WO2020057305A1 - 一种风险商户发现方法和装置 - Google Patents

一种风险商户发现方法和装置 Download PDF

Info

Publication number
WO2020057305A1
WO2020057305A1 PCT/CN2019/100950 CN2019100950W WO2020057305A1 WO 2020057305 A1 WO2020057305 A1 WO 2020057305A1 CN 2019100950 W CN2019100950 W CN 2019100950W WO 2020057305 A1 WO2020057305 A1 WO 2020057305A1
Authority
WO
WIPO (PCT)
Prior art keywords
face
transaction
user
merchant
risk
Prior art date
Application number
PCT/CN2019/100950
Other languages
English (en)
French (fr)
Inventor
陈帅
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2020057305A1 publication Critical patent/WO2020057305A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Definitions

  • This specification relates to the field of Internet technologies, and in particular, to a method and device for discovering risky merchants.
  • cheating merchants are usually identified through a funding link: Since in the cheating arbitrage collusion between merchants and users, merchants often return funds to users after obtaining funds, they can be identified by tracking the flow of funds. The disadvantage of this method is that the channel of funds between the merchant and the user may be different and difficult to monitor. In addition, some merchants choose to return in weekly or monthly invoicing instead of returning after each transaction, making the identification have a large lag.
  • the embodiments of the present specification provide a method and a device for discovering risky merchants.
  • the technical solution is as follows:
  • a risk merchant discovery method is provided and applied to a client.
  • the method includes:
  • the client device After receiving the code scanning payment operation initiated by the user, determine whether the code scanning interface selected by the user is a face-to-face scanning interface, wherein different code-scanning interfaces are used to identify pictures from different sources, and the face-to-face scanning interface is used to make The client device recognizes nearby pictures through the image acquisition module;
  • the code scanning interface selected by the user is not a face-to-face scanning interface, after the payment is successful, the transaction is marked as a risky transaction;
  • a risk merchant discovery method is provided and applied to a server.
  • the method includes:
  • a risk merchant discovery method includes:
  • the client After receiving the code scanning payment operation initiated by the user, the client determines whether the code scanning interface selected by the user is a face-to-face scanning interface, wherein different code-scanning interfaces are used to identify pictures from different sources, and the face-to-face scanning interface is used for For the client device to identify nearby pictures through the image acquisition module;
  • the client marks the transaction as a risk transaction and uploads the transaction result to the server;
  • the server calculates, based on the transaction result information, whether the ratio of the number of risky transactions completed to the total number of completed transactions within a preset period of time by the merchant to be tested is greater than a first threshold;
  • the server determines whether the business to be tested is a risk business according to the calculation result.
  • a risk merchant discovery device is provided and applied to a client.
  • the device includes:
  • Scanning code detection module It is used to determine whether the scanning interface selected by the user is a face-to-face scanning interface after receiving a scanning payment operation initiated by a user. Among them, different scanning interfaces are used to identify pictures from different sources. The face-to-face scanning interface is used to enable the client device to identify nearby pictures through the image acquisition module;
  • Risk marking module used to mark the transaction as a risk transaction after the payment is successful when the code scanning interface selected by the user is not a face-to-face scanning interface;
  • Result uploading module used to upload transaction results to the server, so that the server calculates the ratio of the number of risky transactions completed to the total number of transactions completed by the merchant under test within a preset time period, and determines the ratio based on whether the ratio is greater than a first threshold Whether the business to be tested is a risk business.
  • a risk merchant discovery device is provided and applied to a server.
  • the device includes:
  • Result receiving module used to receive the transaction result information uploaded by the client;
  • a risk statistics module configured to calculate, based on the transaction result information, whether the ratio of the number of risk transactions completed to the total number of transactions completed by the merchant to be tested within a preset time period is greater than a first threshold
  • Risk determination module used to determine whether the business to be tested is a risk business according to the calculation result.
  • a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein when the processor executes the program, a computer program is implemented.
  • a risky merchant discovery method applied to a client the method includes:
  • the client device After receiving the code scanning payment operation initiated by the user, determine whether the code scanning interface selected by the user is a face-to-face scanning interface, wherein different code-scanning interfaces are used to identify pictures from different sources, and the face-to-face scanning interface is used to make The client device recognizes nearby pictures through the image acquisition module;
  • the code scanning interface selected by the user is not a face-to-face scanning interface, after the payment is successful, the transaction is marked as a risky transaction;
  • a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements a program when the program is executed.
  • a risk merchant discovery method applied to a server the method includes:
  • the technical solution provided in the embodiment of the present specification provides a risky merchant discovery method. After a client receives a code scanning payment operation initiated by a user, if the code scanning interface selected by the user is not a face-to-face scanning interface, the payment is successful. Then, mark this transaction as a risk transaction; upload the transaction results to the server, so that the server calculates the ratio of the number of risky transactions completed to the total number of transactions completed by the merchant under test within a preset time period, according to whether the ratio is greater than The preset threshold determines whether the merchant to be tested is a risk merchant.
  • the method provided in this specification identifies whether the user is scanning in person by distinguishing the scanning path selected by the user on the client, thereby avoiding the difficulty and delay in identification caused by the channel and time of the flow of funds in the prior art.
  • FIG. 1 is a flowchart of a risk merchant discovery method according to an exemplary embodiment of the present specification
  • FIG. 2-3 is a schematic diagram of a non-face-to-face interface shown in an exemplary embodiment of the present specification
  • FIG. 4 is another flowchart of a risk merchant discovery method according to an exemplary embodiment of the present specification.
  • FIG. 5 is a schematic diagram of a risk merchant discovery method shown in an exemplary embodiment of the present specification.
  • FIG. 6 is a flowchart of a risk merchant discovery method executed on a client side according to an exemplary embodiment of the present specification
  • FIG. 7 is a flowchart of a risk merchant discovery method executed on a server according to an exemplary embodiment of the present specification
  • FIG. 8 is a schematic diagram of a risk merchant discovery device on a client side according to an exemplary embodiment of the present specification.
  • FIG. 9 is a schematic diagram of a risk merchant discovery device on a server, according to an exemplary embodiment of the present specification.
  • Fig. 10 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present specification.
  • first, second, third, etc. may be used in this specification to describe various information, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information.
