WO2020098375A1 - 一种基于风险识别的转账请求处理方法及装置 - Google Patents

一种基于风险识别的转账请求处理方法及装置 Download PDF

Info

Publication number
WO2020098375A1
WO2020098375A1 PCT/CN2019/106589 CN2019106589W WO2020098375A1 WO 2020098375 A1 WO2020098375 A1 WO 2020098375A1 CN 2019106589 W CN2019106589 W CN 2019106589W WO 2020098375 A1 WO2020098375 A1 WO 2020098375A1
Authority
WO
WIPO (PCT)
Prior art keywords
risk
delay time
target
user
risk level
Prior art date
Application number
PCT/CN2019/106589
Other languages
English (en)
French (fr)
Inventor
沈琳倩
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2020098375A1 publication Critical patent/WO2020098375A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • the embodiments of the present specification relate to the field of information technology, and in particular, to a method and device for processing a transfer request based on risk identification.
  • the embodiments of the present specification provide a method and device for processing transfer requests based on risk identification.
  • the technical solutions are as follows:
  • a method for processing a transfer request based on risk identification including:
  • the user is prompted to trigger a delayed transfer function; and, based on the identification result, a delay time is determined; wherein, the longer the delay time, the fraud characterized by the identification result is indicated The higher the risk;
  • the delayed transfer is performed based on the delay time.
  • a transfer request processing device based on risk identification including:
  • the receiving module receives the transfer request initiated by the user
  • the risk identification module based on a preset fraud risk identification model, performs risk identification for the transfer request;
  • a prompting module if the recognition result indicates that there is a risk of fraud, then prompting the user to trigger the delayed transfer function
  • an electronic payment platform when an electronic payment platform receives a user-initiated transfer request, it will first identify the risk of the transfer request based on the preset fraud risk identification model. On the one hand, the user is prompted to trigger the delayed transfer function, on the other hand, the delay time is determined according to the recognition result. The longer the determined delay time, the higher the fraud risk characterized by the recognition result. Subsequently, if the user chooses to trigger the delayed transfer function, the electronic payment platform will perform the delayed transfer based on the determined delay time.
  • the electronic payment platform can promptly alert the user to the risk and guide the user to trigger the delayed transfer function. It is safer for users.
  • the electronic payment platform will determine the appropriate delay time for delayed transfer according to the degree of fraud risk of the transfer request, instead of delaying the transfer for a long time (24 hours) regardless of the level of fraud risk. In this way, the transfer progress can be accelerated as much as possible under the premise of clear transfer risk.
  • FIG. 1 is a schematic flowchart of a method for processing a transfer request based on risk identification provided by an embodiment of this specification
  • FIG. 3 is an example diagram of a method for processing a transfer request based on risk identification provided by an embodiment of this specification
  • FIG. 4 is a schematic structural diagram of an apparatus for processing a transfer request based on risk identification provided by an embodiment of this specification
  • electronic payment platforms generally only support users to actively carry out delayed transfers when they are aware of the risk of fraud.
  • users often lack the information and ability to identify fraud risks and are unaware of the fraud risks they face. Assuming that the user initiated the transfer due to fraud, but did not realize that he may be fraudulent, then the funds transferred by the user will immediately reach the account of the criminals, making it difficult to recover the funds.
  • the existing delayed transfer function is the default funds arrived after 24 hours.
  • the transfer transaction initiated by the user has the possibility of fraud, but the possibility of fraud is low, then for the user, the time cost of delaying the transfer for 24 hours is too high.
  • the present invention proposes a transfer request processing method based on risk identification.
  • the electronic payment platform can promptly alert the user to the risk and guide the user to trigger the delayed transfer function. Words are safer.
  • the electronic payment platform will determine the appropriate delay time for delayed transfer according to the degree of fraud risk of the transfer request, instead of delaying the transfer for a long time (24 hours) regardless of the level of fraud risk. In this way, the transfer progress can be accelerated as much as possible under the premise of clear transfer risk.
  • FIG. 1 is a schematic flowchart of a method for processing a transfer request based on risk identification provided by an embodiment of this specification, including the following steps:
  • S100 Receive a transfer request initiated by a user.
  • the execution subject of the method may specifically be a server of an electronic payment platform.
  • the following describes the steps performed by the electronic payment platform, in fact, the steps performed by the server of the electronic payment platform.
  • S102 Perform risk identification on the transfer request based on a preset fraud risk identification model.
  • the fraud risk identification for the transfer request is actually based on the transfer user information, collection user information, and transfer amount contained in the transfer request for risk analysis and risk analysis
  • the process generally involves the analysis of the transaction history and habits of the transfer user, as well as the analysis of the transaction history and habits of the collection user. It may also involve whether the current transaction time is reasonable and whether the transfer user's current equipment Analysis of factors such as commonly used equipment.
  • various different fraud risk identification models can be preset according to actual needs to realize fraud risk identification of transfer requests.
  • the identification result of the fraud risk identification for the transfer request may specifically be the probability of fraud risk.
  • the greater the probability of fraud risk the higher the probability that the user initiates the transfer request due to fraud. That is, the higher the risk of fraud.
  • a probability threshold may be specified in advance, and when the probability of fraud risk obtained by performing risk identification on the transfer request is greater than the probability threshold, it may be regarded as having a fraud risk. When the probability of fraud risk obtained by performing risk identification on the transfer request is not greater than the probability threshold, it can be regarded as having no fraud risk.
  • the electronic payment platform may alert the user on the one hand and suggest that the user trigger the delayed transfer function. For example, the electronic payment platform may display a prompt message to the user, “There is a risk of fraud in the current transfer. It is recommended to delay the transfer”.
  • the electronic payment platform may determine the delay time according to the level of fraud risk characterized by the recognition result. The longer the determined delay time, the higher the fraud risk characterized by the recognition result (i.e., the greater the probability of fraud risk).
  • the determined delay time is positively related to the fraud risk (fraud risk probability) characterized by the recognition result.
  • the way to determine the delay time is actually to use the dependent variable of the delay time and the positive correlation function with the probability of fraud risk as the independent variable.
  • Method 2 Preset several risk levels, and for each risk level, assign a corresponding probability interval to the risk level, and allocate a corresponding duration to the risk level. For any two risk levels, the left end point value of the probability interval corresponding to the higher risk level is greater than the right end point value of the probability interval corresponding to the lower risk level.
  • the probability range within which the fraud risk probability falls may be determined according to the fraud risk probability obtained by performing risk identification for the transfer request, and then the risk level corresponding to the determined probability interval is used as the target risk level. Subsequently, the duration corresponding to the target risk level is determined as the delay duration.
