The invention relates to a transaction security control method and a system based on subject portrait

A security control and transaction technology, applied in the field of transaction security, to achieve good real-time performance, fast analysis, and strong recognition capabilities

Active Publication Date: 2019-03-22
北京领雁科技股份有限公司
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem that the existing technology can only be remedied or recovered after the fraudulent transactions occur, the present invention innovatively provides a transaction security control method and system based on subject portraits. Through the construction of subject portraits and anti-fraud models, The invention can realize the security control of the transaction when the transaction occurs, reduce or even avoid the occurrence of high-risk transactions, protect the transaction security of users, and fundamentally reduce or even prevent the occurrence of fraudulent transactions, thereby better solving the problems existing in the existing post-event supervision method many problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The invention relates to a transaction security control method and a system based on subject portrait
  • The invention relates to a transaction security control method and a system based on subject portrait
  • The invention relates to a transaction security control method and a system based on subject portrait

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Such as figure 1 As shown, this embodiment specifically discloses a transaction security control method based on subject portraits, so that transaction security can be effectively protected under emerging transaction methods and transaction channels, and the occurrence of fraudulent behavior can be reduced or even avoided. Specifically, the transaction The security control method includes the following steps.

[0066] Step S1, build a data mart through the acquired banking transaction data, such as analysis of bank user and account data and ETL (extract, transform, load) to build a data mart , is used to calculate the historical behavior of the subject. The time span of the subject data is often long, and more historical data is required to be accumulated. After the data mart is built, the historical transaction data is read from the data mart.

[0067] Step S2, based on the read historical transaction data, determine the subject portrait data to reflect the user's dai...

Embodiment 2

[0094] Based on the same inventive concept as Embodiment 1, this embodiment specifically discloses a transaction security control system based on subject portraits, which can effectively protect transaction security under emerging transaction methods and transaction channels, and reduce or even avoid the occurrence of fraudulent behavior ,Such as Figure 5 As shown, the transaction security control system includes a data mart building module, a subject portrait generation module, an in-memory database, a matching result calculation module, and a transaction risk decision-making module.

[0095] The data mart building module is used to construct a data mart through the acquired banking transaction data, which is used to calculate the historical behavior of the subject, and the data mart is used to provide historical transaction data.

[0096] The subject portrait generation module is used to determine the subject portrait data to reflect the user's daily transaction behavior ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention particularly discloses a transaction safety control method and a system based on a subject portrait. The method comprises the following steps: determining subject portrait data accordingto historical transaction data; Reading the subject portrait data corresponding to the real-time transaction data when the transaction occurs; Make the real-time transaction data and the main body portrait data carry on the difference comparison, in order to obtain the difference comparison result; Making the difference comparison result match the anti-fraud model similarly to get the similar matching result; Determining a transaction risk level according to the similarity matching result and the obtained real-time transaction data, so as to send out corresponding control instructions; The system includes data mart construction module, main body portrait generation module, in-memory database, matching result calculation module and transaction risk decision module. The invention can efficiently and accurately identify high-risk transactions, and can carry out real-time discrimination and control when high-risk transactions occur, so as to achieve the purpose of reducing or even avoiding fraudulent transactions in real-time, and protect the transaction safety of users.

Description

technical field [0001] The present invention relates to the technical field of transaction security, more specifically, the present invention is a transaction security control method and system based on subject portraits. Background technique [0002] At present, with the diversified development of business transaction methods and transaction channels, emerging electronic banks have begun to be widely used, such as online banking, telephone banking, mobile banking, self-service banking, POS terminals, mobile payments, etc. These emerging transactions The method greatly facilitates users; since these transaction processes do not involve bank tellers, it is impossible to effectively control the possible fraudulent means of both parties to the transaction. The traditional method is often post-event supervision, such as T+1 monitoring means, etc. However, The traditional method can only be solved after the fraud occurs. Even if the user's loss can be recovered, it often takes a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06F16/22G06F16/24G06K9/62
CPCG06Q40/04G06F18/22
Inventor 胡佰庆高建新雷开霖李治宇陈海燕
Owner 北京领雁科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products