  • word “if” as used herein can be interpreted as “at” or "when” or "in response to determination”.
  • cheating merchants are usually identified through a funding link: Since in the cheating arbitrage collusion between merchants and users, merchants often return funds to users after obtaining funds, they can be identified by tracking the flow of funds. The disadvantage of this method is that the channel of funds between the merchant and the user may be different and difficult to monitor. In addition, some merchants choose to return in weekly or monthly invoicing instead of returning after each transaction, making the identification have a large lag.
  • an embodiment of the present specification provides a risk merchant discovery method and a risk merchant discovery device for performing the method.
  • the risk merchant discovery involved in this embodiment is described in detail below. See FIG.
  • the method can include the following steps:
  • the client receives a scan code payment operation initiated by a user.
  • step S102 Determine whether the code scanning interface selected by the user is a face-to-face scanning interface. If it is a face-to-face scanning interface, perform step S103. If it is not a face-to-face scanning interface, do not operate.
  • different code scanning interfaces are used to identify pictures from different sources, and the face-to-face scanning interface is used to enable a client device to identify nearby pictures through an image acquisition module;
  • the user In the normal offline code scanning payment operation, the user usually scans the payment code provided by the merchant directly through the image acquisition module (camera, etc.) of the mobile device, and then completes the payment operation.
  • the image acquisition module camera, etc.
  • the payment code is sent or displayed via the network to users who assist in drawing funds for the event.
  • the merchant can send the payment code to other users through a single person or group, or the merchant displays the payment code in a public forum (Weibo, Post Bar, etc.), and the user completes the transaction through the screenshot and the merchant's request to return paragraph.
  • the user usually chooses the second or third method to identify the payment code when assisting in collecting funds for the activity, that is, the user's operation interface is the “photo album” in FIG. 2 and the “photo album” in FIG. 3 "Identify the QR code in the picture".
  • the non-face-to-face scanning interface is not limited to the examples. As long as the user does not use the client device to identify nearby pictures through the image acquisition module, it can be determined as a non-face-to-face scanning.
  • the client marks the transaction as a risk transaction and uploads the transaction result to the server;
  • the transaction information may include a merchant who conducts a transaction with the user. Suspect marks on the transaction, the time of the transaction, etc. At this time, it is uncertain whether the transaction was used to illegally apply activity funds. It must be further determined whether the merchant has a large number of transactions similar to the above, with suspected illegal application of activity funds.
  • the server calculates, based on the transaction result information, whether the ratio of the number of risky transactions completed to the total number of transactions completed by the merchant to be tested within a preset time period is greater than a first threshold;
  • the server After the server receives the transaction result information from each client, the server accumulates the transaction result information under the corresponding merchant information, and statistics the transaction information of different merchants to determine the number of risky transactions completed by the merchant within the preset time period and the total Whether the ratio of the number of transactions is greater than a first threshold.
  • S105 The server determines whether the merchant to be tested is a risk merchant according to the calculation result.
  • the ratio of the number of risky transactions to the total number of transactions is greater than the first threshold value, it means that the merchant has a high probability of completing a large number of non-face-to-face transactions with the user, and it can be judged that the merchant is likely to carry out activity funds.
  • An embodiment of the present specification also provides a more specific risk merchant discovery method. As shown in FIG. 4, the method may include the following steps:
  • the client monitors different code scanning interfaces provided to the user for code scanning payment
  • the client determines whether the code scanning interface operated by the user is a face-to-face scanning interface. If the face-to-face scanning interface is performed, step S403 is performed. If it is not the face-to-face scanning interface, no operation is performed. ;
  • step S406. Determine whether the time difference is greater than a preset time. If the time difference is greater than the preset time, step S407 is performed. If the time difference is not greater than the preset time, no operation is performed.
  • the scan code button suspected of cheating in the client can be uniquely identified by an ID.
  • the keys suspected of cheating are as shown in FIG. 2 and FIG. 3, and the identification positions "album” and "identification QR code” in the figure.
  • the user operation is recorded, and the record contains the unique identification of the button and the time CTi of the click.
  • the server calculates, based on the transaction result information, whether the ratio of the number of risky transactions completed to the total number of completed transactions within a preset period of time by the merchant to be tested is greater than a first threshold;
  • step S410 If the ratio is greater than the first threshold, continue to determine whether the total number of transactions completed by the merchant under test within the preset time period is greater than a second threshold. If the total number of transactions is greater than the second threshold, step S410 is performed. If the total number of transactions is not greater than the second threshold. Then do not operate;
  • the merchant is likely to carry out the collection of activity funds.
  • this is a risk merchant discovery method performed on a client according to an embodiment of the present specification.
  • the method includes:
  • this is a risk merchant discovery method performed on a server according to an embodiment of the present specification.
  • the method includes:
  • S703 Determine whether the merchant under test is a risk merchant according to the calculation result.
  • the embodiment of the present specification also provides a risk merchant discovery device applied to the client.
  • the device may include a code scanning detection module 810, a risk marking module 820, and a result uploading module. 830.
  • the code scanning detection module 810 is configured to determine whether the scanning interface selected by the user is a face-to-face scanning interface after receiving a scanning payment operation initiated by a user, wherein different scanning interfaces are used to identify pictures from different sources,
  • the face-to-face scanning interface is used to enable a client device to identify nearby pictures through an image acquisition module;
  • Risk marking module 820 used for marking the transaction as a risk transaction after the payment is successful when the code scanning interface selected by the user is not the face scanning interface;
  • Result uploading module 830 It is used to upload the transaction results to the server, so that the server calculates the ratio of the number of risky transactions completed to the total number of transactions completed by the merchant to be tested within a preset period of time, and determines whether the ratio is greater than the first threshold. Describe whether the business to be tested is a risk business.
  • the embodiment of the present specification also provides a risk merchant discovery device applied to a server.
  • the device may include a result receiving module 910, a risk statistics module 920, and a risk determination module 930. .
  • a result receiving module 910 configured to receive transaction result information uploaded by a user terminal
