WO2021223675A1 - 风险检测 - Google Patents

风险检测 Download PDF

Info

Publication number
WO2021223675A1
WO2021223675A1 PCT/CN2021/091433 CN2021091433W WO2021223675A1 WO 2021223675 A1 WO2021223675 A1 WO 2021223675A1 CN 2021091433 W CN2021091433 W CN 2021091433W WO 2021223675 A1 WO2021223675 A1 WO 2021223675A1
Authority
WO
WIPO (PCT)
Prior art keywords
page
service provider
input
information
preset
Prior art date
Application number
PCT/CN2021/091433
Other languages
English (en)
French (fr)
Inventor
姚鑫
陈理
李洋涛
唐爽
鲁珊珊
王亚敏
盛晓文
张瑶顺
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2021223675A1 publication Critical patent/WO2021223675A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Definitions

  • This manual relates to the field of computer technology, especially risk detection.
  • the purpose of the embodiments of this specification is to provide a risk detection method, device, and equipment to provide a solution to accurately determine the credibility of the merchant, so as to avoid the user's economic loss and privacy leakage.
  • an embodiment of the present specification provides a risk detection method, the method includes: determining the target user's inspection information for the service provider based on the first input of the service provider's inspection information on the preset service page Patrol page for the second patrol information; jump from the preset service page to the patrol page, and receive the target user’s second patrol page for the second patrol information on the patrol page Input; based on the first input and the second input, determine the credibility of the service provider, so as to determine whether the service provider has a predetermined risk based on the credibility.
  • an embodiment of this specification provides a risk detection device, the device includes: a page determination module, configured to determine the target user’s first input of inspection information for the service provider on the preset service page The inspection page of the second inspection information of the service provider; the input receiving module is used to jump from the preset service page to the inspection page, and receive the target user's inspection page The second input for the second inspection information; a risk determination module, configured to determine the credibility of the service provider based on the first input and the second input, so as to determine the credibility of the service provider based on the credibility To determine whether the service provider has a predetermined risk.
  • an embodiment of this specification provides a risk detection device, the risk detection device comprising: a processor; and a memory arranged to store computer-executable instructions, which when executed, cause the Processor: According to the target user’s first input on the service provider’s patrol information on the preset service page, determine the patrol page for the second patrol information of the service provider; jump from the preset service page Go to the inspection page, and receive the second input of the target user on the second inspection information on the inspection page; determine the service based on the first input and the second input
  • the credibility of the provider is used to determine whether the service provider has a predetermined risk based on the credibility.
  • Figure 1 is a flowchart of an embodiment of a risk detection method in this specification
  • Figure 2 is a schematic diagram of a preset service page
  • Figure 3 is a schematic diagram of a patrol page in this manual
  • FIG. 4 is a flowchart of another embodiment of a risk detection method in this specification.
  • Figures 5a and 5b are schematic diagrams of a preset guidance jump option in this specification.
  • Fig. 6 is a schematic structural diagram of another embodiment of a risk detection device in this specification.
  • Figure 7 is a schematic diagram of the structure of a risk detection device in this specification.
  • the embodiments of this specification provide a risk detection method, device and equipment.
  • the execution subject of the method can be a terminal device or a server, where the terminal device can be a device such as a personal computer, or a mobile phone, a tablet computer, etc.
  • the server can be an independent server or a server cluster composed of multiple servers.
  • the method may specifically include the following steps:
  • the inspection page for the second inspection information of the service provider is determined.
  • the target user can be a user who uses a predetermined service provided by the service provider or purchases a predetermined product provided by the service provider and needs to pay a certain fee to the service provider.
  • the preset service page can be the target user pays the service provider to the service provider.
  • the inspection information may include the information used to obtain the actual operating conditions of the service provider.
  • the inspection information may include the preset yes/non-choice questions regarding the actual operating conditions of the service provider.
  • the first input may be the feedback information of the target user for the inspection information.
  • the inspection information includes the preset non-choice questions about the real business situation of the service provider
  • the first input of the target user may be for the preset Whether to select multiple-choice questions (ie, "Yes” or "No")
  • the second inspection information can also be used to obtain information about the true business conditions of the service provider, and it can be different from the inspection information, for example .
  • the inspection information may include the preset non-choice questions for the true business situation of the service provider, and the second inspection information may include the preset fill-in questions for obtaining the true business situation of the service provider.
  • the embodiments of the present specification provide a technical solution that can solve the above-mentioned problems. For details, refer to the following content.
  • the service provider may be a merchant user registered in a predetermined third-party payment application, and the third-party payment application can provide a scan for the service provider.
  • Code collection services that is, third-party payment applications can provide service providers with QR codes for collection, or provide service providers with the permission to scan code collections.
  • the target user can also be a registered user in the third-party payment application.
  • the third-party payment application can provide the target user with a QR code scanning payment service, that is, the third-party payment application can provide the target user with a payment QR code, or for the target user The user provides the service of scanning code payment.
  • the target user purchases any commodity provided by the service provider (or uses any service provided by the service provider), he can use the third-party payment application installed on the terminal device to check the payment QR code provided by the service provider Perform a scan code payment operation, or show the target user’s payment QR code for the service provider to scan the code payment operation to make payment to the service provider.
  • the inspection information may be displayed in a predetermined area of the payment completion page (ie, the preset service page), where the inspection information may include multiple-choice questions for the actual business situation of the service provider. For example, as shown in Figure 2, in the lower area of the payment completion page, you can display "Is this a travel and accommodation business", and display the options of the multiple-choice question, namely "Yes” and "No", and accept The target user's selection operation in these two options (ie, the first input).
  • the corresponding patrol page and the second patrol information included in the patrol page can be determined according to the first input. For example, suppose the inspection information includes "Is this a business that operates travel accommodation?" and the first input of the target user is the selection operation on the option "No", then the corresponding second inspection information can be for Verification information of the real information of the service provider.
  • the secondary inspection information in the inspection page may include a picture obtaining question for obtaining the service provider location of the service provider.
  • the corresponding secondary inspection information may be acquired information for the business situation of the service provider.
  • the secondary inspection information in the inspection page may include information filling-in-the-blank questions for obtaining the operating quality of the service provider.
  • the above-mentioned inspection page and the method for determining the secondary inspection information contained in it is an optional and achievable method of determination.
  • the inspection page is determined according to the first input, it is possible to jump from the preset service page to the inspection page. That is, when the terminal device receives the first input of the target user, it can jump from the preset service page to the inspection page.
  • the determined secondary inspection information can be displayed on the inspection page, and the second input of the target user for the secondary inspection information can be received.
  • the second inspection information may include image acquisition questions used to obtain the service provider’s service provider’s location, and blank questions used to obtain information about the service provider’s business conditions.
  • the corresponding second input may include information provided by the target user.
  • the feedback information (such as text or voice response, etc.) on the information fill-in-the-blank questions, and the image of the service provider’s service provision scene taken and uploaded by the target user.
  • the credibility of the service provider is determined, so as to determine whether the service provider has a predetermined risk based on the credibility.
  • the inspection information includes multiple-choice questions for the real operating conditions of the service provider
  • the secondary inspection information includes multiple information fill-in questions for obtaining the operating quality of the service provider.
  • Different options of multiple choice questions can be preset with different credibility scores, and the corresponding first credibility can be determined according to the first input of the target user.
  • fill in the blank questions for different information, preset different score weights, and then, and according to the second input of the target user, determine the credibility sub-score corresponding to each information blank question, and then sub-score according to the credibility Value to determine the corresponding second credibility.
  • the credibility of the service provider is determined according to the first credibility and the second credibility.
  • the second inspection information can include 2 information filling-in-the-blank questions.
  • the two information filling-in-the-blank questions can be "Which type of business do you think this business is” and "What credibility issues do you think this business has?" .