  • Method 3 Modify based on method 2. For each preset risk level, preset the time interval corresponding to the risk level; for any two risk levels, the left end value of the time interval corresponding to the higher risk level is greater than The right end point of the duration interval corresponding to the lower risk level.
  • the time interval corresponding to the target risk level may be determined as the target time interval. Then, based on the target duration interval, the delay duration is determined. That is to say, a duration that falls within the target duration interval is taken as the delay duration. For example, a duration that falls within the target duration interval may be randomly selected as the delay duration.
  • Mode 4 Based on the modification in Mode 3, the electronic payment platform can obtain the delay time specified by the user based on the target time interval. That is to say, after determining the target duration interval according to the level of fraud risk characterized by the recognition result, the user can specify a duration that falls within the target duration interval as the delay duration.
  • FIG. 2 is a schematic diagram of determining a delay duration provided by an embodiment of this specification. What is shown in FIG. 2 is actually the above method 4.
  • the electronic payment platform may perform the delayed transfer based on the determined delay time.
  • the electronic payment platform may deduct money from the user's account when the delay time specified by the user is obtained. Then, after 3 hours, the deducted money will be charged to the payee's account.
  • Case 1 If the electronic payment platform determines that the identification result represents a fraud risk, it may first prompt the user to trigger the delayed transfer function, and when it is determined that the delayed transfer function is triggered, then determine the delay duration according to the identification result .
  • Case 2 If the electronic payment platform determines that the identification result represents a fraud risk, it may perform steps S104 and S106 at the same time. For example, if the delay time is determined in the above manner 3, when the electronic payment platform determines that the identification result indicates that there is a risk of fraud, the user may be presented with an interface, which is displayed to remind the user of the risk of fraud , The prompt information is displayed with the target duration interval again to request the user to specify a delay duration based on the target duration interval.
  • Case 3 If the electronic payment platform determines that the identification result represents a fraud risk, it may first determine the delay time according to the identification result, and then prompt the user to trigger the delayed transfer function.
  • the electronic payment platform when receiving a user-initiated transfer request, the electronic payment platform will first identify the risk of the transfer request based on the preset fraud risk identification model. If the identification result indicates fraud risk, it will be Prompt the user to trigger the delayed transfer function, on the other hand, determine the delay time based on the recognition result. The longer the determined delay time, the higher the fraud risk characterized by the recognition result. Subsequently, if the user chooses to trigger the delayed transfer function, the electronic payment platform will perform the delayed transfer based on the determined delay time.
  • FIG. 3 is an example diagram of a transfer request processing method based on risk identification provided by an embodiment of the present specification. Specifically, the following technical effects can be achieved:
  • the user can specify the delay time within the time range provided by the electronic payment platform (under the premise that the electronic payment platform specifies the degree of fraud risk), which can also enhance the user's perception of risk and strengthen the user's transfer Security experience.
  • the receiving module 401 receives the transfer request initiated by the user
  • the risk identification module 402 performs risk identification for the transfer request based on a preset fraud risk identification model
  • the execution module 405 if it is determined that the delayed transfer function is triggered, performs delayed transfer based on the delay duration.
  • the duration interval corresponding to the risk level is preset; for any two risk levels, the left endpoint of the duration interval corresponding to the higher risk level is greater than the duration corresponding to the lower risk level The right end point of the interval;
  • the delay time determining module 404 determines the time interval corresponding to the target risk level as the target time interval according to the target risk level; based on the target time interval, the delay time is determined.
  • the prompt module 403 displays the target duration interval to the user to prompt the user to specify a delay duration based on the target duration interval;
  • the execution module 405 determines that the delayed transfer function is triggered if it is determined that the delay time specified by the user is acquired.
  • the delay time determining module 404 determines the delay time according to the recognition result.
  • the device may include: a processor 1010, a memory 1020, an input / output interface 1030, a communication interface 1040, and a bus 1050.
  • the processor 1010, the memory 1020, the input / output interface 1030, and the communication interface 1040 realize the communication connection between the devices within the device through the bus 1050.
  • the processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit, central processing unit), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc. Programs to implement the technical solutions provided by the embodiments of this specification.
  • the memory 1020 may be implemented in the form of ROM (Read Only Memory, Read Only Memory), RAM (Random Access Memory, Random Access Memory), static storage devices, and dynamic storage devices.
  • the memory 1020 may store an operating system and other application programs. When the technical solutions provided by the embodiments of the present specification are implemented by software or firmware, related program codes are stored in the memory 1020 and are called and executed by the processor 1010.
  • the input / output interface 1030 is used to connect input / output modules to realize information input and output.
  • the input / output / module can be configured as a component in the device (not shown in the figure), or can be externally connected to the device to provide corresponding functions.
  • the input device may include a keyboard, mouse, touch screen, microphone, various sensors, etc.
  • the output device may include a display, a speaker, a vibrator, an indicator light, and the like.
  • the communication interface 1040 is used to connect a communication module (not shown in the figure) to implement communication interaction between the device and other devices.
  • the communication module can realize communication through a wired method (such as USB, network cable, etc.), and can also realize communication through a wireless method (such as mobile network, WIFI, Bluetooth, etc.).
  • the bus 1050 includes a path for transferring information between various components of the device (eg, processor 1010, memory 1020, input / output interface 1030, and communication interface 1040).
  • the device may also include necessary for normal operation Other components.
  • the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of the present specification, rather than including all the components shown in the figures.
  • the embodiments of the present specification also provide a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the method shown in FIG. 1 is implemented.
  • Computer-readable media including permanent and non-permanent, removable and non-removable media, can store information by any method or technology.
  • the information may be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices.
  • computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种基于风险识别的转账请求处理方法及装置。电子支付平台当接收到用户发起的转账请求时(S100),会先基于预设的欺诈风险识别模型对转账请求进行风险识别(S102),如果识别结果表征具有欺诈风险,就会一方面提示用户触发延时转账功能(S104),另一方面根据识别结果确定延时时长(S106)。确定的延时时长越长,表明识别结果表征的欺诈风险越高。随后,如果用户选择触发延时转账功能,电子支付平台就会基于确定的延时时长,进行延时转账(S108)。

