WO2021063015A1 - Risk control method, system, device, and equipment - Google Patents

Risk control method, system, device, and equipment Download PDF

Info

Publication number
WO2021063015A1
WO2021063015A1 PCT/CN2020/094591 CN2020094591W WO2021063015A1 WO 2021063015 A1 WO2021063015 A1 WO 2021063015A1 CN 2020094591 W CN2020094591 W CN 2020094591W WO 2021063015 A1 WO2021063015 A1 WO 2021063015A1
Authority
WO
WIPO (PCT)
Prior art keywords
risk
user
payment
payment subsystem
password
Prior art date
Application number
PCT/CN2020/094591
Other languages
French (fr)
Chinese (zh)
Inventor
薛琼
杨陆毅
陈弢
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2021063015A1 publication Critical patent/WO2021063015A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Definitions

  • the embodiments of this specification relate to the field of information technology, and in particular to risk control methods, systems, devices, and equipment.
  • a set of account numbers and passwords can be adapted to multiple payment subsystems. For example, using Alipay account and password, you can open and use Alipay Hong Kong local wallet AlipayHK and Alipay Macau local wallet.
  • the purpose of the embodiments of this application is to provide a risk control solution when multiple payment subsystems use the same account secret.
  • the embodiments of this specification provide a risk control method, which is applied to multiple payment subsystems that can log in with the same account and password, and the method includes: the first payment subsystem obtains the first business data generated by the user ; Perform risk identification on the first business data, generate and store the shared risk characteristics associated with the user that can be used in the multiple payment subsystems; the second payment subsystem obtains the user’s own system And the shared risk characteristics of the second business data, and risk identification is performed on the second business data according to the shared risk characteristics.
  • the embodiment of this specification also provides a risk control system, which includes multiple payment subsystems that can log in with the same account and password.
  • the first payment subsystem Acquire the first business data generated by the user; perform risk identification on the first business data, generate and store the shared risk characteristics associated with the user that can be used in the multiple payment subsystems;
  • the second payment subsystem Acquire the second business data and the shared risk characteristics generated by the user on the user's own system, and perform risk identification on the second business data according to the shared risk characteristics.
  • the embodiment of this specification also provides a risk control method, which is applied to the second payment subsystem.
  • the method includes: obtaining second business data generated by a user; obtaining shared risk characteristics associated with the user , Wherein the shared risk feature is pre-generated by the first payment subsystem based on the first business data for risk identification, and the login account and password of the first payment subsystem and the second payment subsystem are the same;
  • the risk feature performs risk identification on the second business data.
  • the embodiment of this specification also provides a risk control device, which is applied to the second payment subsystem, the device includes: a business data acquisition module, which acquires second business data generated by a user; risk characteristics The acquiring module acquires the shared risk characteristics associated with the user, wherein the shared risk characteristics are pre-generated by other first payment subsystems based on the first business data for risk identification, the first payment subsystem and the second The login account and password of the payment subsystem are the same; the risk identification module performs risk identification on the second business data according to the shared risk feature.
  • risk identification is performed on the business data of any one of the systems, and after the risk identification result is obtained, it will be generated that can be used for multiple
  • the risk characteristics of each subsystem are shared, so that any other subsystem can identify its own business data based on the shared risk characteristics.
  • it can achieve targeted cross-cutting Prevention and control of site theft risk.
  • any one of the embodiments of the present specification does not need to achieve all the above-mentioned effects.
  • Figure 1 is a schematic diagram of a payment subsystem provided by an embodiment of the specification
  • FIG. 2 is a schematic flowchart of a risk control method provided by an embodiment of this specification
  • FIG. 3 is a schematic diagram of the risk control method based on different assets provided by the embodiments of this specification;
  • FIG. 4 is a schematic flow diagram of another risk control method provided by the embodiments of this specification.
  • Figure 5 is a schematic structural diagram of a wind control device provided by an embodiment of this specification.
  • Fig. 6 is a schematic structural diagram of a device for configuring the method of the embodiment of this specification.
  • a set of account numbers and passwords can be adapted to multiple payment subsystems.
  • users who have registered for the Ant Pass can use the account and password of the Ant Pass to open or log in to the electronic wallets provided by Alipay in other regions, such as Alipay Hong Kong local wallet Alipay HK and Alipay Macau local wallet.
  • Fig. 1 is a schematic diagram of a risk control system provided by an embodiment of this specification.
  • the risk control system contains multiple payment subsystems, and each payment subsystem can use the same user account and password to log in, and the business functions of each payment subsystem are the same.
  • an implementable way is to configure in advance in each payment subsystem to identify a universal pass. Users can register a pass based on a certain payment subsystem, and then use the same set of user accounts and passwords among multiple payment subsystems in the form of passes.
  • the user can also authorize the user account and password in one payment subsystem to another payment subsystem through authorization. For example, if the user has activated the Hong Kong Alipay application, when the user needs to use the Macau Alipay application, he will use the Hong Kong Alipay application to authorize the registered account and password in the Hong Kong Alipay application to log in.
  • the same business function refers to that there are business functions owned by the first payment subsystem and also owned by the second payment subsystem, such as payment, transfer, recharge and payment, financial management, etc., and more The assets and business data of each payment subsystem are independent.
  • the same set of account secrets can log into multiple payment subsystems, which further brings corresponding cross-site fraudulent use risks. For example, if a gangster succeeds in stealing an account or password in the first payment subsystem, it is possible to log in to the second payment subsystem based on the account to embezzle assets. Based on this, the embodiment of this specification provides a risk control solution to solve this cross-site fraud problem.
  • Figure 2 is a schematic flow diagram of a risk control method provided by an embodiment of this specification, which is applied to multiple payment subsystems that can log in with the same account and password.
  • the flow specifically includes the following step:
  • the first payment subsystem obtains first service data generated by the user.
  • the first payment subsystem is relative to the second and other payment subsystems. It is only for the convenience of description, and there is no substantial difference between the subsystems, that is, the first The payment subsystem and the second payment subsystem are relative terms.
  • the first payment subsystem may be an Alipay application in the mainland area
  • the second payment subsystem may be an Alipay application in Hong Kong and Macau
  • the first payment subsystem may be an Alipay application in Hong Kong and the second payment subsystem may be an Alipay application in the mainland area.
  • the first business data refers to the business data generated by the user in the first payment subsystem
  • the second business data is the same.
  • the business data may include types of business data, which may include various transaction data, usage logs of various business functions in the application, user system setting data (for example, login/offline logs, passwords, user nicknames, contact information modification setting data) and many more.
  • types of business data which may include various transaction data, usage logs of various business functions in the application, user system setting data (for example, login/offline logs, passwords, user nicknames, contact information modification setting data) and many more.
  • S203 Perform risk identification on the first business data, generate and store shared risk characteristics associated with the user that can be used in the multiple payment subsystems.
  • shared risk characteristics refer to characteristics that cause risks in each payment system, for example, it may be risk characteristics related to account numbers and passwords. Two examples are given below to identify risks from two aspects to obtain shared risk characteristics that can be adapted to cross-system use, including login risk characteristics and password modification risk characteristics.
  • the first payment subsystem receives the user's login instruction; calls historical business data containing the first payment subsystem identifier to identify the risk of the login instruction, generates a login risk identification result, and based on the login risk identification result Generate login risk characteristics shared among multiple subsystems.
  • the first payment subsystem only needs to call the first historical business data for identification, and does not involve the business data of other subsystems.
  • the business data of each payment subsystem can be unified into the business system for centralized storage, but the business data of the subsystems are separately identified.
  • the business data generated by the user on each payment subsystem is centralized in the payment subsystem for centralized storage.
  • the types of business data may include various transaction data, usage logs of various business functions in the application, user system setting data (for example, password, user nickname, contact information modification setting data), and so on.
  • the user when the user generates the business data, it clearly indicates the payment subsystem to which the business data belongs.
  • the number "CN” is used to characterize the business data generated based on the mainland payment application
  • the number "HK” is used to characterize the business data generated based on the Hong Kong Alipay application.
  • CN or "HK” here characterizes the "payment subsystem that generates business data", rather than “the place where the business data is generated”.
  • a visitor from the mainland area uses a mainland payment application when making payments in Hong Kong. Since the payment application used by the visitor is "venue Payment Application”, he will also use "CN” when identifying business data. Stored in the payment subsystem.
  • the business data between multiple payment subsystems can be isolated, so that when performing risk identification, risk identification can be performed in a targeted manner. For example, when a user logs in to the first payment subsystem, the user can perform operations (such as account number, password, and verification code retries) and historical business data (such as transaction frequency, total amount) generated by the user in the first payment subsystem.
  • operations such as account number, password, and verification code retries
  • historical business data such as transaction frequency, total amount
  • the risk identification result is risky or no risk, or, based on the behavior and historical data of this login, the risk identification result can also be a risk assessment value.
  • the login risk feature can be generated according to the login risk identification result.
  • the log-in result is digitized as the characteristic value of the log-in risk feature.
  • the log-in risk feature represents the user's login situation on the first payment subsystem, and is used in any subsystem of the business system (including the first payment subsystem). ) When receiving the user's login instruction, evaluate the login risk.
  • any other subsystem will also generate another corresponding login risk feature, and multiple login risk features can be used for risk assessment at the same time.
