the risk management and control category may be a category for risks that may exist in the transaction.
  • the risk management and control category may include multiple types, and may be specifically set according to actual conditions, which is not limited in the embodiments of the present specification.
  • the risk management and control category may include two types of transaction risk identification for the first time within a predetermined time period and re-identification of transaction risk within a predetermined time period, such as the first identification of transaction risk within a day and the re-identification of transaction risk within a day.
  • the first risk management and control category may be any of the risk management and control categories, such as first identifying a transaction risk within a predetermined period of time or re-identifying a transaction risk within a predetermined period of time.
  • the server may be provided with a risk prevention and control mechanism.
  • the risk prevention and control mechanism may be provided with multiple risk prevention and control strategies, and store relevant data of the buyer and the seller, as well as relevant information of the seller who is reported as having a risk. Information, etc.
  • the server After the server obtains the transaction data corresponding to the transaction request, it can extract the seller's account information, the buyer's account information, and the transaction scenario information from the transaction data, and then analyze the above information through the risk prevention and control mechanism.
  • the risk prevention and control mechanism determines that the currently stored information does not include the buyer's account information within a predetermined period of time, it can be determined that the user or the buyer first identified the transaction risk. At this time, the transaction corresponding to the transaction request (that is, the target transaction) can be determined.
  • the first risk management and control category belongs to identifying transaction risks for the first time. If the risk prevention and control mechanism determines that the currently stored information includes the buyer's account information for a predetermined period of time, the user or buyer can be identified to identify the risk again. At this time, it can be determined The target corresponding to this transaction request The first category of risk management and control transaction belongs to identify transaction risk again.
  • the risk management category can also be based on the user's first identification of transaction risks and Identify transaction risks.
  • the risk prevention and control mechanism can determine whether the currently stored information includes the buyer's account information for a predetermined period of time in the scenario of transferring to a predetermined account. If it includes, it can determine the first risk management control of the target transaction. The category is to identify risks again. If it is not included, it can be determined that the first risk management category to which the target transaction belongs is the first identification of risks.
  • step S106 a management and control interaction strategy corresponding to the above transaction request is generated based on the first risk management and control category to which the target transaction belongs, and the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction.
  • the management and control interaction strategy may be an interactive risk prevention and control strategy, which can remind the user to identify whether a transaction is a risk strategy in a timely manner through data interaction with the user.
  • the management and control interaction strategy may include multiple types, which may be set according to different risk management and control categories, and the content of different management and control interaction strategies may be set according to actual conditions, which are not limited in the embodiments of this specification.
  • the server may store management and control interaction modes corresponding to different risk management and control categories.
  • the management and control interaction mode may be a composition structure of management and control interaction strategies, such as a risk guidance mode (that is, a mode for guiding users to identify risks through step-by-step information prompts) Risk test mode (that is, a mode for reminding the user to identify risks by providing the user with test information) and the like.
  • a risk guidance mode that is, a mode for guiding users to identify risks through step-by-step information prompts
  • Risk test mode that is, a mode for reminding the user to identify risks by providing the user with test information
  • Risk management category Regulatory interaction mode First risk management category Interaction Mode A Second risk management category Interactive Mode B Third risk management category Interactive Mode C
  • the server After the server obtains the first risk management and control category to which the target transaction belongs, it can find the management and control interaction mode corresponding to the first risk management and control category based on Table 1 above, that is, interaction mode A. Because the management interaction mode is only the composition of the management interaction strategy, it does not include the content of the management interaction strategy. Therefore, the server can obtain the transaction scenario information, the user's account information, the user's account information, and the buyer and seller transaction information. , Transaction behavior information, the seller's historical complaint record and the seller's historical punishment record, etc., and can analyze the above information to determine the type of fraud that the target transaction may correspond to, and can obtain from the database based on the determined type of fraud. The content of the control interaction strategy corresponding to this type of fraud.
  • the server can combine the content of the above control interaction strategy with the interaction mode A to generate the control interaction strategy corresponding to the above transaction request.
  • request you The transaction to pay a certain fee usually belongs to () -A, fraudulent transaction, B, normal transaction.
  • step S108 the above-mentioned interactive control strategy is executed to obtain the transaction result of the target transaction.
  • the server after the server obtains the management and control interaction strategy corresponding to the above transaction request, it can send related data in the management and control interaction strategy to the terminal device.
  • the terminal device After receiving the data sent by the server, the terminal device can display the data, and the user can Fill in the corresponding information or select the corresponding option, and then send the filled information or the selected option information to the server, and the server can set the corresponding data according to the user feedback information to send to the user to fill in or select the information.
  • the user can know in time whether the target transaction is risky. If there is a risk, the user can stop the target transaction. If the user determines that there is no risk, the user can continue the target transaction, that is, continue to pay until Payment is complete.
  • the target transaction is when a user receives a transaction in the name of a government agency that asks you to pay a fee, and the user sees:
  • a transaction that asks you to pay a fee usually belongs to () —After the contents of the interactive control strategies such as A, fraudulent transactions, B, and normal transactions, users will pay more attention to whether the target transaction is fraudulent, thereby reminding the user that the target transaction may have risks and avoiding the loss of user resources.
  • the embodiment of the specification provides a method for managing and controlling a transaction.
  • a first risk to which the target transaction belongs is obtained.
  • the management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs.
  • the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction, and execute the management and control interaction strategy. Get the transaction result of the target transaction.
  • the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding risk management category based on the obtained risk management category.
  • Manage and control interactive strategies which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user's operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
  • an embodiment of the present specification provides a method for managing and controlling transactions.
  • the execution subject of the method may be a terminal device or a server, and the terminal device may be a device such as a personal computer.
  • the server can be an independent server or a server cluster composed of multiple servers, and the server can be a background server for a certain business (such as financial services), or a website (such as an online shopping website or Payment applications, etc.).
  • This method can be used for risk management and control of arbitrary transactions, and differentiated and interactive risk management and control based on user security awareness and risk level.
  • the execution subject is the server
  • the situation of the terminal device can be processed according to the following related content, which is not repeated here.
  • the method may specifically include the following steps:
  • step S302 the transaction data corresponding to the transaction request is acquired.
  • the transaction data may include information such as the seller's account information, buyer's account information, and transaction scenario information.
  • the transaction scenario information may include transfer to a resource card, transfer to a resource account or resource package, and the resource card may include a bank card or a transportation card.
  • resource accounts can be Alipay accounts, bank accounts, etc.
  • resource packs can be red envelopes, etc.
  • the transaction created by the user for the first time can be used to remind the user of the risk through the page reminder. If the user determines to continue the target transaction, the transaction data corresponding to the transaction request can be obtained.
  • step S304 according to the transaction data, the risk management control category to which the target transaction corresponding to the transaction request belongs is identified, and a first risk management control category to which the target transaction belongs is obtained.
  • the risk management and control category to which the target transaction belongs may include the first identification of transaction risk within a predetermined period of time and the identification of transaction risk again within a predetermined period of time.
  • the predetermined duration can be set according to the actual situation, such as 12 hours or 1 day.
  • the risk management and control categories can be divided into two categories, that is, the predetermined duration
  • the transaction risk is identified for the first time within a period of time and the transaction risk is identified again within a predetermined time period.
  • a risk prevention and control mechanism (which can be a risk data system) can be set in the server.
  • the risk prevention and control mechanism can be set with multiple risk prevention and control strategies, and store relevant data of buyers and sellers, as well as those reported as risky. Information about the seller, etc.
  • the server After the server obtains the transaction data corresponding to the transaction request, it can extract the seller's account information, the buyer's account information, and the transaction scenario information from the transaction data. Then, the above information can be analyzed separately through the risk prevention and control mechanism.
  • the prevention and control mechanism determines that the currently stored information does not include the buyer's account information for a predetermined period of time, so that it can be determined that the user or buyer first identified the transaction risk.
  • the first risk management category to which the target transaction belongs can be determined as the first identified transaction.
  • Risk if the risk prevention and control mechanism determines that the currently stored information includes the buyer's account information for a predetermined period of time, it can be determined that the user or the buyer recognizes the transaction risk again.
  • the first risk control category to which the target transaction belongs can be determined as Recognize transaction risk again.
  • the server may perform the processing of steps S306 and S308 described below.
  • step S306 scene information of the target transaction and information of buyers and sellers in the target transaction are acquired, and the type of fraud to which the target transaction belongs is determined.
  • the scenario information may include transfer to a resource card, transfer to a resource account or resource package, and the buyer information in the target transaction may include the buyer's account dimension information, transaction dimension information, and operation behavior information.
  • the seller information in the target transaction may include the seller Account dimension information.
  • the buyer's account dimension information can include the buyer's account registration information, the buyer's account funds (which can include the income and expenditure of funds, etc.), and the common place of the buyer's account (which can include the area or location of the buyer's account, etc.) Wait.
  • the transaction dimension information of the buyer may include transaction information between the buyer and the seller, the transaction behavior of the buyer, and the like.
  • the buyer's operating behavior information may include debits and invalidity of resource cards.
  • the seller's account dimension information may include the historical complaint record of the seller's account and the historical punishment record of the buyer's account. In practical applications, it may not be limited to the above information, and may also include, for example, resource transactions (such as capital transactions) between the buyer and the seller, and the degree of connection (such as friendship or kinship) between the buyer and the seller.
  • resource transactions such as capital transactions
  • degree of connection such as friendship or kinship
  • the type of fraud that triggers a transaction can be specifically set according to the actual situation, which is not limited in the embodiments of this specification.
  • the server may be provided with multiple types of fraud, and the identification mechanism and reminder mechanism corresponding to each type of fraud. For example, if the type of fraud is to request the user to perform a transaction in the name of an organization, the server An identification mechanism and a reminder mechanism for identifying the above-mentioned types of fraud may be set therein. If the server determines that the first risk management category to which the target transaction belongs is the first time that transaction risk is identified within a predetermined period of time, the server can obtain the scene information of the target transaction, as well as the buyer and seller information in the target transaction, and can extract the corresponding information from the above information.
  • Features which can include the characteristics of registration information of the buyer's account, the characteristics of the income and expenditure of the buyer's account, the characteristics of the common location of the buyer's account, the characteristics of the transaction information between the buyer and the seller, the characteristics of the buyer's transaction behavior, and the history of the seller's account.
  • the characteristics and the historical punishment characteristics of the buyer's account can be combined with the above characteristics through the variables in the risk prevention and control mechanism. Finally, the type of fraud that may be involved in the target transaction is obtained.
  • step S308 a corresponding management and control interaction strategy is generated based on the first risk control category to which the target transaction belongs and the fraud type to which the target transaction belongs.
  • the transaction risk is identified for the first time within a predetermined time period, and the management interaction mode corresponding to the first identification of transaction risk within a predetermined time period can be determined, such as risk disclosure and / or risk exclusion guidelines, and risk disclosure. It can be used to reveal the possible risks of the target transaction to the user to remind the user to proceed with the target transaction with caution.
  • the risk exclusion guidelines can be used to instruct the user to point and guide to exclude a certain risk, etc., and determine the management and control interaction required for the target transaction through the above methods.
  • the framework that is, the interactive mode of management and control
  • specific content can be added to the above framework.
  • the server can obtain relevant information and risk exclusion guidelines for risk disclosure corresponding to the type of fraud according to the type of fraud that may be involved in the target transaction.
  • Relevant information can be set into the framework of risk disclosure and risk exclusion guidance, so as to generate corresponding management and control interaction strategies.
  • the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify the risks existing in the target transaction.
  • the risk guidance strategy may include a prevention and control guidance strategy for the risks corresponding to different types of fraud, which can help users identify the current transaction (i.e. the target Transactions), and guide users to stop target transactions in a timely manner.
  • risk guidance strategies can include risk disclosure strategies and risk exclusion guidance strategies.
  • the risk disclosure strategy can include the disclosure of relevant characteristics or characteristics of different types of fraud.
  • the types of fraud that may be involved in target transactions are fraud type 1 and fraud type 2.
  • Common characteristics or characteristics of fraud type 1 can be used. Show to the user (or buyer), the user can view the above-mentioned common characteristics or features. If the user believes that the target transaction meets the above-mentioned common characteristics or features, the user will determine that the target transaction may have transaction risks. At this time, the user can further decide whether to follow up For transactions, if the user believes that the target transaction does not meet the above common characteristics or characteristics, the risk disclosure strategy will guide the user to check the common characteristics or characteristics of the fraud type 2.
  • the user can continue to determine whether the target transaction meets the above common characteristics or characteristics until it is determined Whether the target transaction is risky.
  • the server may set multiple optional processes for the target transaction. Specifically, if the strategy is disclosed through the risks corresponding to the fraud types 1 and 2 described above, the user determines that there is no transaction risk or transaction risk in the target transaction. Small, at this time, the user can continue the target transaction. If the user determines that the target transaction has transaction risk or the transaction risk is large, at this time, the user can ignore the target transaction through the "back" button provided in the terminal device. If the user is not sure of the target The size of the transaction risk of the transaction.
  • the user can obtain more relevant information from the server through the buttons such as "more security education” provided in the terminal device to further determine the size of the transaction risk of the target transaction. If the user determines the target transaction If there is transaction risk, you can report the target transaction and the seller. For details, please refer to the following related content, which will not be repeated here.
  • the risk exclusion guidance strategy may be a strategy in which the user provides the user with the transaction risk that the target transaction may have in the process of determining whether the target transaction has transaction risk, and asks the user for confirmation.
  • the target transaction may involve fraud type 1 and fraud type 2.
  • the server can determine the target transaction as a transaction corresponding to fraud type 1 and provide it to the user for confirmation. If the user determines that the target transaction corresponds to fraud type 1 Transaction, you can ignore the target transaction by pressing the "Back" button provided in the terminal device or report the target transaction and the seller. If the user determines that the target transaction is not a transaction corresponding to fraud type 1, the server can send the target transaction The transaction determined to be fraud type 2 is provided to the user for confirmation.
  • the server may perform the processing of steps S310 and S312 described below.
  • step S310 scene information of the target transaction and information of buyers and sellers in the target transaction are acquired, and the type of fraud to which the target transaction belongs is determined.
  • the content of the step S310 is the same as the content of the step S306.
  • step S312 the corresponding security awareness test information is generated based on the first risk control category to which the target transaction belongs and the type of fraud to which the target transaction belongs.
  • the security awareness test information may be test information composed of one or more test questions and corresponding optional answers, and may also be test information composed of one or more test questions and information input boxes.
  • the server can collect the transaction information of the target transaction, and can perform feature extraction and other processing on the above information to obtain corresponding characteristics.
  • the above-mentioned characteristics can be fused through the variables in the risk prevention and control mechanism, and finally the type of fraud that the target transaction may involve.
  • the transaction risk can be identified again within a predetermined period of time, and the management and control interaction strategy corresponding to the transaction risk can be identified again within a predetermined period of time, that is, the security awareness test information. Awaken the user's security awareness of the target transaction and prevent the loss of user resources.
  • the type of fraud that may be involved in the target transaction includes fraud type 3 and fraud type 4, based on each type of fraud, you can select security awareness test information corresponding to the type of fraud from a predetermined test database, that is, you can The security awareness test information corresponding to fraud type 3 and fraud type 4 is selected from a predetermined test database.
  • the security awareness test information corresponding to each fraud type may be one or multiple.
  • the fraud type 3 is telecommunications.
  • the corresponding security awareness test information can be: In the name of Organization A, the transaction that asks you to pay a fee usually belongs to () -A, fraudulent transaction, B, normal transaction, etc.
  • the server can judge through the above method The strength of the user (or buyer) in the security awareness of the transaction, and based on this, it can be further determined whether the user needs to be educated or awakened in security awareness to prevent the loss of user resources.
  • step S314 the above-mentioned interactive control strategy is executed to obtain the transaction result of the target transaction.
  • the server may set a plurality of optional processes for the target transaction. Specifically, if the user determines that the target transaction does not exist after the above steps S306 and S308 or steps S310 and S312 are processed The transaction risk or transaction risk is small. At this time, the user can continue the target transaction. If the user determines that the target transaction has transaction risk or the transaction risk is large, at this time, the user can ignore the target transaction through the "back" button provided in the terminal device. If the user is not sure about the transaction risk of the target transaction, at this time, the user can obtain more relevant information from the server through the buttons such as "more security education" provided in the terminal device to further determine the magnitude of the transaction risk of the target transaction. If the user determines that there is transaction risk in the target transaction, the target transaction and the seller can be reported and processed. For details, please refer to the following related content, which will not be repeated here.
  • step S316 when a report instruction for a target transaction is received, report information based on the target transaction is collected.
  • the report information may include relevant information of the seller (such as the account information of the seller, the use location information of the seller's account, the seller's fraud method, etc.), relevant information of the buyer (such as the buyer's account information, the use of the buyer's account, etc. ).
  • step S318 the collected report information is stored to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
  • the server can store the collected report information in the relevant database of the above-mentioned risk prevention and control mechanism (or risk data system).
  • risk prevention and control mechanism or risk data system.
  • the server can warn the user of the risk.
  • the server can continuously output a transaction failure to allow the user to Be aware of the fraud risks reminded in the above-mentioned interactive control strategy to awaken the security awareness of users and protect users' resources from loss.
  • step S320 if it is determined that the target transaction has transaction risk, the target transaction is stopped, and a notification message of the target transaction failure is output.
  • the transaction control scheme in this embodiment fully considers the difference in the level of user security awareness, and adopts different levels of wake-up mechanisms for users with different levels of security awareness (that is, risk management and control categories). Disturb heavy reminder "goal.
  • the added information return mechanism of the transaction control scheme can collect more user-side information and enhance the accuracy of the user's actual situation judgment.
  • the real-time reporting mechanism can also effectively prevent the fraudulent secondary fraud and increase the risk of fraud. Control capabilities.
  • the embodiment of the specification provides a method for managing and controlling a transaction.
  • a first risk to which the target transaction belongs is obtained.
  • the management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs.
  • the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction, and execute the management and control interaction strategy. Get the transaction result of the target transaction.
  • the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding risk management category based on the obtained risk management category.
  • Manage and control interactive strategies which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user's operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
  • the embodiment of the specification also provides a transaction management and control device, as shown in FIG. 5.
  • the transaction control device includes a data acquisition module 501, a risk category determination module 502, an interaction strategy generation module 503, and an execution module 504, of which:
  • a data acquisition module 501 configured to acquire transaction data corresponding to a transaction request
  • a risk category determination module 502 configured to identify, according to the transaction data, a risk management and control category to which a target transaction corresponding to the transaction request belongs, and obtain a first risk management and control category to which the target transaction belongs;
  • An interaction policy generating module 503 is configured to generate a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
  • the execution module 504 is configured to execute the management and control interaction strategy to obtain a transaction result of the target transaction.
  • the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined period and re-identifying the transaction risk within a predetermined period.
  • the first risk control category is the first time that transaction risk is identified within a predetermined period of time
  • the interaction policy generation module 503 includes:
  • a first fraud type determining unit configured to obtain scene information of the target transaction, and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
  • a first interaction strategy generating unit is configured to generate a corresponding management and interaction strategy based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
  • the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
  • the risk guidance strategy includes a risk disclosure strategy and a risk discharge guidance strategy.
  • the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package
  • the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information
  • the seller information in the target transaction includes account dimension information of the seller.
  • the first risk control category is to identify the transaction risk again within a predetermined period of time
  • the interaction policy generation module 503 includes:
  • a second fraud type determining unit configured to obtain scene information of the target transaction and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
  • a second interaction strategy generating unit is configured to generate corresponding security awareness test information based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
  • the device further includes:
  • a report information collection module configured to collect report information based on the target transaction when a report instruction for the target transaction is received
  • the report information storage module is configured to store collected report information to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
  • the device further includes:
  • the transaction stopping module is configured to stop the target transaction if it is determined that the target transaction has transaction risks, and output a notification message that the target transaction fails.
  • the embodiment of the present specification provides a transaction management and control device.
  • a transaction management and control device By acquiring transaction data corresponding to a transaction request, and according to the transaction data, identifying a risk management control category to which the target transaction corresponding to the transaction request belongs, to obtain a first risk to which the target transaction belongs.
  • the management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs. Get the transaction result of the target transaction.
  • the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding Manage and control interactive strategies, which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
  • the embodiment of the specification also provides a transaction management and control device, as shown in FIG. 6.
  • the target transaction management and control device may be a server provided in the foregoing embodiment.
  • the transaction management and control equipment may have relatively large differences due to different configurations or performance, and may include one or more processors 601 and memory 602.
  • the memory 602 may store one or more storage applications or data.
  • the memory 602 may be a temporary storage or a persistent storage.
  • the application program stored in the memory 602 may include one or more modules (not shown), and each module may include a series of computer-executable instructions in a transaction control device.
  • the processor 601 may be configured to communicate with the memory 602 and execute a series of computer-executable instructions in the memory 602 on a transaction management device.
  • the transaction management equipment may also include one or more power sources 603, one or more wired or wireless network interfaces 604, one or more input / output interfaces 605, and one or more keyboards 606.
  • the transaction management and control device includes a memory and one or more programs.
  • One or more programs are stored in the memory, and one or more programs may include one or more modules.
  • Each module may include a series of computer-executable instructions in a transaction control device, and configured to be executed by one or more processors.
  • the one or more programs include computer-executable instructions for:
  • a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
  • the management and control interaction strategy is executed to obtain a transaction result of the target transaction.
  • the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined period and re-identifying the transaction risk within a predetermined period.
  • the first risk control category is the first time that transaction risk is identified within a predetermined period of time
  • the generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
  • a corresponding management and control interaction strategy is generated.
  • the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
  • the risk guidance strategy includes a risk disclosure strategy and a risk discharge guidance strategy.
  • the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package
  • the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information
  • the seller information in the target transaction includes account dimension information of the seller.
  • the first risk control category is to identify the transaction risk again within a predetermined period of time
  • the generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
  • the collected report information is stored to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
  • the target transaction is stopped, and a notification message of the target transaction failure is output.
  • the embodiment of the present specification provides a transaction management and control device.
  • a transaction management and control device By acquiring transaction data corresponding to a transaction request, and according to the transaction data, identifying a risk management and control category to which the target transaction corresponding to the transaction request belongs, to obtain a first risk to which the target transaction belongs.
  • the management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs.
  • the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction, and execute the management and control interaction strategy. Get the transaction result of the target transaction.
  • the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding risk management category based on the obtained risk management category.
  • Manage and control interactive strategies which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user's operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
  • a programmable logic device Programmable Logic Device (PLD)
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller may be implemented in any suitable manner, for example, the controller may take the form of a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor. , Logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers, and embedded microcontrollers. Examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, With the Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory.
  • the controller may take the form of a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor. , Logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers, and embedded microcontrollers. Examples of controllers include, but are
  • controller logic gates, switches, application-specific integrated circuits, programmable logic controllers, and embedded controllers by logic programming the method steps Microcontrollers, etc. to achieve the same function. Therefore, such a controller can be regarded as a hardware component, and a device included in the controller for implementing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as a structure that can be both a software module implementing the method and a hardware component.
  • the system, device, module, or unit described in the foregoing embodiments may be specifically implemented by a computer chip or entity, or a product with a certain function.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
  • embodiments of the present specification may be provided as a method, a system, or a computer program product. Therefore, one or more embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present specification may adopt a computer program implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code therein. The form of the product.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • Embodiments of the present specification are described with reference to flowcharts and / or block diagrams of methods, devices (systems), and computer program products according to the embodiments of the present specification. It should be understood that each process and / or block in the flowcharts and / or block diagrams, and combinations of processes and / or blocks in the flowcharts and / or block diagrams can be implemented by computer program instructions.
  • These computer program instructions may be provided to a processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to produce a machine, so that the instructions generated by the processor of the computer or other programmable data processing device are used to generate instructions Means for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
  • a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.
  • processors CPUs
  • input / output interfaces output interfaces
  • network interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information can be stored by any method or technology.
  • Information may be computer-readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media may be used to store information that can be accessed by computing devices.
  • computer-readable media does not include temporary computer-readable media, such as modulated data signals and carrier waves.
  • one or more embodiments of the present specification may be provided as a method, a system, or a computer program product. Therefore, one or more embodiments of the present specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present specification may adopt a computer program implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code therein. The form of the product.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • One or more embodiments of the specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • One or more embodiments of the present specification may also be practiced in distributed computing environments in which tasks are performed by remote processing devices connected through a communication network.
  • program modules may be located in local and remote computer storage media, including storage devices.