  • a risk statistics module 920 configured to calculate, based on the transaction result information, whether the ratio of the number of risky transactions completed to the total number of completed transactions within a preset period of time by the merchant to be tested is greater than a first threshold;
  • a risk determination module 930 is configured to determine whether the merchant to be tested is a risk merchant according to a calculation result.
  • An embodiment of the present specification further provides a computer device including at least a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the foregoing risk merchant discovery method when the processor executes the program, The method is applied to a client, and the method includes at least:
  • the client device After receiving the code scanning payment operation initiated by the user, determine whether the code scanning interface selected by the user is a face-to-face scanning interface, wherein different code-scanning interfaces are used to identify pictures from different sources, and the face-to-face scanning interface is used to make The client device recognizes nearby pictures through the image acquisition module;
  • the code scanning interface selected by the user is not a face-to-face scanning interface, after the payment is successful, the transaction is marked as a risky transaction;
  • An embodiment of the present specification further provides a computer device including at least a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the foregoing risk merchant discovery method when the processor executes the program,
  • the method is applied to a server, and the method includes at least:
  • FIG. 10 shows a more specific schematic diagram of a hardware structure of a computing device provided by an embodiment of the present specification.
  • the device may include a processor 1010, a memory 1020, an input / output interface 1030, a communication interface 1040, and a bus 1050.
  • the processor 1010, the memory 1020, the input / output interface 1030, and the communication interface 1040 implement a communication connection within the device through a bus 1050.
  • the processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits, etc., for performing related operations. Program to implement the technical solutions provided by the embodiments of this specification.
  • a general-purpose CPU Central Processing Unit
  • ASIC Application Specific Integrated Circuit
  • the memory 1020 can be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage devices, dynamic storage devices, and the like.
  • the memory 1020 may store an operating system and other application programs.
  • related program codes are stored in the memory 1020 and are called and executed by the processor 1010.
  • the input / output interface 1030 is used to connect an input / output module to implement information input and output.
  • the input / output / module can be configured in the device as a component (not shown in the figure), or it can be externally connected to the device to provide corresponding functions.
  • the input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc.
  • the output device may include a display, a speaker, a vibrator, and an indicator light.
  • the communication interface 1040 is used to connect a communication module (not shown in the figure) to implement communication interaction between the device and other devices.
  • the communication module can implement communication through a wired method (such as USB, network cable, etc.), and can also implement communication through a wireless method (such as mobile network, WIFI, Bluetooth, etc.).
  • the bus 1050 includes a path for transmitting information between various components of the device (for example, the processor 1010, the memory 1020, the input / output interface 1030, and the communication interface 1040).
  • the device may also include necessary for achieving normal operation Other components.
  • the foregoing device may also include only components necessary to implement the solutions of the embodiments of the present specification, and does not necessarily include all the components shown in the drawings.
  • An embodiment of the present specification also provides a computer-readable storage medium on which a computer program is stored.
  • the program is executed by a processor, the foregoing method for detecting a risky merchant is implemented.
  • the method is applied to a client.
  • the method at least includes:
  • the client device After receiving the code scanning payment operation initiated by the user, determine whether the code scanning interface selected by the user is a face-to-face scanning interface, wherein different code-scanning interfaces are used to identify pictures from different sources, and the face-to-face scanning interface is used to make The client device recognizes nearby pictures through the image acquisition module;
  • the code scanning interface selected by the user is not a face-to-face scanning interface, after the payment is successful, the transaction is marked as a risky transaction;
  • An embodiment of the present specification also provides a computer-readable storage medium on which a computer program is stored.
  • the program is executed by a processor, the foregoing method for discovering a risky merchant is implemented.
  • the method is applied to a server.
  • the method includes at least:
  • Computer-readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information can be stored by any method or technology.
  • Information may be computer-readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media may be used to store information that can be accessed by computing devices.
  • computer-readable media does not include temporary computer-readable media, such as modulated data signals and carrier waves.
  • risk merchant discovery system which includes:
  • the client is configured to determine whether the code scanning interface selected by the user is a face-to-face scanning interface after receiving a code scanning payment operation initiated by a user, wherein different code scanning interfaces are used to identify pictures from different sources.
  • the face-to-face scanning interface is used to enable the client device to identify nearby pictures through the image acquisition module;
  • the client is configured to mark the transaction as a risk transaction after the payment is successful when the code scanning interface selected by the user is not an in-person scanning interface;
  • the client is used to upload the transaction result to the server;
  • the server is configured to receive transaction result information uploaded by a client
  • the server is configured to calculate, based on the transaction result information, whether the ratio of the number of completed risky transactions to the total number of completed transactions within a preset time period of the merchant to be tested is greater than a first threshold;
  • the server is configured to determine whether the merchant to be tested is a risk merchant according to a calculation result.
  • the relevant part may refer to the description of the method embodiment.
  • the device embodiments described above are only schematic, wherein the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, may be located One place, or it can be distributed across multiple network elements. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement without creative efforts.
  • the embodiments of the present specification can be implemented by means of software plus a necessary universal hardware platform. Based on such an understanding, the technical solutions of the embodiments of the present specification may be embodied in the form of software products that are essentially or contribute to the existing technology.
  • the computer software product may be stored in a storage medium, such as ROM / RAM, Magnetic disks, optical disks, and the like include a number of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments or portions of the embodiments of this specification.
  • the system, device, module, or unit described in the foregoing embodiments may be specifically implemented by a computer chip or entity, or a product with a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet computer, wearable device, or a combination of any of these devices.

