Merchant fraud risk monitoring system and data mining method

A data mining and monitoring system technology, applied in data processing applications, instruments, finance, etc., can solve problems such as low labor efficiency

Inactive Publication Date: 2020-09-01
交通银行股份有限公司上海市分行
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As mentioned above, how to change the status quo of Bank of Communications credit card merchants' risk management work with low efficiency, how to improve the level of automation, scientificity and effectiveness of merchants' risk management, so as to adapt to the rapid development of Bank of Communications credit card acquiring business, and build an accurate, efficient, An easy-to-use credit card merchant risk monitoring and management system is one of the key factors, so it is necessary to introduce high-end IT technology to effectively monitor and manage credit card merchant fraud risks in the acquiring bank business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Merchant fraud risk monitoring system and data mining method
  • Merchant fraud risk monitoring system and data mining method
  • Merchant fraud risk monitoring system and data mining method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] This embodiment discloses as figure 1 A data mining method for a merchant fraud risk monitoring system is shown, the method includes the following steps:

[0042] S1 Determine the purpose and goal of data mining based on the business goals of the financial sector;

[0043] S2 confirms the data source according to the purpose and target determined in S1, and conducts data collection;

[0044] S3 screens the collected data and prepares data for data mining;

[0045] S4 Perform quality testing on the filtered data, and perform data integration on the tested data;

[0046] S5 performs data conversion after detecting the data, format or variables required for mining;

[0047] S6 uses different methods to perform data mining on the converted data to obtain the result data;

[0048] S7 evaluates and interprets the result data of the mining according to the credit card acquiring business situation, data mining goals and business purposes, forming a credit card fraud credit scoring model;

...

Embodiment 2

[0066] In this embodiment, based on the implementation experience of the Gibbeck data mining project and strictly in accordance with the general data mining methodology, the entire data mining process can be divided into the following 10 steps: they are business purpose determination, data source identification, data collection, and data selection. , Data quality review, data conversion, data mining, result interpretation, application suggestion and result application.

[0067] (1) Determination of business goals: Clarifying the purpose or goal of data mining is the key to the successful completion of any data mining project. For example, determining the goal of the project is to build a credit card fraud analysis model.

[0068] (2) Confirm the data source: Given the business goals of data mining, the next step is to find data that can solve and answer business problems. What is needed to build a fraud analysis model is a lot of information about credit card transactions, and as m...

Embodiment 3

[0078] This embodiment analyzes the data by taking the example of transaction behavior. The objective of the Bank of Communications' credit card acquiring bank risk monitoring system is to use advanced data mining technology to conduct in-depth analysis of historical transaction information, find out the hidden knowledge and laws, and develop transaction fraud risks. The scoring model is used to identify fake cards and fake cards of credit cards, find out the transactions generated by fake cards and fake cards, and use them to predict the probability that credit card transactions are fraudulent, providing a scientific basis for formulating intelligent anti-fraud strategies. Specifically, the system should achieve:

[0079] Analyze massive credit card transaction data, establish a fraud identification model for fake cards, shorten the time between fraud occurrence, identification, and processing, and reduce losses caused by fake cards;

[0080] Continue to track and explore new cred...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of financial risk control, in particular to a merchant fraud risk monitoring system and a data mining method. The method includes: determining the purposeand target of data mining according to the commercial target of a financial department; confirming a data source according to the purpose and the target, and collecting data; screening the collected data, and preparing data for data mining; carrying out quality detection on the screened data, and carrying out data integration on the detected data; after data, formats or variables needed by miningare detected, carrying out data conversion; performing data mining on the converted data by using different methods to obtain result data. A large amount of credit card transaction data is analyzed through a data mining means, a credit card fraud analysis model is established, credit card transactions with high fraud risks are identified, early warning prompts are given in time, a basis is provided for risk management, or a credit card fraud scoring model is applied to an order receiving service to guide order receiving service operation.

Description

Technical field [0001] The invention relates to the technical field of financial risk control, in particular to a merchant fraud risk monitoring system and a data mining method. Background technique [0002] With the substantial increase in the acquiring transaction volume of Bank of Communications, it has become the second largest acquirer in Shanghai after ICBC. At the same time, credit card fraud activities are becoming more and more rampant, and the lag in merchant risk management is becoming one of the biggest obstacles to credit card business expansion and profitability. In order to reduce the losses caused by merchant risks and improve the overall management level of credit card merchants, merchant risk management has become an important work content of the private financial business department. [0003] As mentioned above, how to change the hard and low efficiency of Bank of Communications’ credit card merchant risk management work, and how to improve the automation, scien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/02
CPCG06Q40/03
Inventor 卢意
Owner 交通银行股份有限公司上海市分行
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products