Abstract

Embodiments of the present specification disclose a transaction monitoring method, device, and apparatus. The method comprises: acquiring transaction data corresponding to a transaction request; identifying, according to the transaction data, a risk monitoring category to which a target transaction corresponding to the transaction request belongs, and obtaining a first risk monitoring category to which the target transaction belongs; generating, on the basis of the first risk monitoring category to which the target transaction belongs, an interaction-based monitoring strategy corresponding to the transaction request, wherein the interaction-based monitoring strategy is a strategy for performing transaction risk monitoring by means of data interaction; and implementing the interaction-based monitoring strategy, and obtaining a transaction result of the target transaction.

Description

一种交易的管控方法、装置及设备Method, device and equipment for controlling transaction 技术领域Technical field
本说明书涉及计算机技术领域,尤其涉及一种交易的管控方法、装置及设备。This specification relates to the field of computer technology, and in particular, to a method, device, and device for controlling transactions.
背景技术Background technique
随着网络技术和终端技术的不断发展,服务提供者通过服务器为用户提供各种服务,而用户可以使用终端通过网络向相应的服务器请求相应的服务。随着网络服务的不断壮大,网络交易的数量也越来越大,而其中就会包含欺诈交易,欺诈交易的识别和管控一直是风险防控领域的难点。With the continuous development of network technology and terminal technology, service providers provide users with various services through servers, and users can use terminals to request corresponding services from corresponding servers through the network. With the continuous growth of network services, the number of network transactions is also increasing, and fraudulent transactions will be included in them. The identification and management of fraudulent transactions has always been a difficult point in the field of risk prevention and control.
近年来电信诈骗风险形势严峻,黑产专业化及诈骗手法升级,人们安全意识与互联网高速普及形成差距,因此,对欺诈风险防控提出了更高的要求。由于欺诈者与用户之间存在更加紧密的交互联系,而用户对于交易风险的认知有限,往往需要通过反复的进行风险防控策略介入才能起到反欺诈的效果,但对于未遭遇欺诈风险的用户而言,上述反复的进行风险防控策略介入对用户的操作体验的影响较大。为了有效解决欺诈风险给用户带来的损害,提升用户安全感知,需要提供一种能够平衡用户体验和唤醒用户安全意识的方案,以对用户的交易进行欺诈风险管控,降低用户的资源损失。In recent years, the situation of telecommunication fraud risks has been severe, the black industry specialization and fraud methods have been upgraded, and people's security awareness has formed a gap with the high-speed popularity of the Internet. Therefore, higher requirements have been put forward for fraud risk prevention and control. Due to the closer interaction between fraudsters and users, and users' limited awareness of transaction risks, it is often necessary to repeatedly engage in risk prevention and control strategies to achieve anti-fraud effects, but for those who have not encountered fraud risks, For users, the above-mentioned repeated risk prevention and control strategy intervention has a greater impact on the user's operating experience. In order to effectively address the damage caused by fraud risks to users and improve their security perceptions, it is necessary to provide a solution that can balance the user experience and awaken the user's security awareness, in order to manage the fraud risks of user transactions and reduce the loss of user resources.
发明内容Summary of the Invention
本说明书实施例的目的是提供一种交易的管控方法、装置及设备,以提供一种能够平衡用户体验和唤醒用户安全意识的方案,以对用户的交易进行欺诈风险管控,降低用户的资源损失。The purpose of the embodiments of the present specification is to provide a method, device, and device for transaction control, so as to provide a solution that can balance the user experience and awaken the security awareness of the user, so as to control the fraud risk of the user's transaction and reduce the loss of user resources. .
为解决上述技术问题,本说明书实施例是这样实现的:To solve the above technical problems, the embodiments of the present specification are implemented as follows:
本说明书实施例提供的一种交易的管控方法,所述方法包括:A method for managing and controlling transactions provided by the embodiments of this specification, the method includes:
获取交易请求对应的交易数据;Get the transaction data corresponding to the transaction request;
根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;Identifying the risk management and control category to which the target transaction corresponding to the transaction request belongs according to the transaction data, and obtaining the first risk management and control category to which the target transaction belongs;
基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策 略,所述管控交互策略为通过数据交互的方式进行交易风险管控的策略;Generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
执行所述管控交互策略,得到所述目标交易的交易结果。The management and control interaction strategy is executed to obtain a transaction result of the target transaction.
可选地,所述目标交易所属的风险管控类别包括预定时长内首次识别交易风险和预定时长内再次识别交易风险。Optionally, the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined time period and re-identifying the transaction risk within a predetermined time period.
可选地,所述第一风险管控类别为预定时长内首次识别交易风险,Optionally, the first risk management category is the first time that transaction risk is identified within a predetermined period of time,
所述基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,包括:The generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;Acquiring scene information of the target transaction, and information of buyers and sellers in the target transaction, and determining the type of fraud to which the target transaction belongs;
基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的管控交互策略。Based on the first risk management category to which the target transaction belongs and the type of fraud to which the target transaction belongs, a corresponding management and control interaction strategy is generated.
可选地,所述管控交互策略包括用于引导所述买方识别所述目标交易中存在的风险的风险引导策略。Optionally, the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
可选地,所述风险引导策略包括风险揭示策略和风险排出指引策略。Optionally, the risk guiding strategy includes a risk revealing strategy and a risk exhausting guiding strategy.
可选地,所述场景信息包括转账到资源卡、转账到资源账户或资源包,所述目标交易中的买方信息包括所述买方的账户维度信息、交易维度信息和操作行为信息,所述目标交易中的卖方信息包括所述卖方的账户维度信息。Optionally, the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package, and the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information. The seller information in the transaction includes account dimension information of the seller.
可选地,所述第一风险管控类别为预定时长内再次识别交易风险,Optionally, the first risk management category is to re-identify transaction risks within a predetermined period of time,
所述基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,包括:The generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;Acquiring scene information of the target transaction, and information of buyers and sellers in the target transaction, and determining the type of fraud to which the target transaction belongs;
基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的安全意识测试信息。Based on the first risk management category to which the target transaction belongs and the type of fraud to which the target transaction belongs, corresponding security awareness test information is generated.
可选地,所述方法还包括:Optionally, the method further includes:
当接收到对所述目标交易的举报指令时,采集基于所述目标交易的举报信息;When a report instruction for the target transaction is received, collecting report information based on the target transaction;
存储采集的举报信息,以记录所述买方和所述卖方之间的所述目标交易,以及与所 述卖方交易存在的风险。The collected report information is stored to record the target transaction between the buyer and the seller, and the risks associated with the transaction with the seller.
可选地,所述方法还包括:Optionally, the method further includes:
如果确定所述目标交易存在交易风险,则停止所述目标交易,并输出所述目标交易失败的通知消息。If it is determined that the target transaction has transaction risk, the target transaction is stopped, and a notification message of the target transaction failure is output.
本说明书实施例提供的一种交易的管控装置,所述装置包括:A transaction management device provided in the embodiments of the present specification, the device includes:
数据获取模块,用于获取交易请求对应的交易数据;A data acquisition module for acquiring transaction data corresponding to a transaction request;
风险类别确定模块,用于根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;A risk category determination module, configured to identify, according to the transaction data, a risk management and control category to which a target transaction corresponding to the transaction request belongs, and obtain a first risk management and control category to which the target transaction belongs;
交互策略生成模块,用于基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,所述管控交互策略为通过数据交互的方式进行交易风险管控的策略;An interaction strategy generating module is configured to generate a management interaction strategy corresponding to the transaction request based on a first risk management category to which the target transaction belongs, where the management interaction strategy is a strategy for performing transaction risk management and control through data interaction;
执行模块,用于执行所述管控交互策略,得到所述目标交易的交易结果。An execution module is configured to execute the management and control interaction strategy to obtain a transaction result of the target transaction.
可选地,所述目标交易所属的风险管控类别包括预定时长内首次识别交易风险和预定时长内再次识别交易风险。Optionally, the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined time period and re-identifying the transaction risk within a predetermined time period.
可选地,所述第一风险管控类别为预定时长内首次识别交易风险,Optionally, the first risk management category is the first time that transaction risk is identified within a predetermined period of time,
所述交互策略生成模块,包括:The interaction strategy generation module includes:
第一欺诈类型确定单元,用于获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;A first fraud type determining unit, configured to obtain scene information of the target transaction, and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
第一交互策略生成单元,用于基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的管控交互策略。A first interaction strategy generating unit is configured to generate a corresponding management and interaction strategy based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
可选地,所述管控交互策略包括用于引导所述买方识别所述目标交易中存在的风险的风险引导策略。Optionally, the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
可选地,所述风险引导策略包括风险揭示策略和风险排出指引策略。Optionally, the risk guiding strategy includes a risk revealing strategy and a risk exhausting guiding strategy.
可选地,所述场景信息包括转账到资源卡、转账到资源账户或资源包,所述目标交易中的买方信息包括所述买方的账户维度信息、交易维度信息和操作行为信息,所述目标交易中的卖方信息包括所述卖方的账户维度信息。Optionally, the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package, and the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information. The seller information in the transaction includes account dimension information of the seller.
可选地,所述第一风险管控类别为预定时长内再次识别交易风险,Optionally, the first risk management category is to re-identify transaction risks within a predetermined period of time,
所述交互策略生成模块,包括:The interaction strategy generation module includes:
第二欺诈类型确定单元,用于获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;A second fraud type determining unit, configured to obtain scene information of the target transaction and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
第二交互策略生成单元,用于基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的安全意识测试信息。A second interaction strategy generating unit is configured to generate corresponding security awareness test information based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
可选地,所述装置还包括:Optionally, the apparatus further includes:
举报信息采集模块,用于当接收到对所述目标交易的举报指令时,采集基于所述目标交易的举报信息;A report information collection module, configured to collect report information based on the target transaction when a report instruction for the target transaction is received;
举报信息存储模块,用于存储采集的举报信息,以记录所述买方和所述卖方之间的所述目标交易,以及与所述卖方交易存在的风险。The report information storage module is configured to store collected report information to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
可选地,所述装置还包括:Optionally, the apparatus further includes:
停止交易模块,用于如果确定所述目标交易存在交易风险,则停止所述目标交易,并输出所述目标交易失败的通知消息。The transaction stopping module is configured to stop the target transaction if it is determined that the target transaction has transaction risks, and output a notification message that the target transaction fails.
本说明书实施例提供的一种交易的管控设备,所述目标交易的管控设备包括:An embodiment of this specification provides a transaction management and control device. The target transaction management and control device includes:
处理器;以及Processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:A memory arranged to store computer-executable instructions which, when executed, cause the processor to:
获取交易请求对应的交易数据;Get the transaction data corresponding to the transaction request;
根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;Identifying the risk management and control category to which the target transaction corresponding to the transaction request belongs according to the transaction data, and obtaining the first risk management and control category to which the target transaction belongs;
基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,所述管控交互策略为通过数据交互的方式进行交易风险管控的策略;Generating a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
执行所述管控交互策略,得到所述目标交易的交易结果。The management and control interaction strategy is executed to obtain a transaction result of the target transaction.
由以上本说明书实施例提供的技术方案可见,本说明书实施例通过获取交易请求对应的交易数据,根据该交易数据,对该交易请求对应的目标交易所属的风险管控类别进行识别,得到目标交易所属的第一风险管控类别,然后,可以基于目标交易所属的第一风险管控类别,生成该交易请求对应的管控交互策略,该管控交互策略为通过数据交互 的方式进行交易风险管控的策略,执行该管控交互策略,得到目标交易的交易结果,这样,每当用户创建或执行某交易(即目标交易)时,服务器先通过相应的交易数据确定目标交易所属的风险管控类别,并基于得到的风险管控类别生成对应的管控交互策略,从而可以基于风险管控类别确定用户安全意识的强弱等,并基于风险程度进行差异化交互式的交易风险管控,唤醒不同安全意识的用户对目标交易的安全意识,提升了用户的操作体验,并且提升了支付成功率,有效降低欺诈造成的资损。It can be seen from the technical solutions provided by the embodiments of the present specification that the embodiments of the present specification obtain transaction data corresponding to the transaction request, and according to the transaction data, identify the risk management and control category to which the target transaction corresponding to the transaction request belongs, and obtain the target transaction. Based on the first risk management category of the target transaction, and then a management and control interaction strategy corresponding to the transaction request can be generated based on the first risk management and control category to which the target transaction belongs. Manage and control the interaction strategy to obtain the transaction results of the target transaction. In this way, whenever a user creates or executes a transaction (that is, the target transaction), the server first determines the risk control category to which the target transaction belongs through the corresponding transaction data, and based on the obtained risk control The category generates corresponding management and control interaction strategies, so that the user's security awareness can be determined based on the risk management and control category, and differentiated and interactive transaction risk management and control based on the degree of risk, awakening users with different security awareness to the security awareness of the target transaction. L operation of the user experience, and improves the success rate of pay, reduce the capital loss resulting from fraud.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly explain the embodiments of the present specification or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly introduced below. Obviously, the drawings in the following description are merely These are some of the embodiments described in this specification. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without paying creative labor.
图1为本说明书一种交易的管控方法实施例;FIG. 1 is an embodiment of a transaction management method of this specification;
图2为本说明书一种交易的管控系统结构示意图;FIG. 2 is a schematic structural diagram of a transaction management system in this specification;
图3为本说明书另一种交易的管控方法实施例;FIG. 3 is another embodiment of a method for controlling transactions in this specification;
图4为本说明书一种交易的管控方法的逻辑过程示意图;FIG. 4 is a schematic diagram of a logical process of a transaction management method in this specification;
图5为本说明书一种交易的管控装置实施例;FIG. 5 is an embodiment of a transaction control device of this specification;
图6为本说明书一种交易的管控设备实施例。FIG. 6 is an embodiment of a transaction management and control device of this specification.
具体实施方式detailed description
本说明书实施例提供一种交易的管控方法、装置及设备。The embodiments of the present specification provide a method, a device, and a device for controlling transactions.
为了使本技术领域的人员更好地理解本说明书中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书保护的范围。In order to enable those skilled in the art to better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described with reference to the accompanying drawings in the embodiments of the present specification. Obviously, the described The examples are only a part of examples of this specification, but not all examples. Based on the embodiments in this specification, all other embodiments obtained by a person of ordinary skill in the art without creative efforts should fall within the protection scope of this specification.
实施例一Example one
如图1所示,本说明书实施例提供一种交易的管控方法,该方法的执行主体可以为 终端设备或服务器,其中,该终端设备可以如个人计算机等设备。该服务器可以是独立的服务器,也可以是由多个服务器组成的服务器集群,而且,该服务器可以是某项业务(如金融业务等)的后台服务器,也可以是某网站(如网络购物网站或支付应用等)的后台服务器等。该方法可以用于对任意的交易进行风险管控,并基于用户安全意识和风险程度进行差异化交互式的风险管控等处理中,为了提高交易风险的管控效率,本实施例中以执行主体为服务器为例进行说明,对于终端设备的情况,可以根据下述相关内容处理,在此不再赘述。该方法具体可以包括以下步骤:As shown in FIG. 1, an embodiment of the present specification provides a method for managing and controlling transactions. The execution subject of the method may be a terminal device or a server, and the terminal device may be a device such as a personal computer. The server can be an independent server or a server cluster composed of multiple servers, and the server can be a background server for a certain business (such as financial services), or a website (such as an online shopping website or Payment applications, etc.). This method can be used for risk management and control of arbitrary transactions, and differentiated and interactive risk management and control based on user security awareness and risk level. In order to improve the efficiency of transaction risk management and control, in this embodiment, the execution subject is the server As an example for description, the situation of the terminal device can be processed according to the following related content, which is not repeated here. The method may specifically include the following steps:
