Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Illegal transaction detection method and illegal transaction detection device

A detection method and transaction technology, applied in the Internet field, can solve problems such as lack of detection methods

Active Publication Date: 2017-03-29
CHINA UNIONPAY
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention provides a method and device for detecting illegal transactions, which is used to solve the problem in the prior art that there is a lack of a detection method that can directly detect specific transaction behaviors of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal transaction detection method and illegal transaction detection device
  • Illegal transaction detection method and illegal transaction detection device
  • Illegal transaction detection method and illegal transaction detection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0075] figure 1 A flow chart of an illegal transaction detection method provided by the embodiment of the present invention, such as figure 1 shown, including the following steps:

[0076] Step S101: Obtain the user's current transaction behavior data;

[0077] Step S102: extracting the first continuous index data and the first discrete index data from multiple behavior indicators of the current transaction behavior data;

[0078] Step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention provide an illegal transaction detection method and an illegal transaction detection device in order to solve the problem that there still lacks a detection method which can be used to detect a specific transaction behavior of a user directly at present. The method comprises the following steps: acquiring the current transaction behavior data of a user; extracting first continuous index data and first discrete index data from multiple behavior indexes of the current transaction behavior data; calculating a first probability of the current transaction behavior according to the first continuous index data and a continuous detection model, and calculating a second probability of the current transaction behavior according to the first discrete index data and a discrete detection model, wherein the continuous detection model and the discrete detection model are determined according to historical transaction behavior data; and getting a third probability according to the first probability and the second probability, wherein the third probability is the probability that the current transaction behavior is an illegal transaction. An analysis is made of a specific transaction behavior of a user, and whether the transaction behavior of the user is legal or not is distinguished based on the characteristics of the transaction behavior of the user. Thus, the precision of detection is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an illegal transaction detection method and device. Background technique [0002] Proxy access technology is widely used because it can enhance the user's online security, save network resources and many other advantages, but it also brings certain problems to the security management of transactions. [0003] In the existing proxy access detection technology, it is commonly used to capture the user's access data packets at the network layer, and judge by analyzing the data packets, or use commonly used proxy ports to perform reverse proxy scanning, and also through comparison Proxy Internet Protocol Address (Internet Protocol Address, IP) library to identify proxy access, however, most of these detection technologies focus on the identification of the network protocol layer, which not only requires a long detection delay, but can only identify whether the user is a proxy IP,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q40/04G06F17/30
CPCG06F16/2462G06Q20/382G06Q40/04
Inventor 胡奕邱雪涛赵金涛刘红宝
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products