  • the first payment subsystem accepts the user's instruction to modify the password initiated by the first payment subsystem; obtains the total amount of asset data of the user account on multiple payment subsystems; and calls the corresponding asset data based on the total amount of asset data A risk control strategy for password modification; after the user has finished modifying the password, a password modification risk feature containing the modification result is generated.
  • any password modification behavior in any payment subsystem will overwrite other payment subsystems.
  • the assets between the payment subsystems are risk-related.
  • the password it is necessary to determine the user's assets between different systems and adjust the risk control strategy according to the total assets.
  • One possible implementation is to determine the total amount of users' assets between systems. If the total amount is larger, the risk control strategy with higher precision will be invoked. For example, suppose that the user’s asset on the first payment subsystem is 0, and the asset on the second payment subsystem is 100,000. At this time, even if the user initiates a password modification instruction on the first payment subsystem, The payment subsystem will also call the risk control strategy corresponding to one hundred thousand assets based on the total assets of one hundred thousand, instead of the risk control strategy corresponding to asset 0. Generally speaking, the larger the asset amount, the higher the level of the corresponding risk control strategy, and the higher the level of the risk control strategy, the greater the precision. The greater the degree of refinement means that the more features will be used for user risk identification, and the more cautious the risk assessment will be.
  • Fig. 3 is a schematic diagram of the risk control method based on different assets provided by the embodiments of this specification.
  • risk and interference in risk control can be balanced, and system overhead can be reduced.
  • the method that can be used is to determine whether the user has assets among the accounts, and assign an asset status label according to whether there is an asset. For example, if there are assets in any account, the value of the tag is 1, and if all accounts have no assets, the value of the tag is 0. State-based processing of tags through assets can hide the user's asset quota, realize the desensitization of the user's assets, and protect the user's privacy.
  • the payment subsystem may use "modify password" as a feature, and generate a feature value based on the number of times the password is initiated and whether it is successful. For example, the proportion of the number of successes in the total number of times is used as the feature value, and the password is The modified risk feature is associated with the user account so that it can be called at any time.
  • password modification risk feature all subsystems can use the same parameter, that is, the user's password modification situation on different payment subsystems will be statistically reflected to the same password modification risk feature, and the feature value will be dynamic modify. It is easy to understand that in practical applications, there can also be more shared risk features that can be used, as long as the use of the risk features meets the spirit of this application.
  • the second payment subsystem obtains the second business data generated by the user on its own system and the shared risk characteristics, and performs risk identification on the second business data according to the shared risk characteristics.
  • the subsystem when a user conducts transactions in any subsystem through the client, the subsystem can call the password related to the user account from the risk control system to modify the risk characteristics for the user’s transaction The instructions are evaluated.
  • the risk control system can first obtain the historical data of each user's password modification, and based on the historical data, it contains training samples of password modification risk characteristics (of course, it can also contain other characteristics, such as the transaction location and the risk value of the transaction object, Transaction frequency, etc.), in the sample, the proportion of the number of successes in the total number of times is used as the characteristic value (or the ratio of the number of successes to the number of failures is used as the characteristic value, etc.), and whether the user is at risk is used as a label (ie The risk of training samples is already known), model training is carried out according to the above samples, and a usable model whose accuracy rate meets the expectations is obtained.
  • password modification risk characteristics of course, it can also contain other characteristics, such as the transaction location and the risk value of the transaction object, Transaction frequency, etc.
  • the proportion of the number of successes in the total number of times is used as the characteristic value (or the ratio of the number of successes to the number of failures is used as the characteristic value, etc.)
  • model training is carried out
  • risk identification is performed on the business data of any one of the systems, and after the risk identification result is obtained, it will be generated that can be used for multiple Shared risk characteristics among the various subsystems, so that any other subsystem can identify its own business data based on the shared risk characteristics, and achieve targeted cross-sites in payment subsystems with the same account and password while being relatively independent Prevention and control of the risk of misappropriation.
  • the embodiment of this specification also provides a risk control system, which includes multiple payment subsystems that can log in with the same account and password.
  • a risk control system which includes multiple payment subsystems that can log in with the same account and password.
  • the first payment subsystem obtains the first business data generated by the user; performs risk identification on the first business data, generates and stores the shared risk characteristics associated with the user that can be used in the multiple payment subsystems;
  • the second payment subsystem obtains the second business data and the shared risk characteristics generated by the user on its own system, and performs risk identification on the second business data according to the shared risk characteristics.
  • the first payment subsystem receives a user's login instruction; calls historical business data containing the first payment subsystem identifier to identify the risk of the login instruction, and generates a login risk identification result, where: The historical business data including the identification of the first payment subsystem is generated and stored when the user uses the first payment subsystem for business processing; and the log-in risk feature is generated according to the log-in risk identification result.
  • the first payment subsystem accepts the user's instruction to modify the password initiated by the first payment subsystem; obtains the total amount of asset data of the user account on multiple payment subsystems; The total amount of asset data calls the corresponding risk control strategy for modifying the password; after the user has finished modifying the password, a password modification risk feature including the modification result is generated.
  • invoking the corresponding risk control strategy for modifying the password according to the total amount of asset data includes: the greater the asset data of the user account in the first payment subsystem and the second payment subsystem, the greater The higher the level of the risk control strategy for modifying the password, the level is positively correlated with the fineness of the risk control strategy.
  • the second payment subsystem receives a transaction instruction initiated by the user in the second payment subsystem; obtains the password modification risk characteristic associated with the user, and compares the password modification characteristic data with the user according to the password modification characteristic data.
  • the transaction instructions are described for risk identification.
  • the embodiment of this specification also provides a risk control method, which is applied to the second payment subsystem, as shown in FIG. 4, which is an example of another aspect of the risk control method provided by the embodiment of this specification.
  • Schematic diagram of the process including:
  • S401 Acquire second service data generated by a user
  • S405 Perform risk identification on the second business data according to the shared risk feature.
  • shared risk characteristics can be generated between any payment subsystem, and any payment subsystem can also call shared risk characteristics generated by other subsystems and perform risk identification.
  • first payment subsystem and second payment subsystem are for descriptive purposes only, and do not refer to a specific subsystem.
  • any payment subsystem is in one It can be the "first payment subsystem” in the process, or the "second payment subsystem” in another process.
  • the embodiment of this specification also provides a risk control device, which is applied to the second payment subsystem, as shown in FIG. 5, which is a diagram of the risk control device provided by the embodiment of this specification. Schematic diagram of the structure, the device includes:
  • the business data acquisition module 501 acquires the second business data generated by the user
  • a risk feature acquisition module 503 which acquires shared risk features associated with the user, where the shared risk features are pre-generated by other first payment subsystems based on the first business data for risk identification, and the first payment subsystem Same as the login account and password of the second payment subsystem;
  • the risk identification module 505 performs risk identification on the second business data according to the shared risk characteristics.
  • the embodiments of this specification also provide a computer device, which at least includes a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor implements the wind shown in FIG. 4 when the program is executed. ⁇ Control method.
  • FIG. 6 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification.
  • the device may include a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050.
  • the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040 realize the communication connection between each other in the device through the bus 1050.
  • the processor 1010 may be implemented by a general CPU (Central Processing Unit, central processing unit), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc., for execution related Program to realize the technical solutions provided in the embodiments of this specification.
  • CPU Central Processing Unit
  • ASIC Application Specific Integrated Circuit
  • the memory 1020 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc.
  • the memory 1020 may store an operating system and other application programs. When the technical solutions provided in the embodiments of this specification are implemented by software or firmware, related program codes are stored in the memory 1020 and called and executed by the processor 1010.
  • the input/output interface 1030 is used to connect an input/output module to realize information input and output.
  • the input/output/module can be configured in the device as a component (not shown in the figure), or it can be connected to the device to provide corresponding functions.
  • the input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc.
  • an output device may include a display, a speaker, a vibrator, an indicator light, and the like.
  • the communication interface 1040 is used to connect a communication module (not shown in the figure) to realize the communication interaction between the device and other devices.
  • the communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.).
  • the bus 1050 includes a path to transmit information between various components of the device (for example, the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040).
  • the above device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040, and the bus 1050, in the specific implementation process, the device may also include the equipment necessary for normal operation. Other components.
  • the above-mentioned devices may also include only the components necessary to implement the solutions of the embodiments of the present specification, and not necessarily include all the components shown in the figures.
  • the embodiment of the present specification also provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the risk control method shown in FIG. 4 is implemented.
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • a typical implementation device is a computer.
  • the specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game control A console, a tablet computer, a wearable device, or a combination of any of these devices.