在步骤S102中,获取交易请求对应的交易数据。In step S102, the transaction data corresponding to the transaction request is acquired.
其中,交易请求可以是基于任意交易触发的买方和卖方进行交易的请求,例如可以是基于转账触发的交易请求,或基于扫描二维码进行支付而触发的交易请求等。交易数据可以包括与上述交易请求对应的交易相关的数据等,例如卖方的相关信息、买方的相关信息和交易场景的相关信息等,具体可以根据实际情况确定,本说明书实施例对此不做限定。Among them, the transaction request may be a request for a buyer and a seller to trigger a transaction based on an arbitrary transaction, for example, a transaction request triggered based on a transfer, or a transaction request triggered based on scanning a QR code for payment. The transaction data may include data related to the transaction corresponding to the above transaction request, such as relevant information of the seller, relevant information of the buyer, and relevant information of the transaction scenario, etc., which can be specifically determined according to the actual situation, which is not limited in the embodiments of this specification. .
在实施中,随着网络技术和终端技术的不断发展,服务提供者通过服务器为用户提供各种服务,而用户可以使用终端通过网络向相应的服务器请求相应的服务。随着网络服务的不断壮大,网络交易的数量也越来越大,而其中就会包含欺诈交易。欺诈交易的识别和管控一直是风险防控领域的难点。近年来电信诈骗风险形势严峻,黑产专业化及诈骗手法升级,人们安全意识与互联网高速普及形成差距,对欺诈风险防控提出了更高的要求。为了有效解决欺诈风险给用户带来的损害,提升用户安全感知,需要通过一定的方式对用户的交易进行欺诈风险管控,降低用户资金损失。In the implementation, with the continuous development of network technology and terminal technology, service providers provide users with various services through servers, and users can use terminals to request corresponding services from corresponding servers through the network. With the continuous growth of network services, the number of network transactions is also increasing, and fraudulent transactions will be included. The identification and management of fraudulent transactions has always been a difficult point in the field of risk prevention and control. In recent years, the situation of telecommunication fraud risks has been severe, the black industry specialization and fraud methods have been upgraded, and people's security awareness has formed a gap with the high-speed popularity of the Internet, which has put forward higher requirements for fraud risk prevention and control. In order to effectively solve the damage caused by fraud risks to users and improve user security awareness, it is necessary to conduct fraud risk management and control on user transactions in a certain way to reduce user funds loss.
由于欺诈者与用户之间更加紧密的交互联系,而用户对于交易风险的认知有限,往往需要通过反复的进行风险防控策略介入才能起到反欺诈的效果,但对于未遭遇欺诈风险的用户而言,上述反复的进行风险防控策略介入对用户的操作体验的影响较大。而如何更加有效地减少用户受欺诈的资源损失,同时又能有效降低用户打扰,减少业务的流失量,需要设计一种能够平衡用户体验和唤醒用户安全意识的方案。为此,本说明书实施例提供一种可行的处理方式,具体可以包括以下内容:Due to the closer interaction between fraudsters and users, and users' limited awareness of transaction risks, it is often necessary to repeatedly engage in risk prevention and control strategies to achieve anti-fraud effects, but for users who have not encountered fraud risks In terms of the above-mentioned repeated risk prevention and control strategy intervention, the user's operation experience has a greater impact. And how to more effectively reduce the user's loss of fraudulent resources, at the same time can effectively reduce user interruptions and reduce the amount of business loss, it is necessary to design a scheme that can balance the user experience and wake up the user's security awareness. To this end, the embodiments of the present specification provide a feasible processing method, which may specifically include the following:
如图2所示,某项交易通常需要用户的终端设备和服务器共同完成,用户的终端设备中可以安装有进行上述交易的应用程序,当用户需要进行上述交易时,可以启动该应用程序,终端设备可以启动该应用程序,并向该应用程序的后台服务器发送数据获取请求,并可以通过该应用程序呈现该数据获取请求获取的数据,用户可以通过该应用程序 提供的数据,以及卖方提供的相关信息(如交易链接或图形码等)触发终端设备生成交易请求。终端设备可以将该交易请求发送给服务器,服务器接收到该交易请求后,可以获取该交易请求对应的交易的相关数据(即交易数据),例如买方的账户信息和卖方的账户信息等。As shown in Figure 2, a transaction usually requires the user's terminal device and server to complete together. The user's terminal device can be installed with an application for performing the above transaction. When the user needs to perform the above transaction, the application can be started. The terminal The device can launch the application, and send a data acquisition request to the background server of the application, and can present the data acquired by the data acquisition request through the application. The user can provide data provided by the application, and related information provided by the seller. Information (such as a transaction link or graphic code) triggers the terminal device to generate a transaction request. The terminal device may send the transaction request to the server. After the server receives the transaction request, the server may obtain relevant data (that is, transaction data) of the transaction corresponding to the transaction request, such as buyer account information and seller account information.
例如,用户的终端设备中安装有支付应用,当用户需要向某卖方进行支付或进行转账时,可以启动该支付应用,该支付应用中可以包括扫描图形码支付的选项,用户可以点击该选项,终端设备可以启动摄像头,同时,该支付应用可以显示扫描界面,用户可以将该扫描界面移动到该卖方提供的图形码所在的位置,终端设备通过对该图形码的扫描获取卖方的相关信息(如卖方的账户信息等),并可以显示该卖方的相关信息,以及资源输入框,用户可以在该资源输入框中输入资源数值(如交易金额等),输入完成后,可以点击支付按键,此时,终端设备可以生成交易请求,并将其发送给服务器,服务器接收到该交易请求后,可以根据该交易请求获取相应的交易的相关数据(即交易数据),例如买方(即该用户)的账户信息、卖方的账户信息和交易场景信息(即转账到预定账户)等。For example, a payment application is installed in the user's terminal device. When the user needs to make a payment or transfer to a seller, the payment application can be launched. The payment application can include the option of scanning the graphic code for payment, and the user can click the option. The terminal device can start the camera. At the same time, the payment application can display the scanning interface. The user can move the scanning interface to the location of the graphic code provided by the seller. The terminal device can obtain the relevant information of the seller by scanning the graphic code (such as The seller's account information, etc.), and can display the relevant information of the seller and the resource input box. The user can enter the resource value (such as the transaction amount, etc.) in the resource input box. After the input is completed, he can click the payment button. The terminal device can generate a transaction request and send it to the server. After receiving the transaction request, the server can obtain the relevant transaction data (that is, transaction data) according to the transaction request, such as the buyer (that is, the user's account). Information, seller's account information and transaction scenario information (i.e. transfer to A given account) and so on.
在步骤S104中,根据上述交易数据,对上述交易请求对应的目标交易所属的风险管控类别进行识别,得到目标交易所属的第一风险管控类别。In step S104, according to the transaction data, the risk management control category to which the target transaction corresponding to the transaction request belongs is identified, and the first risk management control category to which the target transaction belongs is obtained.
其中,风险管控类别可以是针对交易可能存在的风险的类别,风险管控类别可以包括多种,具体可以根据实际情况设定,本说明书实施例对此不做限定。本实施中,风险管控类别可以包括预定时长内首次识别交易风险和预定时长内的再次识别交易风险两个类别,具体如一天内首次识别交易风险和一天内再次识别交易风险等。第一风险管控类别可以是风险管控类别中的任一风险管控类别,如预定时长内首次识别交易风险或预定时长内的再次识别交易风险。The risk management and control category may be a category for risks that may exist in the transaction. The risk management and control category may include multiple types, and may be specifically set according to actual conditions, which is not limited in the embodiments of the present specification. In this implementation, the risk management and control category may include two types of transaction risk identification for the first time within a predetermined time period and re-identification of transaction risk within a predetermined time period, such as the first identification of transaction risk within a day and the re-identification of transaction risk within a day. The first risk management and control category may be any of the risk management and control categories, such as first identifying a transaction risk within a predetermined period of time or re-identifying a transaction risk within a predetermined period of time.
在实施中,服务器中可以设置有风险防控机制,该风险防控机制中可以设置有多个风险防控策略,并存储有买方和卖方的相关数据,以及被举报为存在风险的卖方的相关信息等。为了防止用户进行的交易为欺诈交易而给用户造成资源损失,可以在买方和卖方进行交易之前,通过上述风险防控机制判断用户提交的交易是否存在风险或者其属于哪一种风险管控类别,具体地,服务器获取到交易请求对应的交易数据后,可以从该交易数据中分别提取卖方的账户信息、买方的账户信息和交易场景信息,然后,可以通过风险防控机制分别对上述信息进行分析,如果风险防控机制确定当前存储的信息中不包括预定时长内的买方的账户信息,则可以确定该用户或买方首次识别交易风险,此时, 可以确定该交易请求对应的交易(即目标交易)所属的第一风险管控类别为首次识别交易风险,如果风险防控机制确定当前存储的信息中包括预定时长内的买方的账户信息,则可以确定该用户或买方再次识别风险,此时,可以确定该交易请求对应的目标交易所属的第一风险管控类别为再次识别交易风险。In the implementation, the server may be provided with a risk prevention and control mechanism. The risk prevention and control mechanism may be provided with multiple risk prevention and control strategies, and store relevant data of the buyer and the seller, as well as relevant information of the seller who is reported as having a risk. Information, etc. In order to prevent users' transactions from losing resources to users due to fraudulent transactions, you can use the above-mentioned risk prevention and control mechanism to determine whether the transactions submitted by users are risky or which type of risk control they belong to before the buyers and sellers conduct transactions. After the server obtains the transaction data corresponding to the transaction request, it can extract the seller's account information, the buyer's account information, and the transaction scenario information from the transaction data, and then analyze the above information through the risk prevention and control mechanism. If the risk prevention and control mechanism determines that the currently stored information does not include the buyer's account information within a predetermined period of time, it can be determined that the user or the buyer first identified the transaction risk. At this time, the transaction corresponding to the transaction request (that is, the target transaction) can be determined. The first risk management and control category belongs to identifying transaction risks for the first time. If the risk prevention and control mechanism determines that the currently stored information includes the buyer's account information for a predetermined period of time, the user or buyer can be identified to identify the risk again. At this time, it can be determined The target corresponding to this transaction request The first category of risk management and control transaction belongs to identify transaction risk again.
需要说明的是,除了可以通过上述方式确定目标交易所属的第一风险管控类别外,还可以通过其它方式实现,例如风险管控类别还可以是基于不同的交易场景下的用户首次识别交易风险和再次识别交易风险,此时,风险防控机制可以判断当前存储的信息中是否包括转账到预定账户的场景下预定时长内的买方的账户信息,如果包括,则可以确定目标交易所属的第一风险管控类别为再次识别风险,如果不包括,则可以确定目标交易所属的第一风险管控类别为首次识别风险等。It should be noted that in addition to determining the first risk management category to which the target transaction belongs in the above manner, it can also be implemented in other ways. For example, the risk management category can also be based on the user's first identification of transaction risks and Identify transaction risks. At this time, the risk prevention and control mechanism can determine whether the currently stored information includes the buyer's account information for a predetermined period of time in the scenario of transferring to a predetermined account. If it includes, it can determine the first risk management control of the target transaction. The category is to identify risks again. If it is not included, it can be determined that the first risk management category to which the target transaction belongs is the first identification of risks.
在步骤S106中,基于目标交易所属的第一风险管控类别,生成上述交易请求对应的管控交互策略,该管控交互策略为通过数据交互的方式进行交易风险管控的策略。In step S106, a management and control interaction strategy corresponding to the above transaction request is generated based on the first risk management and control category to which the target transaction belongs, and the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction.
其中,管控交互策略可以是一种交互式的风险防控策略,可以通过与用户之间的数据交互提醒用户及时识别某交易是否是存在风险的策略等。管控交互策略可以包括多种,可以根据不同的风险管控类别进行设置等,不同的管控交互策略的内容可以根据实际情况设定,本说明书实施例对此不做限定。Among them, the management and control interaction strategy may be an interactive risk prevention and control strategy, which can remind the user to identify whether a transaction is a risk strategy in a timely manner through data interaction with the user. The management and control interaction strategy may include multiple types, which may be set according to different risk management and control categories, and the content of different management and control interaction strategies may be set according to actual conditions, which are not limited in the embodiments of this specification.
在实施中,服务器中可以存储有不同风险管控类别对应的管控交互模式,管控交互模式可以是管控交互策略的组成架构,例如风险引导模式(即通过逐步的信息提示引导用户识别风险的模式)或风险测试模式(即通过给用户提供测试信息来提醒用户识别风险的模式)等。上述对应关系可以以表格的形式存储,如表1所示。In the implementation, the server may store management and control interaction modes corresponding to different risk management and control categories. The management and control interaction mode may be a composition structure of management and control interaction strategies, such as a risk guidance mode (that is, a mode for guiding users to identify risks through step-by-step information prompts) Risk test mode (that is, a mode for reminding the user to identify risks by providing the user with test information) and the like. The above correspondence can be stored in the form of a table, as shown in Table 1.
表1Table 1
风险管控类别Risk management category 管控交互模式Regulatory interaction mode
第一风险管控类别First risk management category 交互模式AInteraction Mode A
第二风险管控类别Second risk management category 交互模式BInteractive Mode B
第三风险管控类别Third risk management category 交互模式CInteractive Mode C
服务器得到目标交易所属的第一风险管控类别后,可以基于上述表1查找到第一风险管控类别对应的管控交互模式,即交互模式A。由于管控交互模式仅是管控交互策略的组成架构,其中并不包括管控交互策略的内容,因此,服务器可以获取交易场景信息、 用户的账册信息、用户账户的常用地信息、买方和卖方的交易信息、交易行为信息、卖家的历史被投诉记录和卖家的历史被处罚记录等,并可以对上述信息进行分析,确定目标交易可能对应的欺诈类型,并可以基于确定的欺诈类型,从数据库中获取与该欺诈类型对应的管控交互策略的内容,然后,服务器可以将上述管控交互策略的内容和交互模式A进行组合,从而生成上述交易请求对应的管控交互策略,例如,以政府机关的名义,请求您向其支付某费用的交易通常属于()—A、欺诈交易,B、正常交易。After the server obtains the first risk management and control category to which the target transaction belongs, it can find the management and control interaction mode corresponding to the first risk management and control category based on Table 1 above, that is, interaction mode A. Because the management interaction mode is only the composition of the management interaction strategy, it does not include the content of the management interaction strategy. Therefore, the server can obtain the transaction scenario information, the user's account information, the user's account information, and the buyer and seller transaction information. , Transaction behavior information, the seller's historical complaint record and the seller's historical punishment record, etc., and can analyze the above information to determine the type of fraud that the target transaction may correspond to, and can obtain from the database based on the determined type of fraud. The content of the control interaction strategy corresponding to this type of fraud. Then, the server can combine the content of the above control interaction strategy with the interaction mode A to generate the control interaction strategy corresponding to the above transaction request. For example, in the name of a government agency, request you The transaction to pay a certain fee usually belongs to () -A, fraudulent transaction, B, normal transaction.
在步骤S108中,执行上述管控交互策略,得到目标交易的交易结果。In step S108, the above-mentioned interactive control strategy is executed to obtain the transaction result of the target transaction.
在实施中,服务器得到上述交易请求对应的管控交互策略后,可以将管控交互策略中相关数据发送给终端设备,终端设备接收到服务器发送的数据后,可以显示该数据,用户可以根据该数据中的内容填写相应的信息或选择相应的选项,然后,可以将填写的信息或选择的选项的信息发送给服务器,服务器可以根据用户反馈的信息设置相应的数据发送给用户进行信息的填写或选择,通过上述终端设备与服务器的数据交互,用户可以及时了解目标交易是否存在风险,如果存在风险,用户可以停止目标交易,如果用户确定不存在风险,则可以继续该目标交易,即继续进行支付,直到支付完成。例如,目标交易是用户在接收到以政府机关的名义,请求您向其支付某费用的交易,则用户在查看到:以政府机关的名义,请求您向其支付某费用的交易通常属于()—A、欺诈交易,B、正常交易等管控交互策略的内容后,用户会更加重视目标交易是否存在欺诈,从而提醒用户目标交易可能存在风险,避免用户的资源损失。In implementation, after the server obtains the management and control interaction strategy corresponding to the above transaction request, it can send related data in the management and control interaction strategy to the terminal device. After receiving the data sent by the server, the terminal device can display the data, and the user can Fill in the corresponding information or select the corresponding option, and then send the filled information or the selected option information to the server, and the server can set the corresponding data according to the user feedback information to send to the user to fill in or select the information. Through the data interaction between the terminal device and the server, the user can know in time whether the target transaction is risky. If there is a risk, the user can stop the target transaction. If the user determines that there is no risk, the user can continue the target transaction, that is, continue to pay until Payment is complete. For example, the target transaction is when a user receives a transaction in the name of a government agency that asks you to pay a fee, and the user sees: In the name of a government agency, a transaction that asks you to pay a fee usually belongs to () —After the contents of the interactive control strategies such as A, fraudulent transactions, B, and normal transactions, users will pay more attention to whether the target transaction is fraudulent, thereby reminding the user that the target transaction may have risks and avoiding the loss of user resources.