  • the above-mentioned method for determining the credibility of the service provider is an optional and achievable method for determining.
  • the credibility thresholds corresponding to different predetermined risks can be determined according to the security requirements of different scenarios, and the credibility thresholds of the predetermined risks and the credibility of the service provider can be used to determine whether the service provider There is this predetermined risk.
  • the embodiment of this specification provides a risk detection method, which determines the inspection page for the second inspection information of the service provider according to the first input of the target user on the preset service page for the inspection information of the service provider.
  • the default service page jumps to the inspection page, and receives the second input of the target user’s second inspection information on the inspection page.
  • the credibility of the service provider is determined to be based on Credibility, to determine whether the service provider has a predetermined risk.
  • the credibility of the service provider can be comprehensively determined based on the user's first input for the inspection information and the second input for the second inspection information, and then the service provider can be determined according to the credibility of the service provider Whether there is a predetermined risk to avoid problems such as economic loss and privacy leakage to users.
  • the execution subject of the method can be a terminal device or a server.
  • the terminal device can be a device such as a personal computer or a mobile phone, a tablet computer, etc.
  • the server can be an independent server or a server cluster composed of multiple servers.
  • the method may specifically include the following steps:
  • the preset service page may be a resource transfer completion page for the target user to transfer resources to the service provider.
  • the preset service page may be a scan service provider provided by the target user through a third-party payment application installed in the terminal device. The payment success page after receiving the QR code for payment.
  • the target guidance strategy corresponding to the user information of the target user, the predetermined information of the service provider, and the first input is determined.
  • the user information of the target user may include the age, gender, occupation of the target user, and the historical cumulative credit of the target user in the third-party payment application.
  • the predetermined information of the service provider may be the type of business of the service provider (such as travel Accommodation merchants, catering service merchants, etc.), service provider’s operating years, service provider’s accumulated historical credit in third-party payment applications, service provider’s registered capital and registration duration, etc.
  • the inspection information includes "Is this a travel and accommodation business?"
  • it can be based on the historical cumulative credit in the user information of the target user, the registration time in the service provider's reservation information, and the target user
  • the corresponding target guidance strategy is determined according to the preset correspondence between the information and the strategy.
  • the preset correspondence between part of the information and the strategy can be shown in Table 1 below.
  • the target guidance strategy corresponding to the user information of the target user, the predetermined information of the service provider, and the first input can be determined.
  • the preset correspondence between the above information and the strategy is an optional correspondence. In actual application scenarios, there may also be a variety of different preset correspondences between information and strategies, which can be selected according to the actual application scenarios.
  • the preset correspondence between different information and strategies is not specifically limited in the embodiment of this specification.
  • the patrol page and the second patrol information contained in the patrol page are determined.
  • the inspection pages corresponding to different target guidance strategies and the secondary inspection information contained therein are different.
  • the specific inspection pages and the method for determining the secondary inspection information contained in them can be determined according to the actual application scenarios. There are differences, and this specification does not specifically limit it.
  • the preset guide jump option is displayed on the preset service page.
  • the preset guidance jump option may be displayed on the preset service page, and the target user's selection operation on the preset guidance jump option may be received.
  • preset incentive information (such as cash incentives, etc.) can be displayed to increase the probability of the target user making a selection operation on the preset guidance jump options. For example, as shown in FIG. 5a and FIG. 5b, in FIG. 5a, the inspection information is displayed in the preset display area of the payment success page (ie, the preset service page), and the user's first input for the inspection information is received.
  • the preset guidance jump option can be displayed in the preset display area, and the cash incentive label can be displayed at the same time to encourage the target user to be on the preset jump option Make a selection operation.
  • the preset service provider when it registers with the third-party payment application, it can provide the first image of the service provider location of the preset service provider, and the third-party payment application can store the first image, the terminal device or the server The first image can be obtained from a database of a third-party payment application.
  • the secondary inspection information on the inspection page may include the image acquisition questions used to obtain the service provider’s service provider’s location, and the terminal device or server may receive images taken by the target user about the service provider’s service provider’s location. , That is, the second image can be obtained based on the second input of the target user.
  • the image matching degree between the first image and the second image is obtained, and based on the image matching degree and the first input, the credibility of the service provider is determined, so as to determine whether the service provider has a predetermined risk based on the credibility .
  • the image matching degree between the first image and the second image may be obtained based on a preset image matching degree algorithm. Then, the second credibility can be determined according to the preset correspondence between the matching degree and the credibility score, and the first credibility corresponding to the first input can be obtained. Finally, according to the first credibility and the second credibility Reliability, which determines the credibility of the service provider.
  • the preset correspondence between the information and the strategy can be adjusted based on the second input.
  • the preset correspondence between information and strategy may be the preset correspondence between information and strategy in Table 1 in S404. It is assumed that the second image obtained according to the second input and the stored service provision scenario of the relevant service provider If the image matching degree of the first image is lower than the preset matching degree threshold, the preset correspondence between the information in Table 1 and the strategy is adjusted to the preset correspondence between the information and the strategy shown in Table 2 above.
  • the adjustment method of the preset correspondence between the above information and the strategy is an optional and achievable determination method.
  • the preset alarm information and related information of the service provider are sent to the predetermined merchant management platform, so that the predetermined merchant management platform can handle the service provider .
  • the predetermined merchant management platform can be the management platform where the third-party payment application that the service provider resides in is located, and the predetermined merchant management platform can process service providers with predetermined risks to avoid user privacy leakage and economic Loss and other issues.
  • the embodiment of this specification provides a risk detection method, which determines the inspection page for the second inspection information of the service provider according to the first input of the target user on the preset service page for the inspection information of the service provider.
  • the default service page jumps to the inspection page, and receives the second input of the target user’s second inspection information on the inspection page.
  • the credibility of the service provider is determined to be based on Credibility, to determine whether the service provider has a predetermined risk.
  • the credibility of the service provider can be comprehensively determined based on the user's first input for the inspection information and the second input for the second inspection information, and then the service provider can be determined according to the credibility of the service provider Whether there is a predetermined risk to avoid problems such as economic loss and privacy leakage to users.
  • the embodiment of this specification also provides a risk detection device, as shown in FIG. 6.
  • the risk detection device includes: a page determination module 601, an input receiving module 602, and a risk determination module 603.
  • the page determination module 601 is configured to determine the inspection page for the second inspection information of the service provider according to the first input of the target user's inspection information for the service provider on the preset service page; Module 602, configured to jump from the preset service page to the inspection page, and receive the second input of the target user for the second inspection information on the inspection page; risk determination module 603 , For determining the credibility of the service provider based on the first input and the second input, so as to determine whether the service provider has a predetermined risk according to the credibility.
  • the preset service page is a resource transfer completion page for the target user to transfer resources to the service provider.
  • the input receiving module 602 is configured to: display a preset guide jump option on the preset service page; after receiving the target user's selection on the preset guide jump option During operation, jump from the preset service page to the inspection page, and receive the second input of the second inspection information from the target user on the inspection page.
  • the page determination module 601 is configured to: obtain user information of the target user and predetermined information of the service provider; The user information of the service provider, the predetermined information of the service provider, and the target guidance strategy corresponding to the first input; based on the target guidance strategy, the inspection page and the second inspection page contained in the inspection page are determined information.