Landscapes

  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请提供一种风险商户发现方法。先接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户,本申请通过区分用户在客户端选择的扫码路径识别用户是否是当面进行扫描,避免了现有技术因资金流动的渠道和时间问题造成的监察困难和识别滞后。

Description

一种风险商户发现方法和装置 技术领域
本说明书涉及互联网技术领域,尤其涉及一种风险商户发现方法和装置。
背景技术
随着电子支付的普及,越来越多的线下商户会为用户提供电子支付渠道,用户可以通过支付宝等支付软件扫描商户提供的付款码,用以线下支付。
其中,电子支付软件方为了吸引用户进行线下支付,有时会投入活动资金用以开展优惠活动,对于参与活动的商户,用户在付款时可以获得金额减免的优惠。面对着大量活动资金,存在着不法商户勾结黑产用户进行虚假交易,然后从中套利。例如:在商户满20减5块的活动中,有不法商家通过网络召集一批用户,然后将付款码远程发送给用户,用户通过网络接收到付款码后,通过扫码付款20元,获得5元减免,实际支出15元,商家获得20元后将用户本金15元返还,并且与用户瓜分5元营销资金。
现有技术中,通常通过资金链路识别作弊商户:由于在商户与用户勾结的作弊套利中,商户往往在获取资金后将资金再返还给用户,因此可以通过跟踪资金流向来进行识别。这种方法的缺点是,商户与用户之间的资金往返渠道可能是不同的,难以监察。此外有的商户选择以周结或者月结的方式返还,而不是在每笔交易后返还,使得识别有较大的滞后。
发明内容
针对上述技术问题,本说明书实施例提供一种风险商户发现方法和装置,技术方案如下:
根据本说明书实施例的第一方面,提供一种风险商户发现方法,应用于客户端,该方法包括:
接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;
将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
根据本说明书实施例的第二方面,提供一种风险商户发现方法,应用于服务器,该方法包括:
接收用户端上传的交易结果信息;
根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
根据计算结果判定所述待测商户是否为风险商户。
根据本说明书实施例的第三方面,提供一种风险商户发现方法,该方法包括:
客户端接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,客户端将本次交易标记为风险交易,并将交易结果上传给服务器;
服务器根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
服务器根据计算结果判定所述待测商户是否为风险商户。
根据本说明书实施例的第四方面,提供一种风险商户发现装置,应用于客户端,该装置包括:
扫码检测模块:用于接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
风险标记模块:用于当所述用户选择的扫码接口不为当面扫描接口后,在支付成功后,将本次交易标记为风险交易;
结果上传模块:用于将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
根据本说明书实施例的第五方面,提供一种风险商户发现装置,应用于服务器,该装置包括:
结果接收模块:用于接收用户端上传的交易结果信息;
风险统计模块:用于根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
风险判定模块:用于根据计算结果判定所述待测商户是否为风险商户。
根据本说明书实施例的第六方面,提供一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现一种风险商户发现方法,应用于客户端,该方法包括:
接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;
将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
根据本说明书实施例的第七方面,提供一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现一种风险商户发现方法,应用于服务器,该方法包括:
接收用户端上传的交易结果信息;
根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
根据计算结果判定所述待测商户是否为风险商户。
本说明书实施例所提供的技术方案,提供了一种风险商户发现方法,客户端接收用 户发起的扫码支付操作后,若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;并将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于预设阈值确定所述待测商户是否为风险商户。
本说明书提供的方法通过区分用户在客户端选择的扫码路径识别用户是否是当面进行扫描,避免了现有技术因资金流动的渠道和时间问题造成的监察困难和识别滞后。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本说明书实施例。
此外,本说明书实施例中的任一实施例并不需要达到上述的全部效果。
附图说明
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书实施例中记载的一些实施例,对于本领域普通技术人员来讲,还可以根据这些附图获得其他的附图。
图1是本说明书一示例性实施例示出的风险商户发现方法的一种流程图;
图2-3是本说明书一示例性实施例示出的非当面接口的示意图;
图4是本说明书一示例性实施例示出的风险商户发现方法的另一种流程图;
图5是本说明书一示例性实施例示出的风险商户发现方法的一种示意图;
图6是本说明书一示例性实施例示出的风险商户发现方法在客户端执行的一种流程图;
图7是本说明书一示例性实施例示出的风险商户发现方法在服务器执行的一种流程图;
图8是本说明书一示例性实施例示出的风险商户发现装置在客户端的一种示意图;
图9是本说明书一示例性实施例示出的风险商户发现装置在服务器的一种示意图;
图10是本说明书一示例性实施例示出的一种计算机设备的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本说明书相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本说明书的一些方面相一致的装置和方法的例子。
在本说明书使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本说明书。在本说明书和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本说明书可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本说明书范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