本说明书实施例提供一种交易的管控方法,通过获取交易请求对应的交易数据,根据该交易数据,对该交易请求对应的目标交易所属的风险管控类别进行识别,得到目标交易所属的第一风险管控类别,然后,可以基于目标交易所属的第一风险管控类别,生成该交易请求对应的管控交互策略,该管控交互策略为通过数据交互的方式进行交易风险管控的策略,执行该管控交互策略,得到目标交易的交易结果,这样,每当用户创建或执行某交易(即目标交易)时,服务器先通过相应的交易数据确定目标交易所属的风险管控类别,并基于得到的风险管控类别生成对应的管控交互策略,从而可以基于风险管控类别确定用户安全意识的强弱等,并基于风险程度进行差异化交互式的交易风险管控,唤醒不同安全意识的用户对目标交易的安全意识,提升了用户的操作体验,并且提升了支付成功率,有效降低欺诈造成的资损。The embodiment of the specification provides a method for managing and controlling a transaction. By acquiring transaction data corresponding to a transaction request, and identifying the risk management and control category to which the target transaction corresponding to the transaction request belongs based on the transaction data, a first risk to which the target transaction belongs is obtained. The management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs. The management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction, and execute the management and control interaction strategy. Get the transaction result of the target transaction. In this way, whenever a user creates or executes a transaction (ie, the target transaction), the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding risk management category based on the obtained risk management category. Manage and control interactive strategies, which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user's operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
实施例二Example two
如图3所示,本说明书实施例提供一种交易的管控方法,该方法的执行主体可以为 终端设备或服务器,其中,该终端设备可以如个人计算机等设备。该服务器可以是独立的服务器,也可以是由多个服务器组成的服务器集群,而且,该服务器可以是某项业务(如金融业务等)的后台服务器,也可以是某网站(如网络购物网站或支付应用等)的后台服务器等。该方法可以用于对任意的交易进行风险管控,并基于用户安全意识和风险程度进行差异化交互式的风险管控等处理中,为了提高交易风险的管控效率,本实施例中以执行主体为服务器为例进行说明,对于终端设备的情况,可以根据下述相关内容处理,在此不再赘述。该方法具体可以包括以下步骤:As shown in FIG. 3, an embodiment of the present specification provides a method for managing and controlling transactions. The execution subject of the method may be a terminal device or a server, and the terminal device may be a device such as a personal computer. The server can be an independent server or a server cluster composed of multiple servers, and the server can be a background server for a certain business (such as financial services), or a website (such as an online shopping website or Payment applications, etc.). This method can be used for risk management and control of arbitrary transactions, and differentiated and interactive risk management and control based on user security awareness and risk level. In order to improve the efficiency of transaction risk management and control, in this embodiment, the execution subject is the server As an example for description, the situation of the terminal device can be processed according to the following related content, which is not repeated here. The method may specifically include the following steps:
在步骤S302中,获取交易请求对应的交易数据。In step S302, the transaction data corresponding to the transaction request is acquired.
其中,交易数据可以包括如卖方的账户信息、买方的账户信息和交易场景信息等,交易场景信息可以包括转账到资源卡、转账到资源账户或资源包等,资源卡可以如银行卡、交通卡等具有存储资源数据的卡片等,资源账户可以如支付宝账户、银行账户等,资源包可以如红包等。The transaction data may include information such as the seller's account information, buyer's account information, and transaction scenario information. The transaction scenario information may include transfer to a resource card, transfer to a resource account or resource package, and the resource card may include a bank card or a transportation card. Such as cards with stored resource data, resource accounts can be Alipay accounts, bank accounts, etc., resource packs can be red envelopes, etc.
在实际应用中,用户首次创建的交易,可以通过页面提醒的方式,对用户进行风险提醒,如果用户确定继续进行目标交易,则可以获取交易请求对应的交易数据。In practical applications, the transaction created by the user for the first time can be used to remind the user of the risk through the page reminder. If the user determines to continue the target transaction, the transaction data corresponding to the transaction request can be obtained.
在步骤S304中,根据上述交易数据,对上述交易请求对应的目标交易所属的风险管控类别进行识别,得到目标交易所属的第一风险管控类别。In step S304, according to the transaction data, the risk management control category to which the target transaction corresponding to the transaction request belongs is identified, and a first risk management control category to which the target transaction belongs is obtained.
其中,目标交易所属的风险管控类别可以包括预定时长内首次识别交易风险和预定时长内再次识别交易风险。预定时长可以根据实际情况设定,例如12小时或1天等。The risk management and control category to which the target transaction belongs may include the first identification of transaction risk within a predetermined period of time and the identification of transaction risk again within a predetermined period of time. The predetermined duration can be set according to the actual situation, such as 12 hours or 1 day.
在实施中,如图4所示,考虑到对于预定时长内首次识别交易风险的用户和预定时长内再次识别交易风险的用户,由于两者对某个交易中是否存在风险的感知情况不同,因此,可以提送差异化的欺诈骗局提醒和操作指引,让用户能够更容易结合提醒内容识破骗局,终止受欺诈的操作,本说明书实施中,可以将风险管控类别划分为两个类别,即预定时长内首次识别交易风险和预定时长内再次识别交易风险。In implementation, as shown in FIG. 4, considering that the user who first identified the transaction risk within a predetermined period of time and the user who re-identified the transaction risk within a predetermined period of time, because the two have different perceptions of whether a risk exists in a transaction, , Can provide differentiated fraud and scam reminders and operation guidelines, so that users can more easily identify the scam and terminate the fraudulent operation by combining the reminder content. In the implementation of this manual, the risk management and control categories can be divided into two categories, that is, the predetermined duration The transaction risk is identified for the first time within a period of time and the transaction risk is identified again within a predetermined time period.
服务器中可以设置有风险防控机制(可以是风险数据体系),该风险防控机制中可以设置有多个风险防控策略,并存储有买方和卖方的相关数据,以及被举报为存在风险的卖方的相关信息等。服务器获取到交易请求对应的交易数据后,可以从该交易数据中分别提取卖方的账户信息、买方的账户信息和交易场景信息,然后,可以通过风险防控机制分别对上述信息进行分析,如果风险防控机制确定当前存储的信息中不包括预定时长内的买方的账户信息,则可以确定该用户或买方首次识别交易风险,此时,可以确定 目标交易所属的第一风险管控类别为首次识别交易风险,如果风险防控机制确定当前存储的信息中包括预定时长内的买方的账户信息,则可以确定该用户或买方再次识别交易风险,此时,可以确定目标交易所属的第一风险管控类别为再次识别交易风险。A risk prevention and control mechanism (which can be a risk data system) can be set in the server. The risk prevention and control mechanism can be set with multiple risk prevention and control strategies, and store relevant data of buyers and sellers, as well as those reported as risky. Information about the seller, etc. After the server obtains the transaction data corresponding to the transaction request, it can extract the seller's account information, the buyer's account information, and the transaction scenario information from the transaction data. Then, the above information can be analyzed separately through the risk prevention and control mechanism. The prevention and control mechanism determines that the currently stored information does not include the buyer's account information for a predetermined period of time, so that it can be determined that the user or buyer first identified the transaction risk. At this time, the first risk management category to which the target transaction belongs can be determined as the first identified transaction. Risk, if the risk prevention and control mechanism determines that the currently stored information includes the buyer's account information for a predetermined period of time, it can be determined that the user or the buyer recognizes the transaction risk again. At this time, the first risk control category to which the target transaction belongs can be determined as Recognize transaction risk again.
如果通过上述步骤S304的处理,确定第一风险管控类别为预定时长内首次识别交易风险,则服务器可以通过下述步骤S306和步骤S308的处理。If it is determined through the processing of step S304 that the first risk management and control category is the first time that transaction risk is identified within a predetermined period of time, the server may perform the processing of steps S306 and S308 described below.
在步骤S306中,获取目标交易的场景信息,以及目标交易中的买方和卖方的信息,确定目标交易所属的欺诈类型。In step S306, scene information of the target transaction and information of buyers and sellers in the target transaction are acquired, and the type of fraud to which the target transaction belongs is determined.
其中,场景信息可以包括转账到资源卡、转账到资源账户或资源包,目标交易中的买方信息可以包括买方的账户维度信息、交易维度信息和操作行为信息,目标交易中的卖方信息可以包括卖方的账户维度信息。其中的买方的账户维度信息可以包括买方账户的注册信息、买方账户的资金情况(可以包括资金的收入情况和支出情况等)、买方账户的常用地(可以包括买方账户使用的区域或位置等)等。买方的交易维度信息可以包括买方与卖方之间的交易信息、买方的交易行为等。买方的操作行为信息可以包括借贷和资源卡无效等。卖方的账户维度信息可以包括卖方账户的历史被投诉记录和买方账户的历史被处罚记录等。在实际应用中,可以不限于上述信息,还可以包括如买方和卖方之间的资源往来(如资金往来等)、买方和卖方之间的关联程度(如好友关系或亲属关系等)等。欺诈类型可以包括多种,如假借某组织的名义请求用户进行某项交易对应的欺诈类型,或假借用户的朋友或亲属的名义请求用户进行某项交易对应的欺诈类型,或通过点击恶意链接而触发某项交易对应的欺诈类型等,具体可以根据实际情况设定,本说明书实施例对此不做限定。The scenario information may include transfer to a resource card, transfer to a resource account or resource package, and the buyer information in the target transaction may include the buyer's account dimension information, transaction dimension information, and operation behavior information. The seller information in the target transaction may include the seller Account dimension information. The buyer's account dimension information can include the buyer's account registration information, the buyer's account funds (which can include the income and expenditure of funds, etc.), and the common place of the buyer's account (which can include the area or location of the buyer's account, etc.) Wait. The transaction dimension information of the buyer may include transaction information between the buyer and the seller, the transaction behavior of the buyer, and the like. The buyer's operating behavior information may include debits and invalidity of resource cards. The seller's account dimension information may include the historical complaint record of the seller's account and the historical punishment record of the buyer's account. In practical applications, it may not be limited to the above information, and may also include, for example, resource transactions (such as capital transactions) between the buyer and the seller, and the degree of connection (such as friendship or kinship) between the buyer and the seller. There are many types of fraud, such as the type of fraud corresponding to requesting a user to perform a transaction in the name of an organization, or the type of fraud corresponding to requesting a user to perform a transaction in the name of a friend or relative of the user, or by clicking on a malicious link. The type of fraud that triggers a transaction can be specifically set according to the actual situation, which is not limited in the embodiments of this specification.
在实施中,服务器中可以设置有多种欺诈类型,以及每种欺诈类型对应的识别机制和提醒机制,例如,欺诈类型为假借某组织的名义请求用户进行某项交易对应的欺诈类型,则服务器中可以设置有识别上述欺诈类型的识别机制和提醒机制等。如果服务器确定目标交易所属的第一风险管控类别为预定时长内首次识别交易风险,则服务器可以获取目标交易的场景信息,以及目标交易中的买方和卖方的信息,可以从上述信息中提取相应的特征,其中可以包括买方账户的注册信息特征、买方账户的收入特征和支出特征、买方账户的常用地特征、买方与卖方之间的交易信息特征、买方的交易行为特征、卖方账户的历史被投诉特征和买方账户的历史被处罚特征等,可以通过风险防控机制内的变量刻画融合上述特征,最终得到目标交易可能会涉及到的欺诈类型。In the implementation, the server may be provided with multiple types of fraud, and the identification mechanism and reminder mechanism corresponding to each type of fraud. For example, if the type of fraud is to request the user to perform a transaction in the name of an organization, the server An identification mechanism and a reminder mechanism for identifying the above-mentioned types of fraud may be set therein. If the server determines that the first risk management category to which the target transaction belongs is the first time that transaction risk is identified within a predetermined period of time, the server can obtain the scene information of the target transaction, as well as the buyer and seller information in the target transaction, and can extract the corresponding information from the above information. Features, which can include the characteristics of registration information of the buyer's account, the characteristics of the income and expenditure of the buyer's account, the characteristics of the common location of the buyer's account, the characteristics of the transaction information between the buyer and the seller, the characteristics of the buyer's transaction behavior, and the history of the seller's account. The characteristics and the historical punishment characteristics of the buyer's account can be combined with the above characteristics through the variables in the risk prevention and control mechanism. Finally, the type of fraud that may be involved in the target transaction is obtained.
在步骤S308中,基于目标交易所属的第一风险管控类别和目标交易所属的欺诈类 型,生成相对应的管控交互策略。In step S308, a corresponding management and control interaction strategy is generated based on the first risk control category to which the target transaction belongs and the fraud type to which the target transaction belongs.
在实施中,可以根据目标交易所属的风险管控类别为预定时长内首次识别交易风险,确定预定时长内首次识别交易风险对应的管控交互模式,具体如风险揭示和/或风险排除指引等,风险揭示可以用于向用户揭示目标交易可能存在的风险,以提醒用户谨慎进行目标交易,风险排除指引可以用于指示用户进行排除某风险的指向和引导等,通过上述方式确定目标交易需要采用的管控交互的框架(即管控交互模式)后,可以向上述框架中加入具体内容,因此,服务器可以根据目标交易可能涉及到的欺诈类型,获取与该欺诈类型相对应的风险揭示的相关信息和风险排除指引的相关信息,并可以将获取的相关信息分别设置到风险揭示和风险排除指引的框架中,从而生成相应的管控交互策略。其中,管控交互策略包括用于引导买方识别目标交易中存在的风险的风险引导策略,风险引导策略可以包括针对不同欺诈类型对应的风险的防控引导的策略,可以帮助用户识别当前交易(即目标交易)可能存在的风险,并引导用户及时停止目标交易等。In the implementation, according to the risk management and control category to which the target transaction belongs, the transaction risk is identified for the first time within a predetermined time period, and the management interaction mode corresponding to the first identification of transaction risk within a predetermined time period can be determined, such as risk disclosure and / or risk exclusion guidelines, and risk disclosure. It can be used to reveal the possible risks of the target transaction to the user to remind the user to proceed with the target transaction with caution. The risk exclusion guidelines can be used to instruct the user to point and guide to exclude a certain risk, etc., and determine the management and control interaction required for the target transaction through the above methods. After the framework (that is, the interactive mode of management and control), specific content can be added to the above framework. Therefore, the server can obtain relevant information and risk exclusion guidelines for risk disclosure corresponding to the type of fraud according to the type of fraud that may be involved in the target transaction. Relevant information can be set into the framework of risk disclosure and risk exclusion guidance, so as to generate corresponding management and control interaction strategies. Among them, the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify the risks existing in the target transaction. The risk guidance strategy may include a prevention and control guidance strategy for the risks corresponding to different types of fraud, which can help users identify the current transaction (i.e. the target Transactions), and guide users to stop target transactions in a timely manner.
基于上述内容,风险引导策略具体可以包括风险揭示策略和风险排除指引策略等。其中的风险揭示策略可以包括不同欺诈类型的相关特征或特性的揭示,例如,目标交易可能会涉及到的欺诈类型为欺诈类型1和欺诈类型2,可以将欺诈类型1所具备的共同特性或特征展示给用户(或买方),用户可以查看展示的上述共同特性或特征,如果用户认为目标交易符合上述共同特性或特征,用户会确定目标交易可能存在交易风险,此时用户可以进一步决策是否进行后续交易,如果用户认为目标交易不符合上述共同特性或特征,风险揭示策略会引导用户查看欺诈类型2所具备的共同特性或特征,用户可以继续判断目标交易是否符合上述共同特性或特征,直到判断出目标交易是否存在风险。如图4所示,服务器可以为目标交易设置多个可选处理,具体地,如果通过对上述欺诈类型1和欺诈类型2对应的风险揭示策略后,用户确定目标交易不存在交易风险或交易风险较小,此时,用户可以继续目标交易,如果用户确定目标交易存在交易风险或交易风险较大,此时,用户可以通过终端设备中提供的“返回”按键忽略目标交易,如果用户不确定目标交易的交易风险大小,此时,用户可以通过终端设备中提供的“更多安全教育”等按键,从服务器中获取更多相关信息,进一步判断目标交易的交易风险的大小,如果用户确定目标交易存在交易风险,则可以对目标交易和卖方进行举报等处理,具体可以参见下述相关内容,在此不再赘述。Based on the above, risk guidance strategies can include risk disclosure strategies and risk exclusion guidance strategies. The risk disclosure strategy can include the disclosure of relevant characteristics or characteristics of different types of fraud. For example, the types of fraud that may be involved in target transactions are fraud type 1 and fraud type 2. Common characteristics or characteristics of fraud type 1 can be used. Show to the user (or buyer), the user can view the above-mentioned common characteristics or features. If the user believes that the target transaction meets the above-mentioned common characteristics or features, the user will determine that the target transaction may have transaction risks. At this time, the user can further decide whether to follow up For transactions, if the user believes that the target transaction does not meet the above common characteristics or characteristics, the risk disclosure strategy will guide the user to check the common characteristics or characteristics of the fraud type 2. The user can continue to determine whether the target transaction meets the above common characteristics or characteristics until it is determined Whether the target transaction is risky. As shown in FIG. 4, the server may set multiple optional processes for the target transaction. Specifically, if the strategy is disclosed through the risks corresponding to the fraud types 1 and 2 described above, the user determines that there is no transaction risk or transaction risk in the target transaction. Small, at this time, the user can continue the target transaction. If the user determines that the target transaction has transaction risk or the transaction risk is large, at this time, the user can ignore the target transaction through the "back" button provided in the terminal device. If the user is not sure of the target The size of the transaction risk of the transaction. At this time, the user can obtain more relevant information from the server through the buttons such as "more security education" provided in the terminal device to further determine the size of the transaction risk of the target transaction. If the user determines the target transaction If there is transaction risk, you can report the target transaction and the seller. For details, please refer to the following related content, which will not be repeated here.