  • the device further includes: a relationship adjustment module, configured to adjust the preset correspondence between the information and the strategy based on the second input of the target user.
  • the device further includes: an alarm module, which is configured to send preset alarm information and all information to a predetermined merchant management platform when it is determined that the service provider has a predetermined risk according to the credibility.
  • an alarm module which is configured to send preset alarm information and all information to a predetermined merchant management platform when it is determined that the service provider has a predetermined risk according to the credibility. The relevant information of the service provider, so that the predetermined merchant management platform can process the service provider.
  • the risk determination module 603 is configured to: obtain a pre-stored first image corresponding to the preset service provider; based on the second input, obtain a second image provided by the target user Image; acquiring the image matching degree of the first image and the second image, and determining the credibility of the service provider based on the image matching degree and the first input.
  • the embodiment of this specification provides a risk detection device, which determines the inspection page for the second inspection information of the service provider according to the first input of the target user on the preset service page for the inspection information of the service provider.
  • the default service page jumps to the inspection page, and receives the second input of the target user’s second inspection information on the inspection page.
  • the credibility of the service provider is determined to be based on Credibility, to determine whether the service provider has a predetermined risk.
  • the credibility of the service provider can be comprehensively determined based on the user's first input for the inspection information and the second input for the second inspection information, and then the service provider can be determined according to the credibility of the service provider Whether there is a predetermined risk to avoid problems such as economic loss and privacy leakage to users.
  • the embodiment of this specification also provides a risk detection device, as shown in FIG. 7.
  • the risk detection device may be the terminal device or server provided in the foregoing embodiment.
  • the risk detection equipment may have relatively large differences due to different configurations or performances, and may include one or more processors 701 and a memory 702, and the memory 702 may store one or more storage applications or data. Among them, the memory 702 may be short-term storage or persistent storage.
  • the application program stored in the memory 702 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions for the risk detection device.
  • the processor 701 may be configured to communicate with the memory 702, and execute a series of computer-executable instructions in the memory 702 on the risk detection device.
  • the risk detection device may also include one or more power supplies 703, one or more wired or wireless network interfaces 704, one or more input and output interfaces 705, and one or more keyboards 706.
  • the risk detection device includes a memory and one or more programs.
  • one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions in the risk detection equipment, and is configured to be configured by
  • the execution of the one or more programs by one or more processors includes computer-executable instructions for performing the following computer-executable instructions: according to the first input of the target user's inspection information for the service provider on the preset service page, determine that the service is provided Inspection page of the second inspection information of the party; jump from the preset service page to the inspection page, and receive the second inspection information of the target user on the inspection page Two inputs; based on the first input and the second input, determine the credibility of the service provider, so as to determine whether the service provider has a predetermined risk based on the credibility.
  • the preset service page is a resource transfer completion page for the target user to transfer resources to the service provider.
  • the jumping from the preset service page to the inspection page and receiving the second input of the target user on the second inspection information on the inspection page includes:
  • the preset service page displays preset guidance jump options; upon receiving the target user's selection operation on the preset guidance jump options, jump from the preset service page to the patrol Page, and receiving a second input of the target user for the secondary inspection information on the inspection page.
  • the determining the inspection page of the second inspection information for the service provider according to the first input of the target user on the preset service page for the inspection information of the service provider includes: acquiring the The user information of the target user and the predetermined information of the service provider; based on the preset correspondence between the information and the strategy, the user information of the target user, the predetermined information of the service provider, and the first input are determined Corresponding target guidance strategy; based on the target guidance strategy, the patrol page and the second patrol information contained in the patrol page are determined.
  • the method further includes: comparing the information with the target user based on the second input of the target user. The preset corresponding relationship of the strategy is adjusted.
  • the method further includes: determining that the service provider has a reservation based on the credibility In the case of risk, the preset alarm information and related information of the service provider are sent to the predetermined merchant management platform, so that the predetermined merchant management platform can process the service provider.
  • the determining the credibility of the service provider based on the first input and the second input includes: obtaining a pre-stored first image corresponding to the preset service provider; Based on the second input, obtain a second image provided by the target user; obtain an image matching degree between the first image and the second image, and determine based on the image matching degree and the first input The credibility of the service provider.
  • the embodiment of this specification provides a risk detection device, which determines the inspection page for the second inspection information of the service provider according to the first input of the target user on the preset service page for the inspection information of the service provider.
  • the default service page jumps to the inspection page, and receives the second input of the target user’s second inspection information on the inspection page.
  • the credibility of the service provider is determined to be based on Credibility, to determine whether the service provider has a predetermined risk.
  • the credibility of the service provider can be comprehensively determined based on the user's first input for the inspection information and the second input for the second inspection information, and then the service provider can be determined according to the credibility of the service provider Whether there is a predetermined risk to avoid problems such as economic loss and privacy leakage to users.
  • the embodiment of this specification also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, each process of the above-mentioned risk detection method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here.
  • the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
  • the embodiment of this specification provides a computer-readable storage medium, which determines the inspection page for the second inspection information of the service provider according to the first input of the target user on the preset service page for the inspection information of the service provider , Jump from the preset service page to the inspection page, and receive the second input of the second inspection information from the target user on the inspection page, and determine the credibility of the service provider based on the first input and the second input, In order to determine whether the service provider has a predetermined risk based on the credibility.
  • the credibility of the service provider can be comprehensively determined based on the user's first input for the inspection information and the second input for the second inspection information, and then the service provider can be determined according to the credibility of the service provider Whether there is a predetermined risk to avoid problems such as economic loss and privacy leakage to users.
  • a Programmable Logic Device (such as a Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic function is determined by the user's programming of the device.
  • HDL Hardware Description Language
  • the controller can be implemented in any suitable manner.
  • the controller can take the form of, for example, a microprocessor or a processor and a computer-readable medium storing computer-readable program codes (such as software or firmware) executable by the (micro)processor. , Logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the memory control logic.
  • controllers in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to program the method steps to make the controller use logic gates, switches, application specific integrated circuits, programmable logic controllers, and embedded logic.
  • the same function can be realized in the form of a microcontroller or the like. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for realizing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • embodiments of this specification can be provided as a method, a system, or a computer program product. Therefore, one or more embodiments of this specification may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may adopt computer programs implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes. The form of the product.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • one or more embodiments of this specification can be provided as a method, a system or a computer program product. Therefore, one or more embodiments of this specification may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may adopt computer programs implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes. The form of the product.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • One or more embodiments of this specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • One or more embodiments of this specification can also be practiced in distributed computing environments. In these distributed computing environments, tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules can be located in local and remote computer storage media including storage devices.