Abstract

A risk control method, a system, a device, and equipment. The method comprises: when a user can log in to different payment subsystems using a same account and password, performing risk identification with respect to service data of any of the systems and, when the risk identification result is produced, generating a shared risk feature applicable among the multiple subsystems, thus allowing any other of the subsystems to identity service data of self on the basis of the shared risk feature.

Description

风控方法、系统、装置及设备Risk control methods, systems, devices and equipment 技术领域Technical field
本说明书实施例涉及信息技术领域,尤其涉及风控方法、系统、装置及设备。The embodiments of this specification relate to the field of information technology, and in particular to risk control methods, systems, devices, and equipment.
背景技术Background technique
在支付应用中,为了在不同的地区推广第三方支付软件,经常会采用如下方式:一套账号和密码可以适应于多个支付子系统中。例如,使用支付宝的账号和密码,可以开通并使用支付宝香港本地钱包AlipayHK以及支付宝澳门本地钱包。In payment applications, in order to promote third-party payment software in different regions, the following methods are often used: a set of account numbers and passwords can be adapted to multiple payment subsystems. For example, using Alipay account and password, you can open and use Alipay Hong Kong local wallet AlipayHK and Alipay Macau local wallet.
在这种方式下,由于各个站点钱包的地区不同,同一套账密可登录多个支付子系统的问题却带来潜在的跨系统的账户盗用问题。基于此,需要一种适应于多个支付子系统使用同一账密的风控方案。In this way, due to the different regions of the wallets of each site, the problem that the same set of account secrets can log in to multiple payment subsystems has brought potential cross-system account theft. Based on this, a risk control solution that adapts to multiple payment subsystems using the same account secret is needed.
发明内容Summary of the invention
本申请实施例的目的是提供一种在多个支付子系统使用同一账密时的风控方案。The purpose of the embodiments of this application is to provide a risk control solution when multiple payment subsystems use the same account secret.
为解决上述技术问题,本申请实施例是这样实现的:In order to solve the above technical problems, the embodiments of the present application are implemented as follows:
一方面,本说明书实施例提供一种风控方法,应用于可以同一账号和密码进行登录的多个支付子系统上,所述方法包括:第一支付子系统获取用户所产生的第一业务数据;对所述第一业务数据进行风险识别,生成与所述用户关联的可用于所述多个支付子系统的共享风险特征,并存储;第二支付子系统,获取用户在自身系统上所产生的第二业务数据和所述共享风险特征,根据所述共享风险特征对所述第二业务数据进行风险识别。On the one hand, the embodiments of this specification provide a risk control method, which is applied to multiple payment subsystems that can log in with the same account and password, and the method includes: the first payment subsystem obtains the first business data generated by the user ; Perform risk identification on the first business data, generate and store the shared risk characteristics associated with the user that can be used in the multiple payment subsystems; the second payment subsystem obtains the user’s own system And the shared risk characteristics of the second business data, and risk identification is performed on the second business data according to the shared risk characteristics.
与一方面对应的,本说明书实施例还提供一种风控系统,所述系统中包含可以同一账号和密码进行登录的多个支付子系统,在所述风控系统中,第一支付子系统获取用户所产生的第一业务数据;对所述第一业务数据进行风险识别,生成与所述用户关联的可用于所述多个支付子系统的共享风险特征,并存储;第二支付子系统,获取用户在自身系统上所产生的第二业务数据和所述共享风险特征,根据所述共享风险特征对所述第二业务数据进行风险识别。Corresponding to one aspect, the embodiment of this specification also provides a risk control system, which includes multiple payment subsystems that can log in with the same account and password. In the risk control system, the first payment subsystem Acquire the first business data generated by the user; perform risk identification on the first business data, generate and store the shared risk characteristics associated with the user that can be used in the multiple payment subsystems; the second payment subsystem Acquire the second business data and the shared risk characteristics generated by the user on the user's own system, and perform risk identification on the second business data according to the shared risk characteristics.
另一方面,本说明书实施例还提供一种风控方法,应用于第二支付子系统中,所 述方法包括:获取用户所产生的第二业务数据;获取与所述用户关联的共享风险特征,其中,所述共享风险特征由第一支付子系统基于第一业务数据进行风险识别所预先生成,所述第一支付子系统和第二支付子系统的登录账号和密码相同;根据所述共享风险特征对所述第二业务数据进行风险识别。On the other hand, the embodiment of this specification also provides a risk control method, which is applied to the second payment subsystem. The method includes: obtaining second business data generated by a user; obtaining shared risk characteristics associated with the user , Wherein the shared risk feature is pre-generated by the first payment subsystem based on the first business data for risk identification, and the login account and password of the first payment subsystem and the second payment subsystem are the same; The risk feature performs risk identification on the second business data.
与另一方面对应的,本说明书实施例还提供一种风控装置,应用于第二支付子系统中,所述装置包括:业务数据获取模块,获取用户所产生的第二业务数据;风险特征获取模块,获取与所述用户关联的共享风险特征,其中,所述共享风险特征由其它第一支付子系统基于第一业务数据进行风险识别所预先生成,所述第一支付子系统和第二支付子系统的登录账号和密码相同;风险识别模块,根据所述共享风险特征对所述第二业务数据进行风险识别。Corresponding to another aspect, the embodiment of this specification also provides a risk control device, which is applied to the second payment subsystem, the device includes: a business data acquisition module, which acquires second business data generated by a user; risk characteristics The acquiring module acquires the shared risk characteristics associated with the user, wherein the shared risk characteristics are pre-generated by other first payment subsystems based on the first business data for risk identification, the first payment subsystem and the second The login account and password of the payment subsystem are the same; the risk identification module performs risk identification on the second business data according to the shared risk feature.
通过本说明书实施例所提供的方案,当用户使用同一账号密码在不同支付子系统间可以登录时,针对其中任一系统的业务数据进行风险识别,并得到风险识别结果后,将生成可用于多个子系统间的共享风险特征,从而任一其它子系统可以基于该共享风险特征对自身的业务数据进行识别,在账号密码相同而同时业务相对独立的各支付子系统中,实现有针对性的跨站点盗用风险的防控。Through the solution provided by the embodiment of this specification, when a user can log in between different payment subsystems using the same account and password, risk identification is performed on the business data of any one of the systems, and after the risk identification result is obtained, it will be generated that can be used for multiple The risk characteristics of each subsystem are shared, so that any other subsystem can identify its own business data based on the shared risk characteristics. In each payment subsystem with the same account password and relatively independent business, it can achieve targeted cross-cutting Prevention and control of site theft risk.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本说明书实施例。It should be understood that the above general description and the following detailed description are only exemplary and explanatory, and cannot limit the embodiments of this specification.
此外,本说明书实施例中的任一实施例并不需要达到上述的全部效果。In addition, any one of the embodiments of the present specification does not need to achieve all the above-mentioned effects.
附图说明Description of the drawings
为了更清楚地说明本说明书实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书实施例中记载的一些实施例,对于本领域普通技术人员来讲,还可以根据这些附图获得其他的附图。In order to more clearly describe the technical solutions in the embodiments of this specification, the following will briefly introduce the drawings needed in the description of the embodiments. Obviously, the drawings in the following description are only those recorded in the embodiments of this specification. For some embodiments, those of ordinary skill in the art can also obtain other drawings based on these drawings.
图1为本说明书实施例所提供的支付子系统的示意图;Figure 1 is a schematic diagram of a payment subsystem provided by an embodiment of the specification;
图2是本说明书实施例提供的一种风控方法的流程示意图;FIG. 2 is a schematic flowchart of a risk control method provided by an embodiment of this specification;
图3为本说明书实施例所提供的基于不同资产所采用的风控方式的示意图;FIG. 3 is a schematic diagram of the risk control method based on different assets provided by the embodiments of this specification;
图4为本说明书实施例所提供的另一方面的风控方法的流程示意图Figure 4 is a schematic flow diagram of another risk control method provided by the embodiments of this specification
图5是本说明书实施例提供的一种风控装置的结构示意图;Figure 5 is a schematic structural diagram of a wind control device provided by an embodiment of this specification;
图6是用于配置本说明书实施例方法的一种设备的结构示意图。Fig. 6 is a schematic structural diagram of a device for configuring the method of the embodiment of this specification.
具体实施方式Detailed ways
为了使本领域技术人员更好地理解本说明书实施例中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行详细地描述,显然,所描述的实施例仅仅是本说明书的一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员所获得的所有其他实施例,都应当属于保护的范围。In order to enable those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation The examples are only a part of the embodiments in this specification, not all the embodiments. Based on the embodiments in this specification, all other embodiments obtained by those of ordinary skill in the art should fall within the scope of protection.
在当前的业务体系中,为了推广业务,经常会采用如下方式:一套账号和密码可以适应于多个支付子系统中。例如,已经注册了蚂蚁通行证的用户,可以使用蚂蚁通行证的账号和密码,开通或者登录在其它地区的支付宝所提供的电子钱包,例如,支付宝香港本地钱包AlipayHK以及支付宝澳门本地钱包。如图1所示,图1为本说明书实施例所提供的风控系统的示意图。在该示意图中,风控系统中包含了多个支付子系统,各支付子系统之间可以使用同一用户账号和密码进行登录,各支付子系统的业务功能相同。In the current business system, in order to promote business, the following methods are often used: a set of account numbers and passwords can be adapted to multiple payment subsystems. For example, users who have registered for the Ant Pass can use the account and password of the Ant Pass to open or log in to the electronic wallets provided by Alipay in other regions, such as Alipay Hong Kong local wallet Alipay HK and Alipay Macau local wallet. As shown in Fig. 1, Fig. 1 is a schematic diagram of a risk control system provided by an embodiment of this specification. In this schematic diagram, the risk control system contains multiple payment subsystems, and each payment subsystem can use the same user account and password to log in, and the business functions of each payment subsystem are the same.
例如,在实际应用中,一种可实施的方式为在各支付子系统中预先进行配置,识别通用的通行证。用户可以基于在某个支付子系统上注册通行证,然后以通行证的方式,在多个支付子系统之间使用同一套用户账号和密码。For example, in practical applications, an implementable way is to configure in advance in each payment subsystem to identify a universal pass. Users can register a pass based on a certain payment subsystem, and then use the same set of user accounts and passwords among multiple payment subsystems in the form of passes.
又或者,用户还可以通过授权的方式,将一个支付子系统中的用户账号和密码授权至另一支付子系统中。例如,用户开通了香港支付宝应用,当用户需要使用澳门支付宝应用时,则通过香港支付宝应用授权已经注册的香港支付宝应用中的账号和密码进行登录。Or, the user can also authorize the user account and password in one payment subsystem to another payment subsystem through authorization. For example, if the user has activated the Hong Kong Alipay application, when the user needs to use the Macau Alipay application, he will use the Hong Kong Alipay application to authorize the registered account and password in the Hong Kong Alipay application to log in.
