Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk detection method and device, electronic equipment and readable storage medium

A risk, reading module technology, applied in multi-programming devices, program control design, electronic digital data processing and other directions, can solve the problems of multi-transaction fraud risk, loss of customers and financial companies, and database performance degradation.

Pending Publication Date: 2021-05-07
CHINA CITIC BANK
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, online payments also lead to a greater risk of transaction fraud
At present, the industry mainly adopts a rule-based method to deal with the transaction fraud risk of online payment. For example, the traditional transaction risk detection system based on the relational database mainly uses the SQL query statement in the database table, which is the risk control rule. The number of SQL to be queried in the database = risk control The number of rules * the current instantaneous transaction volume, the amount of daily risk detection data is small, so there is no problem, but when the instantaneous transaction volume of the customer group surges (such as a huge number of customers concentrated on consumption transactions after 0:00 on Double Eleven), it is necessary to query the database After the number of SQL is enlarged in equal proportions (that is, read amplification), the performance of the database will drop sharply, resulting in a sharp drop in system processing capacity, which will eventually lead to delays in risk transaction alarms, untimely corresponding risk control disposals, and losses to customers and financial companies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk detection method and device, electronic equipment and readable storage medium
  • Risk detection method and device, electronic equipment and readable storage medium
  • Risk detection method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present application, and should not be construed as limiting the present invention.

[0049] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the specification of the present application refers to the presence of the features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. The expressi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computers, in particular to a risk detection method and device, electronic equipment and a readable storage medium, and the method comprises the steps: storing obtained target transaction data of a target user in a Kafka message system; the method comprises the following steps: reading target transaction data in a Kafka message system based on an Apache Storm program; analyzing and processing the target transaction data and outputting an analysis result based on a program of an Apache Storm and Esper complex event processing component; and if the analysis result accords with a preset risk alarm rule, starting risk alarm. According to the risk detection scheme provided by the invention, high availability of 7 * 24 hours is achieved, online horizontal capacity expansion is supported, an efficient rule editing function is provided for business personnel, historical transaction regression verification and query are supported, and 10 billion-level data volume is supported.

Description

technical field [0001] The present application relates to the technical field of computer data processing, and in particular to a risk detection method, device, electronic equipment and readable storage medium. Background technique [0002] Online payment is favored by consumers due to its convenience and close correlation with daily life, and has become a mainstream transaction payment method. However, online payments also lead to more risks of transaction fraud. At present, the industry mainly adopts a rule-based method to deal with the transaction fraud risk of online payment. For example, the traditional transaction risk detection system based on the relational database mainly uses the SQL query statement in the database table, which is the risk control rule. The number of SQL to be queried in the database = risk control The number of rules * the current instantaneous transaction volume, the amount of daily risk detection data is small, so there is no problem, but when ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06F9/54
CPCG06Q20/4016G06Q20/4014G06F9/546G06F2209/548
Inventor 洪湃宋倩褚中成曾常安解安芳
Owner CHINA CITIC BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products