风险排除指引策略可以是用户在确定目标交易是否存在交易风险的过程中,向用户提供目标交易可能存在的交易风险,并请求用户进行确认的策略等。例如目标交易 可能会涉及到的欺诈类型为欺诈类型1和欺诈类型2,服务器可以将目标交易判定为欺诈类型1对应的交易,则并提供给用户确认,如果用户确定目标交易为欺诈类型1对应的交易,则可以通过终端设备中提供的“返回”等按键忽略目标交易或可以对目标交易和卖方进行举报等处理,如果用户确定目标交易不是欺诈类型1对应的交易,则服务器可以将目标交易判定为欺诈类型2对应的交易,则并提供给用户确认等。The risk exclusion guidance strategy may be a strategy in which the user provides the user with the transaction risk that the target transaction may have in the process of determining whether the target transaction has transaction risk, and asks the user for confirmation. For example, the target transaction may involve fraud type 1 and fraud type 2. The server can determine the target transaction as a transaction corresponding to fraud type 1 and provide it to the user for confirmation. If the user determines that the target transaction corresponds to fraud type 1 Transaction, you can ignore the target transaction by pressing the "Back" button provided in the terminal device or report the target transaction and the seller. If the user determines that the target transaction is not a transaction corresponding to fraud type 1, the server can send the target transaction The transaction determined to be fraud type 2 is provided to the user for confirmation.
如果通过上述步骤S304的处理,确定第一风险管控类别为预定时长内再次识别交易风险,则服务器可以通过下述步骤S310和步骤S312的处理。If it is determined through the processing of step S304 that the first risk management category is to identify the transaction risk again within a predetermined period of time, the server may perform the processing of steps S310 and S312 described below.
在步骤S310中,获取目标交易的场景信息,以及目标交易中的买方和卖方的信息,确定目标交易所属的欺诈类型。In step S310, scene information of the target transaction and information of buyers and sellers in the target transaction are acquired, and the type of fraud to which the target transaction belongs is determined.
上述步骤S310的步骤内容与上述步骤S306的步骤内容相同,步骤S310的具体处理可以参见上述步骤S306的相关内容,在此不再赘述。The content of the step S310 is the same as the content of the step S306. For the specific processing of the step S310, refer to the related content of the step S306, and details are not described herein again.
在步骤S312中,基于目标交易所属的第一风险管控类别和目标交易所属的欺诈类型,生成相对应的安全意识测试信息。In step S312, the corresponding security awareness test information is generated based on the first risk control category to which the target transaction belongs and the type of fraud to which the target transaction belongs.
其中,安全意识测试信息可以是由一个或多个测试题目和相应的可选答案构成的测试信息,还可以是由一个或多个测试题目和信息输入框等构成的测试信息等。The security awareness test information may be test information composed of one or more test questions and corresponding optional answers, and may also be test information composed of one or more test questions and information input boxes.
在实施中,服务器可以采集目标交易的交易信息,可以对上述信息进行特征提取等处理,得到相应的特征。可以通过风险防控机制内的变量刻画融合上述特征,最终得到目标交易可能会涉及到的欺诈类型。可以基于目标交易所属的第一风险管控类别预定时长内再次识别交易风险,确定预定时长内再次识别交易风险对应的管控交互策略,即安全意识测试信息,这样,可以通过对用户进行安全意识测试来唤醒用户对目标交易的安全意识,防止用户的资源损失。In implementation, the server can collect the transaction information of the target transaction, and can perform feature extraction and other processing on the above information to obtain corresponding characteristics. The above-mentioned characteristics can be fused through the variables in the risk prevention and control mechanism, and finally the type of fraud that the target transaction may involve. Based on the first risk control category to which the target transaction belongs, the transaction risk can be identified again within a predetermined period of time, and the management and control interaction strategy corresponding to the transaction risk can be identified again within a predetermined period of time, that is, the security awareness test information. Awaken the user's security awareness of the target transaction and prevent the loss of user resources.
例如,如果目标交易可能会涉及到的欺诈类型包括欺诈类型3和欺诈类型4,则可以基于每一种欺诈类型,从预定的测试数据库中选取与该欺诈类型对应的安全意识测试信息,即可以从预定的测试数据库中选取欺诈类型3和欺诈类型4对应的安全意识测试信息,其中,每一种欺诈类型对应的安全意识测试信息可以为一个,也可以是多个,如欺诈类型3为电信诈骗类,则相应的安全意识测试信息可以为:以A组织的名义,请求您向其支付某费用的交易通常属于()—A、欺诈交易,B、正常交易等,通过上述方式服务器可以判断用户(或买方)对交易中的安全意识的强弱,并可以基于此进一步确定是否需要对该用户进行安全意识的教育或唤醒,防止用户的资源损失。For example, if the type of fraud that may be involved in the target transaction includes fraud type 3 and fraud type 4, based on each type of fraud, you can select security awareness test information corresponding to the type of fraud from a predetermined test database, that is, you can The security awareness test information corresponding to fraud type 3 and fraud type 4 is selected from a predetermined test database. The security awareness test information corresponding to each fraud type may be one or multiple. For example, the fraud type 3 is telecommunications. For fraud, the corresponding security awareness test information can be: In the name of Organization A, the transaction that asks you to pay a fee usually belongs to () -A, fraudulent transaction, B, normal transaction, etc. The server can judge through the above method The strength of the user (or buyer) in the security awareness of the transaction, and based on this, it can be further determined whether the user needs to be educated or awakened in security awareness to prevent the loss of user resources.
需要说明的是,在对用户(或买家)的安全意识进行测试外,还可以对对用户进行免责提醒等,具体可以根据实际业务需求设定,本实施例对此不做限定。It should be noted that in addition to testing the security awareness of the user (or buyer), the user can also be reminded of exemption from liability, etc., which can be specifically set according to actual business requirements, which is not limited in this embodiment.
在步骤S314中,执行上述管控交互策略,得到目标交易的交易结果。In step S314, the above-mentioned interactive control strategy is executed to obtain the transaction result of the target transaction.
在实施中,如图4所示,服务器可以为目标交易设置多个可选处理,具体地,如果通过上述步骤S306和步骤S308,或者步骤S310和步骤S312的处理后,用户确定目标交易不存在交易风险或交易风险较小,此时,用户可以继续目标交易,如果用户确定目标交易存在交易风险或交易风险较大,此时,用户可以通过终端设备中提供的“返回”按键忽略目标交易,如果用户不确定目标交易的交易风险大小,此时,用户可以通过终端设备中提供的“更多安全教育”等按键,从服务器中获取更多相关信息,进一步判断目标交易的交易风险的大小,如果用户确定目标交易存在交易风险,则可以对目标交易和卖方进行举报等处理,具体可以参见下述相关内容,在此不再赘述。In implementation, as shown in FIG. 4, the server may set a plurality of optional processes for the target transaction. Specifically, if the user determines that the target transaction does not exist after the above steps S306 and S308 or steps S310 and S312 are processed The transaction risk or transaction risk is small. At this time, the user can continue the target transaction. If the user determines that the target transaction has transaction risk or the transaction risk is large, at this time, the user can ignore the target transaction through the "back" button provided in the terminal device. If the user is not sure about the transaction risk of the target transaction, at this time, the user can obtain more relevant information from the server through the buttons such as "more security education" provided in the terminal device to further determine the magnitude of the transaction risk of the target transaction. If the user determines that there is transaction risk in the target transaction, the target transaction and the seller can be reported and processed. For details, please refer to the following related content, which will not be repeated here.
在步骤S316中,当接收到对目标交易的举报指令时,采集基于目标交易的举报信息。In step S316, when a report instruction for a target transaction is received, report information based on the target transaction is collected.
其中,举报信息可以包括卖方的相关信息(如卖方的账户信息、卖方的账户的使用位置信息、卖方的诈骗方式等)、买方的相关信息(如买方的账户信息、买方账户的使用位置信息等)。Wherein, the report information may include relevant information of the seller (such as the account information of the seller, the use location information of the seller's account, the seller's fraud method, etc.), relevant information of the buyer (such as the buyer's account information, the use of the buyer's account, etc. ).
在步骤S318中,存储采集的举报信息,以记录买方和卖方之间的目标交易,以及与卖方交易存在的风险。In step S318, the collected report information is stored to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
在实施中,服务器可以将采集的举报信息存储到上述风险防控机制(或风险数据体系)的相关数据库中,这样,通过设置举报入口,便于用户实时对交易的风险情况进行反馈,而非等到交易成功后用户再进行举报,通过快速信息回流应用的方式,不但可以减少用户的资源损失,还可以大幅提升欺诈策略的管控能力,防止欺诈者二次行骗。In implementation, the server can store the collected report information in the relevant database of the above-mentioned risk prevention and control mechanism (or risk data system). In this way, by setting a report entrance, it is convenient for users to feedback the risk situation of the transaction in real time, instead of waiting until After the transaction is successful, the user reports again. By using the fast information return application, not only can the user's resource loss be reduced, but also the management and control capabilities of the fraud strategy can be greatly improved to prevent fraudulent fraud.
基于上述相关内容,例如,在用户针对目标交易首次输入支付密码时,服务器可以对用户进行风险提醒,在用户非首次对目标交易输入支付密码时,服务器可以通过不断输出交易失败的方式,让用户意识到上述管控交互策略中提醒的欺诈风险,以唤醒用户的安全意识,保护用户的资源不受损失。Based on the above-mentioned related content, for example, when a user enters a payment password for a target transaction for the first time, the server can warn the user of the risk. When the user enters a payment password for the target transaction for the first time, the server can continuously output a transaction failure to allow the user to Be aware of the fraud risks reminded in the above-mentioned interactive control strategy to awaken the security awareness of users and protect users' resources from loss.
在步骤S320中,如果确定目标交易存在交易风险,则停止目标交易,并输出目标交易失败的通知消息。In step S320, if it is determined that the target transaction has transaction risk, the target transaction is stopped, and a notification message of the target transaction failure is output.
基于上述处理方式,通过将用户(或买方)的操作行为信息、用户的交易维度 信息以及卖家账户信息等融合进对特征的刻画,通过在风险防控机制(或风险防控体系)内的策略、变量的特征描述,精准判断用户进行的交易的风险程度,以及用户自身及收款方的风险等级,推荐给用户最合适的交互式风险排除流程。本实施例中的交易的管控方案增加与用户的交互设计,并在交互内容中融入更多常识性骗局内容,通过提升用户的安全意识,更容易唤醒用户。另外,本实施例中的交易的管控方案充分考虑了用户安全意识水平的差异化,对不同安全意识级别(即风险管控类别)的用户采用了不同程度的唤醒机制,通过上述设计可以实现“轻打扰重提醒”的目标。此外,该交易的管控方案增加的信息回流机制能够采集更多用户侧的信息,加强对于用户实际情况判断的准确性,而实时举报机制也可以有效阻止欺诈者的二次行骗,提升欺诈风险的管控能力。Based on the above-mentioned processing methods, by integrating user (or buyer) operation behavior information, user's transaction dimension information, and seller account information, etc. into the characterization of features, through strategies in the risk prevention and control mechanism (or risk prevention and control system) Describe the characteristics of the variables, accurately determine the risk level of the user's transaction, and the risk level of the user and the payee, and recommend the most suitable interactive risk exclusion process for the user. The transaction control scheme in this embodiment increases the interaction design with the user, and incorporates more common-sense scam content into the interactive content. By improving the user's security awareness, it is easier to wake up the user. In addition, the transaction control scheme in this embodiment fully considers the difference in the level of user security awareness, and adopts different levels of wake-up mechanisms for users with different levels of security awareness (that is, risk management and control categories). Disturb heavy reminder "goal. In addition, the added information return mechanism of the transaction control scheme can collect more user-side information and enhance the accuracy of the user's actual situation judgment. The real-time reporting mechanism can also effectively prevent the fraudulent secondary fraud and increase the risk of fraud. Control capabilities.
本说明书实施例提供一种交易的管控方法,通过获取交易请求对应的交易数据,根据该交易数据,对该交易请求对应的目标交易所属的风险管控类别进行识别,得到目标交易所属的第一风险管控类别,然后,可以基于目标交易所属的第一风险管控类别,生成该交易请求对应的管控交互策略,该管控交互策略为通过数据交互的方式进行交易风险管控的策略,执行该管控交互策略,得到目标交易的交易结果,这样,每当用户创建或执行某交易(即目标交易)时,服务器先通过相应的交易数据确定目标交易所属的风险管控类别,并基于得到的风险管控类别生成对应的管控交互策略,从而可以基于风险管控类别确定用户安全意识的强弱等,并基于风险程度进行差异化交互式的交易风险管控,唤醒不同安全意识的用户对目标交易的安全意识,提升了用户的操作体验,并且提升了支付成功率,有效降低欺诈造成的资损。The embodiment of the specification provides a method for managing and controlling a transaction. By acquiring transaction data corresponding to a transaction request, and identifying the risk management and control category to which the target transaction corresponding to the transaction request belongs based on the transaction data, a first risk to which the target transaction belongs is obtained. The management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs. The management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction, and execute the management and control interaction strategy. Get the transaction result of the target transaction. In this way, whenever a user creates or executes a transaction (ie, the target transaction), the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding risk management category based on the obtained risk management category. Manage and control interactive strategies, which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user's operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
实施例三Example three
以上为本说明书实施例提供的交易的管控方法,基于同样的思路,本说明书实施例还提供一种交易的管控装置,如图5所示。The above is the transaction management method provided by the embodiment of the present specification. Based on the same thinking, the embodiment of the specification also provides a transaction management and control device, as shown in FIG. 5.
该交易的管控装置包括:数据获取模块501、风险类别确定模块502、交互策略生成模块503和执行模块504,其中:The transaction control device includes a data acquisition module 501, a risk category determination module 502, an interaction strategy generation module 503, and an execution module 504, of which:
数据获取模块501,用于获取交易请求对应的交易数据;A data acquisition module 501, configured to acquire transaction data corresponding to a transaction request;
风险类别确定模块502,用于根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;A risk category determination module 502, configured to identify, according to the transaction data, a risk management and control category to which a target transaction corresponding to the transaction request belongs, and obtain a first risk management and control category to which the target transaction belongs;
交互策略生成模块503,用于基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,所述管控交互策略为通过数据交互的方式进行交易 风险管控的策略;An interaction policy generating module 503 is configured to generate a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
执行模块504,用于执行所述管控交互策略,得到所述目标交易的交易结果。The execution module 504 is configured to execute the management and control interaction strategy to obtain a transaction result of the target transaction.
本说明书实施例中,所述目标交易所属的风险管控类别包括预定时长内首次识别交易风险和预定时长内再次识别交易风险。In the embodiment of the present specification, the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined period and re-identifying the transaction risk within a predetermined period.
本说明书实施例中,所述第一风险管控类别为预定时长内首次识别交易风险,In the embodiment of the present specification, the first risk control category is the first time that transaction risk is identified within a predetermined period of time,
所述交互策略生成模块503,包括:The interaction policy generation module 503 includes:
第一欺诈类型确定单元,用于获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;A first fraud type determining unit, configured to obtain scene information of the target transaction, and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
第一交互策略生成单元,用于基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的管控交互策略。A first interaction strategy generating unit is configured to generate a corresponding management and interaction strategy based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
本说明书实施例中,所述管控交互策略包括用于引导所述买方识别所述目标交易中存在的风险的风险引导策略。In the embodiment of the present specification, the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
本说明书实施例中,所述风险引导策略包括风险揭示策略和风险排出指引策略。In the embodiment of the present specification, the risk guidance strategy includes a risk disclosure strategy and a risk discharge guidance strategy.
本说明书实施例中,所述场景信息包括转账到资源卡、转账到资源账户或资源包,所述目标交易中的买方信息包括所述买方的账户维度信息、交易维度信息和操作行为信息,所述目标交易中的卖方信息包括所述卖方的账户维度信息。In the embodiment of the present specification, the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package, and the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information. The seller information in the target transaction includes account dimension information of the seller.
本说明书实施例中,所述第一风险管控类别为预定时长内再次识别交易风险,In the embodiment of the present specification, the first risk control category is to identify the transaction risk again within a predetermined period of time,
所述交互策略生成模块503,包括:The interaction policy generation module 503 includes:
第二欺诈类型确定单元,用于获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;A second fraud type determining unit, configured to obtain scene information of the target transaction and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
第二交互策略生成单元,用于基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的安全意识测试信息。A second interaction strategy generating unit is configured to generate corresponding security awareness test information based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
本说明书实施例中,所述装置还包括:In the embodiment of the present specification, the device further includes:
举报信息采集模块,用于当接收到对所述目标交易的举报指令时,采集基于所述目标交易的举报信息;A report information collection module, configured to collect report information based on the target transaction when a report instruction for the target transaction is received;
