A method, device and equipment for identifying abnormal transaction behavior

An anomaly recognition and transaction technology, applied in the computer field, can solve problems such as user resource loss, achieve the effect of avoiding resource loss and improving effectiveness

Active Publication Date: 2021-09-28
ADVANCED NEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the continuous improvement of network technology, there are more and more network viruses or network Trojan horse programs, and it is difficult for blacklists or whitelists to cover all possible network viruses or network Trojan horse programs in time, or other risky transactions. In this way, In practical applications, users will encounter transaction risks that cannot be covered in the blacklist or whitelist, resulting in the loss of user resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and equipment for identifying abnormal transaction behavior
  • A method, device and equipment for identifying abnormal transaction behavior
  • A method, device and equipment for identifying abnormal transaction behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] like figure 1 As shown, the embodiment of this specification provides a method for establishing an abnormality recognition model. The execution subject of the method may be a terminal device or a server, wherein the terminal device may be a personal computer or other mobile phone or a tablet computer. A terminal device, the terminal device may be a terminal device used by a user. The server can be an independent server, or a server cluster composed of multiple servers, and the server can be the background server of a certain business, or the background of a certain website (such as an online shopping website or payment application, etc.) server etc. In order to improve the efficiency of establishing an abnormality identification model, this embodiment takes the execution subject as a server as an example for illustration. For the case of a terminal device, it can be handled according to the following relevant content, and will not be repeated here. The method specific...

Embodiment 2

[0089] like image 3 As shown, the embodiment of this specification provides a method for identifying abnormal transaction behavior. The execution subject of the method may be a terminal device or a server, wherein the terminal device may be a personal computer or other mobile phone or tablet computer. A terminal device, the terminal device may be a terminal device used by a user. The server can be an independent server, or a server cluster composed of multiple servers, and the server can be the background server of a certain business, or the background of a certain website (such as an online shopping website or payment application, etc.) server etc. This method can create an identification model for identifying abnormal transactions, and identify abnormal transaction lines. In order to improve the identification efficiency of abnormal transactions, this embodiment takes the execution subject as the server as an example for illustration. For terminal equipment In the case of...

Embodiment 3

[0131] The above is the identification method for abnormal transaction behavior provided by the embodiment of this specification. Based on the same idea, the embodiment of this specification also provides an identification device for abnormal transaction behavior, such as Figure 5 shown.

[0132] The identification device for abnormal transaction behavior includes: a model acquisition module 501, a vector calculation module 502 and an identification module 503, wherein:

[0133] A model acquisition module 501, configured to acquire an abnormality recognition model, wherein the abnormality recognition model is established according to the user identifier of at least one user and the identifier of the transaction object in the historical transaction data of the at least one user, and the abnormality recognition model uses It is used to calculate the topic distribution vector in user transactions;

[0134] A vector calculation module 502, configured to use the abnormality ident...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification discloses a method, device, and equipment for identifying abnormal transaction behaviors. The method includes: acquiring an abnormal identification model, wherein the abnormal identification model is based on the user identification of at least one user and the user ID of the at least one user. The identification of the transaction object in the historical transaction data is established. The abnormal recognition model is used to calculate the topic distribution vector in the user transaction. Then, the abnormal recognition model can be used to calculate the topic distribution vector corresponding to the transaction to be recognized. According to the Describe the topic distribution vector corresponding to the transaction to be identified, and identify the abnormality of the transaction to be identified.

Description

technical field [0001] This specification relates to the field of computer technology, and in particular to a method, device and equipment for identifying abnormal transaction behavior. Background technique [0002] With the development of network technology and terminal technology, e-commerce plays an important role in people's life, and with the continuous development of e-commerce, people pay more and more attention to transaction security. [0003] In order to ensure the security of network transactions, the corresponding business systems are usually equipped with detection mechanisms for network transaction behaviors, such as intercepting possible risky transactions in the business system through blacklists or whitelists. With the continuous improvement of network technology, there are more and more network viruses or network Trojan horse programs, and it is difficult for blacklists or whitelists to cover all possible network viruses or network Trojan horse programs in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06G06Q20/40G06Q30/00
CPCG06Q10/0635G06Q20/4016G06Q30/0185
Inventor 许辽萨王维强
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products