WO2021249526A1 - 风险防控信息处理方法、装置及设备 - Google Patents

风险防控信息处理方法、装置及设备 Download PDF

Info

Publication number
WO2021249526A1
WO2021249526A1 PCT/CN2021/099605 CN2021099605W WO2021249526A1 WO 2021249526 A1 WO2021249526 A1 WO 2021249526A1 CN 2021099605 W CN2021099605 W CN 2021099605W WO 2021249526 A1 WO2021249526 A1 WO 2021249526A1
Authority
WO
WIPO (PCT)
Prior art keywords
risk
target operation
user equipment
graphic code
risk analysis
Prior art date
Application number
PCT/CN2021/099605
Other languages
English (en)
French (fr)
Inventor
项斌
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2021249526A1 publication Critical patent/WO2021249526A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device

Definitions

  • This document relates to the field of computer technology, in particular to a method, device and equipment for processing risk prevention and control information.
  • the deduction initiator is the merchant, and the merchant will send the deduction request to the payment server.
  • the payment server cannot obtain the user terminal-level risk situation, and it is easy to embezzle accounts and bank cards, etc. Anti-fraud risk.
  • This manual provides a method, device and equipment for processing risk prevention and control information to solve the problem that in the existing technology, in the offline payment scheme of the user, because the user terminal-level risk situation cannot be obtained, it is easy to embezzle accounts and embezzle banks. Cards and other anti-fraud risk issues.
  • the embodiments of this specification provide a method for processing risk prevention and control information.
  • the method includes: in response to an operation of displaying a graphic code corresponding to a target operation, obtaining generated information corresponding to the graphic code, the generated information including: basic information required to perform the target operation and the first user equipment The terminal-level risk analysis result made by the target operation; generate a graphic code according to the generated information, and display the generated graphic code on the first user equipment so that the second user equipment can pass the scan
  • the graphic code initiates the execution request of the target operation to the server, so that the server determines whether to execute the target operation according to the basic information according to the terminal layer risk analysis result in the graphic code.
  • the embodiments of this specification provide a method for processing risk prevention and control information, which is applied to a server and includes: receiving a second user equipment that initiates to the server by scanning a graphic code displayed by the first user equipment. A request for execution of a target operation; the graphic code is generated by the first user equipment based on generated information, and the generated information includes: basic information required to perform the target operation and the first user equipment for the target operation The made terminal-level risk analysis result; according to the terminal-level risk analysis result in the graphic code, it is determined whether to perform the target operation according to the basic information.
  • an embodiment of this specification provides a risk prevention and control information processing device, including: an information acquisition module, in response to the operation of displaying the graphic code corresponding to the target operation, obtains the generation information corresponding to the graphic code, and the generating
  • the information includes: basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; an information generation module, which generates a graphic code according to the generated information, and combines The generated graphic code is displayed on the first user equipment, so that the second user equipment scans the graphic code to initiate the execution request of the target operation to the server, so that the server can perform the target operation according to the graphic code.
  • the terminal-level risk analysis result of determines whether to perform the target operation according to the basic information.
  • an embodiment of this specification provides a risk prevention and control information processing device, including: a request receiving module that receives a target operation initiated by a second user equipment to the server by scanning the graphic code displayed by the first user equipment Execution request; the graphic code is generated by the first user equipment based on generated information, the generated information includes: basic information required to perform the target operation and the first user equipment made for the target operation The terminal-level risk analysis result of the; the operation determination module determines whether to perform the target operation according to the basic information according to the terminal-level risk analysis result in the graphic code.
  • the embodiments of the present specification provide a risk prevention and control information processing device, including: a processor; and, a memory arranged to store computer-executable instructions that, when executed, cause the Processor: In response to the operation of displaying the graphic code corresponding to the target operation, obtain generation information corresponding to the graphic code, where the generated information includes: basic information required to perform the target operation and the first user equipment The terminal-level risk analysis result made by the target operation; generate a graphic code according to the generated information, and display the generated graphic code on the first user equipment, so that the second user equipment scans the The graphic code initiates the execution request of the target operation to the server, so that the server determines whether to execute the target operation according to the basic information according to the terminal layer risk analysis result in the graphic code.
  • the embodiments of this specification provide a risk prevention and control information processing device, including: a processor; and, a memory arranged to store computer-executable instructions that, when executed, cause the Processor: receiving the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is generated by the first user equipment based on generated information, and the generating
  • the information includes: basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; and determine whether it is based on the terminal-level risk analysis result in the graphic code
  • the basic information performs the target operation.
  • an embodiment of this specification provides a storage medium.
  • the storage medium is used to store computer-executable instructions.
  • the computer-executable instructions when executed, implement the following process: in response to the operation of displaying the graphic code corresponding to the target operation, obtain generation information corresponding to the graphic code, and the generated information includes: Basic information and the terminal-level risk analysis result made by the first user equipment for the target operation; generate a graphic code according to the generated information, and display the generated graphic code on the first user equipment , So that the second user equipment scans the graphic code to initiate the execution request of the target operation to the server, so that the server determines whether to execute the target operation according to the basic information according to the terminal layer risk analysis result in the graphic code.
  • the target operation in response to the operation of displaying the graphic code corresponding to the target operation, obtain generation information corresponding to the graphic code, and the generated information includes: Basic information and the terminal-level risk analysis result made by the first user equipment for the target operation; generate a graphic code according to the generated information, and display the generated graphic code
  • an embodiment of this specification provides a storage medium.
  • the storage medium is used to store computer-executable instructions.
  • the computer executable instruction When executed, the following process is realized: receiving the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is the first
  • a user equipment is generated based on generated information, the generated information includes: basic information required to perform the target operation and a terminal-level risk analysis result made by the first user equipment for the target operation; according to the graph
  • the terminal layer risk analysis result in the code determines whether to perform the target operation according to the basic information.
  • the risk prevention and control information processing method, device, and equipment provided by the embodiments of this specification obtain the graphic code corresponding to the graphic code required to execute the target operation when responding to the operation of displaying the graphic code corresponding to the target operation through the first user equipment Basic information and the terminal-level risk analysis result made by the first user equipment for the target operation; the first user equipment generates a graphic code according to the basic information and the terminal-level risk analysis result, and displays it on the first user equipment so that the second user equipment
  • the user equipment initiates a target operation execution request to the server by scanning the graphic code, so that the server determines whether to perform the target operation according to the basic information according to the terminal-level risk analysis result in the graphic code, so that the second user equipment scans the first user equipment
  • the provided graphic code initiates a target operation on the first user equipment to the server, it can also enable the server to obtain the terminal-level risk analysis results made by the first user equipment, thereby well solving the terminal risk prevention and control in offline payment scenarios.
  • the problem of inaccessibility of information has improved the
  • FIG. 1 is a schematic diagram of an application scenario of a method for processing risk prevention and control information provided by an embodiment of this specification;
  • FIG. 2 is a first schematic flowchart of a method for processing risk prevention and control information provided by an embodiment of this specification
  • FIG. 3 is a schematic diagram 1 of the scenario flow of the risk prevention and control information processing method provided by the embodiment of this specification;
  • Fig. 4 is a second schematic flow diagram of a method for processing risk prevention and control information provided by an embodiment of this specification
  • FIG. 5 is a second schematic diagram of the scenario flow of the risk prevention and control information processing method provided by the embodiment of this specification.
  • FIG. 6 is a schematic diagram 1 of the module composition of the risk prevention and control information processing device provided by the embodiment of this specification;
  • FIG. 7 is a second schematic diagram of the module composition of the risk prevention and control information processing device provided by the embodiment of this specification.
  • FIG. 8 is a first structural diagram of a risk prevention and control information processing device provided by an embodiment of this specification.
  • FIG. 9 is a second structural diagram of the risk prevention and control information processing equipment provided by the embodiment of this specification.
  • FIG. 1 is a schematic diagram of the application scenario of the risk prevention and control information processing method provided by the embodiment of this specification.
  • an offline payment scenario of a user is taken as an example.
  • the scenario includes: the first user device in an offline state such as payment
  • the terminal equipment used by the user, the second user equipment in an online state, such as the terminal equipment used by the user accepting payment, are located on the network side of the server, the risk control system and the decoding center.
  • the terminal device can be a mobile phone, a tablet computer, a desktop computer, a portable notebook computer, etc., on which is installed an application based on a graphic code (such as a barcode, a two-dimensional code) to perform a target operation, such as a payment code in an electronic wallet.
  • a graphic code such as a barcode, a two-dimensional code
  • the first user equipment When the first user equipment generates the graphic code corresponding to the target operation in the application, it may add the terminal layer risk analysis result generated by the first user equipment for the target operation to the graphic code.
  • the second user equipment initiates an execution request to the server based on scanning the graphic code provided by the first user equipment, so as to request the server to perform the target operation based on the payment code.
  • the decoding center is used to receive and parse the graphic code from the server to obtain corresponding information.
  • the risk control system is used to receive the terminal-level risk analysis results sent from the server to analyze the risk of executing the target operation and give risk decisions.
  • the first user equipment in the offline state obtains generation information corresponding to the graphic code, and the generation information includes: performing the target operation The required basic information and the terminal-level risk analysis result made by the first user equipment for the target operation; the first user equipment generates a graphic code according to the acquired generation information, and displays the generated graphic code on the first user equipment , So that the second user equipment scans the graphic code to initiate the execution request of the target operation to the server, so that the server determines whether to execute the target operation according to the basic information according to the terminal-layer risk analysis result in the graphic code, so that the second user equipment When the user equipment initiates a request for the target operation to the server, the server can obtain the terminal-level risk analysis result made by the first user equipment for the target operation based on the graphic code sent by the second user equipment.
  • the first terminal device may obtain the analysis rule information used for risk analysis of the user equipment from the risk control system corresponding to the target operation, and use the analysis rule information to compare the corresponding data collected from the first user equipment. Analyze content information for analysis and processing, and obtain terminal-level risk analysis results.
  • the analysis rule information used for risk analysis of the user equipment may include at least one of black and white list information, device fingerprint information, web page filtering information, and designated event attribute information.
  • the above-mentioned graphic code may be a payment code corresponding to the first user equipment; the target operation is that the second user equipment scans the payment code corresponding to the first user equipment and initiates a deduction to the payment account corresponding to the first user equipment to the server. Operation.
  • the above-mentioned graphic code may include one of a two-dimensional code and a barcode.
  • the second user equipment in the online state can scan the graphic code corresponding to the target operation provided by the first user equipment; of course, the graphic code contains: basic information required to perform the target operation and the first user equipment The terminal-level risk analysis result made by the target operation.
  • the second user equipment sends the scanned graphic code to the server, so that the server determines whether to perform the target operation based on the basic information based on the terminal-level risk analysis result contained in the graphic code.
  • the server may first parse the terminal-level risk analysis result from the graphic code; then, the terminal-level risk analysis result Send to the risk control system, and obtain the risk decision result fed back by the risk control system;
  • the risk decision result includes: when the above-mentioned terminal-level risk analysis result is risk-free, the target operation decision is made when the risk is accepted; or when the terminal-level risk analysis result In order to reject the risky decision of the target operation when the risk is made; and, if the risk decision result is that the target operation is risk-free, the server determines to perform the target operation based on the basic information: if the risk decision result is that the target operation is risky, the server refuses to execute the target operate.
  • the server can use the risk control system to analyze the risk of the target operation after grasping the risk analysis information at the terminal level according to the terminal-level risk analysis results contained in the graphic code, thereby improving the risk prevention and control of the risk control system Ability to improve the efficiency of the server to perform target operations.
