Charging method of risk control system and risk control system server

A system server and risk control technology, applied in the field of data processing, can solve problems such as unreasonable pricing methods and achieve reasonable pricing methods

Inactive Publication Date: 2017-06-09
ALIBABA GRP HLDG LTD
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing method does not take the judgment of the e-commerce platform or the merchant as a factor in determining the commission, and this pricing method is unreasonable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Charging method of risk control system and risk control system server
  • Charging method of risk control system and risk control system server
  • Charging method of risk control system and risk control system server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present application provide a charging method and server of a risk control system.

[0042] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0043] This application may relate to one or more systems. For example figure 1 As shown, a system architecture 100 of the present application may include an e-commerce platform 111 and a risk control system 112 . The e-commer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention disclose a charging method and a server of a risk control system. According to one embodiment, the charging method of a risk control system comprises the following step: a risk control system server gets current transaction data from an e-commerce platform server; the risk control system server calculates the risk probability of the current transaction by use of the current transaction data and based on big data; the risk control system server feeds the risk probability back to the e-commerce platform server; the risk control system server receives the result of the current transaction sent by the e-commerce platform server; and the risk control system server determines the amount of commission according to the current transaction result and the risk probability. According to the embodiment, the current transaction result and the risk probability given before can be considered in determination of the amount of commission, and the pricing mode is more reasonable.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a charging method and server of a risk control system. Background technique [0002] In B2B, B2C and other e-commerce platforms, during the transaction process, the buyer pays the merchant, and the merchant sells products or services. Buyers can provide their own fund account for payment, specifically, such as using balance payment, online credit card payment, etc. [0003] The buyer's fund account may not be operated by the buyer himself, and sometimes someone else may have stolen the buyer's account. For example, if the buyer loses his credit card, someone else picks it up and uses the card to make purchases on the e-commerce platform. For another example, the buyer's own e-commerce platform account is stolen, and the thief uses the account to make consumption on the e-commerce platform. These acts are all acts of illegal misappropriation. However, during ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/06G06Q40/08
CPCG06Q30/0609G06Q40/08
Inventor 徐季秋张浩许凯
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products