Description

一种基于风险识别的转账请求处理方法及装置 技术领域
本说明书实施例涉及信息技术领域,尤其涉及一种基于风险识别的转账请求处理方法及装置。
背景技术
实际生活中,时常会出现用户因受到欺诈(如电信欺诈)而向不法分子转账的情况。在这种情况下,用户往往在转账后才会意识到自己被骗,此时,如果不法分子的账户已经接收到的用户转账的资金,那么不法分子很可能已经将账户中的资金转移,导致用户很难挽回自己的资金损失。
现有的电子支付平台一般支持延时到账功能(功能触发后,默认资金24小时后到账)。具体地,用户在通过电子支付平台发起转账时,如果意识到自己可能被骗,则可以同时选择触发延时到账功能,这意味着,用户发起转账24小时后,转账的资金才会打入收款方的账户。如果发起转账的24小时内,用户确认自己被骗,则用户可以及时请求电子支付平台冻结转账交易。
然而,上述的触发延时转账方式对用户而言依然不够安全。
发明内容
为了解决现有的触发延时转账的方式对用户而言不够安全的问题,本说明书实施例提供一种基于风险识别的转账请求处理方法及装置,技术方案如下:
根据本说明书实施例的第1方面,提供一种基于风险识别的转账请求处理方法,包括:
接收用户发起的转账请求;
基于预设的欺诈风险识别模型,针对所述转账请求进行风险识别;
若识别结果表征具有欺诈风险,则提示所述用户触发延时转账功能;并且,根据所述识别结果,确定延时时长;其中,所述延时时长越长,表明所述识别结果表征的欺诈风险越高;
若确定所述延时转账功能被触发,则基于所述延时时长,进行延时转账。
根据本说明书实施例的第2方面,提供一种基于风险识别的转账请求处理装置,包括:
接收模块,接收用户发起的转账请求;
风险识别模块,基于预设的欺诈风险识别模型,针对所述转账请求进行风险识别;
提示模块,若识别结果表征具有欺诈风险,则提示所述用户触发延时转账功能;
延时时长确定模块,若识别结果表征具有欺诈风险,则根据所述识别结果,确定延时时长;其中,所述延时时长越长,表明所述识别结果表征的欺诈风险越高;
执行模块,若确定所述延时转账功能被触发,则基于所述延时时长,进行延时转账。
本说明书实施例所提供的技术方案,电子支付平台当接收到用户发起的转账请求时,会先基于预设的欺诈风险识别模型对转账请求进行风险识别,如果识别结果表征具有欺诈风险,就会一方面提示用户触发延时转账功能,另一方面根据识别结果确定延时时长。确定的延时时长越长,表明识别结果表征的欺诈风险越高。随后,如果用户选择触发延时转账功能,电子支付平台就会基于确定的延时时长,进行延时转账。
如此,一方面,如果用户发起的转账请求具有欺诈风险,那么,哪怕用户并没有意识到自己可能被骗,电子支付平台也能够及时对用户进行风险提醒,引导用户触发延时转账功能,这对用户而言更为安全。另一方面,电子支付平台会根据转账请求具有的欺诈风险程度的高低,确定合适的延时时长进行延时转账,而不是无论欺诈风险高低,都延时很长时间(24小时)进行转账,如此,可以在明确转账风险的前提下,尽量加快转账进度。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本说明书实施例。
此外,本说明书实施例中的任一实施例并不需要达到上述的全部效果。
附图说明
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书实施例中记载的一些实施例,对于本领域普通技术人员来讲,还可以根据这些 附图获得其他的附图。
图1是本说明书实施例提供的一种基于风险识别的转账请求处理方法的流程示意图;
图2是本说明书实施例提供的确定延时时长的示意图;
图3是本说明书实施例提供的基于风险识别的转账请求处理方法的示例图;
图4是本说明书实施例提供的一种基于风险识别的转账请求处理装置的结构示意图;
图5是用于配置本说明书实施例方法的一种设备的结构示意图。
具体实施方式
目前,电子支付平台一般仅支持用户在意识到欺诈风险的情况下主动进行延时转账。然而,很多情况下,用户往往缺乏识别欺诈风险的信息与能力,意识不到自己所面临的欺诈风险。假设用户因被欺诈而发起转账,却没有意识到自己可能被欺诈,那么,用户转账的资金就会即时到达不法分子的账户,导致资金难以追回。
此外,现有的延时转账功能是默认资金24小时后到账的。然而,如果用户发起的转账交易虽然具有欺诈可能性,但是欺诈可能性较低的,那么,对于用户而言,延时24小时进行转账所付出的时间代价过大。
基于以上,本发明提出了一种基于风险识别的转账请求处理方法。一方面,如果用户发起的转账请求具有欺诈风险,那么,哪怕用户并没有意识到自己可能被骗,电子支付平台也能够及时对用户进行风险提醒,引导用户触发延时转账功能,这对用户而言更为安全。另一方面,电子支付平台会根据转账请求具有的欺诈风险程度的高低,确定合适的延时时长进行延时转账,而不是无论欺诈风险高低,都延时很长时间(24小时)进行转账,如此,可以在明确转账风险的前提下,尽量加快转账进度。