  • the risk analysis used to determine whether to perform the target operation also includes: server-side risk analysis made on the server side; accordingly, the server is in accordance with the graphic code
  • server-side risk analysis made on the server side; accordingly, the server is in accordance with the graphic code
  • the above-mentioned server-side risk analysis may include at least two layers of risk analysis, and each layer of risk analysis is correspondingly set with a priority; the server is triggering the execution of the server-side risk analysis, and makes the server-side risk analysis for the target operation
  • the risk analysis of each layer can be triggered in turn according to the priority corresponding to each layer of risk analysis and the obtained risk analysis results will be sent to the risk control system until the risk control system makes a decision based on the risk analysis results of the corresponding layer.
  • the target operation has no risk or risky risk decision result
  • the risk analysis operation is ended to improve the efficiency of obtaining the risk analysis result.
  • FIG. 2 is the first flow diagram of the risk prevention and control information processing method provided by the embodiment of this specification.
  • the method in FIG. 2 can be executed by the first user equipment in FIG. 1, as shown in FIG.
  • the method includes the following steps: Step S102, in response to the operation of displaying the graphic code corresponding to the target operation, obtain generation information corresponding to the graphic code, the generated information including: basic information required to perform the target operation and the first user equipment for the target operation
  • the made terminal-level risk analysis result wherein, the graphic code includes but is not limited to one of a two-dimensional code and a barcode.
  • the so-called target operation may be a certain specified operation involved in an application installed on the first user equipment, and the specified operation needs to be initiated and executed by a second user equipment different from the first user equipment to the server on the network side, and the specified operation must be completed in the implementation.
  • the graphic code provided by the first user equipment needs to be used in the process of specifying the operation.
  • the first user equipment in the offline state obtains the generation corresponding to the graphic code from the device side Information, the generated information is used to generate the graphic code.
  • the generated information includes basic information required to perform the target operation and a terminal-level risk analysis result made by the first user equipment for the target operation.
  • the basic information required to perform the target operation may generally refer to all necessary information provided by the first user equipment required for the operation business content of the target operation, for example, when the target operation is a payment account corresponding to the first user equipment
  • the basic information may include information such as the account name of the payment account, the deduction amount, and the deduction method.
  • the terminal-level risk analysis results made by the first user equipment for the target operation can include several situations, such as clearly accepting the risk (the risk result obtained by the analysis is clearly within the acceptance range, and the target operation is not risky executable), and clearly rejecting the risk (The risk result obtained by the analysis is clearly within the scope of rejection, and the target operation has risks that cannot be implemented), and the risk is not clear (the risk result obtained by the analysis is not within the scope of acceptance or rejection, and it is unclear whether the target operation is risky) .
  • the specific analysis method used in the risk analysis is not the focus of the embodiments of this specification, and those skilled in the art can design and set it by themselves. The embodiment of this specification does not limit this.
  • the first user equipment may obtain the terminal-level risk analysis result through the following steps.
  • the first user equipment may obtain analysis rule information used for risk analysis of the user equipment from the risk control system corresponding to the target operation; wherein the analysis rule information used for risk analysis of the user equipment may include: black and white lists At least one of information, device fingerprint information, web filtering information, and designated event attribute information.
  • black and white list information blacklist information that identifies risks, and white list information that does not store risks; the list information may specifically be the username or binding of the application corresponding to the first user device triggering the target operation Account information.
  • Device fingerprint information Device information that identifies whether there is a risk, such as device ID information.
  • Web filtering information Web filtering information that identifies whether there is a risk.
  • Specified event attribute information the attribute information of the specified event that identifies whether there is a risk on the device, such as the event type to which the event has occurred, and the content information involved in the event.
  • Step 2 Use the analysis rule information to analyze and process the corresponding analysis content information collected from the first user equipment to obtain the terminal-level risk analysis result.
  • the analysis content information corresponding to the foregoing analysis rule information is collected from the first user equipment, and the analysis content information is analyzed and judged using the corresponding analysis rule information to determine the terminal-level risk analysis result.
  • the terminal-level risk analysis results include three situations: clearly accepting the risk, clearly rejecting the risk, and unclear risk.
  • step S104 a graphic code is generated according to the generated information, and the generated graphic code is displayed on the first user equipment, so that the second user equipment scans the graphic code to initiate the execution request of the target operation to the server, and then causes the server to perform the target operation according to the graphic code
  • the terminal-level risk analysis result determines whether to perform the target operation based on the basic information.
  • the terminal-level risk analysis result of the first user device can be directly obtained, so that the network-side risk control system can grasp the terminal-level risk prevention and control information through the graphic code, thereby improving its own risk prevention and control ability.
  • the graphic code can be displayed on the first user equipment, so that the user holding the second user equipment scans the graphic code through the second user equipment , And forward the graphic code to the server to initiate a request for execution of the target operation.
  • the server receives the execution request, it can determine whether to execute the target operation according to the basic information according to the terminal-level risk analysis result in the graphic code.
  • the graphic code may specifically be a payment code corresponding to the first user equipment;
  • the target operation is a second user equipment that scans the payment code corresponding to the first user equipment and initiates a transaction to the first user equipment to the server.
  • the payment account corresponding to the user device performs the deduction operation.
  • the graphic code is used as the payment code corresponding to the first user equipment
  • the target operation is that the second user equipment scans the payment code corresponding to the first user equipment and initiates a deduction to the server for the payment account corresponding to the first user equipment.
  • the risk prevention and control information processing method includes: S11: the user (paying user) is logged in offline The application on the first user device.
  • the first user equipment obtains (updates) analysis rule information from the risk control system to the local, where the analysis rule information is analysis rule information used for risk analysis of the user equipment.
  • the first user equipment generates a terminal-level risk analysis result based on the analysis rule information and the corresponding analysis content information obtained locally.
  • the first user equipment receives the operation of generating the payment code triggered by the user.
  • the first user equipment generates a payment code based on the basic information obtained locally from the device side for generating the payment code and the above-mentioned terminal-level risk analysis result, and displays the payment code on the first user equipment.
  • the second user equipment may initiate a target operation execution request to the server by scanning the graphic code provided by the first user equipment, so that the server determines whether to perform the target operation according to the basic information according to the terminal layer risk analysis result in the graphic code.
  • the risk prevention and control information processing method obtains the generated information corresponding to the graphic code by responding to the operation of displaying the graphic code corresponding to the target operation.
  • the generated information includes: the basic information required to perform the target operation and the first The terminal-level risk analysis result made by the user equipment for the target operation; generate graphic codes according to the generated information, and display the generated graphic codes on the first user equipment, so that the second user equipment initiates the target to the server by scanning the graphic code
  • the operation execution request allows the server to determine whether to perform the target operation based on the basic information according to the terminal-level risk analysis result in the graphic code, so that the second user equipment scans the graphic code provided by the first user equipment to initiate the first target operation to the server.
  • the server can also obtain the terminal-level risk analysis results made by the first user equipment, which solves the problem that terminal risk prevention and control information cannot be obtained in offline payment scenarios, and improves risk prevention. Control performance and ability.
  • FIG. 4 is the second flowchart of the risk prevention and control information processing method provided by the embodiment of this specification.
  • the method in FIG. 4 can be executed by the server in FIG. 1, as shown in FIG. 4, the method includes the following Step: S202, receiving the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is generated by the first user equipment based on generated information, and the generated information includes: The basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation.
  • the graphic code includes but is not limited to one of a two-dimensional code and a barcode.
  • the so-called target operation may be a certain specified operation involved in an application installed on the first user equipment, and the specified operation needs to be initiated and executed by a second user equipment different from the first user equipment to the server on the network side, and the specified operation must be completed in the implementation.
  • the graphic code provided by the first user equipment needs to be used in the process of specifying the operation.
  • the first user equipment in the offline state can be generated by executing the method steps in the first embodiment Graphic code
  • the graphic code contains: basic information required to execute the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation.
  • the basic information required to perform the target operation may generally refer to all necessary information provided by the first user equipment required for the operation business content of the target operation, for example, when the target operation is a payment account corresponding to the first user equipment
  • the basic information may include information such as the account name of the payment account, the deduction amount, and the deduction method.
  • the terminal-level risk analysis results made by the first user equipment for the target operation can include several situations, such as clearly accepting the risk (the risk result obtained by the analysis is clearly within the acceptance range, and the target operation is not risky executable), and clearly rejecting the risk (The risk result obtained by the analysis is clearly within the scope of rejection, and the target operation has risks that cannot be implemented), and the risk is not clear (the risk result obtained by the analysis is not within the scope of acceptance or rejection, and it is unclear whether the target operation is risky) .
  • the specific analysis method used in the risk analysis is not the focus of the embodiments of this specification, and those skilled in the art can design and set it by themselves. The embodiment of this specification does not limit this.
  • the graphic code is sent to the server to initiate an execution request for the target operation to the server, and the execution request includes the graphic generated by the first user equipment
  • the code includes: basic information used to execute the target operation and the terminal layer risk analysis result made by the first user equipment.
  • S204 Determine, according to the terminal layer risk analysis result in the graphic code, whether to perform the target operation according to the basic information.
  • the server judges the risk brought by the execution of this target operation according to the terminal-level risk analysis result contained in the graphic code, so as to determine whether to execute the target operation according to the basic information.
  • the server determines whether to perform the target operation based on the basic information according to the terminal-level risk analysis result contained in the graphic code. This can be achieved through the following steps: Step 1, the server parses the terminal-level risk analysis result from the graphic code; for example, the server The graphic code received from the second user equipment can be sent to the decoding center of the server, and the graphic code can be parsed by the decoding center to obtain the terminal layer risk analysis result contained in the graphic code and the basic information required to execute the target operation.
  • Step 2 Send the terminal-level risk analysis result to the risk control system, and obtain the risk decision result fed back by the risk control system;
  • the risk decision result includes: when the terminal-level risk analysis result is that the target operation is risk-free when the risk is accepted Decision; or when the risk analysis result at the terminal level is to reject the risk, the target operation is risky decision;
  • the risk control system needs to further utilize the server-side (service-level) risk in the risk control system.
  • the analysis method conducts risk analysis on the above-mentioned target operation to determine the risk decision result. Since the focus in the embodiments of this specification is how to obtain and perform risk analysis on the target operation based on the terminal-level risk analysis results, in the risk control system, in determining the risk decision results, focus on the terminal level that clearly accepts or rejects Risk analysis results to determine risk decisions.
  • Step 3 If the risk decision result is that the target operation is risk-free, execute the target operation based on the basic information: Step 4, if the risk decision result is that the target operation is risky, then refuse to perform the target operation.
  • the graphic code is used as the payment code corresponding to the first user equipment, and the target operation is that the second user equipment scans the payment code corresponding to the first user equipment and initiates a deduction to the server for the payment account corresponding to the first user equipment.
  • the method for processing risk prevention and control information in the embodiment of this specification is illustrated as an example. As shown in Figure 5, the method for processing risk prevention and control information includes: S21: the user (the user who accepts payment) passes through the second user The device scans the payment code (such as a QR code) displayed by the first user device, and uploads the payment code to the server.
  • S22 The server calls the decoding center to parse the payment code.
  • the decoding center returns the decoding information, which contains the terminal-level risk analysis result generated by the first user equipment for this deduction operation and basic information used to perform this deduction operation.