举报信息存储模块,用于存储采集的举报信息,以记录所述买方和所述卖方之间的所述目标交易,以及与所述卖方交易存在的风险。The report information storage module is configured to store collected report information to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
本说明书实施例中,所述装置还包括:In the embodiment of the present specification, the device further includes:
停止交易模块,用于如果确定所述目标交易存在交易风险,则停止所述目标交易,并输出所述目标交易失败的通知消息。The transaction stopping module is configured to stop the target transaction if it is determined that the target transaction has transaction risks, and output a notification message that the target transaction fails.
本说明书实施例提供一种交易的管控装置,通过获取交易请求对应的交易数据,根据该交易数据,对该交易请求对应的目标交易所属的风险管控类别进行识别,得到目标交易所属的第一风险管控类别,然后,可以基于目标交易所属的第一风险管控类别,生成该交易请求对应的管控交互策略,该管控交互策略为通过数据交互的方式进行交易风险管控的策略,执行该管控交互策略,得到目标交易的交易结果,这样,每当用户创建或执行某交易(即目标交易)时,服务器先通过相应的交易数据确定目标交易所属的风险管控类别,并基于得到的风险管控类别生成对应的管控交互策略,从而可以基于风险管控类别确定用户安全意识的强弱等,并基于风险程度进行差异化交互式的交易风险管控,唤醒不同安全意识的用户对目标交易的安全意识,提升了用户的操作体验,并且提升了支付成功率,有效降低欺诈造成的资损。The embodiment of the present specification provides a transaction management and control device. By acquiring transaction data corresponding to a transaction request, and according to the transaction data, identifying a risk management control category to which the target transaction corresponding to the transaction request belongs, to obtain a first risk to which the target transaction belongs. The management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs. Get the transaction result of the target transaction. In this way, whenever a user creates or executes a transaction (ie, the target transaction), the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding Manage and control interactive strategies, which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
实施例四Embodiment 4
以上为本说明书实施例提供的交易的管控装置,基于同样的思路,本说明书实施例还提供一种交易的管控设备,如图6所示。The above is the transaction management and control device provided by the embodiment of the present specification. Based on the same idea, the embodiment of the specification also provides a transaction management and control device, as shown in FIG. 6.
所述目标交易的管控设备可以为上述实施例提供的服务器。The target transaction management and control device may be a server provided in the foregoing embodiment.
交易的管控设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器601和存储器602,存储器602中可以存储有一个或一个以上存储应用程序或数据。其中,存储器602可以是短暂存储或持久存储。存储在存储器602的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对交易的管控设备中的一系列计算机可执行指令。更进一步地,处理器601可以设置为与存储器602通信,在交易的管控设备上执行存储器602中的一系列计算机可执行指令。交易的管控设备还可以包括一个或一个以上电源603,一个或一个以上有线或无线网络接口604,一个或一个以上输入输出接口605,一个或一个以上键盘606。The transaction management and control equipment may have relatively large differences due to different configurations or performance, and may include one or more processors 601 and memory 602. The memory 602 may store one or more storage applications or data. The memory 602 may be a temporary storage or a persistent storage. The application program stored in the memory 602 may include one or more modules (not shown), and each module may include a series of computer-executable instructions in a transaction control device. Furthermore, the processor 601 may be configured to communicate with the memory 602 and execute a series of computer-executable instructions in the memory 602 on a transaction management device. The transaction management equipment may also include one or more power sources 603, one or more wired or wireless network interfaces 604, one or more input / output interfaces 605, and one or more keyboards 606.
具体在本实施例中,交易的管控设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对交易的管控设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行 以下计算机可执行指令:Specifically in this embodiment, the transaction management and control device includes a memory and one or more programs. One or more programs are stored in the memory, and one or more programs may include one or more modules. Each module may include a series of computer-executable instructions in a transaction control device, and configured to be executed by one or more processors. The one or more programs include computer-executable instructions for:
获取交易请求对应的交易数据;Get the transaction data corresponding to the transaction request;
根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;Identifying the risk management and control category to which the target transaction corresponding to the transaction request belongs according to the transaction data, and obtaining the first risk management and control category to which the target transaction belongs;
基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,所述管控交互策略为通过数据交互的方式进行交易风险管控的策略;Generating a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
执行所述管控交互策略,得到所述目标交易的交易结果。The management and control interaction strategy is executed to obtain a transaction result of the target transaction.
本说明书实施例中,所述目标交易所属的风险管控类别包括预定时长内首次识别交易风险和预定时长内再次识别交易风险。In the embodiment of the present specification, the risk management and control category to which the target transaction belongs includes first identifying the transaction risk within a predetermined period and re-identifying the transaction risk within a predetermined period.
本说明书实施例中,所述第一风险管控类别为预定时长内首次识别交易风险,In the embodiment of the present specification, the first risk control category is the first time that transaction risk is identified within a predetermined period of time,
所述基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,包括:The generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;Acquiring scene information of the target transaction, and information of buyers and sellers in the target transaction, and determining the type of fraud to which the target transaction belongs;
基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的管控交互策略。Based on the first risk management category to which the target transaction belongs and the type of fraud to which the target transaction belongs, a corresponding management and control interaction strategy is generated.
本说明书实施例中,所述管控交互策略包括用于引导所述买方识别所述目标交易中存在的风险的风险引导策略。In the embodiment of the present specification, the management and control interaction strategy includes a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
本说明书实施例中,所述风险引导策略包括风险揭示策略和风险排出指引策略。In the embodiment of the present specification, the risk guidance strategy includes a risk disclosure strategy and a risk discharge guidance strategy.
本说明书实施例中,所述场景信息包括转账到资源卡、转账到资源账户或资源包,所述目标交易中的买方信息包括所述买方的账户维度信息、交易维度信息和操作行为信息,所述目标交易中的卖方信息包括所述卖方的账户维度信息。In the embodiment of the present specification, the scenario information includes a transfer to a resource card, a transfer to a resource account or a resource package, and the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior information. The seller information in the target transaction includes account dimension information of the seller.
本说明书实施例中,所述第一风险管控类别为预定时长内再次识别交易风险,In the embodiment of the present specification, the first risk control category is to identify the transaction risk again within a predetermined period of time,
所述基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,包括:The generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;Acquiring scene information of the target transaction, and information of buyers and sellers in the target transaction, and determining the type of fraud to which the target transaction belongs;
基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的安全意识测试信息。Based on the first risk management category to which the target transaction belongs and the type of fraud to which the target transaction belongs, corresponding security awareness test information is generated.
本说明书实施例中,还包括:The embodiments of the present specification further include:
当接收到对所述目标交易的举报指令时,采集基于所述目标交易的举报信息;When a report instruction for the target transaction is received, collecting report information based on the target transaction;
存储采集的举报信息,以记录所述买方和所述卖方之间的所述目标交易,以及与所述卖方交易存在的风险。The collected report information is stored to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
本说明书实施例中,还包括:The embodiments of the present specification further include:
如果确定所述目标交易存在交易风险,则停止所述目标交易,并输出所述目标交易失败的通知消息。If it is determined that the target transaction has transaction risk, the target transaction is stopped, and a notification message of the target transaction failure is output.
本说明书实施例提供一种交易的管控设备,通过获取交易请求对应的交易数据,根据该交易数据,对该交易请求对应的目标交易所属的风险管控类别进行识别,得到目标交易所属的第一风险管控类别,然后,可以基于目标交易所属的第一风险管控类别,生成该交易请求对应的管控交互策略,该管控交互策略为通过数据交互的方式进行交易风险管控的策略,执行该管控交互策略,得到目标交易的交易结果,这样,每当用户创建或执行某交易(即目标交易)时,服务器先通过相应的交易数据确定目标交易所属的风险管控类别,并基于得到的风险管控类别生成对应的管控交互策略,从而可以基于风险管控类别确定用户安全意识的强弱等,并基于风险程度进行差异化交互式的交易风险管控,唤醒不同安全意识的用户对目标交易的安全意识,提升了用户的操作体验,并且提升了支付成功率,有效降低欺诈造成的资损。The embodiment of the present specification provides a transaction management and control device. By acquiring transaction data corresponding to a transaction request, and according to the transaction data, identifying a risk management and control category to which the target transaction corresponding to the transaction request belongs, to obtain a first risk to which the target transaction belongs. The management and control category can then generate the management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs. The management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction, and execute the management and control interaction strategy. Get the transaction result of the target transaction. In this way, whenever a user creates or executes a transaction (ie, the target transaction), the server first determines the risk management category to which the target transaction belongs through the corresponding transaction data, and generates a corresponding risk management category based on the obtained risk management category. Manage and control interactive strategies, which can determine the strength of users' security awareness based on risk management and control categories, and conduct differentiated and interactive transaction risk management and control based on the degree of risk, awaken users with different security awareness to the security awareness of target transactions, and improve the user's operating Experience, and to enhance the success rate of pay, reduce the capital loss resulting from fraud.
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。The specific embodiments of the present specification have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and the desired result may still be achieved. In addition, the processes depicted in the figures do not necessarily require the particular order shown or sequential order to achieve the desired results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如, 可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, for a technical improvement, it can be clearly distinguished whether it is an improvement in hardware (for example, the improvement of circuit structures such as diodes, transistors, switches, etc.) or an improvement in software (for the improvement of method flow). However, with the development of technology, the improvement of many methods and processes can be regarded as a direct improvement of the hardware circuit structure. Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware entity modules. For example, a programmable logic device (Programmable Logic Device (PLD)) (such as a Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic function is determined by the user programming the device. Designers can program themselves to "integrate" a digital system on a PLD, without having to ask a chip manufacturer to design and produce a dedicated integrated circuit chip. Moreover, nowadays, instead of making integrated circuit chips manually, this programming is mostly implemented by "logic compiler" software, which is similar to the software compiler used in program development and writing, but before compilation The original code must also be written in a specific programming language, which is called Hardware Description Language (HDL), and HDL is not the only one, but there are many types, such as ABEL (Advanced Boolean ExpressionLanguage) , AHDL (Altera, Hardware, Description, Language), Confluence, CUPL (Cornell, University Programming, Language), HDCal, JHDL (Java, Hardware, Description, Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby, Hardware, Description), etc. VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. Those skilled in the art should also be clear that as long as the method flow is logically programmed and integrated into the integrated circuit using the above-mentioned several hardware description languages, a hardware circuit that implements the logic method flow can be easily obtained.
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor. , Logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers, and embedded microcontrollers. Examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, With the Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory. Those skilled in the art also know that, in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to make the controller logic gates, switches, application-specific integrated circuits, programmable logic controllers, and embedded controllers by logic programming the method steps Microcontrollers, etc. to achieve the same function. Therefore, such a controller can be regarded as a hardware component, and a device included in the controller for implementing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as a structure that can be both a software module implementing the method and a hardware component.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The system, device, module, or unit described in the foregoing embodiments may be specifically implemented by a computer chip or entity, or a product with a certain function. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above device, the functions are divided into various units and described separately. Of course, when implementing one or more embodiments of the present specification, the functions of each unit may be implemented in the same software or software.
本领域内的技术人员应明白,本说明书的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present specification may be provided as a method, a system, or a computer program product. Therefore, one or more embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present specification may adopt a computer program implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code therein. The form of the product.
本说明书的实施例是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。Embodiments of the present specification are described with reference to flowcharts and / or block diagrams of methods, devices (systems), and computer program products according to the embodiments of the present specification. It should be understood that each process and / or block in the flowcharts and / or block diagrams, and combinations of processes and / or blocks in the flowcharts and / or block diagrams can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to produce a machine, so that the instructions generated by the processor of the computer or other programmable data processing device are used to generate instructions Means for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions The device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方 法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media includes both permanent and non-persistent, removable and non-removable media. Information can be stored by any method or technology. Information may be computer-readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media may be used to store information that can be accessed by computing devices. As defined herein, computer-readable media does not include temporary computer-readable media, such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "including," "including," or any other variation thereof are intended to encompass non-exclusive inclusion, so that a process, method, product, or device that includes a range of elements includes not only those elements, but also Other elements not explicitly listed, or those that are inherent to such a process, method, product, or device. Without more restrictions, the elements defined by the sentence "including a ..." do not exclude the existence of other identical elements in the process, method, product or equipment including the elements.
本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present specification may be provided as a method, a system, or a computer program product. Therefore, one or more embodiments of the present specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present specification may adopt a computer program implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code therein. The form of the product.
本说明书一个或多个实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书一个或多个实施例,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。One or more embodiments of the specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. One or more embodiments of the present specification may also be practiced in distributed computing environments in which tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules may be located in local and remote computer storage media, including storage devices.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other. Each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple. For the relevant part, refer to the description of the method embodiment.
以上所述仅为本说明书的实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的 任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。The above descriptions are merely examples of the present specification and are not intended to limit the present specification. For those skilled in the art, this specification may have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this specification shall be included in the scope of claims of this specification.