所述的业务功能相同指的是,在第一支付子系统间有拥有的业务功能,在第二支付子系统上也同样拥有,例如,支付、转账、充值缴费、理财等等,且,多个支付子系统的资产与业务数据是独立的。The same business function refers to that there are business functions owned by the first payment subsystem and also owned by the second payment subsystem, such as payment, transfer, recharge and payment, financial management, etc., and more The assets and business data of each payment subsystem are independent.
在这种跨站点的方式下,同一套账密可登录多个支付子系统也进一步带来了相应的跨站点的盗用风险。例如,一个黑产分子如果在第一支付子系统盗用账号或者密码成功,那么就有可能基于账号登录第二支付子系统进行资产的盗用。基于此,本说明书实施例提供一种风控方案,以解决这种跨站点的盗用问题。In this cross-site approach, the same set of account secrets can log into multiple payment subsystems, which further brings corresponding cross-site fraudulent use risks. For example, if a gangster succeeds in stealing an account or password in the first payment subsystem, it is possible to log in to the second payment subsystem based on the account to embezzle assets. Based on this, the embodiment of this specification provides a risk control solution to solve this cross-site fraud problem.
以下结合附图,详细说明本说明书各实施例提供的技术方案。在一方面,如图2所示,图2是本说明书实施例提供的一种风控方法的流程示意图,应用于可以同一账号 和密码进行登录的多个支付子系统上,该流程具体包括如下步骤:The following describes in detail the technical solutions provided by the embodiments of this specification in conjunction with the accompanying drawings. On the one hand, as shown in Figure 2, Figure 2 is a schematic flow diagram of a risk control method provided by an embodiment of this specification, which is applied to multiple payment subsystems that can log in with the same account and password. The flow specifically includes the following step:
S201,第一支付子系统获取用户所产生的第一业务数据。S201: The first payment subsystem obtains first service data generated by the user.
首先需要说明的是,所述的第一支付子系统是相对于第二等等其他支付子系统而言的,仅为了描述方便,各子系统间并不存在实质上的区别,即,第一支付子系统和第二支付子系统是相对而言的。First of all, it should be noted that the first payment subsystem is relative to the second and other payment subsystems. It is only for the convenience of description, and there is no substantial difference between the subsystems, that is, the first The payment subsystem and the second payment subsystem are relative terms.
例如,第一支付子系统可以是大陆区的支付宝应用,第二支付子系统是港澳支付宝应用;或者,第一支付子系统是香港支付宝应用,第二支付子系统是大陆区的支付宝应用。For example, the first payment subsystem may be an Alipay application in the mainland area, and the second payment subsystem may be an Alipay application in Hong Kong and Macau; or the first payment subsystem may be an Alipay application in Hong Kong and the second payment subsystem may be an Alipay application in the mainland area.
由于各支付子系统的业务数据是独立的,第一业务数据指的是用户在该第一支付子系统所产生的业务数据,第二业务数据同理。Since the business data of each payment subsystem is independent, the first business data refers to the business data generated by the user in the first payment subsystem, and the second business data is the same.
所述的业务数据可以包括业务数据的类型可以包括各种交易数据、应用内的各业务功能使用日志、用户系统设置数据(例如,登录/离线日志、密码、用户昵称、联系方式修改设置数据)等等。The business data may include types of business data, which may include various transaction data, usage logs of various business functions in the application, user system setting data (for example, login/offline logs, passwords, user nicknames, contact information modification setting data) and many more.
S203,对所述第一业务数据进行风险识别,生成与所述用户关联的可用于所述多个支付子系统的共享风险特征,并存储。S203: Perform risk identification on the first business data, generate and store shared risk characteristics associated with the user that can be used in the multiple payment subsystems.
虽然各支付系统的业务功能相同,但是由于被使用在不同的地区,因此实际上很多的风险特征是带有地域性,而不能共享使用的。例如,同一个特征月均消费额,在不同的地区中,特征取值就不一样,因此,该特征的取值就不可在各支付子系统间共享使用。Although the business functions of each payment system are the same, because they are used in different regions, in fact, many of the risk characteristics are regional and cannot be shared. For example, the average monthly consumption of the same feature is different in different regions. Therefore, the value of this feature cannot be shared among payment subsystems.
在本说明书实施例中,共享风险特征指的是在各支付系统均会造成风险的特征,例如,可以是与账号和密码相关的风险特征。以下给出两个示例,分别从两个方面进行风险识别,以得到可以适应于跨系统使用的共享风险特征,包括登录风险特征和密码修改风险特征。In the embodiments of this specification, shared risk characteristics refer to characteristics that cause risks in each payment system, for example, it may be risk characteristics related to account numbers and passwords. Two examples are given below to identify risks from two aspects to obtain shared risk characteristics that can be adapted to cross-system use, including login risk characteristics and password modification risk characteristics.
(1)登录风险特征。(1) Logging risk characteristics.
具体而言,由第一支付子系统接收用户的登陆指令;调用包含第一支付子系统标识的历史业务数据对所述登陆指令进行风险识别,生成登录风险识别结果,根据所述登录风险识别结果生成多个子系统间共享的登录风险特征。Specifically, the first payment subsystem receives the user's login instruction; calls historical business data containing the first payment subsystem identifier to identify the risk of the login instruction, generates a login risk identification result, and based on the login risk identification result Generate login risk characteristics shared among multiple subsystems.
需要说明的是,在进行登录风险识别的过程中,第一支付子系统仅需要调用第一 历史业务数据进行识别,而不会涉及到其它子系统的业务数据。在一种实施方式中可以将各支付子系统的业务数据统一到业务系统中进行集中式的存储,但是分别给子系统的业务数据加上标识。例如,将用户在各支付子系统上所产生的业务数据集中到支付子系统中进行集中存储。业务数据的类型可以包括各种交易数据、应用内的各业务功能使用日志、用户系统设置数据(例如,密码、用户昵称、联系方式修改设置数据)等等。It should be noted that in the process of identifying the login risk, the first payment subsystem only needs to call the first historical business data for identification, and does not involve the business data of other subsystems. In an implementation manner, the business data of each payment subsystem can be unified into the business system for centralized storage, but the business data of the subsystems are separately identified. For example, the business data generated by the user on each payment subsystem is centralized in the payment subsystem for centralized storage. The types of business data may include various transaction data, usage logs of various business functions in the application, user system setting data (for example, password, user nickname, contact information modification setting data), and so on.
同时,为了各支付子系统的业务数据更加的明晰边界,在用户产生业务数据时,即明确表示业务数据所归属的支付子系统。例如,使用编号“CN”来表征基于大陆支付应用所产生的业务数据,基于编号“HK”来表征基于香港支付宝应用所产生的业务数据。At the same time, in order to more clearly define the boundaries of the business data of each payment subsystem, when the user generates the business data, it clearly indicates the payment subsystem to which the business data belongs. For example, the number "CN" is used to characterize the business data generated based on the mainland payment application, and the number "HK" is used to characterize the business data generated based on the Hong Kong Alipay application.
需要说明的是,这里的编号“CN”或者“HK”表征的是“产生业务数据的支付子系统”,而不是表征“产生业务数据的地点”。例如,一名大陆地区的游客在香港地区进支付时使用了大陆支付应用,那么由于该游客使用的支付应用时“大陆支付应用”,那么在对业务数据进行标识时也会使用“CN”并存储于支付子系统中。It should be noted that the number "CN" or "HK" here characterizes the "payment subsystem that generates business data", rather than "the place where the business data is generated". For example, a visitor from the mainland area uses a mainland payment application when making payments in Hong Kong. Since the payment application used by the visitor is "Mainland Payment Application", he will also use "CN" when identifying business data. Stored in the payment subsystem.
通过前述方式,可以将多个支付子系统间的业务数据隔离开,从而,在进行风险识别时,可以有针对性的进行风险识别。例如,用户在登录第一支付子系统时,可以根据该用户在第一支付子系统所产生的操作(例如账号、密码以及验证码的重试次数)及历史业务数据(例如,交易频率、总额、平均金额等等),及其他风险相关的数据信息(例如,历史登录地点、历史登录失败次数等等)对本次登录进行风险识别,生成相应的风险识别结果可以是一个标签化的数据,例如,风险识别结果为有风险或者无风险,或者,基于本次登录的行为和历史数据,风险识别结果还可以是一个风险评估值。Through the foregoing method, the business data between multiple payment subsystems can be isolated, so that when performing risk identification, risk identification can be performed in a targeted manner. For example, when a user logs in to the first payment subsystem, the user can perform operations (such as account number, password, and verification code retries) and historical business data (such as transaction frequency, total amount) generated by the user in the first payment subsystem. , Average amount, etc.), and other risk-related data information (for example, historical login location, historical login failure times, etc.) to identify the risk of this login, and generate the corresponding risk identification result can be a labeled data, For example, the risk identification result is risky or no risk, or, based on the behavior and historical data of this login, the risk identification result can also be a risk assessment value.
进而可以根据登录风险识别结果生成登录风险特征。例如,将登录结果数值化,作为登录风险特征的特征值,登录风险特征表征了用户在第一支付子系统上的登录情形,用于业务系统中的任一子系统(包括第一支付子系统)在接收到该用户的登录指令时,对登录风险进行评估。Furthermore, the login risk feature can be generated according to the login risk identification result. For example, the log-in result is digitized as the characteristic value of the log-in risk feature. The log-in risk feature represents the user's login situation on the first payment subsystem, and is used in any subsystem of the business system (including the first payment subsystem). ) When receiving the user's login instruction, evaluate the login risk.
容易理解,对应的,其它的任一子系统也同样会产生相应的另一登录风险特征,多个登录风险特征可以同时使用于风险评估。It is easy to understand that, correspondingly, any other subsystem will also generate another corresponding login risk feature, and multiple login risk features can be used for risk assessment at the same time.
(2)密码修改风险特征。(2) Password modification risk characteristics.
具体而言,第一支付子系统接受用户在第一支付子系统所发起的修改密码的指令;获取所述用户账号在多个支付子系统上的资产数据总额;根据所述资产数据总额调用对 应的修改密码的风控策略;在用户修改密码结束后,生成包含所述修改结果的密码修改风险特征。Specifically, the first payment subsystem accepts the user's instruction to modify the password initiated by the first payment subsystem; obtains the total amount of asset data of the user account on multiple payment subsystems; and calls the corresponding asset data based on the total amount of asset data A risk control strategy for password modification; after the user has finished modifying the password, a password modification risk feature containing the modification result is generated.
由于本说明书实施例中,若用户发起修改密码成功,任何一个支付子系统中更改密码的行为都会覆盖其它支付子系统。换言之,各支付子系统间的资产是存在风险相关的。换言之,在已经确定了用户可以基于同一账密登录不同的支付子系统后,如果用户修改密码,有必要确定该用户在不同系统间的资产,并且根据资产总额来调整风控策略。In the embodiment of this specification, if the user initiates a successful password modification, any password modification behavior in any payment subsystem will overwrite other payment subsystems. In other words, the assets between the payment subsystems are risk-related. In other words, after it has been determined that the user can log in to different payment subsystems based on the same account secret, if the user changes the password, it is necessary to determine the user's assets between different systems and adjust the risk control strategy according to the total assets.