随着电子支付的普及,越来越多的线下商户会为用户提供电子支付渠道,用户可以通过支付宝等支付软件扫描商户提供的付款码,用以线下支付。
其中,电子支付软件方为了吸引用户进行线下支付,有时会投入活动资金用以开展优惠活动,对于参与活动的商户,用户在付款时可以获得金额减免的优惠。面对着大量活动资金,存在着不法商户勾结黑产用户进行虚假交易,然后从中套利。例如:在商户满20减5块的活动中,有不法商家通过网络召集一批用户,然后将付款码发给用户,用户通过扫码付款20元,获得5元减免,实际支出15元,商家获得20元后将用户本金15元返还,并且与用户瓜分5元营销资金。
现有技术中,通常通过资金链路识别作弊商户:由于在商户与用户勾结的作弊套利中,商户往往在获取资金后将资金再返还给用户,因此可以通过跟踪资金流向来进行识别。这种方法的缺点是,商户与用户之间的资金往返渠道可能是不同的,难以监察。此外有的商户选择以周结或者月结的方式返还,而不是在每笔交易后返还,使得识别有较大的滞后。
针对以上问题,本说明书实施例提供一种风险商户发现方法,以及一种用于执行该方法的风险商户发现装置,下面对本实施例涉及的风险商户发现进行详细说明,参见图 1所示,该方法可以包括以下步骤:
S101,客户端接收用户发起的扫码支付操作,
S102,确定所述用户选择的扫码接口是否为当面扫描接口,若是当面扫描接口,则执行步骤S103,若不是当面扫描接口,则不操作;
其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
在正常的线下扫码付款操作中,用户通常会直接通过移动设备的图像采集模块(摄像头等)扫描商户提供的付款码,进而完成支付操作。
风险商户想要非法套取活动资金时,通常并不会采用线下扫码的方式付款,用户并不用出现在商家门店。而是通过网络将付款码发送或展示给协助套取活动资金的用户。举例说明,商户可将付款码通过单人或群组的方式发送给其他用户,或,商家将付款码展示在公共论坛(微博,贴吧等),由用户完成交易后通过截图和商家要求返款。
可以理解,用户远程获取付款码后,通常不采用直接当面扫描的方式对付款码进行识别,而一般的电子支付软件通常会提供一些非当面扫描的付款码识别方式。
以电子支付软件支付宝钱包为例,参考图2和图3,目前支付宝钱包APP内有三种付款码识别方式:
1)打开支付宝钱包->进入“扫一扫”->将手机摄像头对准付款码进行扫码;
2)打开支付宝钱包->进入”扫一扫”->点击“相册”按钮->从相册中选择付款码图片进行付款码识别;
3)点击长按付款码图片(商家通过支付宝社交渠道将付款码发给用户,或在论坛等处展示给用户)->点击“识别图中二维码”进行付款码识别。
以上述识别方式为例,用户在协助套取活动资金时,通常选择第二种或第三种方式进行付款码识别,即用户的操作接口分别为图2中的“相册”和图3中的“识别图中二维码”。且非当面扫描接口不仅限于举例的几种,只要用户没有使用客户端设备通过图像采集模块对附近图片进行识别,则可将其判定为非当面扫描。
S103,若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,客户端将本次交易标记为风险交易,并将交易结果上传给服务器;
仍以上文支付宝钱包的三种付款码识别方式为例,若用户选择的扫码接口为“相册” 或“识别图中二维码”,则在对应的交易成功后,将这笔交易标记为风险交易。
将该笔交易信息上传到服务器,交易信息可包括与用户进行交易的商户。对该笔交易的嫌疑标记,该笔交易的进行时间等。此时,尚不能确定该交易是不是用来非法套用活动资金的。必须进一步确定商户是否出现大量与上述类似,具备非法套用活动资金的嫌疑的交易。
S104,服务器根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
服务器从各个客户端收到的交易结果信息后,将交易结果信息累计到对应的商户信息下,并对不同商户的交易信息进行统计,判断商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值。
S105,服务器根据计算结果判定所述待测商户是否为风险商户。
可以理解,若风险交易数与总交易数的比值大于第一阈值,则表示商户大概率与用户之间完成了大量非当面交易,进而可判断该商户很可能在进行活动资金的套取。
本说明书实施例还提供一种更为具体的风险商户发现方法,参见图4所示,该方法可以包括以下步骤:
S401,客户端对提供给用户的,用于扫码支付的不同扫码接口进行监控;
S402,当用户对所述不同扫码接口之一进行操作后,客户端确定用户操作的扫码接口是否为当面扫描接口,若是当面扫描接口,执行步骤S403,若不是当面扫描接口,则不操作;
S403,若用户操作的接口为非当面扫描接口,则记录用户的接口操作时间;
S404,接口操作结束后,发生首次扫码支付事件时,记录所述扫码支付事件的发生时间;
S405,计算所述接口操作时间与扫码支付事件发生时间的时间差;
S406,判断所述时间差是否大于预设时间,如大于预设时间,则执行步骤S407,若不大于预设时间,则不操作;
具体地,可将客户端中有作弊嫌疑的扫码按键用ID进行唯一标识。以图2,图3为例,有作弊嫌疑的按键是如图2,图3中的标识位置“相册”和“识别图中二维码”。
用户点击标识案件后,对该次用户操作进行记录,该记录包含该按键的唯一标识与点击的时间CTi。当扫码支付事件发起后,记录扫码事件发生时间PT。并根据点击与支付事件的时间差ti=PT-CTi,如果时间差小于预设时间,则可判断这次点击事件与这次交易时间有关联。参考图5,假设将交易结果记为Y,则令Y=1代表该交易为风险交易,令Y=0代表该交易为正常交易。
S407,在支付成功后,将本次交易标记为风险交易,并将交易结果上传给服务器;
S408,服务器根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
S409,若所述比值大于第一阈值,继续判断待测商户在所述预设时间段内完成的总交易数是否大于第二阈值,若所述总交易数大于第二阈值,则执行步骤S410,若所述总交易数不大于第二阈值。则不操作;
可以理解,在时间足够集中(预设时间段内),样本足够多(总交易数大于第二阈值)的情况下,若风险交易数量在总交易数量中的占比足够高(完成风险交易数与完成总交易数的比值是否大于第一阈值),则该商户大概率在进行活动资金的套取。
S410,判定所述待测商户为风险商户。
为了更清楚地说明本说明书实施例的方案,下面分别再从单侧的角度,对于执行的方法进行说明:
参见图6所示,为本说明书实施例在客户端执行的风险商户发现方法,所述方法包括:
S601,接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
S602,若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;
S603,将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
参见图7所示,为本说明书实施例在服务器执行的风险商户发现方法,所述方法包 括:
S701,接收用户端上传的交易结果信息;
S702,根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
S703,根据计算结果判定所述待测商户是否为风险商户。
相应于上述方法实施例,本说明书实施例还提供一种应用于客户端的风险商户发现装置,参见图8所示,所述装置可以包括:扫码检测模块810,风险标记模块820和结果上传模块830。
