Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network transaction analysis method and system

A network transaction and analysis method technology, applied in the field of network transaction analysis methods and systems, can solve problems affecting user experience, etc., to achieve the effect of improving the accuracy of risk control, reducing the interruption rate, and improving user experience

Inactive Publication Date: 2019-10-29
南京星云数字技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the existing risk interception system of the third-party payment platform can effectively intercept abnormal transactions and protect the safety of customers’ legal property, it inevitably blocks many normal transactions, which affects some user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network transaction analysis method and system
  • Network transaction analysis method and system
  • Network transaction analysis method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Hereinafter, embodiments of the present invention will be described in detail, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network transaction analysis method and a network transaction analysis system, which are used for releasing part of intercepted transactions on the premise of not remarkablyimproving the killing-missing rate so as to reduce mis-killing and improve the user experience. The network transaction analysis method comprises the following steps: collecting sample data, and establishing a sample database; wherein the sample data comprises normal transaction data and abnormal transaction case data; according to the transaction indexes of the sample data record, performing credibility level division on the transaction, and constructing a credibility model; inputting real-time transaction information intercepted by the system into the credible model, calculating whether thereal-time transaction belongs to a high credible level or not, and if yes, performing transaction; and if not, intercepting the transaction.

Description

technical field [0001] The invention belongs to the technical field of big data risk control, and specifically relates to a network transaction analysis method and system. Background technique [0002] With the rapid development of Internet shopping, more and more criminals pay attention to third-party payment platforms. Criminals take advantage of some loopholes in the platform to take advantage of loopholes, steal platform accounts, steal platform user funds, etc., causing great losses to customers. With the growth and expansion of third-party payment platforms, some high-quality and loyal customers will be cultivated, but there will also be a large number of fraudulent behaviors. Although the existing risk interception system of the third-party payment platform can effectively intercept abnormal transactions and protect the safety of customers' legal property, it will inevitably block many normal transactions, which affects some user experience. How to reduce the probab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/4016
Inventor 樊帅李贵军
Owner 南京星云数字技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products