Claims (19)

  1. 一种交易的管控方法,所述方法包括:A method for managing and controlling transactions, the method includes:
    获取交易请求对应的交易数据;Get the transaction data corresponding to the transaction request;
    根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;Identifying the risk management and control category to which the target transaction corresponding to the transaction request belongs according to the transaction data, and obtaining the first risk management and control category to which the target transaction belongs;
    基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,所述管控交互策略为通过数据交互的方式进行交易风险管控的策略;Generating a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
    执行所述管控交互策略,得到所述目标交易的交易结果。The management and control interaction strategy is executed to obtain a transaction result of the target transaction.
  2. 根据权利要求1所述的方法,所述目标交易所属的风险管控类别包括预定时长内首次识别交易风险和预定时长内再次识别交易风险。The method according to claim 1, wherein the risk management category to which the target transaction belongs includes first identifying a transaction risk within a predetermined period of time and re-identifying a transaction risk within a predetermined period of time.
  3. 根据权利要求2所述的方法,所述第一风险管控类别为预定时长内首次识别交易风险,The method according to claim 2, wherein the first risk management category is the first time that transaction risk is identified within a predetermined period of time,
    所述基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,包括:The generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
    获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;Acquiring scene information of the target transaction, and information of buyers and sellers in the target transaction, and determining the type of fraud to which the target transaction belongs;
    基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的管控交互策略。Based on the first risk management category to which the target transaction belongs and the type of fraud to which the target transaction belongs, a corresponding management and control interaction strategy is generated.
  4. 根据权利要求3所述的方法,所述管控交互策略包括用于引导所述买方识别所述目标交易中存在的风险的风险引导策略。The method according to claim 3, wherein the management interaction strategy comprises a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
  5. 根据权利要求4所述的方法,所述风险引导策略包括风险揭示策略和风险排出指引策略。The method according to claim 4, wherein the risk guiding strategy comprises a risk revealing strategy and a risk exhausting guiding strategy.
  6. 根据权利要求3所述的方法,所述场景信息包括转账到资源卡、转账到资源账户或资源包,所述目标交易中的买方信息包括所述买方的账户维度信息、交易维度信息和操作行为信息,所述目标交易中的卖方信息包括所述卖方的账户维度信息。The method according to claim 3, wherein the scene information includes transfer to a resource card, transfer to a resource account or a resource package, and the buyer information in the target transaction includes account dimension information, transaction dimension information, and operation behavior of the buyer Information, and the seller information in the target transaction includes account dimension information of the seller.
  7. 根据权利要求2所述的方法,所述第一风险管控类别为预定时长内再次识别交易风险,The method according to claim 2, wherein the first risk management category is to identify the transaction risk again within a predetermined period of time,
    所述基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,包括:The generating a management and control interaction strategy corresponding to the transaction request based on the first risk management and control category to which the target transaction belongs includes:
    获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;Acquiring scene information of the target transaction, and information of buyers and sellers in the target transaction, and determining the type of fraud to which the target transaction belongs;
    基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的安全意识测试信息。Based on the first risk management category to which the target transaction belongs and the type of fraud to which the target transaction belongs, corresponding security awareness test information is generated.
  8. 根据权利要求3-7中任一项所述的方法,所述方法还包括:The method according to any one of claims 3-7, further comprising:
    当接收到对所述目标交易的举报指令时,采集基于所述目标交易的举报信息;When a report instruction for the target transaction is received, collecting report information based on the target transaction;
    存储采集的举报信息,以记录所述买方和所述卖方之间的所述目标交易,以及与所述卖方交易存在的风险。The collected report information is stored to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
  9. 根据权利要求8所述的方法,所述方法还包括:The method according to claim 8, further comprising:
    如果确定所述目标交易存在交易风险,则停止所述目标交易,并输出所述目标交易失败的通知消息。If it is determined that the target transaction has transaction risk, the target transaction is stopped, and a notification message of the target transaction failure is output.
  10. 一种交易的管控装置,所述装置包括:A transaction management and control device, the device includes:
    数据获取模块,用于获取交易请求对应的交易数据;A data acquisition module for acquiring transaction data corresponding to a transaction request;
    风险类别确定模块,用于根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;A risk category determination module, configured to identify, according to the transaction data, a risk management and control category to which a target transaction corresponding to the transaction request belongs, and obtain a first risk management and control category to which the target transaction belongs;
    交互策略生成模块,用于基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,所述管控交互策略为通过数据交互的方式进行交易风险管控的策略;An interaction strategy generating module is configured to generate a management interaction strategy corresponding to the transaction request based on a first risk management category to which the target transaction belongs, where the management interaction strategy is a strategy for performing transaction risk management and control through data interaction;
    执行模块,用于执行所述管控交互策略,得到所述目标交易的交易结果。An execution module is configured to execute the management and control interaction strategy to obtain a transaction result of the target transaction.
  11. 根据权利要求10所述的装置,所述目标交易所属的风险管控类别包括预定时长内首次识别交易风险和预定时长内再次识别交易风险。The device according to claim 10, wherein the risk management category to which the target transaction belongs includes first identifying a transaction risk within a predetermined time period and re-identifying the transaction risk within a predetermined time period.
  12. 根据权利要求11所述的装置,所述第一风险管控类别为预定时长内首次识别交易风险,The device according to claim 11, wherein the first risk management category is the first time a transaction risk is identified within a predetermined period of time,
    所述交互策略生成模块,包括:The interaction strategy generation module includes:
    第一欺诈类型确定单元,用于获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;A first fraud type determining unit, configured to obtain scene information of the target transaction, and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
    第一交互策略生成单元,用于基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的管控交互策略。A first interaction strategy generating unit is configured to generate a corresponding management and interaction strategy based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
  13. 根据权利要求12所述的装置,所述管控交互策略包括用于引导所述买方识别所述目标交易中存在的风险的风险引导策略。The apparatus according to claim 12, wherein the management interaction strategy comprises a risk guidance strategy for guiding the buyer to identify risks existing in the target transaction.
  14. 根据权利要求13所述的装置,所述风险引导策略包括风险揭示策略和风险排出指引策略。The apparatus according to claim 13, wherein the risk guiding strategy comprises a risk revealing strategy and a risk exhausting guiding strategy.
  15. 根据权利要求12所述的装置,所述场景信息包括转账到资源卡、转账到资源 账户或资源包,所述目标交易中的买方信息包括所述买方的账户维度信息、交易维度信息和操作行为信息,所述目标交易中的卖方信息包括所述卖方的账户维度信息。The device according to claim 12, wherein the scene information includes a transfer to a resource card, a transfer to a resource account or a resource package, and the buyer information in the target transaction includes the buyer's account dimension information, transaction dimension information, and operation behavior Information, and the seller information in the target transaction includes account dimension information of the seller.
  16. 根据权利要求11所述的装置,所述第一风险管控类别为预定时长内再次识别交易风险,The device according to claim 11, wherein the first risk management category is re-identification of a transaction risk within a predetermined time period,
    所述交互策略生成模块,包括:The interaction strategy generation module includes:
    第二欺诈类型确定单元,用于获取所述目标交易的场景信息,以及所述目标交易中的买方和卖方的信息,确定所述目标交易所属的欺诈类型;A second fraud type determining unit, configured to obtain scene information of the target transaction and information of buyers and sellers in the target transaction, and determine a fraud type to which the target transaction belongs;
    第二交互策略生成单元,用于基于所述目标交易所属的第一风险管控类别和所述目标交易所属的欺诈类型,生成相对应的安全意识测试信息。A second interaction strategy generating unit is configured to generate corresponding security awareness test information based on a first risk management category to which the target transaction belongs and a fraud type to which the target transaction belongs.
  17. 根据权利要求12-16中任一项所述的装置,所述装置还包括:The device according to any one of claims 12 to 16, further comprising:
    举报信息采集模块,用于当接收到对所述目标交易的举报指令时,采集基于所述目标交易的举报信息;A report information collection module, configured to collect report information based on the target transaction when a report instruction for the target transaction is received;
    举报信息存储模块,用于存储采集的举报信息,以记录所述买方和所述卖方之间的所述目标交易,以及与所述卖方交易存在的风险。The report information storage module is configured to store collected report information to record the target transaction between the buyer and the seller, and the risks existing in the transaction with the seller.
  18. 根据权利要求17所述的装置,所述装置还包括:The apparatus according to claim 17, further comprising:
    停止交易模块,用于如果确定所述目标交易存在交易风险,则停止所述目标交易,并输出所述目标交易失败的通知消息。The transaction stopping module is configured to stop the target transaction if it is determined that the target transaction has transaction risks, and output a notification message that the target transaction fails.
  19. 一种交易的管控设备,所述目标交易的管控设备包括:A transaction management and control device. The target transaction management and control device includes:
    处理器;以及Processor; and
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:A memory arranged to store computer-executable instructions which, when executed, cause the processor to:
    获取交易请求对应的交易数据;Get the transaction data corresponding to the transaction request;
    根据所述交易数据,对所述交易请求对应的目标交易所属的风险管控类别进行识别,得到所述目标交易所属的第一风险管控类别;Identifying the risk management and control category to which the target transaction corresponding to the transaction request belongs according to the transaction data, and obtaining the first risk management and control category to which the target transaction belongs;
    基于所述目标交易所属的第一风险管控类别,生成所述交易请求对应的管控交互策略,所述管控交互策略为通过数据交互的方式进行交易风险管控的策略;Generating a management and control interaction strategy corresponding to the transaction request based on a first risk management and control category to which the target transaction belongs, where the management and control interaction strategy is a strategy for performing transaction risk management and control through data interaction;
    执行所述管控交互策略,得到所述目标交易的交易结果。The management and control interaction strategy is executed to obtain a transaction result of the target transaction.
PCT/CN2019/100680 2018-09-20 2019-08-15 Transaction monitoring method, device, and apparatus WO2020057300A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811102784.3A CN109376999A (en) 2018-09-20 2018-09-20 A kind of management-control method of transaction, device and equipment
CN201811102784.3 2018-09-20