Abstract

一种风险检测方法、装置及设备,所述方法包括:根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。

Description

风险检测 技术领域
本说明书涉及计算机技术领域,尤其涉及风险检测。
背景技术
随着计算机技术的不断发展,线下扫码支付的方式逐渐成为人们的主流支付方式,但随着入驻第三方支付应用的商家数量的激增,如何对入驻的商家进行可信度的检测,以避免造成用户的财产损失、隐私泄露等问题,成为一个焦点问题。
目前,可以通过问卷巡检的模式,对入驻第三方支付应用的商家进行巡检。例如,当用户使用第三方支付应用,通过线下扫码支付的方式向商家进行支付后,可以在支付完成页面显示简单的是非题,然后根据用户的回答,确定商家的可信度。但是,由于支付完成页面的容量限制,所以,只能在支付完成页面渲染简单的是非题,而简单的是非题不足以准确的确定商家的特征信息,即不能准确的确定商家的可信度,因此,需要一种准确的确定商家的可信度,以避免造成用户的经济损失及隐私泄露等问题的解决方案。
发明内容
本说明书实施例的目的是提供一种风险检测方法、装置及设备,以提供一种准确的确定商家的可信度,以避免造成用户的经济损失及隐私泄露等问题的解决方案。
为了实现上述技术方案,本说明书实施例是这样实现的:
第一方面,本说明书实施例提供的一种风险检测方法,所述方法包括:在根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
第二方面,本说明书实施例提供了一种风险检测装置,所述装置包括:页面确定模块,用于根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;输入接收模块,用于从所述预设服务页 面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;风险确定模块,用于基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
第三方面,本说明书实施例提供了一种风险检测设备,所述风险检测设备包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
附图说明
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本说明书一种风险检测方法实施例的流程图;
图2为一种预设服务页面的示意图;
图3为本说明书一种巡检页面的示意图;
图4为本说明书又一种风险检测方法实施例的流程图;
图5a和图5b为本说明书一种预设引导跳转选项的示意图;
图6为本说明书又一种风险检测装置实施例的结构示意图;
图7为本说明书一种风险检测设备的结构示意图。
具体实施方式
本说明书实施例提供一种风险检测方法、装置及设备。
为了使本技术领域的人员更好地理解本说明书中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描 述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书保护的范围。
实施例一
如图1所示,本说明书实施例提供一种风险检测方法,该方法的执行主体可以为终端设备或服务器,其中,该终端设备可以如个人计算机等设备,也可以如手机、平板电脑等移动终端设备,该服务器可以是独立的服务器,也可以是由多个服务器组成的服务器集群。该方法具体可以包括以下步骤:
在S102中,根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对服务提供方的二次巡检信息的巡检页面。
其中,目标用户可以是使用服务提供方提供的预定服务或购买服务提供方提供的预定商品,且需要向服务提供方支付一定费用的用户,预设服务页面可以是目标用户向服务提供方支付费用的页面或费用支付完成的页面等,巡检信息可以包括用于获取针对服务提供方的真实经营情况的信息,例如,巡检信息可以包括针对服务提供方的真实经营情况的预设是非选择题,第一输入可以是目标用户针对巡检信息的反馈信息,例如,假设巡检信息包括对服务提供方的真实经营情况的预设是非选择题,则目标用户的第一输入可以是针对预设是否选择题的选项(即“是”或“否”)的选择操作,二次巡检信息也可以是用于获取服务提供方的真实经营情况的信息,且可以与巡检信息不同的,例如,巡检信息可以包括针对服务提供方的真实经营情况的预设是非选择题,则二次巡检信息可以包括用于获取服务提供方的真实经营情况的预设填空题。
在实施中,随着计算机技术的不断发展,线下扫码支付的方式逐渐成为人们的主流支付方式,但随着入驻第三方支付应用的商家数量的激增,如何对入驻的商家进行可信度的检测,以避免造成用户的财产损失、隐私泄露等问题,成为一个焦点问题。目前,可以通过问卷巡检的模式,对入驻第三方支付应用的商家进行巡检。例如,当用户使用第三方支付应用,通过线下扫码支付的方式向商家进行支付后,可以在支付完成页面显示简单的是非题,然后根据用户的回答,确定商家的可信度。但是,由于支付完成页面的容量限制,所以,只能在支付完成页面渲染简单的是非题,而简单的是非题不足以准确的确定商家的特征信息,即不能准确的确定商家的可信度,另外,用户在支付完成页面针对是否题的答题率较低,所以,根据支付完成页面用户的答题情况,确定的商家可信度的准确性差,因此,需要一种准确的确定商家的可信度,以避免造成用户的经济损 失及隐私泄露等问题的解决方案。为此,本说明书实施例提供一种可以解决上述问题的技术方案,具体可以参见下述内容。
以服务提供方为线下实体商家,预设服务页面为扫码支付完成页面为例,服务提供方可是在预定第三方支付应用中注册的商家用户,第三方支付应用可为服务提供方提供扫码收款的服务,即第三方支付应用可为服务提供方提供收款二维码,或为服务提供商提供扫码收款的权限。同样的,目标用户也可是该第三方支付应用中的注册用户,第三方支付应用可以为目标用户提供扫码付款的服务,即第三方支付应用可为目标用户提供付款二维码,或为目标用户提供扫码支付的服务。这样,目标用户在购买服务提供方提供的任意商品(或使用服务提供方提供的任意服务)后,可通过终端设备上安装的该第三方支付应用,对服务提供方提供的收款二维码进行扫码支付操作,或出示目标用户的付款二维码以供服务提供商进行扫码收款操作,以向该服务提供方进行支付。
在支付完成后,可以在支付完成页面(即预设服务页面)的预定区域显示巡检信息,其中,巡检信息可以包括针对服务提供方的真实经营情况的选择题。例如,如图2所示,在支付完成页面的下方区域,可以显示“请问这是一家经营旅行住宿的商家吗”,并显示该选择题的选项,即“是”和“否”,并接收目标用户在这两个选择项中的选择操作(即第一输入)。
在接收到目标用户的第一输入的情况下,可以根据第一输入,确定对应的巡检页面及巡检页面中包括的二次巡检信息。例如,假设巡检信息包括“请问这是一家经营旅行住宿的商家吗”,目标用户的第一输入为在“否”这一选项上的选择操作,则对应的二次巡检信息可以是针对服务提供方的真实信息的核对信息。例如,如图3所示,巡检页面内的二次巡检信息可以包括用于获取服务提供方的服务提供场所的图片获取题。另外,如果目标用户的第一输入为在“是”这一选项上的选择操作,则对应的二次巡检信息可以是针对服务提供方的经营情况的获取信息。例如,巡检页面内的二次巡检信息可以包括用于获取服务提供方的经营质量的信息填空题等。
上述巡检页面及其包含的二次巡检信息的确定方法是一种可选地、可实现的确定方法,在实际应用场景中,还可以有多种不同的确定方法,可以根据实际应用场景的不同而有所不同,本说明书实施例对此不做具体限定。
在S104中,从预设服务页面跳转到巡检页面,并接收目标用户在巡检页面针对二次巡检信息的第二输入。
在实施中,在根据第一输入确定了巡检页面的情况下,可以从预设服务页面跳转到巡检页面。即终端设备在接收到目标用户的第一输入的情况下,可以从预设服务页面跳转到巡检页面。
在巡检页面可以显示确定的二次巡检信息,并可以接收目标用户针对二次巡检信息的第二输入。例如,二次巡检信息可以包括用于获取服务提供方的服务提供场所的图像获取题,以及用于获取服务提供方的经营情况的信息填空题,则对应的第二输入可以包括目标用户提供的对信息填空题的反馈信息(如文字或语音回复等),以及目标用户拍摄并上传的服务提供方的服务提供场景的图像。
在S106中,基于第一输入和第二输入,确定服务提供方的可信度,以根据可信度,确定服务提供方是否存在预定风险。