扫码检测模块810:用于接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
风险标记模块820:用于当所述用户选择的扫码接口不为当面扫描接口后,在支付成功后,将本次交易标记为风险交易;
结果上传模块830:用于将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
相应于上述方法实施例,本说明书实施例还提供一种应用于服务器的风险商户发现装置,参见图9所示,所述装置可以包括:结果接收模块910,风险统计模块920和风险判定模块930。
结果接收模块910:用于接收用户端上传的交易结果信息;
风险统计模块920:用于根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
风险判定模块930:用于根据计算结果判定所述待测商户是否为风险商户。
本说明书实施例还提供一种计算机设备,其至少包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,处理器执行所述程序时实现前述风险商户发现方法,所述方法应用于客户端,该方法至少包括:
接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用 于使客户端设备通过图像采集模块对附近图片进行识别;
若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;
将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
本说明书实施例还提供一种计算机设备,其至少包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,处理器执行所述程序时实现前述风险商户发现方法,所述方法应用于服务器,该方法至少包括:
接收用户端上传的交易结果信息;
根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
根据计算结果判定所述待测商户是否为风险商户。
图10示出了本说明书实施例所提供的一种更为具体的计算设备硬件结构示意图,该设备可以包括:处理器1010、存储器1020、输入/输出接口1030、通信接口1040和总线1050。其中处理器1010、存储器1020、输入/输出接口1030和通信接口1040通过总线1050实现彼此之间在设备内部的通信连接。
处理器1010可以采用通用的CPU(Central Processing Unit,中央处理器)、微处理器、应用专用集成电路(Application Specific Integrated Circuit,ASIC)、或者一个或多个集成电路等方式实现,用于执行相关程序,以实现本说明书实施例所提供的技术方案。
存储器1020可以采用ROM(Read Only Memory,只读存储器)、RAM(Random Access Memory,随机存取存储器)、静态存储设备,动态存储设备等形式实现。存储器1020可以存储操作系统和其他应用程序,在通过软件或者固件来实现本说明书实施例所提供的技术方案时,相关的程序代码保存在存储器1020中,并由处理器1010来调用执行。
输入/输出接口1030用于连接输入/输出模块,以实现信息输入及输出。输入输出/模块可以作为组件配置在设备中(图中未示出),也可以外接于设备以提供相应功能。 其中输入设备可以包括键盘、鼠标、触摸屏、麦克风、各类传感器等,输出设备可以包括显示器、扬声器、振动器、指示灯等。
通信接口1040用于连接通信模块(图中未示出),以实现本设备与其他设备的通信交互。其中通信模块可以通过有线方式(例如USB、网线等)实现通信,也可以通过无线方式(例如移动网络、WIFI、蓝牙等)实现通信。
总线1050包括一通路,在设备的各个组件(例如处理器1010、存储器1020、输入/输出接口1030和通信接口1040)之间传输信息。
需要说明的是,尽管上述设备仅示出了处理器1010、存储器1020、输入/输出接口1030、通信接口1040以及总线1050,但是在具体实施过程中,该设备还可以包括实现正常运行所必需的其他组件。此外,本领域的技术人员可以理解的是,上述设备中也可以仅包含实现本说明书实施例方案所必需的组件,而不必包含图中所示的全部组件。
本说明书实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现前述的风险商户发现方法,所述方法应用于客户端,该方法至少包括:
接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;
将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
本说明书实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现前述的风险商户发现方法,所述方法应用于服务器,该方法至少包括:
接收用户端上传的交易结果信息;
根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
根据计算结果判定所述待测商户是否为风险商户。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
本说明还提供一种风险商户发现系统,所述系统包括:
服务器、客户端;
所述客户端,用于接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
所述客户端,用于当所述用户选择的扫码接口不为当面扫描接口后,在支付成功后,将本次交易标记为风险交易;
所述客户端,用于将交易结果上传给服务器;
所述服务器,用于接收用户端上传的交易结果信息;
所述服务器,用于根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
所述服务器,用于根据计算结果判定所述待测商户是否为风险商户。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本说明书方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本说明书实施例可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本说明书实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本说明书实施例各个实施例或者实施例的某些部分所述的方法。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,在实施本说明书实施例方案时可以把各模块的功能在同一个或多个软件和/或硬件中实现。也可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
以上所述仅是本说明书实施例的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本说明书实施例原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本说明书实施例的保护范围。