  • S24 The server conducts risk control consultation and downloads the terminal-level risk analysis results to the risk control system.
  • the risk control system returns the risk decision result.
  • the result includes: if the terminal-level risk analysis result clearly accepts or rejects the risk, the risk control system returns directly, otherwise the risk control system further conducts subsequent service-side risk analysis, Return the risk decision result.
  • S26 The server initiates a deduction or refuses to deduct the deduction according to the result of the risk decision.
  • the risk analysis used to determine whether to perform the target operation also includes: the server-side risk analysis made on the server side; accordingly, in accordance with When the terminal-level risk analysis result in the graphic code determines whether to perform the target operation based on the basic information, if the risk decision result does not clearly indicate whether the target operation is risky, the server-level risk analysis is triggered and the target operation is targeted Make the server-side risk analysis result; determine whether to perform the target operation based on the basic information according to the server-side risk analysis result.
  • the specific analysis method used in the server-side risk analysis is not the focus of the embodiment of this specification, and those skilled in the art can design and set it by themselves.
  • the embodiment of this specification does not limit this.
  • it may include: risk analysis methods for rapid identification of credibility filtering, blacklist filtering, and custom filtering of the first user equipment; it may also include: in-depth identification, identification routing, risk scoring, decision routing, and other in-depth analysis of risks Analysis method to conduct risk analysis on the target operation from the server side.
  • server-side risk analysis may include at least two levels of risk analysis, and each level of risk analysis is correspondingly set with a priority; the priority division may follow the complexity of the analysis process of the corresponding risk analysis or the accuracy of the analysis result Degree to perform.
  • the risk analysis of each layer can be triggered in turn according to the priority corresponding to each layer of risk analysis and the risk analysis results obtained Send to the risk control system until the risk control system makes a risk-free or risky risk decision result for the target operation based on the risk analysis result of the corresponding layer, and the risk analysis operation is ended.
  • the server-side risk analysis is not all executed, but the execution is triggered in sequence according to the priority of each layer of risk analysis, and after each execution is completed, the risk analysis result is obtained, the risk analysis result is sent to
  • the risk control system makes risk decision-making judgments.
  • the server ends the risk analysis operation, and subsequent level risk analysis is no longer performed.
  • the server After the server receives the risk decision result fed back by the risk control system, it can determine whether to perform the target operation based on the basic information based on the execution process similar to the foregoing and according to the risk decision result.
  • the risk prevention and control information processing method receives the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is generated by the first user equipment based on Information generation, the generated information includes: basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; determine whether to base the basic information according to the terminal-level risk analysis result in the graphic code Perform the target operation, so that when the second user equipment scans the graphic code provided by the first user equipment to initiate a target operation on the first user equipment to the server, the server can also obtain the terminal-level risk made by the first user equipment
  • the analysis results have solved the problem that terminal risk prevention and control information cannot be obtained in offline payment scenarios, and improved the performance and capabilities of risk prevention and control.
  • FIGS. 2 to 3 Corresponding to the risk prevention and control information processing method described in FIGS. 2 to 3, based on the same technical concept, the embodiment of this specification also provides a risk prevention and control information processing device.
  • Figure 6 is a schematic diagram of the module composition of the risk prevention and control information processing device provided by the embodiment of this specification.
  • the device is set in the first user equipment and is used to execute the risk prevention and control information processing method described in Figures 2 to 3, as shown in Figure 6
  • the device includes: an information acquisition module 301, in response to the operation of displaying the graphic code corresponding to the target operation, obtains generated information corresponding to the graphic code, the generated information includes: basic information required to perform the target operation And the terminal-level risk analysis result made by the first user equipment for the target operation; the information generating module 302 generates a graphic code according to the generated information, and stores the generated graphic code in the first user
  • the device displays, so that the second user equipment scans the graphic code to initiate the execution request of the target operation to the server, so that the server determines whether to perform the target operation according to the terminal-layer risk analysis result in the graphic code. Information performs the target operation.
  • the device shown in FIG. 6 may further include: an analysis rule acquisition module, which acquires analysis rule information for user equipment to perform risk analysis from the risk control system corresponding to the target operation; an analysis result generation module, which uses all The analysis rule information analyzes and processes the corresponding analysis content information collected from the first user equipment to obtain the terminal-level risk analysis result.
  • an analysis rule acquisition module which acquires analysis rule information for user equipment to perform risk analysis from the risk control system corresponding to the target operation
  • an analysis result generation module which uses all The analysis rule information analyzes and processes the corresponding analysis content information collected from the first user equipment to obtain the terminal-level risk analysis result.
  • the analysis rule information used for the risk analysis of the user equipment includes at least one of black and white list information, device fingerprint information, web page filtering information, and designated event attribute information.
  • the graphic code is a payment code corresponding to the first user equipment; the target operation is that the second user equipment scans the payment code corresponding to the first user equipment and initiates to the server the payment account corresponding to the first user equipment. The operation of deduction.
  • the graphic code includes one of a two-dimensional code and a barcode.
  • the risk prevention and control information processing device obtains the generated information corresponding to the graphic code by responding to the operation of displaying the graphic code corresponding to the target operation.
  • the generated information includes: basic information required to perform the target operation and the first The terminal-level risk analysis result made by the user equipment for the target operation; generate graphic codes according to the generated information, and display the generated graphic codes on the first user equipment, so that the second user equipment initiates the target to the server by scanning the graphic code.
  • the operation execution request allows the server to determine whether to perform the target operation based on the basic information according to the terminal-level risk analysis result in the graphic code, so that the second user equipment scans the graphic code provided by the first user equipment to initiate the first target operation to the server.
  • the server can also obtain the terminal-level risk analysis results made by the first user equipment, which solves the problem that terminal risk prevention and control information cannot be obtained in offline payment scenarios, and improves risk prevention. Control performance and ability.
  • FIG. 7 is a schematic diagram of the module composition of the risk prevention and control information processing device provided by the embodiment of this specification.
  • the device is set in the second user equipment and used to execute the risk prevention and control information processing method described in Figures 4 to 5, as shown in Figure 7
  • the apparatus includes: a request receiving module 401, which receives a request for execution of a target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is the first user
  • the device generates based on the generated information, and the generated information includes: basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; the operation determining module 402, according to The terminal layer risk analysis result in the graphic code determines whether to execute the target operation according to the basic information.
  • the operation determination module 402 parses the terminal-level risk analysis result from the graphic code; sends the terminal-level risk analysis result to the risk control system, and obtains the risk decision result fed back by the risk control system;
  • the risk decision result includes: the target operation decision made when the terminal-level risk analysis result is that the risk is accepted is risk-free; or the target operation made when the terminal-level risk analysis result is that the risk is rejected is risky If the risk decision result is that the target operation is risk-free, execute the target operation according to the basic information: if the risk decision result is that the target operation is risky, refuse to perform the target operation .
  • the risk analysis for determining whether to perform the target operation further includes: a server-side risk analysis made on the server side; the operation determining module 402, if the risk decision result is not clearly given If the target operation is risky, then the execution of the server-side risk analysis is triggered, and the server-side risk analysis result is made for the target operation; according to the server-side risk analysis result, it is determined whether according to the basic information Perform the target operation.
  • the server-side layer risk analysis includes at least two layers of risk analysis, and each layer of risk analysis is correspondingly set with a priority; the operation determining module 402 triggers the execution of each layer in turn according to the priority corresponding to each layer of risk analysis.
  • Layer risk analysis and send the obtained risk analysis results to the risk control system until the risk control system makes a risk-free or risky risk decision result for the target operation based on the risk analysis results of the corresponding layer, end the risk Analysis operation.
  • the graphic code is a payment code corresponding to the first user equipment;
  • the target operation is a payment code initiated by the second user equipment to the server after scanning the payment code corresponding to the first user equipment to the first user
  • the payment account corresponding to the device performs deduction operations.
  • the graphic code includes one of a two-dimensional code and a barcode.
  • the risk prevention and control information processing device receives the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is generated by the first user equipment based on Information generation, the generated information includes: basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; determine whether to base the basic information according to the terminal-level risk analysis result in the graphic code Perform the target operation, so that when the second user equipment scans the graphic code provided by the first user equipment to initiate a target operation on the first user equipment to the server, the server can also obtain the terminal-level risk made by the first user equipment
  • the analysis results have solved the problem that terminal risk prevention and control information cannot be obtained in offline payment scenarios, and improved the performance and capabilities of risk prevention and control.
  • Figure 8 is a schematic structural diagram of a risk prevention and control information processing device provided by an embodiment of this specification.
  • the risk prevention and control information processing equipment may have relatively large differences due to different configurations or performances, and may include one or more processors 501 and a memory 502, and the memory 502 may store one or more memories. Application or data. Among them, the memory 502 may be short-term storage or persistent storage.
  • the application program stored in the memory 502 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions in the risk prevention and control information processing device.
  • the processor 501 may be configured to communicate with the memory 502, and execute a series of computer executable instructions in the memory 502 on the risk prevention and control information processing device.
  • the risk prevention and control information processing equipment may also include one or more power supplies 503, one or more wired or wireless network interfaces 504, one or more input and output interfaces 505, one or more keyboards 506, and the like.
  • the risk prevention and control information processing device includes a memory and one or more programs, one or more programs are stored in the memory, and the one or more programs may include one or more modules , And each module can include a series of computer-executable instructions in the risk prevention and control information processing equipment, and is configured to be executed by one or more processors.
  • the one or more programs include the following computer-executable instructions : In response to the operation of displaying the graphic code corresponding to the target operation, obtain generation information corresponding to the graphic code, where the generated information includes: basic information required to perform the target operation and the first user equipment targeting the target The terminal-level risk analysis result made by the operation; generate a graphic code according to the generated information, and display the generated graphic code on the first user equipment, so that the second user equipment scans the graphic code Initiating the execution request of the target operation to the server, so that the server determines whether to execute the target operation according to the basic information according to the terminal layer risk analysis result in the graphic code.
  • the method further includes: obtaining analysis rule information for risk analysis of the user equipment from the risk control system corresponding to the target operation; and using the analysis rule information to pair Perform analysis and processing from the corresponding analysis content information collected by the first user equipment to obtain the terminal-level risk analysis result.
  • the analysis rule information used for risk analysis of the user equipment includes at least one of black and white list information, device fingerprint information, web page filtering information, and designated event attribute information .
  • the graphic code is the payment code corresponding to the first user equipment; the target operation is after the second user equipment scans the payment code corresponding to the first user equipment An operation initiated to the server to deduct the payment account corresponding to the first user equipment.
  • the graphic code includes one of a two-dimensional code and a barcode.
  • the risk prevention and control information processing equipment obtained by the embodiment of this specification obtains the generated information corresponding to the graphic code by responding to the operation of displaying the graphic code corresponding to the target operation.
  • the generated information includes: basic information required to perform the target operation and the first The terminal-level risk analysis result made by the user equipment for the target operation; generate graphic codes according to the generated information, and display the generated graphic codes on the first user equipment, so that the second user equipment initiates the target to the server by scanning the graphic code
  • the operation execution request allows the server to determine whether to perform the target operation based on the basic information according to the terminal-level risk analysis result in the graphic code, so that the second user equipment scans the graphic code provided by the first user equipment to initiate the first target operation to the server.