为了使本领域技术人员更好地理解本说明书实施例中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行详细地描述,显然,所描述的实施例仅仅是本说明书的一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员所获得的所有其他实施例,都应当属于保护的范围。
以下结合附图,详细说明本说明书各实施例提供的技术方案。
图1是本说明书实施例提供的一种基于风险识别的转账请求处理方法的流程示意图,包括以下步骤:
S100:接收用户发起的转账请求。
本方法的执行主体具体可以是电子支付平台的服务器。下文对所述电子支付平台执行的步骤进行说明,实际上是对所述电子支付平台的服务器执行的步骤进行说明。
在本说明书实施例中,所述用户是指发起转账的用户。通常,所述用户在电子支付平台上开通有账户,用户向电子支付平台发起转账请求,实际上是请求电子支付平台将自己的账户中的一定金额转移给其他用户。
S102:基于预设的欺诈风险识别模型,针对所述转账请求进行风险识别。
在本说明书实施例中,所述欺诈风险识别模型可以是用于针对一笔转账交易进行欺诈风险识别的策略、规则,也可以是基于机器学习算法训练得到的,用于针对一笔转账交易进行欺诈风险识别的模型。
具体地,基于所述欺诈风险识别模型,针对所述转账请求进行欺诈风险识别,实际上是根据所述转账请求中包含的转账用户信息、收账用户信息、转账金额,进行风险分析,风险分析过程一般涉及对转账用户的交易历史记录、习惯特征的分析,以及对收账用户的交易历史记录、习惯特征的分析,还可能涉及对当前交易时间是否合理、所述转账用户当前使用的设备是否为常用设备等因素的分析。总之,对本领域技术人员而言,可以根据实际需要预设各种不同的欺诈风险识别模型,实现对转账请求的欺诈风险识别。
在本说明书实施例中,针对转账请求的欺诈风险识别的识别结果具体可以是欺诈风险概率,欺诈风险概率越大,说明所述用户因被欺诈而发起所述转账请求的可能性就越高,即欺诈风险越高。
具体地,可以预先指定概率阈值,当对所述转账请求进行风险识别所得到的欺诈风险概率大于所述概率阈值,就可以视为具有欺诈风险。当对所述转账请求进行风险识别所得到的欺诈风险概率不大于所述概率阈值,就可以视为不具有欺诈风险。
S104:若识别结果表征具有欺诈风险,则提示所述用户触发延时转账功能。
S106:若识别结果表征具有欺诈风险,则根据所述识别结果,确定延时时长。
在本说明书实施例中,电子支付平台如果确定识别结果表征具有欺诈风险,可以一方面对用户进行风险提示,建议用户触发延时转账功能。例如,电子支付平台可以向用户展示一段提示信息“当前转账存在欺诈风险,建议进行延时转账”。另一方面,电子支付平台可以根据所述识别结果所表征的欺诈风险的高低,确定延时时长。确定的延时 时长越长,表明所述识别结果表征的欺诈风险越高(即欺诈风险概率越大)。
进一步地,本说明书实施例提供了以下几种确定延时时长的方式:
方式1:确定的延时时长与所述识别结果表征的欺诈风险(欺诈风险概率)正相关。如此,确定延时时长的方式实际上是,以延时时长因变量,以欺诈风险概率为自变量的正相关函数。例如,所述正相关函数可以是y=2x,其中,y表征延时时长,x表征欺诈风险概率。
方式2:预设若干风险等级,针对每个风险等级,为该风险等级分配对应的概率区间,并且,为该风险等级分配对应的时长。其中,针对任意两个风险等级,较高的风险等级所对应的概率区间的左端点值大于较低的风险等级所对应的概率区间的右端点值。
如此,可以根据针对转账请求进行风险识别所得到欺诈风险概率,确定所述欺诈风险概率落入的概率区间,进而将确定的概率区间对应的风险等级作为目标风险等级。随后,将目标风险等级对应的时长确定为延时时长。
显然,在方式2中,所述目标风险等级越高,表明所述识别结果表征的欺诈风险越高。所述延时时长越长,表明所述目标风险等级越高。
此外需要说明的是,在方式2中,根据多个不同的识别结果(欺诈风险概率)所确定的延时时长可能相同。这是因为,多个不同的欺诈风险概率可能落入预设的同一概率区间,也就对应于同一风险等级,最终确定的延时时长皆为该风险等级对应的时长。
方式3:基于方式2进行修改,针对预设的每个风险等级,预设该风险等级对应的时长区间;针对任意两个风险等级,较高的风险等级所对应的时长区间的左端点值大于较低的风险等级所对应的时长区间的右端点值。
如此,在确定出目标风险等级之后,可以确定所述目标风险等级对应的时长区间,作为目标时长区间。然后,基于所述目标时长区间,确定延时时长。也就是所,将一个落入所述目标时长区间的时长作为延时时长。例如,可以随机选择一个落入所述目标时长区间的时长作为延时时长。
