Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for identifying transaction risks

A technology of risk identification and identification methods, applied in the direction of sale/lease transactions, character and pattern recognition, instruments, etc.

Active Publication Date: 2022-04-26
ADVANCED NEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of this application provides a method and device for identifying transaction risks, which are used to solve the problem of how to identify illegal transactions of illegal users in Internet transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identifying transaction risks
  • A method and device for identifying transaction risks
  • A method and device for identifying transaction risks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In Internet transactions, when a service provider receives a transaction request from a user, it needs to verify the user information carried in the transaction request. After the verification is passed, the service provider can process the user's transaction request, thereby realizing Internet transactions. However, in practical applications, there are some illegal users who will steal user information, and then use the user information to realize illegal transactions.

[0061]Taking bank transactions as an example, bank card service providers can realize bank transactions after verifying the bank card's BIN (Bank Identification Number), bank card user name, and bank card validity period. However, when information such as the BIN of the bank card, the user name of the bank card, and the validity period of the bank card are leaked, illegal users will easily steal the information of a type of bank card with the same BIN, and then use the stolen information to carry out il...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a transaction risk identification method and device. The method includes: obtaining the first data corresponding to the security transaction of the target service provider and the second data corresponding to the transaction to be identified; obtaining a risk identification model, the risk identification model Obtained by training based on the mixed data of the first data and the second data, the risk identification model is used to cluster the transaction data; and the output result output by the risk identification model for the mixed data is obtained ; Identify the risk of the transaction to be identified according to the output result.

Description

technical field [0001] The present application relates to the field of information security, in particular to a method and device for identifying transaction risks. Background technique [0002] In Internet transactions, when the user sends a transaction request to the service provider, the user information can be carried in the transaction request, and the service provider can process the user's transaction request after receiving the transaction request and verifying the user information. Then realize Internet transactions. [0003] However, as the Internet environment becomes more and more complex, there are some illegal users who use illegal means to steal user information carried by users in Internet transactions, and use these user information to conduct illegal transactions, which brings great harm to the information security and property safety of users. great risk. How to identify illegal transactions of illegal users has become an urgent problem to be solved. C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06G06Q30/06G06K9/62
CPCG06Q10/0635G06Q30/0601G06Q30/0609G06F18/23G06F18/214
Inventor 郭龙
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products