  • the server can also obtain the terminal-level risk analysis results made by the first user equipment, which solves the problem that terminal risk prevention and control information cannot be obtained in offline payment scenarios, and improves risk prevention. Control performance and ability.
  • FIGS. 4 to 5 Corresponding to the risk prevention and control information processing method described in FIGS. 4 to 5, based on the same technical concept, the embodiment of this specification also provides a risk prevention and control information processing device, which is used to execute the above risk prevention and control information processing method ,
  • Figure 9 is a schematic structural diagram of a risk prevention and control information processing device provided by an embodiment of this specification.
  • risk prevention and control information processing equipment may have relatively large differences due to different configurations or performances, and may include one or more processors 601 and a memory 602, and the memory 602 may store one or more memories. Application or data. Among them, the memory 602 may be short-term storage or persistent storage.
  • the application program stored in the memory 602 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions in the risk prevention and control information processing device.
  • the processor 601 may be configured to communicate with the memory 602, and execute a series of computer executable instructions in the memory 602 on the risk prevention and control information processing device.
  • the risk prevention and control information processing equipment may also include one or more power supplies 603, one or more wired or wireless network interfaces 604, one or more input and output interfaces 605, one or more keyboards 606, and so on.
  • the risk prevention and control information processing device includes a memory and one or more programs, one or more programs are stored in the memory, and the one or more programs may include one or more modules , And each module can include a series of computer-executable instructions in the risk prevention and control information processing equipment, and is configured to be executed by one or more processors.
  • the one or more programs include the following computer-executable instructions : Receiving the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is generated by the first user equipment based on generated information, and the generated information includes : The basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; determine whether according to the terminal-level risk analysis result in the graphic code The basic information performs the target operation.
  • the determining whether to perform the target operation according to the basic information according to the terminal-level risk analysis result in the graphic code includes: parsing the terminal-level risk from the graphic code Analysis result; send the terminal-level risk analysis result to the risk control system, and obtain the risk decision result fed back by the risk control system; the risk decision result includes: when the terminal-level risk analysis result is an acceptance risk The target operation is risk-free decision; or the target operation is risky decision made when the terminal-level risk analysis result is a rejection risk; if the risk decision result is that the target operation is risk-free, then The basic information executes the target operation: if the risk decision result is that the target operation is risky, then refuse to execute the target operation.
  • the risk analysis for determining whether to perform the target operation further includes: a server-side layer risk analysis made on the server side;
  • the terminal-level risk analysis result in determining whether to perform the target operation according to the basic information includes: if the risk decision result does not clearly indicate whether the target operation is risky, triggering the execution of the server-side risk analysis, And make a server-side risk analysis result for the target operation; determine whether to perform the target operation according to the basic information according to the server-side risk analysis result.
  • the server-side risk analysis includes at least two layers of risk analysis, and each layer of risk analysis is correspondingly set with a priority; the triggering execution of the server-side risk analysis, And making the server-side risk analysis result for the target operation includes: triggering the execution of each layer of risk analysis in turn according to the priority corresponding to each layer of risk analysis and sending the obtained risk analysis result to the risk control system until When the risk control system makes a risk-free or risky risk decision result of the target operation based on the risk analysis result of the corresponding layer, the risk analysis operation is ended.
  • the graphic code is the payment code corresponding to the first user equipment; the target operation is after the second user equipment scans the payment code corresponding to the first user equipment An operation initiated to the server to deduct the payment account corresponding to the first user equipment.
  • the graphic code includes one of a two-dimensional code and a barcode.
  • the risk prevention and control information processing device receives the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment; the graphic code is generated by the first user equipment based on Information generation, the generated information includes: basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; determine whether to base the basic information according to the terminal-level risk analysis result in the graphic code Perform the target operation, so that when the second user equipment scans the graphic code provided by the first user equipment to initiate a target operation on the first user equipment to the server, the server can also obtain the terminal-level risk made by the first user equipment
  • the analysis results have solved the problem that terminal risk prevention and control information cannot be obtained in offline payment scenarios, and improved the performance and capabilities of risk prevention and control.
  • the embodiment of this specification also provides a storage medium for storing computer-executable instructions.
  • the storage The medium can be a U disk, an optical disk, a hard disk, etc.
  • the computer executable instructions stored in the storage medium are executed by the processor, the following process can be realized: in response to the operation of displaying the graphic code corresponding to the target operation, obtain the graphic code corresponding
  • the generated information includes: basic information required to perform the target operation and a terminal-level risk analysis result made by the first user equipment for the target operation; and a graphic code is generated according to the generated information , And display the generated graphic code on the first user equipment, so that the second user equipment scans the graphic code to initiate the execution request of the target operation to the server, so that the server can perform the target operation according to the
  • the terminal layer risk analysis result in the graphic code determines whether to execute the target operation according to the basic information.
  • the method further includes: obtaining analysis rule information for risk analysis of the user equipment from the risk control system corresponding to the target operation;
  • the analysis rule information is used to analyze and process the corresponding analysis content information collected from the first user equipment to obtain the terminal-level risk analysis result.
  • the analysis rule information used for risk analysis of the user equipment includes: black and white list information, device fingerprint information, web page filtering information, and designated event attributes At least one type of information.
  • the graphic code is the payment code corresponding to the first user equipment; the target operation is that the second user equipment scans the first user equipment.
  • the payment code corresponding to the user equipment is then initiated to the server to deduct the payment account corresponding to the first user equipment.
  • the graphic code includes one of a two-dimensional code and a barcode.
  • the computer executable instructions stored in the storage medium provided in the embodiments of this specification When executed by the processor, they obtain generation information corresponding to the graphic code by responding to the operation of displaying the graphic code corresponding to the target operation, and the generated information includes: execution target The basic information required for the operation and the terminal-level risk analysis result made by the first user equipment for the target operation; the graphic code is generated according to the generated information, and the generated graphic code is displayed on the first user equipment so that the second user
  • the device initiates the execution request of the target operation to the server by scanning the graphic code, so that the server determines whether to perform the target operation according to the basic information according to the terminal-level risk analysis result in the graphic code, so that the second user equipment scans the first user equipment to provide
  • the graphic code in the server initiates a target operation for the first user equipment, it can also enable the server to obtain the terminal-level risk analysis results made by the first user equipment, thereby well solving the terminal risk prevention and control information in the offline payment scenario Unavailable problems have improved the performance and ability of risk prevention and control.
  • the embodiment of this specification also provides a storage medium for storing computer-executable instructions.
  • the storage The medium can be a U disk, an optical disk, a hard disk, etc., and when the computer executable instructions stored in the storage medium are executed by the processor, the following process can be realized: receiving the second user equipment by scanning the graphic code displayed by the first user equipment The execution request of the target operation initiated by the server; the graphic code is generated by the first user equipment based on generated information, and the generated information includes: basic information required to perform the target operation and the first user equipment The terminal-level risk analysis result made by the target operation; according to the terminal-level risk analysis result in the graphic code, it is determined whether to perform the target operation according to the basic information.
  • the determining whether to execute the target operation according to the basic information according to the terminal layer risk analysis result in the graphic code includes: The terminal layer risk analysis result is parsed in the code; the terminal layer risk analysis result is sent to the risk control system, and the risk decision result fed back by the risk control system is obtained; the risk decision result includes: when the terminal layer risk The analysis result is the risk-free decision of the target operation made when the risk is accepted; or the risky decision of the target operation made when the terminal-level risk analysis result is the rejection of the risk; if the risk decision result is the If the target operation is risk-free, the target operation is executed according to the basic information: if the risk decision result is that the target operation is risky, then the target operation is rejected.
  • the risk analysis for determining whether to perform the target operation further includes: a server-side risk analysis performed on the server side;
  • the determining whether to perform the target operation according to the basic information according to the terminal-layer risk analysis result in the graphic code includes: if the risk decision result does not clearly indicate whether the target operation is risky, triggering execution of the target operation
  • the server-end layer risk analysis, and the server-end layer risk analysis result is made for the target operation; according to the server-end layer risk analysis result, it is determined whether to execute the target operation according to the basic information.
  • the server-side layer risk analysis includes at least two layers of risk analysis, and each layer of risk analysis is correspondingly set with a priority; the trigger execution The server-side risk analysis, and making the server-side risk analysis result for the target operation includes: triggering the execution of each layer risk analysis in turn according to the priority corresponding to each layer of risk analysis and sending the obtained risk analysis result to The risk control system ends the risk analysis operation until the risk control system makes a risk-free or risky risk decision result of the target operation based on the risk analysis result of the corresponding layer.
  • the graphic code is the payment code corresponding to the first user equipment; the target operation is that the second user equipment scans the first user equipment.
  • the payment code corresponding to the user equipment is then initiated to the server to deduct the payment account corresponding to the first user equipment.
  • the graphic code includes one of a two-dimensional code and a barcode.
  • the computer-executable instructions stored in the storage medium provided in the embodiments of this specification When executed by the processor, they receive the execution request of the target operation initiated by the second user equipment to the server by scanning the graphic code displayed by the first user equipment;
  • the graphic code is generated by the first user equipment based on the generated information, and the generated information includes: basic information required to perform the target operation and the terminal-level risk analysis result made by the first user equipment for the target operation; according to the terminal in the graphic code Layer risk analysis results determine whether to perform the target operation based on basic information, so that when the second user equipment scans the graphic code provided by the first user equipment to initiate a target operation on the first user equipment to the server, the server can also obtain the first user equipment.
  • a terminal-level risk analysis result made by the user equipment which solves the problem that terminal risk prevention and control information cannot be obtained in offline payment scenarios, and improves the risk prevention and control performance and capabilities.
  • a Programmable Logic Device (such as a Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic function is determined by the user's programming of the device.
  • HDL Hardware Description Language
  • the controller can be implemented in any suitable manner.
  • the controller can take the form of, for example, a microprocessor or a processor and a computer-readable medium storing computer-readable program codes (such as software or firmware) executable by the (micro)processor. , Logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the memory control logic.
  • controllers in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to program the method steps to make the controller use logic gates, switches, application-specific integrated circuits, programmable logic controllers, and embedded logic.
  • the same function can be realized in the form of a microcontroller or the like. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for realizing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • one or more embodiments of this specification can be provided as a method, a system, or a computer program product. Therefore, one or more embodiments of this specification may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this specification may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can direct a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.
  • the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
  • processors CPU
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory in a computer-readable medium, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM).
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • One or more embodiments of this specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • One or more embodiments of this specification can also be practiced in distributed computing environments. In these distributed computing environments, tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules can be located in local and remote computer storage media including storage devices.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本说明书实施例提供了一种风险防控信息处理方法、装置及设备,其中,方法包括:第一用户设备响应于展示目标操作对应的图形码的操作,获取图形码对应的生成信息,生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果;根据生成信息生成图形码,并将生成的图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而解决在用户的离线支付方案中,因无法获取用户终端层风险情况,而容易出现盗用账户、盗用银行卡等反欺诈风险的问题。