方式4:基于方式3进行修改,电子支付平台可以获取所述用户基于所述目标时长区间指定的延时时长。也就是说,在根据识别结果表征的欺诈风险的高低,确定目标时长区间之后,可以由用户来指定一个落入所述目标时长区间的时长作为延时时长。图2是本说明书实施例提供的确定延时时长的示意图。图2所示的实际上是上述方式4。
S108:若确定所述延时转账功能被触发,则基于所述延时时长,进行延时转账。
在本说明书实施例中,一旦所述用户选择触发延时转账功能,电子支付平台就可以基于确定出的延时时长,进行延时转账。
需要说明的是,电子支付平台可以当确定所述延时转账功能被触发时,从所述用户的账户中进行扣款。接着,当时间经过所述延时时长之后,执行转账,即将所扣款项打入收款方的账户。
例如,假设用户指定的延时时长为3个小时,那么,电子支付平台可以在获取到所述用户指定的延时时长时,从所述用户的账户中进行扣款。接着,在3小时之后,将所扣款项打入收款方的账户。
此外需要说明的是,在本说明书实施例中,对上述步骤S104与S106的执行顺序不作具体限定。具体可以有以下几种情况:
情况1:电子支付平台如果确定识别结果表征具有欺诈风险,则可以先提示所述用户触发延时转账功能,待确定所述延时转账功能被触发时,再根据所述识别结果确定延时时长。
情况2:电子支付平台如果确定识别结果表征具有欺诈风险,则可以同时执行步骤S104与步骤S106。例如,如果采用上述的方式3确定延时时长,那么,电子支付平台在确定识别结果表征具有欺诈风险时,可以向所述用户展示一个界面,界面中既显示了用于提示所述用户欺诈风险的提示信息,又显示有所述目标时长区间,以请求所述用户基于所述目标时长区间,指定延时时长。
情况3:电子支付平台如果确定识别结果表征具有欺诈风险,则可以先根据所述识别结果确定延时时长,再提示所述用户触发延时转账功能。
情况4:如果采用前文所述的方式3确定延时时长,那么,可以在执行步骤S106的过程中,插入步骤S104。具体地,若采用方式3执行步骤S106,则在确定出目标时长区间之后,可以执行步骤S104,将所述目标时长区间展示给所述用户,这相当于提示所述用户存在欺诈风险,并请求所述用户基于所述目标时长区间指定延时时长。相应的,电子支付平台当获取到所述用户指定的延时时长,意味着确定所述延时转账功能被触发。
通过图1所示的方法,电子支付平台当接收到用户发起的转账请求时,会先基于预设的欺诈风险识别模型对转账请求进行风险识别,如果识别结果表征具有欺诈风险,就会一方面提示用户触发延时转账功能,另一方面根据识别结果确定延时时长。确定的延 时时长越长,表明识别结果表征的欺诈风险越高。随后,如果用户选择触发延时转账功能,电子支付平台就会基于确定的延时时长,进行延时转账。
图3是本说明书实施例提供的基于风险识别的转账请求处理方法的示例图。具体可以实现如下技术效果:
1、无需用户具有风险意识,电子支付平台可以基于预设的欺诈风险识别模型识别出存在欺诈风险的转账请求,并对用户进行风险提示,引导用户进行延时转账。这对用户而言安全性更高。
2、针对不同风险程度的转账交易,建议用户选择不同的延时时长进行延时转账。具有欺诈风险且欺诈风险较高的转账交易,相应的延时时长较长;具有欺诈风险且欺诈风险较低的转账交易,相应的延时时长较短。如此,可以在明确欺诈风险的前提下,尽量加快转账进度。
3、通过本说明实施例,用户在电子支付平台提供的时长范围内(电子支付平台明确欺诈风险程度的前提下),指定延时时长,这也可以增强用户对风险的感知,强化用户进行转账时的安全体验。
基于图1所示的基于风险识别的转账请求处理方法,本说明书实施例还对应提供了一种基于风险识别的转账请求处理装置,如图4所示,包括:
接收模块401,接收用户发起的转账请求;
风险识别模块402,基于预设的欺诈风险识别模型,针对所述转账请求进行风险识别;
提示模块403,若识别结果表征具有欺诈风险,则提示所述用户触发延时转账功能;
延时时长确定模块404,若识别结果表征具有欺诈风险,则根据所述识别结果,确定延时时长;其中,所述延时时长越长,表明所述识别结果表征的欺诈风险越高;
执行模块405,若确定所述延时转账功能被触发,则基于所述延时时长,进行延时转账。
所述延时时长确定模块404,根据所述识别结果,从预设的至少两个风险等级中确定所述识别结果对应的风险等级,作为目标风险等级;其中,所述目标风险等级越高,表明所述识别结果表征的欺诈风险越高;根据所述目标风险等级,确定延时时长;其中,所述延时时长越长,表明所述目标风险等级越高。
针对预设的每个风险等级,预设该风险等级对应的时长区间;针对任意两个风险等级,较高的风险等级所对应的时长区间的左端点值大于较低的风险等级所对应的时长区间的右端点值;
