Identification method and device for high-risk transaction subject and server

A subject and transaction technology, applied in the computer field, can solve problems such as the scale of harm or loss, the loss of related companies, and disrupt the market order, and achieve the effect of ensuring normal operation, reducing losses, and maintaining market order.

Pending Publication Date: 2019-06-21
ADVANCED NEW TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The emergence of these risks not only disturbed the normal market order, but also brought huge losses to the relevant companies.
In this context, such hazards are often discovered after the event, and at this time the scale of the hazard or the loss is already relatively large, and subsequent remedies often involve huge human and physical costs and little effect.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method and device for high-risk transaction subject and server
  • Identification method and device for high-risk transaction subject and server
  • Identification method and device for high-risk transaction subject and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0018] Please refer to figure 1 , a schematic diagram of an application scenario of an embodiment involved in the technical solution of this specification. The e-commerce trading platform is responsible for accessing buyers 1, 2...n, and sellers 1, 2...n, and facilitating transactions between buyers and sellers and the subsequent payment process on the platform. There is a transaction log in the platform, and its log has recorded data information related to each e-commerce transaction, such as buyer ID, seller ID, transaction type, transaction time, transaction amount, payment method (such as credit card, savings card, goods to payment, etc.), transaction times, total transaction amount and other field information. The platform sends each e-commerce transaction-related data information to the identification device of high-risk transaction subjects based on various strategies to identify high-risk new transaction subjects and related events, thereby identifying new high-risk b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identification method for a high-risk transaction subject. The identification method comprises the following steps: constructing a transaction relation network by utilizing transaction data information; and according to related data in the transaction relationship network, calculating the probability that an unknown high-risk transaction subject is a high-risk transaction subject through a known high-risk transaction subject in the transaction data information, thereby identifying a new high-risk transaction subject. Therefore, more high-risk transactions can be effectively and timely identified by an e-commerce platform or a third-party payment company and the like, possible loss is prevented or reduced, normal operation of company services is guaranteed, and normal market order is maintained.

Description

technical field [0001] This specification relates to the field of computer technology, and in particular to a method, device and server for identifying high-risk transaction subjects. Background technique [0002] With the vigorous development of the mobile Internet, more and more ordinary consumers choose to use Alipay and other third-party payment tools instead of cash payment to complete transactions. These payment tools have greatly facilitated ordinary consumers. Whether they are shopping in a store, buying vegetables in a vegetable market, or taking a bus or subway, they only need to complete the payment through the mobile app without carrying cash. The vigorous development of third-party payment has also led to the emergence of some new risks that affect the security of financial data. For example, some merchants use false transactions to cash out credit cards, defraud, or extract marketing funds from related companies. The emergence of these risks not only disrupte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38G06Q20/40G06F17/50
Inventor 刘腾飞
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products