Description

风险防控信息处理方法、装置及设备 技术领域
本文件涉及计算机技术领域,尤其涉及一种风险防控信息处理方法、装置及设备。
背景技术
随着电子支付业务的发展,线下O2O(在线离线/线上到线下,Online To Offline)业务量日益增长,线下支付方案中的离线支付量(用户在弱网或无网环境下的支付方案)也随之增长。
在用户的离线支付方案中,扣款发起方是商户,商户会将扣款请求发送到支付服务器,此场景下支付服务器无法获取到用户终端层风险情况,很容易出现盗用账户、盗用银行卡等反欺诈风险。
发明内容
本说明书提供了一种风险防控信息处理方法、装置及设备,用以解决现有技术中,在用户的离线支付方案中,因无法获取用户终端层风险情况,而容易出现盗用账户、盗用银行卡等反欺诈风险的问题。
为达到上述目的,本发明的实施例采用如下技术方案:第一方面,本说明书实施例提供了一种风险防控信息处理方法。该方法包括:响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
第二方面,本说明书实施例提供了一种风险防控信息处理方法,所述方法应用于服务器,包括:接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
第三方面,本说明书实施例提供了一种风险防控信息处理装置,包括:信息获取模块,响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;信息生成模块,根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
第四方面,本说明书实施例提供了一种风险防控信息处理装置,包括:请求接收模块,接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包 括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;操作确定模块,根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
第五方面,本说明书实施例提供了一种风险防控信息处理设备,包括:处理器;以及,被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
第六方面,本说明书实施例提供了一种风险防控信息处理设备,包括:处理器;以及,被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
第七方面,本说明书实施例提供了一种存储介质。该存储介质用于存储计算机可执行指令。所述计算机可执行指令在被执行时实现以下流程:响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
第八方面,本说明书实施例提供了一种存储介质。该存储介质用于存储计算机可执行指令。所述计算机可执行指令在被执行时实现以下流程:接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
本说明书实施例提供的风险防控信息处理方法、装置及设备,通过第一用户设备在响应于展示目标操作对应的图形码的操作时,获取该图形码对应的执行所述目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果;第一用户设备根据基础信息以及终端层风险分析结果生成图形码,并在第一用户设备进行展示,以使第二用户设备通过扫描图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
附图说明
为了更清楚地说明本说明书一个或多个实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本说明书实施例提供的风险防控信息处理方法的应用场景示意图;
图2为本说明书实施例提供的风险防控信息处理方法的流程示意图一;
图3为本说明书实施例提供的风险防控信息处理方法的场景流程示意图一;
图4为本说明书实施例提供的风险防控信息处理方法的流程示意图二;
图5为本说明书实施例提供的风险防控信息处理方法的场景流程示意图二;
图6为本说明书实施例提供的风险防控信息处理装置的模块组成示意图一;
图7为本说明书实施例提供的风险防控信息处理装置的模块组成示意图二;
图8为本说明书实施例提供的风险防控信息处理设备的结构示意图一;
图9为本说明书实施例提供的风险防控信息处理设备的结构示意图二。
具体实施方式
为了使本技术领域的人员更好地理解本说明书实施例中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书的一部分实施例,而不是全部的实施例。基于本说明书一个或多个实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本文件的保护范围。
图1为本说明书实施例提供的风险防控信息处理方法的应用场景示意图,如图1所示,以在用户的离线支付场景为例,该场景包括:处于离线状态的第一用户设备如付款用户使用的终端设备、处于在线状态的第二用户设备如接受付款的用户使用的终端设备,位于网络侧的服务器、风控系统和解码中心。其中,终端设备可以为手机、平板电脑、台式计算机、便携笔记本式计算机等,其上安装有基于图形码(如条形码、二维码)进行目标操作的应用,如电子钱包中利用付款码进行的付款操作。第一用户设备在生成针对应用内目标操作对应的图形码时,可将自身生成的针对目标操作的终端层风险分析结果添加到图形码中。第二用户设备基于扫描第一用户设备提供的图形码向服务器发起执行请求,以请求服务器基于付款码执行目标操作。解码中心用于接收和解析来自服务器的图形码,获取相应信息。风控系统用于接收来自服务器发送的终端层风险分析结果,以对执行目标操作的风险进行分析并给出风险决策。
具体的,响应于离线用户欲在第一用户设备上展示目标操作对应的图形码的触发操作,处于离线状态的第一用户设备获取该图形码对应的生成信息,该生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果;第一用户设备根据获取到的生成信息生成图形码,并将生成的图形码在第一用户设备进行展示,以使第二用户设备通过扫描该图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行所述目标操作,从而使得在第二用户设备向服务器发起针对目标操作的请求时,服务器能够基于第二用户设备发送的图形码获取到第一用户设备针对目标操作所做出的终端层风险分析结果。
进一步地,在执行上述方法时,第一终端设备可以从目标操作对应的风控系统中获取用于用户设备进行风险分析的分析规则信息,并采用分析规则信息对从第一用户设备采集的相应分析内容信息进行分析处理,得到终端层风险分析结果。
进一步地,所述用于用户设备进行风险分析的分析规则信息可包括:黑白名单信息、设备指纹信息、网页过滤信息、指定事件属性信息中的至少一种信息。
进一步地,上述图形码可以为第一用户设备对应的付款码;目标操作为第二用户设备扫描第一用户设备对应的付款码后向服务器发起的对第一用户设备对应的支付账户进行扣款的操作。
进一步地,上述图形码可包括:二维码、条形码中的一种。
相对应地,处于在线状态的第二用户设备可以扫描第一用户设备提供的与目标操作对应的图形码;当然,该图形码中包含:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果。第二用户设备将扫描获取的图形码发送至服务器,以使服务器基于图形码中包含的终端层风险分析结果确定是否根据基础信息执行目标操作。
进一步地,在服务器根据图形码中包含的终端层风险分析结果确定是否根据基础信息执行目标操作的过程中,服务器可先从图形码中解析出终端层风险分析结果;然后将终端层风险分析结果发送至风控系统,并获取风控系统反馈的风险决策结果;该风险决策结果包括:当上述终端层风险分析结果为接受风险时作出的目标操作无风险的决策;或者当终端层风险分析结果为拒绝风险时作出的目标操作有风险的决策;并且,如果风险决策结果为目标操作无风险,则服务器确定根据基础信息执行目标操作:如果风险决策结果为目标操作有风险,则服务器拒绝执行目标操作。
由此,服务器可以根据图形码中包含的终端层风险分析结果,利用风控系统在掌握终端层面的风险分析信息后,对执行目标操作的风险进行综合分析,从而提升风控系统的风险防控能力,提高服务器执行目标操作的效率。
另外,为了提高服务器对目标操作的风险防控能力,在用于确定是否执行目标操作的风险分析中还包括:在服务器侧所做出的服务端层风险分析;相应地,服务器在根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作时,可以具体执行如下过程:如果风险决策结果未明确给出目标操作是否有风险,则触发执行服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果;并根据服务端层风险分析结果确定是否根据基础信息执行目标操作。从而提高服务器对目标操作的风险防控能力。
进一步地,上述服务端层风险分析可包括至少两层风险分析,且每层风险分析对应设置有优先级;服务器在触发执行服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果时,可按每层风险分析对应的优先级依次触发执行各层风险分析并将得到的风险分析结果发送至所述风控系统,直到风控系统基于相应层的风险分析结果做出所述目标操作无风险或者有风险的风险决策结果时,结束风险分析操作,以提高获取风险分析结果的效率。
下面通过多个实施例来进一步说明本说明书的技术方案。
实施例一
基于上述应用场景架构,图2为本说明书实施例提供的风险防控信息处理方法的流程示意图一,图2中的方法能够由图1中的第一用户设备执行,如图2所示,该方法包括以下步骤:步骤S102,响应于展示目标操作对应的图形码的操作,获取图形码对应的生成信息,所述生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对 目标操作所做出的终端层风险分析结果;其中,所述图形码包括但不局限于:二维码、条形码中的一种。所谓目标操作可以是第一用户设备上安装的应用中涉及的某一指定操作,该指定操作需由区别于第一用户设备的第二用户设备向网络侧的服务器发起执行,且在实现完成该指定操作的过程中需要使用到由第一用户设备提供的图形码。
具体地,响应于离线用户欲在第一用户设备上展示目标操作对应的图形码的触发操作,处于离线状态(也可以是在线状态)的第一用户设备从设备侧获取该图形码对应的生成信息,该生成信息用生成该图形码。生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果。
其中,执行目标操作所需的基础信息可泛指用于执行目标操作的操作业务内容所需要的由第一用户设备提供的全部必要信息,例如在目标操作为对第一用户设备对应的支付账户进行扣款的操作中,该基础信息可包括:支付账户的账户名、扣款金额、扣款方式等信息。
第一用户设备针对目标操作所做出的终端层风险分析结果可以包含几种情况,如明确接受风险(分析得到的风险结果明确在接受范围内,目标操作不存在风险可执行)、明确拒绝风险(分析得到的风险结果明确在拒绝范围内,目标操作存在风险不可执行)、风险不明确(分析得到的风险结果即不在接受范围内、也不在拒绝范围内,目标操作是否存在风险尚不明确)。对于前两种情况,可以明确执行或者拒绝执行目标操作,对于第三种情况,则需要通过风控系统进一步对执行目标操作的风险进行服务端层的风险防控分析才能确定,具体服务端层的风险分析采用的具体分析方法不是本说明书实施例的重点,本领域技术人员可以自行设计和设定。本说明书实施例对此不作限定。
进一步地,第一用户设备可以通过如下步骤来获取终端层风险分析结果。
步骤1,第一用户设备可以从目标操作对应的风控系统中获取用于用户设备进行风险分析的分析规则信息;其中,所述用于用户设备进行风险分析的分析规则信息可包括:黑白名单信息、设备指纹信息、网页过滤信息、指定事件属性信息中的至少一种信息。各规则信息具体示意如下:黑白名单信息:标识存在风险的黑名单信息,以及不存储风险的白名单信息;名单信息具体可以是第一用户设备触发目标操作所对应的应用的用户名或者绑定的账号信息。
设备指纹信息:标识是否存在风险的设备信息,比如设备的ID信息等。
网页过滤信息:标识是否存在风险的网页过滤信息。
指定事件属性信息:标识设备上是否存在风险的指定事件的属性信息,例如已发生事件所属的事件类型,事件中涉及的内容信息等。
步骤2,采用分析规则信息对从第一用户设备采集的相应分析内容信息进行分析处理,得到终端层风险分析结果。
具体地,从第一用户设备上采集与上述各分析规则信息对应的分析内容信息,并采用相应的分析规则信息对分析内容信息进行分析判断,以确定出终端层风险分析结果。该终端层风险分析结果包括:明确接受风险、明确拒绝风险以及风险不明确三种情况。
步骤S104,根据生成信息生成图形码,并将生成的图形码在第一用户设备进行展示,以使第二用户设备通过扫描图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作。
从生成的图形码中,可以直接获取到第一用户设备的终端层风险分析结果,从而使网络侧的风控系统通过图形码掌握终端层面的风险防控信息,从而提升其自身的风险防控能力。