在实施中,例如,假设巡检信息包括针对服务提供方的真实经营情况的选择题,二次巡检信息包括用于获取服务提供方的经营质量的多个信息填空题。可以为选择题的不同选项,预设不同的可信度分值,根据目标用户的第一输入,确定对应的第一可信度。并为不同的信息填空题,预设不同的分值权重,然后,并=根据目标用户的第二输入,确定每个信息填空题对应的可信度子分值,然后根据可信度子分值,确定对应的第二可信度。最后,根据第一可信度和第二可信度,确定服务提供方的可信度。
例如,巡检信息为“请问这是一家经营旅行住宿的商家吗”,目标用户的第一输入为针对“否”这一选项的选择操作,则对应的第一可信度可以为-1。二次巡检信息可以包括2个信息填空题,这2个信息填空题可以分别为“请问您觉得该商家是哪一类的商家”,以及“请问您觉得该商家存在哪些可信度问题”。可以获取目标用户对这2个信息填空题的反馈信息,并对每道题的反馈信息进行语义分析,以确定对应的第二可信度(假设根据目标用户的第二输入,确定对应的第二可信度为10),则该服务提供方的可信度可以为-1+10=9。
上述服务提供方的可信度的确定方法是一种可选地、可实现的确定方法,在实际应用场景中,还可以有多种不同的确定方法,可以根据实际应用场景的不同而有所不同,本说明书实施例对此不做具体限定。
在实际应用场景中,可以根据不同场景的安全性需求,确定不同的预定风险对应的可信度阈值,并根据预定风险的可信度阈值以及服务提供方的可信度,确定服务提供方是否存在该预定风险。
在实际应用场景中,根据服务提供方的可信度,确定该服务提供方是否存在预定风险的方法可以有多种多样,可以根据实际应用场景的不同而有所不同,本说明书实施例对此不做具体限定。
本说明书实施例提供一种风险检测方法,通过根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对服务提供方的二次巡检信息的巡检页面,从预设服务页面跳转到巡检页面,并接收目标用户在巡检页面针对二次巡检信息的第二输入,基于第一输入和第二输入,确定服务提供方的可信度,以根据可信度,确定服务提供方是否存在预定风险。这样,可以根据用户针对巡检信息的第一输入和针对二次巡检信息的第二输入,综合确定服务提供方的可信度,然后根据服务提供方的可信度,确定该服务提供方是否存在预定风险,以避免造成用户的经济损失及隐私泄露等问题。
实施例二
如图4所示,本说明书实施例提供一种风险检测方法,该方法的执行主体可以为终端设备或服务器,其中,该终端设备可以如个人计算机等设备,也可以如手机、平板电脑等移动终端设备,该服务器可以是独立的服务器,也可以是由多个服务器组成的服务器集群。该方法具体可以包括以下步骤:
在S402中,获取目标用户的用户信息以及服务提供方的预定信息。
其中,预设服务页面可以为目标用户向服务提供方进行资源转移的资源转移完成页面,例如,预设服务页面可以是目标用户通过终端设备中安装的第三方支付应用,扫描服务提供方提供的收款二维码进行支付后的支付成功页面。
在S404中,基于信息与策略的预设对应关系,确定与目标用户的用户信息、服务提供方的预定信息以及第一输入相对应的目标引导策略。
其中,目标用户的用户信息可以包括目标用户的年龄、性别、职业以及目标用户在第三方支付应用中的历史累计信用等信息,服务提供方的预定信息可以是服务提供方的商家类型(如旅行住宿商家、餐饮服务商家等)、服务提供方的经营年限、服务提供方在第三方支付应用中的历史累计信用、服务提供方的注册资本和注册时长等信息。
在实施中,假设巡检信息包括“请问这是一家经营旅行住宿的商家吗”,则可以基于目标用户的用户信息中的历史累计信用度、服务提供方的预定信息中的注册时长,以及目标用户针对上述巡检信息的第一输入,根据信息与策略的预设对应关系,确定对应的目标引导策略,其中,部分信息与策略的预设对应关系可以如下表1所示。
表1
Figure PCTCN2021091433-appb-000001
根据表1中的信息与策略的预设对应关系,可以确定与目标用户的用户信息、服务提供方的预定信息以及第一输入相对应的目标引导策略。
上述信息与策略的预设对应关系是一种可选地的对应关系,在实际应用场景中,还可以有多种不同的信息与策略的预设对应关系,可以根据实际应用场景的不同,选择不同的信息与策略的预设对应关系,本说明书实施例对此不作具体限定。
在S406中,基于目标引导策略,确定巡检页面以及巡检页面包含的二次巡检信息。
在实施中,不同的目标引导策略对应的巡检页面及其包含的二次巡检信息不同,具体的巡检页面及其包含的二次巡检信息的确定方法可以根据实际应用场景的不同而有所不同,本说明书对此不作具体限定。
在S408中,在预设服务页面显示预设引导跳转选项。
在S410中,在接收到目标用户在预设引导跳转选项上的选择操作时,从预设服务页面跳转到巡检页面,并接收目标用户在巡检页面针对二次巡检信息的第二输入。
在实施中,可以在预设服务页面显示预设引导跳转选项,并接收目标用户在预设引导跳转选项上的选择操作。此外,在显示预设引导跳转选项的同时,可以显示预设的激励信息(如现金激励等),以提高目标用户在预设引导跳转选项上进行选择操作的概率。例如,如图5a和图5b所示,在图5a中,在支付成功页面(即预设服务页面)的预设显示区域显示巡检信息,并接收用户针对巡检信息的第一输入。在接收到目标用户的第一输入后,如图5b所示,可以在预设显示区域显示预设引导跳转选项,并同时显示现金激励的标签,以激励目标用户在预设跳转选项上进行选择操作。
在S412中,获取预先存储的与预设服务提供方对应的第一图像。
在实施中,预设服务提供方在第三方支付应用进行注册时,可以提供有关预设服务提供方的服务提供场所的第一图像,第三方支付应用可以存储该第一图像,终端设备或服务器可以从第三方支付应用的数据库中,获取该第一图像。
在S414中,基于第二输入,获取目标用户提供的第二图像。
在实施中,巡检页面的二次巡检信息可以包括用于获取服务提供方的服务提供场所的图片获取题,终端设备或服务器可以接收目标用户拍摄的有关服务提供方的服务提供场所的图像,即可以基于目标用户的第二输入,获取第二图像。
在S416中,获取第一图像与第二图像的图像匹配度,并基于图像匹配度和第一输入,确定服务提供方的可信度,以根据可信度,确定服务提供方是否存在预定风险。
在实施中,可以基于预设图像匹配度算法,获取第一图像与第二图像的图像匹配度。然后可以根据预设的匹配度与可信分值的对应关系,确定第二可信度,并获取与第一输入对应的第一可信度,最后,根据第一可信度和第二可信度,确定服务提供方的可信度。
在S418中,基于目标用户的第二输入,对信息与策略的预设对应关系进行调整。
表2
Figure PCTCN2021091433-appb-000002
在实施中。在接收到目标用户的第二输入之后,可以基于第二输入,对信息与策略的预设对应关系进行调整。例如,信息与策略的预设对应关系可以为上述S404中的表1中的信息与策略的预设对应关系,假设根据第二输入获取的第二图像与存储的有关服务提供方的服务提供场景的第一图像的图像匹配度低于预设匹配度阈值,则将表1中的信息与策略的预设对应关系调整为上表2所示的信息与策略的预设对应关系。
当再次检测到另一目标用户在预设服务页面针对该服务提供方的巡检信息的第一输入的情况下,可以基于调整后有的信息与策略的预设对应关系,确定与该目标用户的用户信息、服务提供方的预定信息以及该目标用户的第一输入相对应的目标引导策略。
上述信息与策略的预设对应关系的调整方法是一种可选地、可实现的确定方法,在实际应用场景中,还可以有多种不同的确定方法,可以根据实际应用场景的不同确定不同的调整方法,本说明书对此不做具体限定。
在S420中,在根据可信度确定服务提供方存在预定风险的情况下,向预定商家管理平台发送预设报警信息以及服务提供方的相关信息,以使预定商家管理平台对服务提供方进行处理。
在实施中,预定商家管理平台可以为该服务提供方入驻的第三方支付应用所在的管理平台,预定商家管理平台可以对存在预定风险的服务提供方进行处理,以避免造成用户的隐私泄露以及经济损失等问题。
本说明书实施例提供一种风险检测方法,通过根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对服务提供方的二次巡检信息的巡检页面,从预设服务页面跳转到巡检页面,并接收目标用户在巡检页面针对二次巡检信息的第二输入,基于第一输入和第二输入,确定服务提供方的可信度,以根据可信度,确定服务提供方是否存在预定风险。这样,可以根据用户针对巡检信息的第一输入和针对二次巡检信息的第二输入,综合确定服务提供方的可信度,然后根据服务提供方的可信度,确定该服务提供方是否存在预定风险,以避免造成用户的经济损失及隐私泄露等问题。
实施例三
