Unlock instant, AI-driven research and patent intelligence for your innovation.

Transaction risk detection method, device and equipment

A detection method and technology of detection equipment, applied in the computer field, can solve problems such as risk detection

Active Publication Date: 2020-07-07
ALIPAY COM
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the risk detection mechanism constructed in the above way is only applicable to the risk types known before the risk detection, but it cannot carry out risk detection for the newly added risk type or the newly added implementation method in a certain risk type. Therefore, It is necessary to provide a technical solution that can better prevent and control the risk of a newly added risk type or a newly added implementation method in a certain risk type

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction risk detection method, device and equipment
  • Transaction risk detection method, device and equipment
  • Transaction risk detection method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Such as figure 1 As shown, the embodiment of this specification provides a transaction risk detection method, and the execution subject of the method may be a server, and the server may be an independent server, or a server cluster composed of multiple servers. The server may be a background server of a certain business (such as a transaction business, etc.), or a background server of a certain application (such as a financial application, etc.). The method specifically may include the following steps:

[0022] In step S102, transaction data to be analyzed is acquired.

[0023] Among them, the transaction data can include many kinds, such as the relevant data in the process of the user purchasing a product from a merchant in a shopping website, such as the name of the product, the category of the product, the price of the product, and the purpose of the product. , the size of the product, etc., as well as the name of the merchant, the location of the merchant, etc. In...

Embodiment 2

[0037] Such as image 3 As shown, the embodiment of this specification provides a transaction risk detection method, and the execution subject of the method may be a server, and the server may be an independent server, or a server cluster composed of multiple servers. The server may be a background server of a certain business (such as a transaction business, etc.), or a background server of a certain application (such as a financial application, etc.). The method specifically may include the following steps:

[0038] In step S302, a preset first number of low-order feature samples and a preset second number of high-order feature samples are acquired.

[0039] Wherein, the first quantity can be any quantity, such as 1000 or 10GB, and the second quantity can also be any quantity, and the first quantity and the second quantity can be the same or different.

[0040] In implementation, the sample data used to train the risk analysis model can be obtained in many different ways, ...

Embodiment 3

[0078] This embodiment will describe in detail a transaction risk detection method provided by the embodiment of the present invention in combination with a specific application scenario. The corresponding application scenario is to detect whether there is money laundering in the transaction corresponding to the transaction data through meta-learning based on the Wide and Deep model An application scenario of risk or anti-money laundering risk, wherein the risk analysis model may be a Wide and Deep model, and the predetermined risk may be a money laundering risk or an anti-money laundering risk.

[0079] Such as Figure 4As shown, the embodiment of this specification provides a transaction risk detection method, and the execution subject of the method may be a server, and the server may be an independent server, or a server cluster composed of multiple servers. The server may be a background server of a certain business (such as a transaction business, etc.), or a background s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a transaction risk detection method, a device and equipment. The method comprises the steps of obtaining to-be-analyzed transaction data; performing feature extraction on the transaction data to obtain low-order features and high-order features corresponding to the transaction data; inputting the low-order features and the high-order features corresponding tothe transaction data into a risk analysis model for data risk analysis, and determining whether a transaction corresponding to the transaction data has a predetermined risk, wherein the risk analysismodel is a model obtained by training a predetermined low-order feature sample and a predetermined high-order feature sample through meta-learning.

Description

technical field [0001] This specification relates to the field of computer technology, in particular to a method, device and equipment for detecting transaction risks. Background technique [0002] With the continuous development of terminal technology and network technology, many merchants or users will conduct transactions and daily resource transfer activities through designated financial applications or payment applications, and this requires possible risks for each merchant or user (specifically, illegal Risks (such as money laundering risks, etc.), fraud risks, gambling risks, cash-out risks, etc.) corresponding to the conversion of resources obtained through channels into legitimate resources are prevented and controlled. [0003] Generally, the development organization of a financial application or a payment application can set or build a corresponding risk detection mechanism according to the requirements of the financial application or payment application and possi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06N3/04G06N3/08
CPCG06Q20/4016G06N3/08G06N3/084G06N3/045
Inventor 孙富王睿祺张晓旭金先明
Owner ALIPAY COM