所述延时时长确定模块404,根据所述目标风险等级,确定所述目标风险等级对应的时长区间,作为目标时长区间;基于所述目标时长区间,确定延时时长。
所述提示模块403,将所述目标时长区间展示给所述用户,以提示所述用户基于所述目标时长区间指定延时时长;
所述执行模块405,若确定获取到所述用户指定的延时时长,则确定所述延时转账功能被触发。
所述延时时长确定模块404,获取所述用户基于所述目标时长区间指定的延时时长。
所述延时时长确定模块404,若确定所述延时转账功能被触发,则根据所述识别结果,确定延时时长。
本说明书实施例还提供一种计算机设备,其至少包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,处理器执行所述程序时实现图1所示的方法。
图5示出了本说明书实施例所提供的一种更为具体的计算设备硬件结构示意图,该设备可以包括:处理器1010、存储器1020、输入/输出接口1030、通信接口1040和总线1050。其中处理器1010、存储器1020、输入/输出接口1030和通信接口1040通过总线1050实现彼此之间在设备内部的通信连接。
处理器1010可以采用通用的CPU(Central Processing Unit,中央处理器)、微处理器、应用专用集成电路(Application Specific Integrated Circuit,ASIC)、或者一个或多个集成电路等方式实现,用于执行相关程序,以实现本说明书实施例所提供的技术方案。
存储器1020可以采用ROM(Read Only Memory,只读存储器)、RAM(Random Access Memory,随机存取存储器)、静态存储设备,动态存储设备等形式实现。存储器1020可以存储操作系统和其他应用程序,在通过软件或者固件来实现本说明书实施例所提供的技术方案时,相关的程序代码保存在存储器1020中,并由处理器1010来调用执行。
输入/输出接口1030用于连接输入/输出模块,以实现信息输入及输出。输入输出/模块可以作为组件配置在设备中(图中未示出),也可以外接于设备以提供相应功能。 其中输入设备可以包括键盘、鼠标、触摸屏、麦克风、各类传感器等,输出设备可以包括显示器、扬声器、振动器、指示灯等。
通信接口1040用于连接通信模块(图中未示出),以实现本设备与其他设备的通信交互。其中通信模块可以通过有线方式(例如USB、网线等)实现通信,也可以通过无线方式(例如移动网络、WIFI、蓝牙等)实现通信。
总线1050包括一通路,在设备的各个组件(例如处理器1010、存储器1020、输入/输出接口1030和通信接口1040)之间传输信息。
需要说明的是,尽管上述设备仅示出了处理器1010、存储器1020、输入/输出接口1030、通信接口1040以及总线1050,但是在具体实施过程中,该设备还可以包括实现正常运行所必需的其他组件。此外,本领域的技术人员可以理解的是,上述设备中也可以仅包含实现本说明书实施例方案所必需的组件,而不必包含图中所示的全部组件。
本说明书实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现图1所示的方法。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本说明书实施例可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本说明书实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本说明书实施例各个实施例或者实施例的某些部分所述的方法。
上述实施例阐明的系统、方法、模块或单元,具体可以由计算机芯片或实体实现, 或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于方法实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的方法实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,在实施本说明书实施例方案时可以把各模块的功能在同一个或多个软件和/或硬件中实现。也可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
以上所述仅是本说明书实施例的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本说明书实施例原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本说明书实施例的保护范围。