以上为本说明书实施例提供的风险检测方法,基于同样的思路,本说明书实施例还提供一种风险检测装置,如图6所示。
该风险检测装置包括:页面确定模块601、输入接收模块602和风险确定模块603。
其中,页面确定模块601,用于根据目标用户在预设服务页面针对服务提供方的巡 检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;输入接收模块602,用于从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;风险确定模块603,用于基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
本说明书实施例中,所述预设服务页面为所述目标用户向所述服务提供方进行资源转移的资源转移完成页面。
本说明书实施例中,所述输入接收模块602,用于:在所述预设服务页面显示预设引导跳转选项;在接收到所述目标用户在所述预设引导跳转选项上的选择操作时,从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入。
本说明书实施例中,所述页面确定模块601,用于:获取所述目标用户的用户信息以及所述服务提供方的预定信息;基于信息与策略的预设对应关系,确定与所述目标用户的用户信息、所述服务提供方的预定信息以及所述第一输入相对应的目标引导策略;基于所述目标引导策略,确定所述巡检页面以及所述巡检页面包含的二次巡检信息。
本说明书实施例中,所述装置,还包括:关系调整模块,用于基于所述目标用户的第二输入,对所述信息与策略的预设对应关系进行调整。
本说明书实施例中,所述装置,还包括:报警模块,用于在根据所述可信度确定所述服务提供方存在预定风险的情况下,向预定商家管理平台发送预设报警信息以及所述服务提供方的相关信息,以使所述预定商家管理平台对所述服务提供方进行处理。
本说明书实施例中,所述风险确定模块603,用于:获取预先存储的与所述预设服务提供方对应的第一图像;基于所述第二输入,获取所述目标用户提供的第二图像;获取所述第一图像与所述第二图像的图像匹配度,并基于所述图像匹配度和所述第一输入,确定所述服务提供方的可信度。
本说明书实施例提供一种风险检测装置,通过根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对服务提供方的二次巡检信息的巡检页面,从预设服务页面跳转到巡检页面,并接收目标用户在巡检页面针对二次巡检信息的第二输入,基于第一输入和第二输入,确定服务提供方的可信度,以根据可信度,确定服务提供方是否存在预定风险。这样,可以根据用户针对巡检信息的第一输入和针对二次巡检 信息的第二输入,综合确定服务提供方的可信度,然后根据服务提供方的可信度,确定该服务提供方是否存在预定风险,以避免造成用户的经济损失及隐私泄露等问题。
实施例四
基于同样的思路,本说明书实施例还提供一种风险检测设备,如图7所示。
所述风险检测设备可以为上述实施例提供的终端设备或服务器。
风险检测设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器701和存储器702,存储器702中可以存储有一个或一个以上存储应用程序或数据。其中,存储器702可以是短暂存储或持久存储。存储在存储器702的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对风险检测设备中的一系列计算机可执行指令。更进一步地,处理器701可以设置为与存储器702通信,在风险检测设备上执行存储器702中的一系列计算机可执行指令。风险检测设备还可以包括一个或一个以上电源703,一个或一个以上有线或无线网络接口704,一个或一个以上输入输出接口705,一个或一个以上键盘706。
在本实施例中,风险检测设备包括有存储器以及一个或一个以上的程序。其中,一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可包括对风险检测设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
可选地,所述预设服务页面为所述目标用户向所述服务提供方进行资源转移的资源转移完成页面。
可选地,所述从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入,包括:在所述预设服务页面显示预设引导跳转选项;在接收到所述目标用户在所述预设引导跳转选项上的选择操作时,从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入。
可选地,所述根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面,包括:获取所述目标用户的用户信息以及所述服务提供方的预定信息;基于信息与策略的预设对应关系,确定与所述目标用户的用户信息、所述服务提供方的预定信息以及所述第一输入相对应的目标引导策略;基于所述目标引导策略,确定所述巡检页面以及所述巡检页面包含的二次巡检信息。
可选地,在所述基于所述第一输入和所述第二输入,确定所述服务提供方的可信度之后,还包括:基于所述目标用户的第二输入,对所述信息与策略的预设对应关系进行调整。
可选地,在所述基于所述第一输入和所述第二输入,确定所述服务提供方的可信度之后,还包括:在根据所述可信度确定所述服务提供方存在预定风险的情况下,向预定商家管理平台发送预设报警信息以及所述服务提供方的相关信息,以使所述预定商家管理平台对所述服务提供方进行处理。
可选地,所述基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,包括:获取预先存储的与所述预设服务提供方对应的第一图像;基于所述第二输入,获取所述目标用户提供的第二图像;获取所述第一图像与所述第二图像的图像匹配度,并基于所述图像匹配度和所述第一输入,确定所述服务提供方的可信度。
本说明书实施例提供一种风险检测设备,通过根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对服务提供方的二次巡检信息的巡检页面,从预设服务页面跳转到巡检页面,并接收目标用户在巡检页面针对二次巡检信息的第二输入,基于第一输入和第二输入,确定服务提供方的可信度,以根据可信度,确定服务提供方是否存在预定风险。这样,可以根据用户针对巡检信息的第一输入和针对二次巡检信息的第二输入,综合确定服务提供方的可信度,然后根据服务提供方的可信度,确定该服务提供方是否存在预定风险,以避免造成用户的经济损失及隐私泄露等问题。
实施例五
本说明书实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述风险检测方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。
本说明书实施例提供一种计算机可读存储介质,通过根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对服务提供方的二次巡检信息的巡检页面,从预设服务页面跳转到巡检页面,并接收目标用户在巡检页面针对二次巡检信息的第二输入,基于第一输入和第二输入,确定服务提供方的可信度,以根据可信度,确定服务提供方是否存在预定风险。这样,可以根据用户针对巡检信息的第一输入和针对二次巡检信息的第二输入,综合确定服务提供方的可信度,然后根据服务提供方的可信度,确定该服务提供方是否存在预定风险,以避免造成用户的经济损失及隐私泄露等问题。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本说明书的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书的实施例是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例或结合软件 和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书一个或多个实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书一个或多个实施例,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本说明书的实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。