Publications (1)

Publication Number Publication Date
WO2020057300A1 true WO2020057300A1 (en) 2020-03-26

Family

ID=65401590

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/100680 WO2020057300A1 (en) 2018-09-20 2019-08-15 Transaction monitoring method, device, and apparatus

Country Status (3)

Country Link
CN (1) CN109376999A (en)
TW (1) TW202013290A (en)
WO (1) WO2020057300A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376999A (en) * 2018-09-20 2019-02-22 阿里巴巴集团控股有限公司 A kind of management-control method of transaction, device and equipment
CN110009192A (en) * 2019-03-06 2019-07-12 阿里巴巴集团控股有限公司 Risk management and control method, system and device based on customer relationship
CN112101691A (en) * 2019-06-18 2020-12-18 创新先进技术有限公司 Method and device for dynamically adjusting risk level and server
CN110458570B (en) * 2019-07-02 2023-08-08 创新先进技术有限公司 Risk transaction management and configuration method and system thereof
CN110377522B (en) * 2019-07-22 2023-10-03 中国工商银行股份有限公司 Transaction scene testing method, device, computing equipment and medium
CN110598982B (en) * 2019-08-07 2022-02-22 创新先进技术有限公司 Active wind control method and system based on intelligent interaction
CN110827033A (en) * 2019-10-11 2020-02-21 支付宝(杭州)信息技术有限公司 Information processing method and device and electronic equipment
CN111353784A (en) * 2020-02-25 2020-06-30 支付宝(杭州)信息技术有限公司 Transfer processing method, system, device and equipment
CN111429145B (en) * 2020-03-26 2022-04-01 深圳市腾讯计算机系统有限公司 Risk control method and device for electronic transaction and electronic equipment
CN111553697A (en) * 2020-04-26 2020-08-18 支付宝(杭州)信息技术有限公司 Risk processing method, device, equipment and storage medium
CN111539741B (en) * 2020-05-15 2023-02-24 支付宝(杭州)信息技术有限公司 Method, system and non-transitory storage medium for identifying operational risk
CN111724069A (en) * 2020-06-22 2020-09-29 百度在线网络技术(北京)有限公司 Method, apparatus, device and storage medium for processing data
CN112381647A (en) * 2020-10-26 2021-02-19 支付宝(杭州)信息技术有限公司 Method, device, equipment and readable medium for transferring funds
CN112907132A (en) * 2021-03-25 2021-06-04 支付宝(杭州)信息技术有限公司 Full-link interactive wind control method and system
CN114612018B (en) * 2022-05-11 2022-07-22 中国南方电网有限责任公司 Internal control risk monitoring method and system and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120130880A1 (en) * 2010-11-23 2012-05-24 Trading Technologies International, Inc. Systems and Methods for Product-Level and Contract-Level Risk Computations and Management
CN106875078A (en) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 transaction risk detection method, device and equipment
CN107705206A (en) * 2017-11-07 2018-02-16 中国银行股份有限公司 A kind of transaction risk appraisal procedure and device
CN107767021A (en) * 2017-09-12 2018-03-06 阿里巴巴集团控股有限公司 A kind of risk control method and equipment
CN109376999A (en) * 2018-09-20 2019-02-22 阿里巴巴集团控股有限公司 A kind of management-control method of transaction, device and equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101706937A (en) * 2009-12-01 2010-05-12 中国建设银行股份有限公司 Method and system for monitoring electronic bank risks
CN108062629B (en) * 2017-12-26 2021-07-09 平安科技(深圳)有限公司 Transaction event processing method, terminal device and medium
CN108492104B (en) * 2018-02-12 2020-10-02 阿里巴巴集团控股有限公司 Resource transfer monitoring method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120130880A1 (en) * 2010-11-23 2012-05-24 Trading Technologies International, Inc. Systems and Methods for Product-Level and Contract-Level Risk Computations and Management
CN106875078A (en) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 transaction risk detection method, device and equipment
CN107767021A (en) * 2017-09-12 2018-03-06 阿里巴巴集团控股有限公司 A kind of risk control method and equipment
CN107705206A (en) * 2017-11-07 2018-02-16 中国银行股份有限公司 A kind of transaction risk appraisal procedure and device
CN109376999A (en) * 2018-09-20 2019-02-22 阿里巴巴集团控股有限公司 A kind of management-control method of transaction, device and equipment

Also Published As

Publication number Publication date
CN109376999A (en) 2019-02-22
TW202013290A (en) 2020-04-01

Similar Documents

Publication Publication Date Title
WO2020057300A1 (en) Transaction monitoring method, device, and apparatus
US11526889B2 (en) Resource transferring monitoring method and device
WO2020019895A1 (en) Method for processing data of buy-now-pay-later transaction, device, processing apparatus, and server
WO2021103694A1 (en) Payment system and method, server device, medium and apparatus
CN111880927B (en) Resource allocation method, device and equipment
CN107451485A (en) A kind of data processing method and equipment based on block chain
CN107578238A (en) A kind of risk control method and equipment
WO2020177478A1 (en) Credit-based qualification information auditing method, apparatus and device
US20200357078A1 (en) Method, apparatus, system, and electronic device for credit tax refundment
KR101723865B1 (en) Method and system for personal information management in estimating credit rating of person to person banking using analysis of big data
US9392012B2 (en) Application security testing system
WO2021244537A1 (en) Resource transfer
US11948191B1 (en) Device-to-device microlending within a distributed system
KR20160091190A (en) System for estimating credit rating in person to person banking using analysis of big data
CN109003088B (en) Business risk analysis method, device and equipment
CN109003071B (en) Payment method, device and equipment
CN111582868B (en) Transaction request processing method, device and equipment
CN110428304A (en) A kind of order settlement system, method and device
US20200074562A1 (en) Systems and methods for generating product-merchant data links
CN110675249A (en) Matching method, device, server and storage medium for network lending
CN113850066A (en) Protocol text generation method, device and equipment
CN107528822B (en) Service execution method and device
CN114819012A (en) Graphic code checking method and device
US11308552B1 (en) Device-to-device microlending within a distributed system
TW201800992A (en) Off-line payment method, device and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19861528

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19861528

Country of ref document: EP

Kind code of ref document: A1