Method and device for determining suspected batch risk transaction events and electronic equipment

A transaction event and risk technology, applied in the network field, can solve problems such as time difference, response program application effect discount, etc., to achieve the effect of improving effectiveness, improving transaction experience, and avoiding financial loss

Inactive Publication Date: 2019-04-12
ALIBABA GRP HLDG LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In addition to single-point prevention and control, there is currently also a solution based on user report information to analyze and discover batch attacks for further response. There is a time difference, which makes the application effect of the response plan compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining suspected batch risk transaction events and electronic equipment
  • Method and device for determining suspected batch risk transaction events and electronic equipment
  • Method and device for determining suspected batch risk transaction events and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0035] It should be noted that the method of the embodiment of the present application can be applied to the scene of batch risk identification and response with front-end real-time risk control model or front-end risk control strategy and rules, for example, it can be applied to the identification of gangs in fraudulent transactions , th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and device for determining suspected batch risk transaction events and electronic equipment, and the method comprises the steps: obtaining a sample transaction event and transaction information corresponding to the sample transaction event, and enabling the risk degree of the sample transaction event to be higher than or equal to a preset risk degree; determining an association relationship between the sample transaction events based on the transaction information; and based on the association relationship, determining suspected batch risk transaction events in the sample transaction events, the degree of association between the suspected batch risk transaction events being higher than or equal to a preset degree of association threshold.

Description

technical field [0001] The present application relates to the field of network technology, and more specifically relates to a method, device and electronic equipment for determining a suspected batch risk transaction event. Background technique [0002] At present, the risk prevention and control system mainly focuses on real-time single-point prevention and control. Based on existing models or strategies, each specific transaction is judged to determine its risk level, and other factors are combined to decide whether to block or release. Single-point prevention and control generally only intercepts transactions that are judged to be high-risk with sufficient confidence, and there are still cases where risky transactions are missed. [0003] In addition to single-point prevention and control, there is also a solution based on user report information to analyze and discover batch attacks for further response. There is a time difference, which makes the application effect of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q40/04
CPCG06Q10/0635G06Q40/04
Inventor 张天翼张杰
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products