在持有第一用户设备的用户利用第一用户生成图形码后,可将该图形码在第一用户设备上展示,以使得持有第二用户设备的用户通过第二用户设备扫描该图形码,并向服务器转发该图形码以发起针对目标操作的执行请求。服务器接收到该执行请求后,可根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作。
其中,所述图形码可具体为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
进一步地,以所述图形码为第一用户设备对应的付款码,目标操作为第二用户设备扫描第一用户设备对应的付款码后向服务器发起的对第一用户设备对应的支付账户进行扣款的操作为例,对本说明书实施例中的风险防控信息处理方法进行示例性说明,如图3所述,该风险防控信息处理方法包括:S11:用户(付款用户)登录处于离线状态下的第一用户设备上的应用。
S12:第一用户设备从风控系统中获取(更新)分析规则信息到本地,该分析规则信息为用于用户设备进行风险分析的分析规则信息。
S13:第一用户设备基于分析规则信息以及从本地获取的相应分析内容信息,生成终端层风险分析结果。
S14:第一用户设备接收用户触发的生成付款码的操作。
S15:第一用户设备基于从设备侧本地获取的用于生成所述付款码的基础信息以及上述终端层风险分析结果生成付款码,并将付款码在第一用户设备上进行展示。
之后,第二用户设备可通过扫描第一用户设备提供的图形码向服务器发起目标操作的执行请求,使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作。
本说明书实施例提供的风险防控信息处理方法,通过响应于展示目标操作对应的图形码的操作,获取图形码对应的生成信息,该生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果;根据生成信息生成图形码,并将生成的图形码在第一用户设备进行展示,以使第二用户设备通过扫描图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
实施例二
基于上述应用场景架构,图4为本说明书实施例提供的风险防控信息处理方法的流程示意图二,图4中的方法能够由图1中的服务器执行,如图4所示,该方法包括以下步骤:S202,接收第二用户设备通过扫描第一用户设备展示的图形码而向服务器发起的目标操作的执行请求;所述图形码为第一用户设备基于生成信息生成,所述生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果。
其中,所述图形码包括但不局限于:二维码、条形码中的一种。所谓目标操作可以是第一用户设备上安装的应用中涉及的某一指定操作,该指定操作需由区别于第一用户设备的第二用户设备向网络侧的服务器发起执行,且在实现完成该指定操作的过程中需要使用到由第一用户设备提供的图形码。
具体地,当离线用户触发在第一用户设备上展示目标操作对应的图形码的操作后,处于离线状态(也可以是在线状态)的第一用户设备可通过执行实施例一中的方法步骤生成图形码,该图形码中包含:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果。
其中,执行目标操作所需的基础信息可泛指用于执行目标操作的操作业务内容所需要的由第一用户设备提供的全部必要信息,例如在目标操作为对第一用户设备对应的支付账户进行扣款的操作中,该基础信息可包括:支付账户的账户名、扣款金额、扣款方式等信息。
第一用户设备针对目标操作所做出的终端层风险分析结果可以包含几种情况,如明确接受风险(分析得到的风险结果明确在接受范围内,目标操作不存在风险可执行)、明确拒绝风险(分析得到的风险结果明确在拒绝范围内,目标操作存在风险不可执行)、风险不明确(分析得到的风险结果即不在接受范围内、也不在拒绝范围内,目标操作是否存在风险尚不明确)。对于前两种情况,可以明确执行或者拒绝执行目标操作,对于第三种情况,则需要通过风控系统进一步对执行目标操作的风险进行服务端层的风险防控分析才能确定,具体服务端层的风险分析采用的具体分析方法不是本说明书实施例的重点,本领域技术人员可以自行设计和设定。本说明书实施例对此不作限定。
第二用户设备通过扫描获取到第一用户设备提供的上述图形码后,将该图形码发送至服务器,以向服务器发起针对目标操作的执行请求,该执行请求中包含第一用户设备生成的图形码,即包括:用于执行目标操作的基础信息以及第一用户设备做出的终端层风险分析结果。
S204,根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作。
具体地,服务器根据图形码中包含的终端层风险分析结果来判断执行本次目标操作所带来的风险,从而确定是否根据基础信息执行目标操作。
例如,服务器根据图形码中包含的终端层风险分析结果确定是否根据基础信息执行目标操作的过程,可通过以下步骤实现:步骤1,服务器从图形码中解析出终端层风险分析结果;例如,服务器可将从第二用户设备接收的图形码发送至服务端的解码中心,通过解码中心解析图形码,以获取图形码中包含的终端层风险分析结果,以及执行所述目标操作所需的基础信息。
步骤2,将终端层风险分析结果发送至风控系统,并获取风控系统反馈的风险决策结果;所述风险决策结果包括:当终端层风险分析结果为接受风险时作出的目标操作无风险的决策;或者当终端层风险分析结果为拒绝风险时作出的目标操作有风险的决策;
另外,需要补充说明的时,在实际应用场景中,如果终端层风险分析结果为即不明确接受风险,也不明确拒绝风险,那么需要在风控系统进一步利用服务端侧(服务层面)的风险分析方法对上述目标操作进行风险分析,以确定风险决策结果。由于本说明书实施例中重点突出的是如何获取并基于终端层风险分析结果对目标操作进行风险分析,因此,在风控系统中在确定风险决策的结果中,重点针对明确接受或者拒绝的终端层风险分析结果,确定风险决策。
步骤3,如果风险决策结果为目标操作无风险,则根据基础信息执行目标操作:步骤4,如果风险决策结果为目标操作有风险,则拒绝执行目标操作。
进一步地,以所述图形码为第一用户设备对应的付款码,目标操作为第二用户设备扫描第一用户设备对应的付款码后向服务器发起的对第一用户设备对应的支付账户进行扣款的操作为例,对本说明书实施例中的风险防控信息处理方法进行示例性说明,如 图5所述,该风险防控信息处理方法包括:S21:用户(接受付款用户)通过第二用户设备扫描第一用户设备展示的付款码(如二维码),并将付款码上传至服务器。
S22:服务端调用解码中心对付款码进行解析。
S23:解码中心返回解码信息,其中包含第一用户设备针对本次扣款操作所生成的终端层风险分析结果以及用于执行本次扣款操作的基础信息。
S24:服务器进行风控咨询,将终端层风险分析结果下传至风控系统。
S25:风控系统返回风险决策结果,该结果包括:若终端层风险分析结果为明确的接受或者拒绝风险,则风控系统直接返回,否则风控系统进一步进行后续的服务侧的风险分析后,返回风险决策结果。
S26:服务器根据风险决策结果发起扣款或者拒绝扣款。
进一步地,为了提高风控系统对目标操作的风险防控能力,在用于确定是否执行目标操作的风险分析中还包括:在服务器侧所做出的服务端层风险分析;相应地,在根据图形码中的终端层风险分析结果确定是否根据基础信息执行所述目标操作时,如果风险决策结果未明确给出目标操作是否有风险,则触发执行服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果;根据服务端层风险分析结果确定是否根据基础信息执行目标操作。
其中,服务端层风险分析所采用的具体分析方法不是本说明书实施例的重点,本领域技术人员可以自行设计和设定。本说明书实施例对此不作限定。例如可包括:针对第一用户设备的可信度过滤、黑名单过滤、自定义过滤的快速识别的风险分析方法;也可以包括:深度识别、识别路由、风险评分、决策路由等深度分析的风险分析方法,以从服务端一侧对目标操作进行风险分析。
进一步地,上述服务端层风险分析可包括至少两层风险分析,且每层风险分析对应设置有优先级;该优先级的划分可遵照与其对应的风险分析的分析过程复杂程度或者分析结果的准确程度来执行。
相应地,在触发执行服务端层风险分析,并针对目标操作做出服务端层风险分析结果时,可按每层风险分析对应的优先级依次触发执行各层风险分析并将得到的风险分析结果发送至风控系统,直到风控系统基于相应层的风险分析结果做出目标操作无风险或者有风险的风险决策结果时,结束风险分析操作。
具体地,为了提高效率,服务端层风险分析不是全部被执行,而是以每层风险分析对应的优先级依次触发执行,并且每次执行完成得到风险分析结果后,将该风险分析结果发送至风控系统进行风险决策判断,当风控系统做出目标操作无风险或者有风险的明确的风险决策结果时,则服务器结束风险分析操作,后续层级的风险分析不再执行。
服务器收到风控系统反馈的风险决策结果后,可基于与前述类似的执行过程,根据风险决策结果,确定是否根据基础信息执行目标操作。
本说明书实施例提供的风险防控信息处理方法,通过接收第二用户设备通过扫描第一用户设备展示的图形码而向服务器发起的目标操作的执行请求;该图形码为第一用户设备基于生成信息生成,生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
实施例三
对应上述图2至图3描述的风险防控信息处理方法,基于相同的技术构思,本说明书实施例还提供一种风险防控信息处理装置。图6为本说明书实施例提供的风险防控信息处理装置的模块组成示意图,该装置设置在第一用户设备中,用于执行图2至图3描述的风险防控信息处理方法,如图6所示,该装置包括:信息获取模块301,响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;信息生成模块302,根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
进一步地,图6所示的装置中还可包括:分析规则获取模块,从所述目标操作对应的风控系统中获取用于用户设备进行风险分析的分析规则信息;分析结果生成模块,采用所述分析规则信息对从所述第一用户设备采集的相应分析内容信息进行分析处理,得到所述终端层风险分析结果。
进一步地,所述用于用户设备进行风险分析的分析规则信息包括:黑白名单信息、设备指纹信息、网页过滤信息、指定事件属性信息中的至少一种信息。
进一步地,所述图形码为第一用户设备对应的付款码;所述目标操作为第二用户设备扫描第一用户设备对应的付款码后向服务器发起的对第一用户设备对应的支付账户进行扣款的操作。
进一步地,所述图形码包括:二维码、条形码中的一种。
本说明书实施例提供的风险防控信息处理装置,通过响应于展示目标操作对应的图形码的操作,获取图形码对应的生成信息,该生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果;根据生成信息生成图形码,并将生成的图形码在第一用户设备进行展示,以使第二用户设备通过扫描图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
需要说明的是,本说明书中关于风险防控信息处理装置的实施例与本说明书中实施例一中关于风险防控信息处理方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险防控信息处理方法的实施,重复之处不再赘述。
实施例四
对应上述图4至图5描述的风险防控信息处理方法,基于相同的技术构思,本说明书实施例还提供一种风险防控信息处理装置。图7为本说明书实施例提供的风险防控信息处理装置的模块组成示意图,该装置设置在第二用户设备中,用于执行图4至图5描述的风险防控信息处理方法,如图7所示,该装置包括:请求接收模块401,接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;操作确定模块402,根据所述图形码中的终端层风险分析结果确定是否 根据所述基础信息执行所述目标操作。
进一步地,操作确定模块402,从所述图形码中解析出终端层风险分析结果;将所述终端层风险分析结果发送至风控系统,并获取所述风控系统反馈的风险决策结果;所述风险决策结果包括:当所述终端层风险分析结果为接受风险时作出的所述目标操作无风险的决策;或者当所述终端层风险分析结果为拒绝风险时作出的所述目标操作有风险的决策;如果所述风险决策结果为所述目标操作无风险,则根据所述基础信息执行所述目标操作:如果所述风险决策结果为所述目标操作有风险,则拒绝执行所述目标操作。
进一步地,用于确定是否执行所述目标操作的风险分析还包括:在所述服务器侧所做出的服务端层风险分析;所述操作确定模块402,如果所述风险决策结果未明确给出所述目标操作是否有风险,则触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果;根据所述服务端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
进一步地,所述服务端层风险分析包括至少两层风险分析,且每层风险分析对应设置有优先级;所述操作确定模块402,按每层风险分析对应的所述优先级依次触发执行各层风险分析并将得到的风险分析结果发送至所述风控系统,直到所述风控系统基于相应层的风险分析结果做出所述目标操作无风险或者有风险的风险决策结果时,结束风险分析操作。
进一步地,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
进一步地,所述图形码包括:二维码、条形码中的一种。