一种可实施方式为判断用户在各系统之间的资产总额,如果总额越大,则调用精细度越高的风控策略。例如,假设用户在第一支付子系统上的资产为0,而在第二支付子系统上的资产为十万,那么在此时,即使用户在第一支付子系统上发起了密码修改指令,支付子系统也将会根据总资产十万调用十万资产所对应的风控策略,而不是资产0所对应的风控策略。通常而言,资产额度越大,对应的风控策略级别越高,级别越高的风控策略精细度也越大。所述的精细度越大指的是对于用户进行风险识别是所采用的特征将会越多,而且,风险评估将会越谨慎。One possible implementation is to determine the total amount of users' assets between systems. If the total amount is larger, the risk control strategy with higher precision will be invoked. For example, suppose that the user’s asset on the first payment subsystem is 0, and the asset on the second payment subsystem is 100,000. At this time, even if the user initiates a password modification instruction on the first payment subsystem, The payment subsystem will also call the risk control strategy corresponding to one hundred thousand assets based on the total assets of one hundred thousand, instead of the risk control strategy corresponding to asset 0. Generally speaking, the larger the asset amount, the higher the level of the corresponding risk control strategy, and the higher the level of the risk control strategy, the greater the precision. The greater the degree of refinement means that the more features will be used for user risk identification, and the more cautious the risk assessment will be.
例如,对于低资产或者无资产的用户采用动态口令,(One-time Password,OTP)单因子校验,每隔一定时间生成一个与时间相关的、不可预测的随机数字组合,让用户输入验证;而对于较高资产的用户则采用双因子校验(例如,结合用户身份证号和生物特征,例如身份证号加指纹;或者,采用包含多项特征的风险识别模型进行风险识别)或者人工审核等方式进行风险控制。如图3所示,图3为本说明书实施例所提供的基于不同资产所采用的风控方式的示意图。For example, for users with low or no assets, use dynamic passwords, (One-time Password, OTP) single-factor verification, and generate a time-related and unpredictable random number combination at regular intervals for users to enter verification; For users with higher assets, two-factor verification (for example, combining user ID number and biological characteristics, such as ID number plus fingerprint; or, adopting a risk identification model containing multiple characteristics for risk identification) or manual review Carry out risk control in other ways. As shown in Fig. 3, Fig. 3 is a schematic diagram of the risk control method based on different assets provided by the embodiments of this specification.
通过针对用户的资产额度调用相应的风控策略,可以平衡风险与风控中的干扰,降低系统开销。By invoking the corresponding risk control strategy for the user's asset quota, risk and interference in risk control can be balanced, and system overhead can be reduced.
进一步地,在一种可实施方式中,可以采用的方式为确定用户在各账户间是否存在资产,并根据是否存在资产给定资产状态标签。例如,任一账户中有资产则该标签的值为1,所有账户均没有资产则该标签的值为0。通过资产进行标签状态化处理,可以隐藏用户的资产额度,实现用户的资产脱敏,保护用户隐私。Further, in an implementable manner, the method that can be used is to determine whether the user has assets among the accounts, and assign an asset status label according to whether there is an asset. For example, if there are assets in any account, the value of the tag is 1, and if all accounts have no assets, the value of the tag is 0. State-based processing of tags through assets can hide the user's asset quota, realize the desensitization of the user's assets, and protect the user's privacy.
在用户基于客户端发起修改密码的指令之后,相应的,本次修改要么成功,要么失败(中断也会被认为修改失败)。进一步地,支付子系统可以以“修改密码”作为特征,以修改密码的发起次数和是否成功次数来生成特征值,例如,以成功次数在总次数中的占比作为特征值,并且将该密码修改风险特征与该用户账号进行相关联,以便随时 调用。After the user initiates an instruction to modify the password based on the client, correspondingly, this modification either succeeds or fails (interruption will also be regarded as a modification failure). Further, the payment subsystem may use "modify password" as a feature, and generate a feature value based on the number of times the password is initiated and whether it is successful. For example, the proportion of the number of successes in the total number of times is used as the feature value, and the password is The modified risk feature is associated with the user account so that it can be called at any time.
在密码修改风险特征中,可以所有的子系统使用同一个参数,即,用户在不同的支付子系统上的密码修改情形将会被统计反应到同一个密码修改风险特征,并进行特征值的动态修改。容易理解的是,在实际应用中,还可以由更多的可使用的共享风险特征,只需该风险特征的使用满足本申请的精神即可。In the password modification risk feature, all subsystems can use the same parameter, that is, the user's password modification situation on different payment subsystems will be statistically reflected to the same password modification risk feature, and the feature value will be dynamic modify. It is easy to understand that in practical applications, there can also be more shared risk features that can be used, as long as the use of the risk features meets the spirit of this application.
S205,第二支付子系统,获取用户在自身系统上所产生的第二业务数据和所述共享风险特征,根据所述共享风险特征对所述第二业务数据进行风险识别。S205: The second payment subsystem obtains the second business data generated by the user on its own system and the shared risk characteristics, and performs risk identification on the second business data according to the shared risk characteristics.
通过前述方式,在业务系统间已经得到了一名用户的多条共享风向特征。因此,当该用户在另一支付子系统(即第二支付系统)上登录,并产生相应的业务数据(包括登录数据、密码修改数据、支付交易数据等等)时,另一支付子系统即可以获取得到该用户的共享风险特征对业务数据进行风险识别,从而实现跨站点的风险防控。Through the foregoing method, multiple shared wind direction characteristics of a user have been obtained between business systems. Therefore, when the user logs in on another payment subsystem (ie, the second payment system) and generates corresponding business data (including login data, password modification data, payment transaction data, etc.), the other payment subsystem is The shared risk characteristics of the user can be obtained for risk identification of business data, so as to achieve cross-site risk prevention and control.
例如,在一种实施方式中,用户通过客户端在任一子系统中进行交易时,该子系统可以从风控系统中调用与该用户账号相关的密码修改风险特征,以用于对用户的交易指令进行评估。For example, in one embodiment, when a user conducts transactions in any subsystem through the client, the subsystem can call the password related to the user account from the risk control system to modify the risk characteristics for the user’s transaction The instructions are evaluated.
具体而言,风控系统可以首先获取各用户的修改密码的历史数据,基于历史数据包含密码修改风险特征的训练样本(当然,还可以包含其它特征,例如,交易地点、交易对象的风险值,交易频率等等),所述样本中以成功次数在总次数中的占比作为特征值(或者以成功次数和失败次数的比值作为特征值等等),以该用户是否存在风险作为标签(即训练样本的风险是已经知道的),根据上述样本进行模型训练,得到一个准确率符合预期的可用模型。Specifically, the risk control system can first obtain the historical data of each user's password modification, and based on the historical data, it contains training samples of password modification risk characteristics (of course, it can also contain other characteristics, such as the transaction location and the risk value of the transaction object, Transaction frequency, etc.), in the sample, the proportion of the number of successes in the total number of times is used as the characteristic value (or the ratio of the number of successes to the number of failures is used as the characteristic value, etc.), and whether the user is at risk is used as a label (ie The risk of training samples is already known), model training is carried out according to the above samples, and a usable model whose accuracy rate meets the expectations is obtained.
在得到可用模型之后,针对任一子系统中所发来的用户交易,获取用户的密码修改风险特征以及其它特征,生成待评估的样本进行风险评估。通过将跨站点改密的标签数据作为一个风险特征加入风险识别,可以在多个支付子系统使用同一账密的情形下,有效实现跨系统的账户盗用风险防控。After obtaining the available model, for the user transaction sent from any subsystem, obtain the user's password modification risk characteristics and other characteristics, and generate samples to be evaluated for risk assessment. By adding cross-site modified tag data as a risk feature to risk identification, it is possible to effectively implement cross-system account embezzlement risk prevention and control when multiple payment subsystems use the same account secret.
通过本说明书实施例所提供的方案,当用户使用同一账号密码在不同支付子系统间可以登录时,针对其中任一系统的业务数据进行风险识别,并得到风险识别结果后,将生成可用于多个子系统间的共享风险特征,从而任一其它子系统可以基于该共享风险特征对自身的业务数据进行识别,在账号密码相同而同时相对独立的各支付子系统中,实现有针对性的跨站点盗用风险的防控。Through the solution provided by the embodiment of this specification, when a user can log in between different payment subsystems using the same account and password, risk identification is performed on the business data of any one of the systems, and after the risk identification result is obtained, it will be generated that can be used for multiple Shared risk characteristics among the various subsystems, so that any other subsystem can identify its own business data based on the shared risk characteristics, and achieve targeted cross-sites in payment subsystems with the same account and password while being relatively independent Prevention and control of the risk of misappropriation.
与一方面对应的,本说明书实施例还提供一种风控系统,所述系统中包含可以同一账号和密码进行登录的多个支付子系统,在所述风控系统中,Corresponding to one aspect, the embodiment of this specification also provides a risk control system, which includes multiple payment subsystems that can log in with the same account and password. In the risk control system,
第一支付子系统获取用户所产生的第一业务数据;对所述第一业务数据进行风险识别,生成与所述用户关联的可用于所述多个支付子系统的共享风险特征,并存储;The first payment subsystem obtains the first business data generated by the user; performs risk identification on the first business data, generates and stores the shared risk characteristics associated with the user that can be used in the multiple payment subsystems;
第二支付子系统,获取用户在自身系统上所产生的第二业务数据和所述共享风险特征,根据所述共享风险特征对所述第二业务数据进行风险识别。The second payment subsystem obtains the second business data and the shared risk characteristics generated by the user on its own system, and performs risk identification on the second business data according to the shared risk characteristics.
进一步地,在所述系统中,第一支付子系统,接收用户的登陆指令;调用包含第一支付子系统标识的历史业务数据对所述登陆指令进行风险识别,生成登录风险识别结果,其中,所述包含第一支付子系统标识的历史业务数据由用户在使用第一支付子系统进行业务处理时所产生并存储;根据所述登录风险识别结果生成登录风险特征。Further, in the system, the first payment subsystem receives a user's login instruction; calls historical business data containing the first payment subsystem identifier to identify the risk of the login instruction, and generates a login risk identification result, where: The historical business data including the identification of the first payment subsystem is generated and stored when the user uses the first payment subsystem for business processing; and the log-in risk feature is generated according to the log-in risk identification result.
进一步地,在所述系统中,第一支付子系统,接受用户在第一支付子系统所发起的修改密码的指令;获取所述用户账号在多个支付子系统上的资产数据总额;根据所述资产数据总额调用对应的修改密码的风控策略;在用户修改密码结束后,生成包含所述修改结果的密码修改风险特征。Further, in the system, the first payment subsystem accepts the user's instruction to modify the password initiated by the first payment subsystem; obtains the total amount of asset data of the user account on multiple payment subsystems; The total amount of asset data calls the corresponding risk control strategy for modifying the password; after the user has finished modifying the password, a password modification risk feature including the modification result is generated.