Claims (16)

  1. 一种风险商户发现方法,所述方法包括:
    客户端接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
    若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,客户端将本次交易标记为风险交易,并将交易结果上传给服务器;
    服务器根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
    服务器根据计算结果判定所述待测商户是否为风险商户。
  2. 一种风险商户发现方法,应用于客户端,所述方法包括:
    接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
    若所述用户选择的扫码接口不为当面扫描接口,则在支付成功后,将本次交易标记为风险交易;
    将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
  3. 如权利要求2所述的方法,所述接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,包括:
    对客户端提供给用户的,用于扫码支付的不同扫码接口进行监控;
    当用户对所述不同扫码接口之一进行操作后,确定用户操作的扫码接口是否为当面扫描接口。
  4. 如权利要求3所述的方法,所述若所述用户选择的扫码模式不为当面扫描,则在支付成功后,将本次交易标记为风险交易,包括:
    若用户操作的接口为非当面扫描接口,确定客户端在操作结束后的预设时间内是否发生扫码支付事件;
    若发生扫码支付事件,则在支付成功后,将本次交易标记为风险交易。
  5. 如权利要求3所述的方法,所述若所述用户选择的扫码模式不为当面扫描,则在支付成功后,将本次交易标记为风险交易,包括:
    若用户操作的接口为非当面扫描接口,则记录用户的接口操作时间;
    接口操作结束后,发生首次扫码支付事件时,记录所述扫码支付事件的发生时间;
    计算所述接口操作时间与扫码支付事件发生时间的时间差,若所述时间差不大于预设时间,则在支付成功后,将本次交易标记为风险交易。
  6. 一种风险商户发现方法,应用于服务器,所述方法包括:
    接收用户端上传的交易结果信息;
    根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
    根据计算结果判定所述待测商户是否为风险商户。
  7. 如权利要求6所述的方法,所述根据计算结果判定所述待测商户是否为风险商户,包括
    判断所述比值是否大于第一阈值;
    若所述比值大于第一阈值,继续判断待测商户在所述预设时间段内完成的总交易数是否大于第二阈值;
    若所述总交易数大于第二阈值,则判定所述待测商户为风险商户。
  8. 一种风险商户发现装置,应用于客户端,所述装置包括:
    扫码检测模块:用于接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
    风险标记模块:用于当所述用户选择的扫码接口不为当面扫描接口后,在支付成功后,将本次交易标记为风险交易;
    结果上传模块:用于将交易结果上传给服务器,以使服务器计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值,根据所述比值是否大于第一阈值确定所述待测商户是否为风险商户。
  9. 如权利要求8所述的装置,所述确定所述用户选择的扫码接口是否为当面扫描接口,包括:
    对客户端提供给用户的,用于扫码支付的不同扫码接口进行监控;
    当用户对所述不同扫码接口之一进行操作后,确定用户操作的扫码接口是否为当面扫描接口。
  10. 如权利要求9所述的装置,所述若所述用户选择的扫码模式不为当面扫描,则在支付成功后,将本次交易标记为风险交易,包括:
    若用户操作的接口为非当面扫描接口,确定客户端在操作结束后的预设时间内是否发生扫码支付事件;
    若发生扫码支付事件,则在支付成功后,将本次交易标记为风险交易。
  11. 如权利要求9所述的装置,所述若所述用户选择的扫码模式不为当面扫描,则在支付成功后,将本次交易标记为风险交易,包括:
    若用户操作的接口为非当面扫描接口,则记录用户的接口操作时间;
    接口操作结束后,发生首次扫码支付事件时,记录所述扫码支付事件的发生时间;
    计算所述接口操作时间与扫码支付事件发生时间的时间差,若所述时间差不大于预设时间,则在支付成功后,将本次交易标记为风险交易。
  12. 一种风险商户发现装置,应用于服务器,所述装置包括:
    结果接收模块:用于接收用户端上传的交易结果信息;
    风险统计模块:用于根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
    风险判定模块:用于根据计算结果判定所述待测商户是否为风险商户。
  13. 如权利要求12所述的装置,所述根据判断结果,判定所述待测商户是否为风险商户,包括
    判断所述比值是否大于第一阈值;
    若所述比值大于第一阈值,继续判断待测商户在所述预设时间段内完成的总交易数是否大于第二阈值;
    若所述总交易数大于第二阈值,则判定所述待测商户为风险商户。
  14. 一种风险商户发现系统,所述系统包括:
    服务器、客户端;
    所述客户端,用于接收用户发起的扫码支付操作后,确定所述用户选择的扫码接口是否为当面扫描接口,其中,不同的扫码接口用于对不同来源的图片进行识别,所述当面扫描接口用于使客户端设备通过图像采集模块对附近图片进行识别;
    所述客户端,用于当所述用户选择的扫码接口不为当面扫描接口后,在支付成功后,将本次交易标记为风险交易;
    所述客户端,用于将交易结果上传给服务器;
    所述服务器,用于接收用户端上传的交易结果信息;
    所述服务器,用于根据所述交易结果信息,计算待测商户在预设时间段内完成风险交易数与完成总交易数的比值是否大于第一阈值;
    所述服务器,用于根据计算结果判定所述待测商户是否为风险商户。
  15. 一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现如权利要求2所述的方法。
  16. 一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现如权利要求6所述的方法。
PCT/CN2019/100950 2018-09-20 2019-08-16 一种风险商户发现方法和装置 WO2020057305A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811099111.7A CN109272336A (zh) 2018-09-20 2018-09-20 一种风险商户发现方法和装置
CN201811099111.7 2018-09-20