本说明书实施例提供的风险防控信息处理装置,通过接收第二用户设备通过扫描第一用户设备展示的图形码而向服务器发起的目标操作的执行请求;该图形码为第一用户设备基于生成信息生成,生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
需要说明的是,本说明书中关于风险防控信息处理装置的实施例与本说明书中实施例二中关于风险防控信息处理方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险防控信息处理方法的实施,重复之处不再赘述。
实施例五
对应上述图2至图3描述的风险防控信息处理方法,基于相同的技术构思,本说明书实施例还提供一种风险防控信息处理设备,该设备用于执行上述的风险防控信息处理方法,图8为本说明书实施例提供的一种风险防控信息处理设备的结构示意图。
如图8所示,风险防控信息处理设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器501和存储器502,存储器502中可以存储有一个或一个以上存储应用程序或数据。其中,存储器502可以是短暂存储或持久存储。存储在存储器502的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括风险防控信息处理设备中的一系列计算机可执行指令。更进一步地,处理器501可以设置为与存储器502通信,在风险防控信息处理设备上执行存储器502中的一系列计算 机可执行指令。风险防控信息处理设备还可以包括一个或一个以上电源503,一个或一个以上有线或无线网络接口504,一个或一个以上输入输出接口505,一个或一个以上键盘506等。
在一个具体的实施例中,风险防控信息处理设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对风险防控信息处理设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
可选地,计算机可执行指令在被执行时,所述方法还包括:从所述目标操作对应的风控系统中获取用于用户设备进行风险分析的分析规则信息;采用所述分析规则信息对从所述第一用户设备采集的相应分析内容信息进行分析处理,得到所述终端层风险分析结果。
可选地,计算机可执行指令在被执行时,所述用于用户设备进行风险分析的分析规则信息包括:黑白名单信息、设备指纹信息、网页过滤信息、指定事件属性信息中的至少一种信息。
可选地,计算机可执行指令在被执行时,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。可选地,计算机可执行指令在被执行时,所述图形码包括:二维码、条形码中的一种。
本说明书实施例提供的风险防控信息处理设备,通过响应于展示目标操作对应的图形码的操作,获取图形码对应的生成信息,该生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果;根据生成信息生成图形码,并将生成的图形码在第一用户设备进行展示,以使第二用户设备通过扫描图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
需要说明的是,本说明书中关于风险防控信息处理设备的实施例与本说明书实施例一中关于风险防控信息处理方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险防控信息处理方法的实施,重复之处不再赘述。
实施例六
对应上述图4至图5描述的风险防控信息处理方法,基于相同的技术构思,本说明书实施例还提供一种风险防控信息处理设备,该设备用于执行上述的风险防控信息处理方法,图9为本说明书实施例提供的一种风险防控信息处理设备的结构示意图。
如图9所示,风险防控信息处理设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器601和存储器602,存储器602中可以存储有一个或 一个以上存储应用程序或数据。其中,存储器602可以是短暂存储或持久存储。存储在存储器602的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括风险防控信息处理设备中的一系列计算机可执行指令。更进一步地,处理器601可以设置为与存储器602通信,在风险防控信息处理设备上执行存储器602中的一系列计算机可执行指令。风险防控信息处理设备还可以包括一个或一个以上电源603,一个或一个以上有线或无线网络接口604,一个或一个以上输入输出接口605,一个或一个以上键盘606等。
在一个具体的实施例中,风险防控信息处理设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对风险防控信息处理设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
可选地,计算机可执行指令在被执行时,所述根据图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作包括:从所述图形码中解析出终端层风险分析结果;将所述终端层风险分析结果发送至风控系统,并获取所述风控系统反馈的风险决策结果;所述风险决策结果包括:当所述终端层风险分析结果为接受风险时作出的所述目标操作无风险的决策;或者当所述终端层风险分析结果为拒绝风险时作出的所述目标操作有风险的决策;如果所述风险决策结果为所述目标操作无风险,则根据所述基础信息执行所述目标操作:如果所述风险决策结果为所述目标操作有风险,则拒绝执行所述目标操作。
可选地,计算机可执行指令在被执行时,用于确定是否执行所述目标操作的风险分析还包括:在所述服务器侧所做出的服务端层风险分析;所述根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作包括:如果所述风险决策结果未明确给出所述目标操作是否有风险,则触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果;根据所述服务端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
可选地,计算机可执行指令在被执行时,所述服务端层风险分析包括至少两层风险分析,且每层风险分析对应设置有优先级;所述触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果包括:按每层风险分析对应的所述优先级依次触发执行各层风险分析并将得到的风险分析结果发送至所述风控系统,直到所述风控系统基于相应层的风险分析结果做出所述目标操作无风险或者有风险的风险决策结果时,结束风险分析操作。
可选地,计算机可执行指令在被执行时,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
可选地,计算机可执行指令在被执行时,所述图形码包括:二维码、条形码中的一种。
本说明书实施例提供的风险防控信息处理设备,通过接收第二用户设备通过扫描 第一用户设备展示的图形码而向服务器发起的目标操作的执行请求;该图形码为第一用户设备基于生成信息生成,生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
需要说明的是,本说明书中关于风险防控信息处理设备的实施例与本说明书实施例二中关于风险防控信息处理方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险防控信息处理方法的实施,重复之处不再赘述。
实施例七
对应上述图2至图3描述的风险防控信息处理方法,基于相同的技术构思,本说明书实施例还提供一种存储介质,用于存储计算机可执行指令,一个具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述方法还包括:从所述目标操作对应的风控系统中获取用于用户设备进行风险分析的分析规则信息;
采用所述分析规则信息对从所述第一用户设备采集的相应分析内容信息进行分析处理,得到所述终端层风险分析结果。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述用于用户设备进行风险分析的分析规则信息包括:黑白名单信息、设备指纹信息、网页过滤信息、指定事件属性信息中的至少一种信息。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述图形码包括:二维码、条形码中的一种。
本说明书实施例提供的存储介质所存储的计算机可执行指令在被处理器执行时,通过响应于展示目标操作对应的图形码的操作,获取图形码对应的生成信息,该生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对目标操作所做出的终端层风险分析结果;根据生成信息生成图形码,并将生成的图形码在第一用户设备进行展示,以使第二用户设备通过扫描图形码向服务器发起目标操作的执行请求,进而使服务器根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
需要说明的是,本说明书中关于存储介质的实施例与本说明书中实施例一关于风险防控信息处理方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险防控信息处理方法的实施,重复之处不再赘述。
实施例八
对应上述图4至图5描述的风险防控信息处理方法,基于相同的技术构思,本说明书实施例还提供一种存储介质,用于存储计算机可执行指令,一个具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作包括:从所述图形码中解析出终端层风险分析结果;将所述终端层风险分析结果发送至风控系统,并获取所述风控系统反馈的风险决策结果;所述风险决策结果包括:当所述终端层风险分析结果为接受风险时作出的所述目标操作无风险的决策;或者当所述终端层风险分析结果为拒绝风险时作出的所述目标操作有风险的决策;如果所述风险决策结果为所述目标操作无风险,则根据所述基础信息执行所述目标操作:如果所述风险决策结果为所述目标操作有风险,则拒绝执行所述目标操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,用于确定是否执行所述目标操作的风险分析还包括:在所述服务器侧所做出的服务端层风险分析;所述根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作包括:如果所述风险决策结果未明确给出所述目标操作是否有风险,则触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果;根据所述服务端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述服务端层风险分析包括至少两层风险分析,且每层风险分析对应设置有优先级;所述触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果包括:按每层风险分析对应的所述优先级依次触发执行各层风险分析并将得到的风险分析结果发送至所述风控系统,直到所述风控系统基于相应层的风险分析结果做出所述目标操作无风险或者有风险的风险决策结果时,结束风险分析操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述图形码包括:二维码、条形码中的一种。
本说明书实施例提供的存储介质所存储的计算机可执行指令在被处理器执行时,通过接收第二用户设备通过扫描第一用户设备展示的图形码而向服务器发起的目标操作的执行请求;该图形码为第一用户设备基于生成信息生成,生成信息包括:执行目标操作所需的基础信息以及第一用户设备针对所述目标操作所做出的终端层风险分析结果;根据图形码中的终端层风险分析结果确定是否根据基础信息执行目标操作,从而实 现在第二用户设备通过扫描第一用户设备提供的图形码向服务器发起针对第一用户设备的目标操作时,也可以使服务器获取到第一用户设备做出的终端层风险分析结果,从而很好的解决了离线支付场景下终端风险防控信息无法获取的问题,提升了风险防控性能和能力。
需要说明的是,本说明书中关于存储介质的实施例与本说明书中实施例二关于风险防控信息处理方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险防控信息处理方法的实施,重复之处不再赘述。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。
在20世纪30年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本说明书一个或多个实施例可提供为方法、系统或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包 含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本说明书一个或多个实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书的一个或多个实施例,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本文件的实施例而已,并不用于限制本文件。对于本领域技术人员来说,本文件可以有各种更改和变化。凡在本文件的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本文件的权利要求范围之内。