Claims (15)

  1. 一种风险检测方法,所述方法包括:
    根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;
    从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;
    基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
  2. 根据权利要求1所述的方法,所述预设服务页面为所述目标用户向所述服务提供方进行资源转移的资源转移完成页面。
  3. 根据权利要求2所述的方法,所述从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入,包括:
    在所述预设服务页面显示预设引导跳转选项;
    在接收到所述目标用户在所述预设引导跳转选项上的选择操作时,从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入。
  4. 根据权利要求3所述的方法,所述根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面,包括:
    获取所述目标用户的用户信息以及所述服务提供方的预定信息;
    基于信息与策略的预设对应关系,确定与所述目标用户的用户信息、所述服务提供方的预定信息以及所述第一输入相对应的目标引导策略;
    基于所述目标引导策略,确定所述巡检页面以及所述巡检页面包含的二次巡检信息。
  5. 根据权利要求4所述的方法,在所述基于所述第一输入和所述第二输入,确定所述服务提供方的可信度之后,还包括:
    基于所述目标用户的第二输入,对所述信息与策略的预设对应关系进行调整。
  6. 根据权利要求4所述的方法,在所述基于所述第一输入和所述第二输入,确定所述服务提供方的可信度之后,还包括:
    在根据所述可信度确定所述服务提供方存在预定风险的情况下,向预定商家管理平台发送预设报警信息以及所述服务提供方的相关信息,以使所述预定商家管理平台对所述服务提供方进行处理。
  7. 根据权利要求6所述的方法,所述基于所述第一输入和所述第二输入,确定所述服 务提供方的可信度,包括:
    获取预先存储的与所述预设服务提供方对应的第一图像;
    基于所述第二输入,获取所述目标用户提供的第二图像;
    获取所述第一图像与所述第二图像的图像匹配度,并基于所述图像匹配度和所述第一输入,确定所述服务提供方的可信度。
  8. 一种风险检测装置,所述装置包括:
    页面确定模块,用于根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;
    输入接收模块,用于从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;
    风险确定模块,用于基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
  9. 根据权利要求8所述的装置,所述预设服务页面为所述目标用户向所述服务提供方进行资源转移的资源转移完成页面。
  10. 根据权利要求9所述的装置,所述输入接收模块,用于:
    在所述预设服务页面显示预设引导跳转选项;
    在接收到所述目标用户在所述预设引导跳转选项上的选择操作时,从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入。
  11. 根据权利要求10所述的装置,所述页面确定模块,用于:
    获取所述目标用户的用户信息以及所述服务提供方的预定信息;
    基于信息与策略的预设对应关系,确定与所述目标用户的用户信息、所述服务提供方的预定信息以及所述第一输入相对应的目标引导策略;
    基于所述目标引导策略,确定所述巡检页面以及所述巡检页面包含的二次巡检信息。
  12. 根据权利要求11所述的装置,所述装置,还包括:
    关系调整模块,用于基于所述目标用户的第二输入,对所述信息与策略的预设对应关系进行调整。
  13. 根据权利要求11所述的装置,所述装置,还包括:
    报警模块,用于在根据所述可信度确定所述服务提供方存在预定风险的情况下,向预定商家管理平台发送预设报警信息以及所述服务提供方的相关信息,以使所述预定商家管理平台对所述服务提供方进行处理。
  14. 根据权利要求13所述的装置,所述风险确定模块,用于:
    获取预先存储的与所述预设服务提供方对应的第一图像;
    基于所述第二输入,获取所述目标用户提供的第二图像;
    获取所述第一图像与所述第二图像的图像匹配度,并基于所述图像匹配度和所述第一输入,确定所述服务提供方的可信度。
  15. 一种风险检测设备,所述风险检测设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    根据目标用户在预设服务页面针对服务提供方的巡检信息的第一输入,确定针对所述服务提供方的二次巡检信息的巡检页面;
    从所述预设服务页面跳转到所述巡检页面,并接收所述目标用户在所述巡检页面针对所述二次巡检信息的第二输入;
    基于所述第一输入和所述第二输入,确定所述服务提供方的可信度,以根据所述可信度,确定所述服务提供方是否存在预定风险。
PCT/CN2021/091433 2020-05-06 2021-04-30 风险检测 WO2021223675A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010372921.6A CN111539739A (zh) 2020-05-06 2020-05-06 一种风险检测方法、装置及设备
CN202010372921.6 2020-05-06