Claims (13)

  1. 一种基于风险识别的转账请求处理方法,包括:
    接收用户发起的转账请求;
    基于预设的欺诈风险识别模型,针对所述转账请求进行风险识别;
    若识别结果表征具有欺诈风险,则提示所述用户触发延时转账功能;并且,根据所述识别结果,确定延时时长;其中,所述延时时长越长,表明所述识别结果表征的欺诈风险越高;
    若确定所述延时转账功能被触发,则基于所述延时时长,进行延时转账。
  2. 如权利要求1所述的方法,根据所述识别结果,确定延时时长,具体包括:
    根据所述识别结果,从预设的至少两个风险等级中确定所述识别结果对应的风险等级,作为目标风险等级;其中,所述目标风险等级越高,表明所述识别结果表征的欺诈风险越高;
    根据所述目标风险等级,确定延时时长;其中,所述延时时长越长,表明所述目标风险等级越高。
  3. 如权利要求2所述的方法,针对预设的每个风险等级,预设该风险等级对应的时长区间;针对任意两个风险等级,较高的风险等级所对应的时长区间的左端点值大于较低的风险等级所对应的时长区间的右端点值;
    根据所述目标风险等级,确定延时时长,具体包括:
    根据所述目标风险等级,确定所述目标风险等级对应的时长区间,作为目标时长区间;
    基于所述目标时长区间,确定延时时长。
  4. 如权利要求3所述的方法,提示所述用户触发延时转账功能,具体包括:
    将所述目标时长区间展示给所述用户,以提示所述用户基于所述目标时长区间指定延时时长;
    确定所述延时转账功能被触发,具体包括:
    确定获取到所述用户指定的延时时长。
  5. 如权利要求3或4所述的方法,基于所述目标时长区间,确定延时时长,具体包括:
    获取所述用户基于所述目标时长区间指定的延时时长。
  6. 如权利要求1~3任一项所述的方法,根据所述识别结果,确定延时时长,具体包括:
    若确定所述延时转账功能被触发,则根据所述识别结果,确定延时时长。
  7. 一种基于风险识别的转账请求处理装置,包括:
    接收模块,接收用户发起的转账请求;
    风险识别模块,基于预设的欺诈风险识别模型,针对所述转账请求进行风险识别;
    提示模块,若识别结果表征具有欺诈风险,则提示所述用户触发延时转账功能;
    延时时长确定模块,若识别结果表征具有欺诈风险,则根据所述识别结果,确定延时时长;其中,所述延时时长越长,表明所述识别结果表征的欺诈风险越高;
    执行模块,若确定所述延时转账功能被触发,则基于所述延时时长,进行延时转账。
  8. 如权利要求7所述的装置,所述延时时长确定模块,根据所述识别结果,从预设的至少两个风险等级中确定所述识别结果对应的风险等级,作为目标风险等级;其中,所述目标风险等级越高,表明所述识别结果表征的欺诈风险越高;根据所述目标风险等级,确定延时时长;其中,所述延时时长越长,表明所述目标风险等级越高。
  9. 如权利要求8所述的装置,针对预设的每个风险等级,预设该风险等级对应的时长区间;针对任意两个风险等级,较高的风险等级所对应的时长区间的左端点值大于较低的风险等级所对应的时长区间的右端点值;
    所述延时时长确定模块,根据所述目标风险等级,确定所述目标风险等级对应的时长区间,作为目标时长区间;基于所述目标时长区间,确定延时时长。
  10. 如权利要求9所述的装置,所述提示模块,将所述目标时长区间展示给所述用户,以提示所述用户基于所述目标时长区间指定延时时长;
    所述执行模块,若确定获取到所述用户指定的延时时长,则确定所述延时转账功能被触发。
  11. 如权利要求9或10所述的装置,所述延时时长确定模块,获取所述用户基于所述目标时长区间指定的延时时长。
  12. 如权利要求7~9任一项所述的装置,所述延时时长确定模块,若确定所述延时转账功能被触发,则根据所述识别结果,确定延时时长。
  13. 一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现如权利要求1至6任一项所述的方法。
PCT/CN2019/106589 2018-11-14 2019-09-19 一种基于风险识别的转账请求处理方法及装置 WO2020098375A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811352286.4A CN109858912A (zh) 2018-11-14 2018-11-14 一种基于风险识别的转账请求处理方法及装置
CN201811352286.4 2018-11-14

