A transaction risk identification method, device, and computer equipment

A risk identification and transaction technology, applied in the field of data processing, can solve the problems of low discrimination, high user interruption rate, affecting user experience, etc., to achieve the effect of ensuring security, reducing interruption rate, and ensuring payment experience

Active Publication Date: 2022-05-27
ADVANCED NEW TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since such fund theft incidents occur on the computer equipment commonly used by users, from the perspective of user behavior, the distinction between such fund theft incidents and the user's normal transaction events is very low, which leads to the existing The accuracy of the risk control system in identifying such fund theft events is low, which in turn leads to a high rate of user interruptions and affects user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A transaction risk identification method, device, and computer equipment
  • A transaction risk identification method, device, and computer equipment
  • A transaction risk identification method, device, and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order for those skilled in the art to better understand the technical solutions in the embodiments of the present specification, the technical solutions in the embodiments of the present specification will be described in detail below with reference to the accompanying drawings in the embodiments of the present specification. Obviously, the described implementation Examples are only some of the embodiments of the present specification, but not all of the embodiments. All other embodiments obtained by those of ordinary skill in the art based on the embodiments in this specification should fall within the scope of protection.

[0026] In the risk control system, the implementation of anti-theft for user fund accounts is the top priority. Through the analysis of historical fund embezzlement incidents, it can be found that a type of fund embezzler, after stealing the user's identity information and fund account information, uses his own mobile phone or computer equipment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a transaction risk identification method, device, and computer equipment. The method includes: obtaining the prediction result of the risk identification model for the output of the transaction to be identified; obtaining the quantitative result of the specified risk quantification scorecard for the output of the transaction to be identified. The specified risk quantification scorecard is the risk quantification scorecard corresponding to the transaction scenario to which the transaction to be identified belongs, wherein different transaction scenarios correspond to different risk quantification scorecards; the acquisition is used to indicate whether there is a Trojan horse risk in the transaction to be identified The technical identification result; determine the risk level of the transaction to be identified according to the prediction result, the quantitative result, and the technical identification result.

Description

technical field [0001] The embodiments of this specification relate to the technical field of data processing, and in particular, to a transaction risk identification method, apparatus, and computer equipment. Background technique [0002] At present, there is a type of fund thief with certain technical capabilities, who implants Trojan viruses into the computer equipment commonly used by users (such as personal laptops, office computers, home computers, etc.) to obtain the user's identity information and fund account information. , transaction information, etc., and use this information to remotely control the computer equipment commonly used by users to implement payment behaviors, so as to achieve the purpose of stealing user funds. [0003] Since such incidents of theft of funds occur on the computer equipment commonly used by users, from the perspective of user behavior, the degree of distinction between such incidents of funds theft and the normal transaction events of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/04G06Q10/06G06Q40/04
CPCG06Q10/04G06Q10/0635G06Q40/04
Inventor 汪婉婷余绮晓赵华王宁朱通
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products