Risk identification method and device for transaction data

A transaction data and risk identification technology, applied in the Internet field, can solve the problems of low identification rate, low efficiency, single data analysis model, etc., and achieve the effect of improving risk identification efficiency, accuracy and data diversification.

Active Publication Date: 2022-06-03
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some anti-fraud applications currently exist, the data analysis models of these applications are usually relatively single, and a relatively complete anti-fraud system cannot be formed, and the identification of fraud risks is not accurate and the identification rate is low
And using the traditional database with anti-fraud data to identify the user's transaction data is inefficient and cannot meet the existing requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and device for transaction data
  • Risk identification method and device for transaction data
  • Risk identification method and device for transaction data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] In the following description, numerous specific details are set forth in order to facilitate a thorough understanding of this specification. However, this manual can

[0099] The terminology used in one or more embodiments of this specification is for the purpose of describing the particular embodiment only,

[0102] FIG. 1 shows the flow of a method for risk identification of transaction data provided according to an embodiment of the present specification

[0104] The risk identification method of the transaction data in the embodiment of this specification is applied to a payment application, by applying the payment application

[0113] Determine the risk transaction scenario feature involved in the historical transaction data according to the risk labeling result;

[0115] The risk transaction scenario feature of accounting for greater than the preset ratio threshold is determined as the target risk transaction scenario feature.

[0118] In an embodiment provided in thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification provides a method and device for risk identification of transaction data, wherein the method for risk identification of transaction data includes: acquiring the transaction data of the user's buried point to be identified by adopting the buried point method, and calling the buried point transaction data used in the risk prevention and control application The buried point operation data of at least one risk transaction scene feature group obtained in the way of points; then the buried point transaction data to be identified and the buried point operation data are sequentially sorted according to the order of data generation time to realize the described The combination of the buried point transaction data to be identified and the buried point operation data, and then by inputting the combined buried point transaction data and buried point operation data into the pre-trained risk identification model to identify the buried point Risk identification is performed on the transaction data, and finally, risk prevention and control is performed on the transaction data at the buried point to be identified according to the risk identification result output by the risk identification model.

Description

Risk identification method and device for transaction data technical field [0001] The embodiments of this specification relate to the field of Internet technology, and in particular, to a method for identifying risk of transaction data. One or more embodiments of the present specification also relate to a risk identification device for transaction data, a computing device, to and a computer-readable storage medium. Background technique With the rapid development of information technology, Internet technology has been widely used in the work and life of users. use. For example, more and more users begin to choose to communicate through the Internet and conduct business online through the Internet. and At present, online payment, online transfer, and online transaction are widely used in users' life and work. [0003] At present, in the application program installed on the terminal device, in addition to using payment software for transactions, some real-time Commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/04G06Q10/06
CPCG06Q40/04G06Q10/0635
Inventor 凌晨
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products