进一步地,在所述系统中,根据所述资产数据总额调用对应的修改密码的风控策略,具体包括:用户账号在第一支付子系统和第二支付子系统中的资产数据越大,调用级别越高的修改密码的风控策略,所述级别与风控策略的精细度成正相关。Further, in the system, invoking the corresponding risk control strategy for modifying the password according to the total amount of asset data includes: the greater the asset data of the user account in the first payment subsystem and the second payment subsystem, the greater The higher the level of the risk control strategy for modifying the password, the level is positively correlated with the fineness of the risk control strategy.
进一步地,在所述系统中,第二支付子系统,接收用户在第二支付子系统所发起的交易指令;获取与所述用户关联的密码修改风险特征,根据所述密码修改特征数据对所述交易指令进行风险识别。Further, in the system, the second payment subsystem receives a transaction instruction initiated by the user in the second payment subsystem; obtains the password modification risk characteristic associated with the user, and compares the password modification characteristic data with the user according to the password modification characteristic data. The transaction instructions are described for risk identification.
在另一方面,本说明书实施例还提供一种风控方法,应用于第二支付子系统中,如图4所示,图4为本说明书实施例所提供的另一方面的风控方法的流程示意图,包括:On the other hand, the embodiment of this specification also provides a risk control method, which is applied to the second payment subsystem, as shown in FIG. 4, which is an example of another aspect of the risk control method provided by the embodiment of this specification. Schematic diagram of the process, including:
S401,获取用户所产生的第二业务数据;S401: Acquire second service data generated by a user;
S403,获取与所述用户关联的共享风险特征,其中,所述共享风险特征由第一支付子系统基于第一业务数据进行风险识别所预先生成,所述第一支付子系统和第二支付子系统的登录账号和密码相同;S403. Acquire a shared risk feature associated with the user, where the shared risk feature is pre-generated by the first payment subsystem based on the first business data for risk identification, and the first payment subsystem and the second payment sub-system The login account and password of the system are the same;
S405,根据所述共享风险特征对所述第二业务数据进行风险识别。S405: Perform risk identification on the second business data according to the shared risk feature.
需要说明的是,共享风险特征是在任一支付子系统间都可以生成,同时任一支付 子系统也可以调用其它子系统所产生的共享风险特征并进行风险识别。前述的“第一支付子系统”和“第二支付子系统”仅是为了描述上的方面,并不指代某个具体的子系统,在该风控系统中,任一支付子系统在一个流程中可以是“第一支付子系统”,在另一流程中也可以是“第二支付子系统”。It should be noted that shared risk characteristics can be generated between any payment subsystem, and any payment subsystem can also call shared risk characteristics generated by other subsystems and perform risk identification. The aforementioned "first payment subsystem" and "second payment subsystem" are for descriptive purposes only, and do not refer to a specific subsystem. In the risk control system, any payment subsystem is in one It can be the "first payment subsystem" in the process, or the "second payment subsystem" in another process.
与另一方面对应的,本说明书实施例还提供一种风控装置,应用于第二支付子系统中,如图5所示,图5为本说明书实施例所提供的一种风控装置的结构示意图,所述装置包括:Corresponding to another aspect, the embodiment of this specification also provides a risk control device, which is applied to the second payment subsystem, as shown in FIG. 5, which is a diagram of the risk control device provided by the embodiment of this specification. Schematic diagram of the structure, the device includes:
业务数据获取模块501,获取用户所产生的第二业务数据;The business data acquisition module 501 acquires the second business data generated by the user;
风险特征获取模块503,获取与所述用户关联的共享风险特征,其中,所述共享风险特征由其它第一支付子系统基于第一业务数据进行风险识别所预先生成,所述第一支付子系统和第二支付子系统的登录账号和密码相同;A risk feature acquisition module 503, which acquires shared risk features associated with the user, where the shared risk features are pre-generated by other first payment subsystems based on the first business data for risk identification, and the first payment subsystem Same as the login account and password of the second payment subsystem;
风险识别模块505,根据所述共享风险特征对所述第二业务数据进行风险识别。The risk identification module 505 performs risk identification on the second business data according to the shared risk characteristics.
本说明书实施例还提供一种计算机设备,其至少包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,处理器执行所述程序时实现图4所示的风控方法。The embodiments of this specification also provide a computer device, which at least includes a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor implements the wind shown in FIG. 4 when the program is executed.控方法。 Control method.
图6示出了本说明书实施例所提供的一种更为具体的计算设备硬件结构示意图,该设备可以包括:处理器1010、存储器1020、输入/输出接口1030、通信接口1040和总线1050。其中处理器1010、存储器1020、输入/输出接口1030和通信接口1040通过总线1050实现彼此之间在设备内部的通信连接。FIG. 6 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification. The device may include a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. The processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040 realize the communication connection between each other in the device through the bus 1050.
处理器1010可以采用通用的CPU(Central Processing Unit,中央处理器)、微处理器、应用专用集成电路(Application Specific Integrated Circuit,ASIC)、或者一个或多个集成电路等方式实现,用于执行相关程序,以实现本说明书实施例所提供的技术方案。The processor 1010 may be implemented by a general CPU (Central Processing Unit, central processing unit), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc., for execution related Program to realize the technical solutions provided in the embodiments of this specification.
存储器1020可以采用ROM(Read Only Memory,只读存储器)、RAM(Random Access Memory,随机存取存储器)、静态存储设备,动态存储设备等形式实现。存储器1020可以存储操作系统和其他应用程序,在通过软件或者固件来实现本说明书实施例所提供的技术方案时,相关的程序代码保存在存储器1020中,并由处理器1010来调用执行。The memory 1020 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc. The memory 1020 may store an operating system and other application programs. When the technical solutions provided in the embodiments of this specification are implemented by software or firmware, related program codes are stored in the memory 1020 and called and executed by the processor 1010.
输入/输出接口1030用于连接输入/输出模块,以实现信息输入及输出。输入输出/ 模块可以作为组件配置在设备中(图中未示出),也可以外接于设备以提供相应功能。其中输入设备可以包括键盘、鼠标、触摸屏、麦克风、各类传感器等,输出设备可以包括显示器、扬声器、振动器、指示灯等。The input/output interface 1030 is used to connect an input/output module to realize information input and output. The input/output/module can be configured in the device as a component (not shown in the figure), or it can be connected to the device to provide corresponding functions. The input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and an output device may include a display, a speaker, a vibrator, an indicator light, and the like.
通信接口1040用于连接通信模块(图中未示出),以实现本设备与其他设备的通信交互。其中通信模块可以通过有线方式(例如USB、网线等)实现通信,也可以通过无线方式(例如移动网络、WIFI、蓝牙等)实现通信。The communication interface 1040 is used to connect a communication module (not shown in the figure) to realize the communication interaction between the device and other devices. The communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.).
总线1050包括一通路,在设备的各个组件(例如处理器1010、存储器1020、输入/输出接口1030和通信接口1040)之间传输信息。The bus 1050 includes a path to transmit information between various components of the device (for example, the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040).
需要说明的是,尽管上述设备仅示出了处理器1010、存储器1020、输入/输出接口1030、通信接口1040以及总线1050,但是在具体实施过程中,该设备还可以包括实现正常运行所必需的其他组件。此外,本领域的技术人员可以理解的是,上述设备中也可以仅包含实现本说明书实施例方案所必需的组件,而不必包含图中所示的全部组件。It should be noted that although the above device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040, and the bus 1050, in the specific implementation process, the device may also include the equipment necessary for normal operation. Other components. In addition, those skilled in the art can understand that the above-mentioned devices may also include only the components necessary to implement the solutions of the embodiments of the present specification, and not necessarily include all the components shown in the figures.
本说明书实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现图4所示的风控方法。The embodiment of the present specification also provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the risk control method shown in FIG. 4 is implemented.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. The information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本说明书实施例可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本说明书实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本说明书实施例各个实施例或者实施例的某些部分所述的方法。From the description of the foregoing implementation manners, it can be understood that those skilled in the art can clearly understand that the embodiments of this specification can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solutions of the embodiments of this specification can be embodied in the form of software products, which can be stored in storage media, such as ROM/RAM, A magnetic disk, an optical disk, etc., include several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute the methods described in the various embodiments or some parts of the embodiments of this specification.
上述实施例阐明的系统、方法、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。The systems, methods, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game control A console, a tablet computer, a wearable device, or a combination of any of these devices.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于方法实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的方法实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,在实施本说明书实施例方案时可以把各模块的功能在同一个或多个软件和/或硬件中实现。也可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the method embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiment. The method embodiments described above are merely illustrative. The modules described as separate components may or may not be physically separated. When implementing the solutions of the embodiments of this specification, the functions of the modules may be in the same Or multiple software and/or hardware implementations. It is also possible to select some or all of the modules according to actual needs to achieve the objectives of the solutions of the embodiments. Those of ordinary skill in the art can understand and implement it without creative work.
以上所述仅是本说明书实施例的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本说明书实施例原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本说明书实施例的保护范围。The above are only specific implementations of the embodiments of this specification. It should be pointed out that for those of ordinary skill in the art, without departing from the principle of the embodiments of this specification, several improvements and modifications can be made. These Improvement and retouching should also be regarded as the protection scope of the embodiments of this specification.

