Interactive awakening method, device, apparatus and system for risk transaction

A risk and transaction technology, applied in the computer field, can solve problems such as user loss, being deceived, and difficult to judge risk transaction fraud methods, and achieve the effect of improving accuracy and awakening rate

Pending Publication Date: 2021-03-19
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Online transactions facilitate people's lives, but also give birth to some risky transactions. Some criminals use the Internet to carry out fraudulent transactions, causing losses to users.
In order to protect users from being cheated, risky transactions will be blocked, but users are deeply deceived in the scam. If the corresponding fraudulent methods cannot be well explained to users, users may bypass control and try to pay and continue to be defrauded cheat
At present, it is difficult to judge the specific fraudulent methods of risky transactions only through static data. At the same time, some high-risk transaction behaviors judged by static data may be normal transactions of users. When it is not sure whether users are really deceived or the specific fraudulent methods of being deceived When , directly blocking the transaction will bring a bad experience to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interactive awakening method, device, apparatus and system for risk transaction
  • Interactive awakening method, device, apparatus and system for risk transaction
  • Interactive awakening method, device, apparatus and system for risk transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0028] With the popularity of online transactions, there are more and more online frauds. For transactions that may have risks, timely risk control is required. Generally, it may be necessary to manually communicate with transaction users for possible risk transactions to determine whether the transaction is indeed risky, and to wake up transaction users in a t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an interactive awakening method, device, apparatus and system for risk transaction, and the method comprises the steps: actively carrying out interaction with a transaction userof a to-be-processed risk transaction, carrying out intention recognition and dialogue recommendation, splicing determined interaction question answering information and recommended risk interactioninquiry information, and transmitting the spliced information to the transaction user; and guiding the transaction user to perform multiple rounds of interactive awakening conversations. Based on multiple rounds of conversations with transaction users, risk identification confirmation of risk transactions is realized, the risk identification accuracy of the risk transactions is improved, fraud means of the risk transactions can be mined, and a data foundation is laid for subsequent risk transaction identification. Meanwhile, the interactive question answering information and the recommended risk interactive inquiry information are spliced, so that questions of the transaction user are answered, the transaction user can be actively guided to confirm risk transaction, the transaction user isawakened in time, and the safety of network transaction and the awakening rate of risk transaction are improved.

Description

technical field [0001] This specification belongs to the field of computer technology, and in particular relates to an interactive wake-up method, device, equipment and system for risk trading. Background technique [0002] Online transactions facilitate people's lives, but also give birth to some risky transactions. Some criminals use the Internet to carry out fraudulent transactions, causing losses to users. In order to protect users from being cheated, risky transactions will be blocked, but users are deeply deceived in the scam. If the corresponding fraudulent methods cannot be well explained to users, users may bypass control and try to pay and continue to be defrauded cheat. At present, it is difficult to judge the specific fraudulent methods of risky transactions only through static data. At the same time, some high-risk transaction behaviors judged by static data may be normal transactions of users. When it is not sure whether users are really deceived or the specif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06F16/332G06F16/335G06F16/35
CPCG06Q20/4016G06Q20/4014G06F16/3329G06F16/335G06F16/35
Inventor 刘赛帅王子豪
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products