Method for training fraudulent transaction detection model, detection method and corresponding device

A detection model and transaction technology, applied in the computer field, can solve the problems of inaccurate results and incomplete detection methods, and achieve the effect of accurate detection

Active Publication Date: 2020-06-16
ADVANCED NEW TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the detection method is not comprehensive and the results are not accurate enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for training fraudulent transaction detection model, detection method and corresponding device
  • Method for training fraudulent transaction detection model, detection method and corresponding device
  • Method for training fraudulent transaction detection model, detection method and corresponding device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0045] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. Such as figure 1 As shown, users may perform various transaction operations through the network, such as payment, transfer, payment, etc. Correspondingly, the server corresponding to the transaction operation, such as the Alipay server, can record the user's operation history. It can be understood that the server that records the user's operation history may be a centralized server or a distributed server, which is not limited here.

[0046] In order to train the fraudulent transaction detection model, a training sample set can be obtained from user operation records recorded in the server. Specifically, some fraudulent transaction operations and normal operations can be pre-determined by manual calibration or other methods. Then...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification provides a method for training a fraudulent transaction detection model, the fraudulent transaction detection model includes a convolutional layer and a classifier layer, the training method includes: obtaining a classification sample set, and the calibration samples in the sample set include user operation sequences and time sequences , the user operation sequence includes a predetermined number of user operations arranged in time order, and the time sequence includes time intervals between adjacent user operations in the user operation sequence. For such a sample set, in the convolution layer, the first convolution processing is performed on the user operation sequence to obtain the first convolution data; the second convolution processing is performed on the time series to obtain the second convolution data; The first convolution data and the second convolution data are combined to obtain time-adjusted convolution data. The thus obtained time-adjusted convolutional data is fed into a classifier layer, and a fraudulent transaction detection model is trained based on the classification results of the classifier layer. Such a trained model can detect fraudulent transactions more effectively.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular, to a method for training a fraudulent transaction detection model, a method for detecting fraudulent transactions, and a corresponding device. Background technique [0002] The development of Internet technology has made people's lives more and more convenient. People can use the Internet to conduct various transactions and operations such as shopping, payment, bill payment, and transfer. However, at the same time, the security problems caused by it are becoming more and more prominent. In recent years, financial fraud has occurred from time to time, and criminals have used various means to trick users into making some fraudulent transactions. For example, some fraudulent links are disguised as official links of banks or communication companies to induce users to pay fees or transfer money; or, through some false information, trick users into o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06N3/04
CPCG06Q20/4016G06N3/045G06F21/316G06N3/08G06N5/046
Inventor 李龙飞
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products