Claims (13)

  1. 一种风控方法,应用于包含多个支付子系统的风控系统上,其中,所述多个支付子系统可以用同一账号和密码进行登录,所述方法包括:A risk control method is applied to a risk control system containing multiple payment subsystems, wherein the multiple payment subsystems can log in with the same account and password, and the method includes:
    第一支付子系统获取用户所产生的第一业务数据;The first payment subsystem obtains the first business data generated by the user;
    对所述第一业务数据进行风险识别,生成与所述用户关联的可用于所述多个支付子系统的共享风险特征,并存储;Perform risk identification on the first business data, generate and store shared risk characteristics associated with the user that can be used in the multiple payment subsystems;
    第二支付子系统获取所述用户在自身系统上所产生的第二业务数据和所述共享风险特征,根据所述共享风险特征对所述第二业务数据进行风险识别。The second payment subsystem obtains the second business data and the shared risk characteristics generated by the user on its own system, and performs risk identification on the second business data according to the shared risk characteristics.
  2. 如权利要求1所述的方法,对所述第一业务数据进行风险识别,生成可用于所述多个支付子系统的共享风险特征,包括:5. The method of claim 1, performing risk identification on the first business data to generate shared risk characteristics that can be used in the multiple payment subsystems, comprising:
    第一支付子系统接收所述用户的登陆指令;The first payment subsystem receives the user's login instruction;
    调用包含第一支付子系统标识的历史业务数据对所述登陆指令进行风险识别,生成登录风险识别结果,其中,所述包含第一支付子系统标识的历史业务数据由所述用户在使用所述第一支付子系统进行业务处理时所产生并存储;Call the historical business data containing the first payment subsystem identification to identify the risk of the login instruction, and generate a login risk identification result, wherein the historical business data containing the first payment subsystem identification is used by the user Generated and stored when the first payment subsystem performs business processing;
    根据所述登录风险识别结果生成登录风险特征。Generate a login risk feature according to the login risk identification result.
  3. 如权利要求1所述的方法,对所述第一业务数据进行风险识别,生成可用于所述多个支付子系统的共享风险特征,包括:5. The method of claim 1, performing risk identification on the first business data to generate shared risk characteristics that can be used in the multiple payment subsystems, comprising:
    接受所述用户在所述第一支付子系统所发起的修改密码的指令;Accepting the password modification instruction initiated by the user in the first payment subsystem;
    获取所述用户账号在多个支付子系统上的资产数据总额;Obtaining the total amount of asset data of the user account on multiple payment subsystems;
    根据所述资产数据总额调用对应的修改密码的风控策略;Invoke the corresponding risk control strategy for password modification according to the total amount of asset data;
    在用户修改密码结束后,生成包含所述修改结果的密码修改风险特征。After the user has finished modifying the password, a password modification risk feature containing the modification result is generated.
  4. 如权利要求3所述的方法,根据所述资产数据总额调用对应的修改密码的风控策略,包括:The method according to claim 3, invoking a corresponding risk control strategy for modifying a password according to the total amount of asset data, comprising:
    用户账号在所述第一支付子系统和所述第二支付子系统中的资产数据越大,调用级别越高的修改密码的风控策略,所述级别与风控策略的精细度成正相关。The greater the asset data of the user account in the first payment subsystem and the second payment subsystem, the higher the level of risk control strategy for modifying the password is invoked, and the level is positively correlated with the fineness of the risk control strategy.
  5. 如权利要求3所述的方法,所述第二支付子系统获取用户在自身系统上所产生的第二业务数据和所述共享风险特征,根据所述共享风险特征对所述第二业务数据进行风险识别,包括:The method according to claim 3, wherein the second payment subsystem obtains the second business data and the shared risk characteristics generated by the user on its own system, and performs processing on the second business data according to the shared risk characteristics. Risk identification, including:
    接收用户在所述第二支付子系统所发起的交易指令;Receiving a transaction instruction initiated by the user in the second payment subsystem;
    获取与所述用户关联的密码修改风险特征,根据所述密码修改特征数据对所述交易指令进行风险识别。Obtain the password modification risk characteristics associated with the user, and perform risk identification on the transaction instruction according to the password modification characteristic data.
  6. 一种风控系统,所述系统中包含可以用同一账号和密码进行登录的多个支付子系统,在所述风控系统中,A risk control system includes multiple payment subsystems that can log in with the same account and password. In the risk control system,
    第一支付子系统获取用户所产生的第一业务数据;The first payment subsystem obtains the first business data generated by the user;
    对所述第一业务数据进行风险识别,生成与所述用户关联的可用于所述多个支付子系统的共享风险特征,并存储;Perform risk identification on the first business data, generate and store shared risk characteristics associated with the user that can be used in the multiple payment subsystems;
    第二支付子系统获取用户在自身系统上所产生的第二业务数据和所述共享风险特征,根据所述共享风险特征对所述第二业务数据进行风险识别。The second payment subsystem obtains the second business data and the shared risk characteristics generated by the user on its own system, and performs risk identification on the second business data according to the shared risk characteristics.
  7. 如权利要求6所述的系统,所述第一支付子系统接收用户的登陆指令;调用包含第一支付子系统标识的历史业务数据对所述登陆指令进行风险识别,生成登录风险识别结果,其中,所述包含第一支付子系统标识的历史业务数据由用户在使用所述第一支付子系统进行业务处理时所产生并存储;根据所述登录风险识别结果生成登录风险特征。7. The system of claim 6, wherein the first payment subsystem receives a user's login instruction; calls historical business data containing the first payment subsystem identifier to perform risk identification on the login instruction, and generates a login risk identification result, wherein The historical business data including the identification of the first payment subsystem is generated and stored when the user uses the first payment subsystem to perform business processing; and the log-in risk feature is generated according to the log-in risk identification result.
  8. 如权利要求6所述的系统,所述第一支付子系统接受用户在所述第一支付子系统所发起的修改密码的指令;获取所述用户账号在多个支付子系统上的资产数据总额;根据所述资产数据总额调用对应的修改密码的风控策略;在用户修改密码结束后,生成包含所述修改结果的密码修改风险特征。The system of claim 6, wherein the first payment subsystem accepts an instruction to modify a password initiated by the user in the first payment subsystem; obtains the total amount of asset data of the user account on multiple payment subsystems ; According to the total amount of asset data call the corresponding risk control strategy for modifying the password; after the user has finished modifying the password, a password modification risk feature containing the modification result is generated.
  9. 如权利要求8所述的系统,根据所述资产数据总额调用对应的修改密码的风控策略,包括:The system according to claim 8, invoking the corresponding risk control strategy for modifying the password according to the total amount of asset data, including:
    用户账号在所述第一支付子系统和所述第二支付子系统中的资产数据越大,调用级别越高的修改密码的风控策略,所述级别与风控策略的精细度成正相关。The greater the asset data of the user account in the first payment subsystem and the second payment subsystem, the higher the level of risk control strategy for modifying the password is invoked, and the level is positively correlated with the fineness of the risk control strategy.
  10. 如权利要求8所述的系统,所述第二支付子系统接收用户在第二支付子系统所发起的交易指令;获取与所述用户关联的密码修改风险特征,根据所述密码修改特征数据对所述交易指令进行风险识别。The system according to claim 8, wherein the second payment subsystem receives a transaction instruction initiated by the user in the second payment subsystem; obtains a password modification risk characteristic associated with the user, and modifies the characteristic data pair according to the password The transaction instruction performs risk identification.
  11. 一种风控方法,应用于第二支付子系统中,所述方法包括:A risk control method applied to a second payment subsystem, the method including:
    获取用户所产生的第二业务数据;Acquiring the second service data generated by the user;
    获取与所述用户关联的共享风险特征,其中,所述共享风险特征由第一支付子系统基于第一业务数据进行风险识别所预先生成,所述第一支付子系统和所述第二支付子系统的登录账号和密码相同;Acquire the shared risk feature associated with the user, where the shared risk feature is pre-generated by the first payment subsystem to perform risk identification based on the first business data, and the first payment subsystem and the second payment sub-system The login account and password of the system are the same;
    根据所述共享风险特征对所述第二业务数据进行风险识别。Perform risk identification on the second business data according to the shared risk feature.
  12. 一种风控装置,应用于第二支付子系统中,所述装置包括:A risk control device applied to a second payment subsystem, the device comprising:
    业务数据获取模块,获取用户所产生的第二业务数据;The business data acquisition module acquires the second business data generated by the user;
    风险特征获取模块,获取与所述用户关联的共享风险特征,其中,所述共享风险特 征由第一支付子系统基于第一业务数据进行风险识别所预先生成,所述第一支付子系统和所述第二支付子系统的登录账号和密码相同;The risk feature acquisition module acquires the shared risk features associated with the user, where the shared risk features are pre-generated by the first payment subsystem based on the first business data for risk identification, and the first payment subsystem and the The login account and password of the second payment subsystem are the same;
    风险识别模块,根据所述共享风险特征对所述第二业务数据进行风险识别。The risk identification module performs risk identification on the second business data according to the shared risk characteristics.
  13. 一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现如权利要求1~5、11中任一项所述的方法。A computer device, comprising a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor executes the program when the program is executed as in any one of claims 1 to 5 and 11. The method described.
PCT/CN2020/094591 2019-09-30 2020-06-05 Risk control method, system, device, and equipment WO2021063015A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910944263.0 2019-09-30
CN201910944263.0A CN110738473B (en) 2019-09-30 2019-09-30 Wind control method, system, device and equipment

