A transaction risk detection method, device and equipment
A detection method and risk technology, applied in the computer field, can solve problems such as risk detection, and achieve the effect of good risk prevention and control.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0021] Such as figure 1 As shown, the embodiment of this specification provides a transaction risk detection method, and the execution subject of the method may be a server, and the server may be an independent server, or a server cluster composed of multiple servers. The server may be a background server of a certain business (such as a transaction business, etc.), or a background server of a certain application (such as a financial application, etc.). The method specifically may include the following steps:
[0022] In step S102, transaction data to be analyzed is acquired.
[0023] Among them, the transaction data can include many kinds, such as the relevant data in the process of the user purchasing a product from a merchant in a shopping website, such as the name of the product, the category of the product, the price of the product, and the purpose of the product. , the size of the product, etc., as well as the name of the merchant, the location of the merchant, etc. In...
Embodiment 2
[0037] Such as image 3 As shown, the embodiment of this specification provides a transaction risk detection method, and the execution subject of the method may be a server, and the server may be an independent server, or a server cluster composed of multiple servers. The server may be a background server of a certain business (such as a transaction business, etc.), or a background server of a certain application (such as a financial application, etc.). The method specifically may include the following steps:
[0038] In step S302, a preset first number of low-order feature samples and a preset second number of high-order feature samples are acquired.
[0039] Wherein, the first quantity can be any quantity, such as 1000 or 10GB, and the second quantity can also be any quantity, and the first quantity and the second quantity can be the same or different.
[0040] In implementation, the sample data used to train the risk analysis model can be obtained in many different ways, ...
Embodiment 3
[0078] This embodiment will describe in detail a transaction risk detection method provided by the embodiment of the present invention in combination with a specific application scenario. The corresponding application scenario is to detect whether there is money laundering in the transaction corresponding to the transaction data through meta-learning based on the Wide and Deep model An application scenario of risk or anti-money laundering risk, wherein the risk analysis model may be a Wide and Deep model, and the predetermined risk may be a money laundering risk or an anti-money laundering risk.
[0079] Such as Figure 4As shown, the embodiment of this specification provides a transaction risk detection method, and the execution subject of the method may be a server, and the server may be an independent server, or a server cluster composed of multiple servers. The server may be a background server of a certain business (such as a transaction business, etc.), or a background s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