Publications (1)

Publication Number Publication Date
WO2021223675A1 true WO2021223675A1 (zh) 2021-11-11

Family

ID=71967669

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/091433 WO2021223675A1 (zh) 2020-05-06 2021-04-30 风险检测

Country Status (2)

Country Link
CN (1) CN111539739A (zh)
WO (1) WO2021223675A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115688130A (zh) * 2022-10-17 2023-02-03 支付宝(杭州)信息技术有限公司 数据处理方法、装置及设备
CN116958135A (zh) * 2023-09-18 2023-10-27 支付宝(杭州)信息技术有限公司 纹理检测处理方法及装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111539739A (zh) * 2020-05-06 2020-08-14 支付宝(杭州)信息技术有限公司 一种风险检测方法、装置及设备
CN111950991A (zh) * 2020-08-21 2020-11-17 支付宝(杭州)信息技术有限公司 业务审核方法及装置
CN111861289A (zh) * 2020-08-21 2020-10-30 支付宝(杭州)信息技术有限公司 任务审核方法及装置
CN112001662B (zh) * 2020-09-14 2022-08-30 支付宝(杭州)信息技术有限公司 一种商户图像的风险检验方法、装置及设备
CN113707177B (zh) * 2021-09-18 2024-03-26 杭银消费金融股份有限公司 基于语音分析识别的服务处理方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012176497A1 (ja) * 2011-06-22 2012-12-27 楽天株式会社 情報処理装置、情報処理方法、情報処理プログラム、及び情報処理プログラムが記録された記録媒体
CN107481065A (zh) * 2017-08-27 2017-12-15 秦勤 一种可强制用户评价的网络有奖广告系统和方法
CN107563770A (zh) * 2017-08-05 2018-01-09 安徽商贸职业技术学院 一种电子商务客服服务质量评价系统
CN108009719A (zh) * 2017-11-29 2018-05-08 广州今也社教育科技有限公司 一种基于托管平台的用户评价方法、服务器及终端
CN110032698A (zh) * 2019-02-03 2019-07-19 阿里巴巴集团控股有限公司 信息显示方法和装置、信息处理方法和装置
CN111539739A (zh) * 2020-05-06 2020-08-14 支付宝(杭州)信息技术有限公司 一种风险检测方法、装置及设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296227A (zh) * 2016-08-12 2017-01-04 李峰 一种反向查验方法
US11282073B2 (en) * 2017-10-12 2022-03-22 Mastercard International Incorporated Multi-party payment card processing systems and methods with friendly fraud detection
CN110472992A (zh) * 2019-07-03 2019-11-19 阿里巴巴集团控股有限公司 一种页面展示方法、装置及设备
CN111062770B (zh) * 2019-10-31 2023-07-18 支付宝(杭州)信息技术有限公司 商户识别方法、设备及计算机可读介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012176497A1 (ja) * 2011-06-22 2012-12-27 楽天株式会社 情報処理装置、情報処理方法、情報処理プログラム、及び情報処理プログラムが記録された記録媒体
CN107563770A (zh) * 2017-08-05 2018-01-09 安徽商贸职业技术学院 一种电子商务客服服务质量评价系统
CN107481065A (zh) * 2017-08-27 2017-12-15 秦勤 一种可强制用户评价的网络有奖广告系统和方法
CN108009719A (zh) * 2017-11-29 2018-05-08 广州今也社教育科技有限公司 一种基于托管平台的用户评价方法、服务器及终端
CN110032698A (zh) * 2019-02-03 2019-07-19 阿里巴巴集团控股有限公司 信息显示方法和装置、信息处理方法和装置
CN111539739A (zh) * 2020-05-06 2020-08-14 支付宝(杭州)信息技术有限公司 一种风险检测方法、装置及设备

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115688130A (zh) * 2022-10-17 2023-02-03 支付宝(杭州)信息技术有限公司 数据处理方法、装置及设备
CN115688130B (zh) * 2022-10-17 2023-10-20 支付宝(杭州)信息技术有限公司 数据处理方法、装置及设备
CN116958135A (zh) * 2023-09-18 2023-10-27 支付宝(杭州)信息技术有限公司 纹理检测处理方法及装置
CN116958135B (zh) * 2023-09-18 2024-03-08 支付宝(杭州)信息技术有限公司 纹理检测处理方法及装置

Also Published As

Publication number Publication date
CN111539739A (zh) 2020-08-14

Similar Documents

Publication Publication Date Title
WO2021223675A1 (zh) 风险检测
US11373161B2 (en) Post-paid transaction data processing method and device, processing apparatus, and server
TW201939404A (zh) 資訊推薦的方法、裝置及設備
WO2021103909A1 (zh) 风险预测和风险预测模型的训练方法、装置及电子设备
TW202013290A (zh) 交易的管控方法、裝置及設備
CN110119860B (zh) 一种垃圾账号检测方法、装置以及设备
JP2020504863A (ja) サービス処理方法および装置
CN108694574B (zh) 一种资源转移渠道的处理方法、装置及设备
TWI713825B (zh) 資料儲存及調用方法及裝置
WO2022267766A1 (zh) 访问聚合码支付页面的方法、装置、设备及介质
WO2020082872A1 (zh) 一种保险业务的处理方法、装置及设备
CN110390182B (zh) 一种确定小程序类目的方法、系统及设备
WO2022247969A1 (zh) 用于支付的方法及装置
US20200357078A1 (en) Method, apparatus, system, and electronic device for credit tax refundment
CN113688313A (zh) 一种预测模型的训练方法、信息推送的方法及装置
WO2020207086A1 (zh) 一种信息的处理系统、方法、装置及设备
WO2020177477A1 (zh) 一种信用服务推荐方法、装置及设备
EP3848878A1 (en) Service processing method and apparatus
CN110020867B (zh) 一种消费合约的处理方法、装置和设备
WO2024041316A1 (zh) 支付处理方法及装置
WO2024037285A1 (zh) 场所服务处理方法及装置
CN110490694B (zh) 一种信用服务的配置方法、装置及电子设备
CN109584088B (zh) 产品信息的推送方法及装置
CN112184074A (zh) 一种提示信息输出方法及装置
WO2019100867A1 (zh) 基于资源增值对象与资源对象的处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21799773

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21799773

Country of ref document: EP

Kind code of ref document: A1