Publications (1)

Publication Number Publication Date
WO2021063015A1 true WO2021063015A1 (en) 2021-04-08

Family

ID=69268420

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/094591 WO2021063015A1 (en) 2019-09-30 2020-06-05 Risk control method, system, device, and equipment

Country Status (2)

Country Link
CN (1) CN110738473B (en)
WO (1) WO2021063015A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114429341A (en) * 2022-01-24 2022-05-03 吉林银行股份有限公司 Grouped payment method, device and equipment

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738473B (en) * 2019-09-30 2021-09-10 支付宝(杭州)信息技术有限公司 Wind control method, system, device and equipment
CN111383025B (en) * 2020-03-04 2022-09-02 支付宝(杭州)信息技术有限公司 Method and device for forwarding wind control data and electronic equipment
CN111311267B (en) * 2020-03-05 2022-06-21 支付宝(杭州)信息技术有限公司 Multi-account risk prevention and control method, system and equipment
CN111461730B (en) * 2020-03-31 2022-08-05 支付宝(杭州)信息技术有限公司 Wind control method, device and system and electronic equipment
CN112597533B (en) * 2020-12-10 2022-07-12 支付宝(杭州)信息技术有限公司 Risk prevention and control method, device and equipment based on privacy protection

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050049892A1 (en) * 2003-07-22 2005-03-03 Miller Charles J. System and method for supply chain collaborative risk management
US20160203489A1 (en) * 2015-01-14 2016-07-14 Alibaba Group Holding Limited Methods, systems, and apparatus for identifying risks in online transactions
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior
CN110046784A (en) * 2018-12-14 2019-07-23 阿里巴巴集团控股有限公司 A kind of risk of user's access determines method and device
CN110060047A (en) * 2019-03-28 2019-07-26 阿里巴巴集团控股有限公司 Credit risk method of discrimination and its device based on transaction
CN110738473A (en) * 2019-09-30 2020-01-31 支付宝(杭州)信息技术有限公司 Wind control method, system, device and equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2354372A1 (en) * 2001-02-23 2002-08-23 Efunds Corporation Electronic payment and authentication system with debit and identification data verification and electronic check capabilities
CN108074024B (en) * 2016-11-10 2022-04-08 蚂蚁蓉信(成都)网络科技有限公司 Trusted data transmission method, device and system
CN108492175A (en) * 2018-03-28 2018-09-04 深圳市元征科技股份有限公司 A kind of financial credit risk control method and server
CN108494799B (en) * 2018-04-18 2021-02-26 家园网络科技有限公司 Data sharing method and system
CN109191129A (en) * 2018-07-18 2019-01-11 阿里巴巴集团控股有限公司 A kind of air control method, system and computer equipment
CN110020786B (en) * 2019-03-11 2023-10-31 创新先进技术有限公司 Service processing and wind control identification method, device and equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050049892A1 (en) * 2003-07-22 2005-03-03 Miller Charles J. System and method for supply chain collaborative risk management
US20160203489A1 (en) * 2015-01-14 2016-07-14 Alibaba Group Holding Limited Methods, systems, and apparatus for identifying risks in online transactions
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior
CN110046784A (en) * 2018-12-14 2019-07-23 阿里巴巴集团控股有限公司 A kind of risk of user's access determines method and device
CN110060047A (en) * 2019-03-28 2019-07-26 阿里巴巴集团控股有限公司 Credit risk method of discrimination and its device based on transaction
CN110738473A (en) * 2019-09-30 2020-01-31 支付宝(杭州)信息技术有限公司 Wind control method, system, device and equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114429341A (en) * 2022-01-24 2022-05-03 吉林银行股份有限公司 Grouped payment method, device and equipment
CN114429341B (en) * 2022-01-24 2022-12-02 吉林银行股份有限公司 Grouped payment method, device and equipment

Also Published As

Publication number Publication date
CN110738473B (en) 2021-09-10
CN110738473A (en) 2020-01-31

Similar Documents

Publication Publication Date Title
WO2021063015A1 (en) Risk control method, system, device, and equipment
US11159501B2 (en) Device identification scoring
US11113412B2 (en) System and method for monitoring and verifying software behavior
CN109716707B (en) Server apparatus and method for distributed electronic recording and transaction history
US8387119B2 (en) Secure application network
WO2020063176A1 (en) Method and device for user identity authentication in network
JP5147336B2 (en) Method, system, and program for authenticating a user attempting to perform an electronic service request
CN108804906B (en) System and method for application login
US11481838B1 (en) Secure data exchange
US20120159590A1 (en) Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques
US11240220B2 (en) Systems and methods for user authentication based on multiple devices
US20160149936A1 (en) Method and system for detecting threats using passive cluster mapping
CN108965250B (en) Digital certificate installation method and system
US20150040193A1 (en) Physical Interaction Style Based User Authentication for Mobile Computing Devices
US11126746B2 (en) Dynamic security controls for data sharing between systems
US20220164789A1 (en) Location based wallets
US10733609B2 (en) Dynamically generated payment token ratings
TW202022669A (en) Method, device and electronic equipment for preventing misuse of identity data
US20170083906A1 (en) Token assurance level based transaction processing
CN111523893A (en) Service request processing method, device, equipment and medium
US20180260542A1 (en) System And Method For Assessment Of Risk
WO2020082833A1 (en) Transfer method and apparatus, and device
US10776787B2 (en) Systems and methods for providing notification services using a digital wallet platform
US20190095920A1 (en) System and method for enforcing granular privacy controls during transaction fraud screening by a third party
US20240129309A1 (en) Distributed device trust determination

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20871555

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20871555

Country of ref document: EP

Kind code of ref document: A1