Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Transaction data-based anti-fraud monitoring method and device

A transaction data and transaction technology, which is applied in the field of data processing, can solve the problems that USBKey cannot meet the security needs of online banking business transactions, and cannot know the legal users of the initiator of the digital signature, so as to improve security and improve security. Effect

Inactive Publication Date: 2013-04-17
CHINA CONSTRUCTION BANK
View PDF6 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Domestic banks usually use USB (Universal Serial Bus, Universal Serial Bus) Key to ensure the security of online banking clients, but the existing USB Key is used as a passive signature certificate carrier, and it is impossible to know whether the initiator of the digital signature is legal Neither the user nor the Trojan horse program can know whether the signature data submitted to the USB Key has been illegally tampered with by hackers before being transmitted to the USB Key
[0003] As network security risks become more and more diverse, a single USB Key can no longer meet the security needs of online banking transactions, and new security technology solutions are urgently needed to deal with the security risks of more and more diverse online banking transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction data-based anti-fraud monitoring method and device
  • Transaction data-based anti-fraud monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0019] see figure 1 , which illustrates a schematic flowchart of an anti-fraud monitoring method based on transaction data according to an embodiment of the present invention, the method may specifically include:

[0020] S101, receiving a business transaction request submitted by a client through a client terminal;

[0021] S102, verifying the legality of the business transaction request,

[0022] If the verification is passed, perform data evaluation on the customer's current business transaction request and the previously stored customer's transaction data file to determine the evaluation value of this business transaction request;

[0023] S103, comparing the determined evaluation value with a predetermined threshold, and if it exceeds t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a transaction data-based anti-fraud monitoring method, which comprises the following steps of: receiving a business transaction request submitted by a client through a client terminal; verifying legality of the business transaction request; if the verification is passed, performing data evaluation on the current business transaction request of the client and a previously stored transaction data file of the client to determine an evaluation value of the current business transaction request; comparing the determined evaluation value with a predetermined threshold value; and determining that the current business transaction request is suspicious fraudulent transaction if the determined evaluation value exceeds the predetermined threshold value. The invention also provides a corresponding device. By implementing the method and the device provided by the invention, the security of business transaction can be improved on the data level of business transaction data analysis.

Description

technical field [0001] The invention relates to the field of data processing, in particular to an anti-fraud monitoring method and system based on transaction data. Background technique [0002] As a brand-new financial service channel, online banking is of great significance to social progress, to customers, and to the bank itself. But at the same time, with the rapid development of network technology, the processing of online banking business is faced with many security risks, such as Trojan horse attacks, man-in-the-middle attacks, phishing attacks, malicious code attacks, etc. Domestic banks usually use USB (Universal Serial Bus, Universal Serial Bus) Key to ensure the security of online banking clients, but the existing USB Key is used as a passive signature certificate carrier, and it is impossible to know whether the initiator of the digital signature is legal Neither the user nor the Trojan horse program can know whether the signature data submitted to the USB Key h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06Q40/02
Inventor 徐捷马春峰刘建忠寇冠张玉张鹏贾川邓玉余挈赵志松
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products