Publications (1)

Publication Number Publication Date
WO2020057305A1 true WO2020057305A1 (zh) 2020-03-26

Family

ID=65197701

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/100950 WO2020057305A1 (zh) 2018-09-20 2019-08-16 一种风险商户发现方法和装置

Country Status (3)

Country Link
CN (1) CN109272336A (zh)
TW (1) TW202013282A (zh)
WO (1) WO2020057305A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272336A (zh) * 2018-09-20 2019-01-25 阿里巴巴集团控股有限公司 一种风险商户发现方法和装置
CN110033092B (zh) * 2019-01-31 2020-06-02 阿里巴巴集团控股有限公司 数据标签生成、模型训练、事件识别方法和装置
CN110659961A (zh) * 2019-09-12 2020-01-07 阿里巴巴集团控股有限公司 一种用于识别线下商户的方法和装置
CN110782143B (zh) * 2019-10-15 2022-05-06 支付宝(杭州)信息技术有限公司 数据处理方法和装置
CN111353488B (zh) * 2020-02-25 2021-09-21 支付宝(杭州)信息技术有限公司 识别码图像中的风险的方法、装置以及设备
CN114897533A (zh) * 2022-02-15 2022-08-12 北京结慧科技有限公司 基于商业行为的风险控制方法、装置、介质及计算机设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150058199A1 (en) * 2013-08-26 2015-02-26 Aleksandra Kosatka-Pioro Computer implemented method for management of standing orders
CN105512563A (zh) * 2014-09-25 2016-04-20 阿里巴巴集团控股有限公司 确认可信设备的方法和装置以及风险释放方法和装置
CN105590261A (zh) * 2014-12-31 2016-05-18 中国银联股份有限公司 商户风险估算方法及系统
CN107230121A (zh) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 交易处理方法、装置及服务器
CN107545422A (zh) * 2017-08-02 2018-01-05 中国银联股份有限公司 一种套现检测方法及装置
CN109272336A (zh) * 2018-09-20 2019-01-25 阿里巴巴集团控股有限公司 一种风险商户发现方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107016538A (zh) * 2017-04-11 2017-08-04 杭州纳戒科技有限公司 载运支付方法以及系统
CN107464169B (zh) * 2017-08-10 2020-11-10 北京星选科技有限公司 信息输出方法和装置
CN107517251B (zh) * 2017-08-16 2020-12-15 北京星选科技有限公司 信息推送方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150058199A1 (en) * 2013-08-26 2015-02-26 Aleksandra Kosatka-Pioro Computer implemented method for management of standing orders
CN105512563A (zh) * 2014-09-25 2016-04-20 阿里巴巴集团控股有限公司 确认可信设备的方法和装置以及风险释放方法和装置
CN105590261A (zh) * 2014-12-31 2016-05-18 中国银联股份有限公司 商户风险估算方法及系统
CN107230121A (zh) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 交易处理方法、装置及服务器
CN107545422A (zh) * 2017-08-02 2018-01-05 中国银联股份有限公司 一种套现检测方法及装置
CN109272336A (zh) * 2018-09-20 2019-01-25 阿里巴巴集团控股有限公司 一种风险商户发现方法和装置

Also Published As

Publication number Publication date
CN109272336A (zh) 2019-01-25
TW202013282A (zh) 2020-04-01

Similar Documents

Publication Publication Date Title
WO2020057305A1 (zh) 一种风险商户发现方法和装置
US11195165B2 (en) Modulating mobile-device displays based on ambient signals to reduce the likelihood of fraud
AU2014225973B2 (en) Predicting approval of transactions
US11797972B1 (en) Verifying information through multiple device interactions
US20220198423A1 (en) Generating an online storefront
AU2019229446A1 (en) Integrated online and offline inventory management
WO2020143377A1 (zh) 一种行业识别模型确定方法和装置
US20170372387A1 (en) Methods, Systems, and Devices for Pushing and Displaying Information
US20190205951A1 (en) Merchant and item ratings
CN110945552B (zh) 一种产品销量提报方法、支付方法和终端设备
WO2020063114A1 (zh) 一种用户安全意识检测方法和装置
WO2019218745A1 (zh) 一种退税方法、系统、装置、移动终端及业务服务器
JP2013246480A (ja) 債権買取事業者装置及び電子債権の割引取引方法
US10650422B1 (en) Augmented project lists with price information
US20150317635A1 (en) Electronic gesture-based signatures
CN108446905B (zh) 一种支付方法、装置及电子设备
US20140188657A1 (en) Establishing Customer Attributes
US11257066B2 (en) Automated digital method and system of providing or sharing access
CN108764861B (zh) 信息获取方法及装置和电子设备
JP2020113005A (ja) 情報処理方法、情報処理装置、及びプログラム
WO2022090999A1 (en) System for pre-owned electronic device diagnostics, with sales and operation facilitation features
JP2022136790A (ja) 情報処理装置、情報処理方法及び情報処理プログラム
RU2770568C1 (ru) Способ и система анализа финансовой активности торговых точек
US20180189816A1 (en) Method for Networking Users for Submission and Processing of Referrals
US11887108B2 (en) System and user interface of a user device for managing tokens associated with a user

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19863923

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19863923

Country of ref document: EP

Kind code of ref document: A1