Claims (26)

  1. 一种风险防控信息处理方法,所述方法应用于第一用户设备,包括:
    响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    从所述目标操作对应的风控系统中获取用于用户设备进行风险分析的分析规则信息;
    采用所述分析规则信息对从所述第一用户设备采集的相应分析内容信息进行分析处理,得到所述终端层风险分析结果。
  3. 根据权利要求2所述的方法,其中,所述用于用户设备进行风险分析的分析规则信息包括:黑白名单信息、设备指纹信息、网页过滤信息、指定事件属性信息中的至少一种信息。
  4. 根据权利要求1所述的方法,其中,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
  5. 根据权利要求1所述的方法,所述图形码包括:二维码、条形码中的一种。
  6. 一种风险防控信息处理方法,所述方法应用于服务器,包括:
    接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  7. 根据权利要求6所述的方法,其中,所述根据图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作包括:
    从所述图形码中解析出终端层风险分析结果;
    将所述终端层风险分析结果发送至风控系统,并获取所述风控系统反馈的风险决策结果;所述风险决策结果包括:当所述终端层风险分析结果为接受风险时作出的所述目标操作无风险的决策;或者当所述终端层风险分析结果为拒绝风险时作出的所述目标操作有风险的决策;
    如果所述风险决策结果为所述目标操作无风险,则根据所述基础信息执行所述目标操作:
    如果所述风险决策结果为所述目标操作有风险,则拒绝执行所述目标操作。
  8. 根据权利要求7所述的方法,其中,用于确定是否执行所述目标操作的风险分析还包括:在所述服务器侧所做出的服务端层风险分析;
    所述根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作包括:
    如果所述风险决策结果未明确给出所述目标操作是否有风险,则触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果;
    根据所述服务端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  9. 根据权利要求8所述的方法,其中,所述服务端层风险分析包括至少两层风险分析,且每层风险分析对应设置有优先级;
    所述触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果包括:
    按每层风险分析对应的所述优先级依次触发执行各层风险分析并将得到的风险分析结果发送至所述风控系统,直到所述风控系统基于相应层的风险分析结果做出所述目标操作无风险或者有风险的风险决策结果时,结束风险分析操作。
  10. 根据权利要求6所述的方法,其中,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
  11. 根据权利要求6所述的方法,所述图形码包括:二维码、条形码中的一种。
  12. 一种风险防控信息处理装置,包括:
    信息获取模块,响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    信息生成模块,根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  13. 根据权利要求12所述的装置,其中,所述装置还包括:
    分析规则获取模块,从所述目标操作对应的风控系统中获取用于用户设备进行风险分析的分析规则信息;
    分析结果生成模块,采用所述分析规则信息对从所述第一用户设备采集的相应分析内容信息进行分析处理,得到所述终端层风险分析结果。
  14. 根据权利要求13所述的装置,其中,所述用于用户设备进行风险分析的分析规则信息包括:黑白名单信息、设备指纹信息、网页过滤信息、指定事件属性信息中的至少一种信息。
  15. 根据权利要求12所述的装置,其中,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
  16. 根据权利要求12所述的装置,所述图形码包括:二维码、条形码中的一种。
  17. 一种风险防控信息处理装置,包括:
    请求接收模块,接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    操作确定模块,根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  18. 根据权利要求17所述的装置,其中,所述操作确定模块,从所述图形码中解 析出终端层风险分析结果;
    将所述终端层风险分析结果发送至风控系统,并获取所述风控系统反馈的风险决策结果;所述风险决策结果包括:当所述终端层风险分析结果为接受风险时作出的所述目标操作无风险的决策;或者当所述终端层风险分析结果为拒绝风险时作出的所述目标操作有风险的决策;
    如果所述风险决策结果为所述目标操作无风险,则根据所述基础信息执行所述目标操作:
    如果所述风险决策结果为所述目标操作有风险,则拒绝执行所述目标操作。
  19. 根据权利要求18所述的装置,其中,用于确定是否执行所述目标操作的风险分析还包括:在所述服务器侧所做出的服务端层风险分析;
    所述操作确定模块,如果所述风险决策结果未明确给出所述目标操作是否有风险,则触发执行所述服务端层风险分析,并针对所述目标操作做出服务端层风险分析结果;
    根据所述服务端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  20. 根据权利要求19所述的装置,其中,所述服务端层风险分析包括至少两层风险分析,且每层风险分析对应设置有优先级;
    所述操作确定模块,按每层风险分析对应的所述优先级依次触发执行各层风险分析并将得到的风险分析结果发送至所述风控系统,直到所述风控系统基于相应层的风险分析结果做出所述目标操作无风险或者有风险的风险决策结果时,结束风险分析操作。
  21. 根据权利要求17所述的装置,其中,所述图形码为所述第一用户设备对应的付款码;所述目标操作为第二用户设备扫描所述第一用户设备对应的付款码后向服务器发起的对所述第一用户设备对应的支付账户进行扣款的操作。
  22. 根据权利要求17所述的装置,其中,所述图形码包括:二维码、条形码中的一种。
  23. 一种风险防控信息处理设备,包括:
    处理器;以及,
    被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:
    响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  24. 一种风险防控信息处理设备,包括:
    处理器;以及,
    被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:
    接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  25. 一种存储介质,用于存储计算机可执行指令,所述计算机可执行指令在被执行时实现以下流程:
    响应于展示目标操作对应的图形码的操作,获取所述图形码对应的生成信息,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    根据所述生成信息生成图形码,并将生成的所述图形码在所述第一用户设备进行展示,以使第二用户设备通过扫描所述图形码向服务器发起所述目标操作的执行请求,进而使所述服务器根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
  26. 一种存储介质,用于存储计算机可执行指令,所述计算机可执行指令在被执行时实现以下流程:
    接收第二用户设备通过扫描第一用户设备展示的图形码而向所述服务器发起的目标操作的执行请求;所述图形码为所述第一用户设备基于生成信息生成,所述生成信息包括:执行所述目标操作所需的基础信息以及所述第一用户设备针对所述目标操作所做出的终端层风险分析结果;
    根据所述图形码中的终端层风险分析结果确定是否根据所述基础信息执行所述目标操作。
PCT/CN2021/099605 2020-06-12 2021-06-11 风险防控信息处理方法、装置及设备 WO2021249526A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010534225.0A CN111445258A (zh) 2020-06-12 2020-06-12 风险防控信息处理方法、装置及设备
CN202010534225.0 2020-06-12

Publications (1)

Publication Number Publication Date
WO2021249526A1 true WO2021249526A1 (zh) 2021-12-16

Family

ID=71652215

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/099605 WO2021249526A1 (zh) 2020-06-12 2021-06-11 风险防控信息处理方法、装置及设备

Country Status (2)

Country Link
CN (1) CN111445258A (zh)
WO (1) WO2021249526A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111445258A (zh) * 2020-06-12 2020-07-24 支付宝(杭州)信息技术有限公司 风险防控信息处理方法、装置及设备
CN112837053B (zh) * 2021-01-29 2022-08-09 支付宝(杭州)信息技术有限公司 支付处理方法及装置
CN113255857B (zh) * 2021-05-28 2022-09-06 支付宝(杭州)信息技术有限公司 一种图形码的风险检测方法、装置及设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875078A (zh) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 交易风险检测方法、装置及设备
CN106878236A (zh) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 一种用户请求处理方法和设备
CN108269084A (zh) * 2017-01-03 2018-07-10 阿里巴巴集团控股有限公司 一种用于在移动设备上进行扫码支付的方法及装置
CN111445258A (zh) * 2020-06-12 2020-07-24 支付宝(杭州)信息技术有限公司 风险防控信息处理方法、装置及设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107590653B (zh) * 2016-07-08 2021-03-09 中国电信股份有限公司 支付方法、终端和系统
CN106570637A (zh) * 2016-10-28 2017-04-19 努比亚技术有限公司 一种二维码数据采集中信息提示装置及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878236A (zh) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 一种用户请求处理方法和设备
CN106875078A (zh) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 交易风险检测方法、装置及设备
CN108269084A (zh) * 2017-01-03 2018-07-10 阿里巴巴集团控股有限公司 一种用于在移动设备上进行扫码支付的方法及装置
CN111445258A (zh) * 2020-06-12 2020-07-24 支付宝(杭州)信息技术有限公司 风险防控信息处理方法、装置及设备

Also Published As

Publication number Publication date
CN111445258A (zh) 2020-07-24

Similar Documents

Publication Publication Date Title
WO2021249526A1 (zh) 风险防控信息处理方法、装置及设备
EP3780541B1 (en) Identity information identification method and device
US10756901B2 (en) Blockchain-based identity authentication method, apparatus, and device
JP6859513B2 (ja) 2次元コード生成の方法およびデバイス、ならびに2次元コード認識の方法およびデバイス
CN113657886B (zh) 一种支付系统、方法、服务器设备、介质及装置
WO2021223675A1 (zh) 风险检测
KR20190025005A (ko) 데이터 위험을 제어하기 위한 방법 및 디바이스
TW201933175A (zh) 資訊識別方法、伺服器、客戶端及系統
CN113344567B (zh) 一种聚合码的支付页面的访问方法、装置、设备及介质
CN113222578A (zh) 一种支付方法及装置
EP3720044B1 (en) Electronic certificate transmission method, apparatus and device
WO2022237574A1 (zh) 权益分享处理的方法及装置
CN111882317A (zh) 一种业务处理系统、可读存储介质以及电子设备
JP2019509567A (ja) アプリケーション(app)のためのリソースロード方法、サービス機能実施方法及び装置
CN108550033A (zh) 一种显示数字对象唯一标识符的方法及装置
WO2024041316A1 (zh) 支付处理方法及装置
WO2021120845A1 (zh) 一种同质风险单位特征集合生成方法、装置、设备及介质
CN107301550B (zh) 额度信息的获取方法、额度管控规则的建立方法及装置
CN113419794B (zh) 支付处理方法及装置
CN112837053B (zh) 支付处理方法及装置
CN114201086B (zh) 信息的展示方法及装置
CN112184074A (zh) 一种提示信息输出方法及装置
CN108280645A (zh) 付款码获取、支付请求响应方法、装置以及设备
CN109903165B (zh) 一种模型合并方法和装置
US11042858B1 (en) Assessing validity of mail item

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21821761

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21821761

Country of ref document: EP

Kind code of ref document: A1