Publications (1)

Publication Number Publication Date
WO2020098375A1 true WO2020098375A1 (zh) 2020-05-22

Family

ID=66889999

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/106589 WO2020098375A1 (zh) 2018-11-14 2019-09-19 一种基于风险识别的转账请求处理方法及装置

Country Status (3)

Country Link
CN (1) CN109858912A (zh)
TW (1) TW202032454A (zh)
WO (1) WO2020098375A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858912A (zh) * 2018-11-14 2019-06-07 阿里巴巴集团控股有限公司 一种基于风险识别的转账请求处理方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110225076A1 (en) * 2010-03-09 2011-09-15 Google Inc. Method and system for detecting fraudulent internet merchants
CN106548302A (zh) * 2016-12-01 2017-03-29 携程旅游信息技术(上海)有限公司 互联网交易的风险识别方法及系统
CN108256842A (zh) * 2018-01-11 2018-07-06 杭州复杂美科技有限公司 区块链关联钱包地址权限管理方法
CN109858912A (zh) * 2018-11-14 2019-06-07 阿里巴巴集团控股有限公司 一种基于风险识别的转账请求处理方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194177A (zh) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 一种用于在线支付风险控制的系统
CN106408282A (zh) * 2016-08-25 2017-02-15 深圳怡化电脑股份有限公司 一种自助终端的转账业务处理方法及系统
CN108510257A (zh) * 2018-04-23 2018-09-07 孙峰 一种电子支付方式

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110225076A1 (en) * 2010-03-09 2011-09-15 Google Inc. Method and system for detecting fraudulent internet merchants
CN106548302A (zh) * 2016-12-01 2017-03-29 携程旅游信息技术(上海)有限公司 互联网交易的风险识别方法及系统
CN108256842A (zh) * 2018-01-11 2018-07-06 杭州复杂美科技有限公司 区块链关联钱包地址权限管理方法
CN109858912A (zh) * 2018-11-14 2019-06-07 阿里巴巴集团控股有限公司 一种基于风险识别的转账请求处理方法及装置

Also Published As

Publication number Publication date
TW202032454A (zh) 2020-09-01
CN109858912A (zh) 2019-06-07

Similar Documents

Publication Publication Date Title
US10762508B2 (en) Detecting fraudulent mobile payments
KR102312781B1 (ko) 오프라인 지불, 서비스 프로세싱, 및 지불 프로세싱을 위한 방법 및 장치
EP3547604B1 (en) Method and apparatus for security question generation and identity verification
US10417620B2 (en) User attribute value transfer method and terminal
WO2020038092A1 (zh) 一种支付风控方法及系统
CN108960839B (zh) 一种支付方法及装置
KR20170077425A (ko) 전자 장치 및 전자 장치의 핸드오프를 이용한 결제 수행 방법
TW201619871A (zh) 資訊展示方法及裝置
US11170188B2 (en) Method and apparatus for presenting graphic codes
US20230097001A1 (en) Microtransaction detection and authorization systems and methods
US20200372511A1 (en) Information Reminding Method and Apparatus, and Electronic Device
WO2016131386A1 (zh) 一种业务管理方法和装置
WO2020114113A1 (zh) 支付码生成、移动支付方法、装置及设备
CN111126623A (zh) 一种模型更新方法、装置及设备
JP2020052633A (ja) プログラム、情報処理端末、及び情報処理方法
WO2020098375A1 (zh) 一种基于风险识别的转账请求处理方法及装置
CN103957104A (zh) 动态令牌防钓鱼方法及装置
EP4345722A1 (en) Offline transaction processing
EP3543938A1 (en) Authentication of a transaction card using a multimedia file
CN106251223A (zh) 交易方可靠性确定方法和装置
CN111539742B (zh) 信息处理方法、装置、电子设备及存储介质
CN111784355B (zh) 一种基于边缘计算的交易安全性验证方法及装置
WO2020082833A1 (zh) 转账方法、装置及设备
CN109615350B (zh) 一种联合支付方法和装置
CN110852740A (zh) 多币种资金池可支付额度预警方法及相关装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19885727

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19885727

Country of ref document: EP

Kind code of ref document: A1