Abnormal information mining method, device, system and terminal equipment

A technology of abnormal information and excavation devices, applied in the field of information processing, can solve the problems of low accuracy, risk control platform cannot add risk adjustment, rework, etc., and achieve the effect of improving prevention and control capabilities

Inactive Publication Date: 2020-03-13
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the transaction characteristics of newly added risks are mainly mined by manually analyzing the event information of transaction events that occur within a set period of time. This method of feature mining is often affected by human factors, and often has low accuracy and poor timeliness. It is found that the effect is not as expected, and rework is required, which will cause unnecessary losses
In addition, most of the existing feature mining methods are to drill down on a single feature dimension. When new risks occur, they are extremely easy to hide in the overall transaction flow and be ignored, which makes the risk control platform unable to adapt to the new risks in a timely manner. When a certain trading volume is accumulated, the impact of this new risk has often undergone a qualitative change, causing serious losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal information mining method, device, system and terminal equipment
  • Abnormal information mining method, device, system and terminal equipment
  • Abnormal information mining method, device, system and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0111] This embodiment provides a method for mining abnormal information. For example, the method can be implemented by a server as an abnormal information mining device. The server can be as follows figure 1 or figure 2 Server 1100 is shown. Such as image 3 As shown, the method may include the following steps S3100-S3400:

[0112] Step S3100, acquiring indicators for risk monitoring and transaction characteristics related to the indicators.

[0113] The indicators for risk monitoring can be set according to the risks that need to be monitored. For example, the risk that needs to be monitored is the risk of fleece. The indicators for risk monitoring can include the sum of the amount received at one time SUM(A), the number of coupons received at one time COUNT(B), and the sum of the amount SUM(A) and the number of coupons COUNT( Any one or multiple items in the ratio SUM(A) / COUNT(B) of B).

[0114] In this embodiment, one indicator for risk monitoring or multiple indicat...

Embodiment 2

[0206] Figure 5 It is a schematic flowchart of a method for identifying abnormal information according to another embodiment of this specification. This embodiment is implemented by a terminal device used by risk control personnel, for example, by figure 2 The terminal device 1300 in the implementation.

[0207] Such as Figure 5 As shown, the method in this embodiment may include the following steps S5100-S5300:

[0208] Step S5100, receiving abnormal information provided by the abnormal information mining device, including abnormal dimension value combination, wherein the dimension value combination is composed of at least one dimension value of each transaction feature, and the transaction feature is related to the index for risk monitoring.

[0209] Step S5200, obtaining feedback information provided for the abnormal information, wherein the feedback information includes the corresponding relationship between the features and validity of the dimension value combination...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an abnormal information mining method, a device, a system and terminal equipment. The method comprises the steps of acquiring indexes for risk monitoring andtransaction features related to the indexes; according to the dimension value of each transaction feature, obtaining each dimension value combination; according to event information of historical transaction events, generating an index value sequence corresponding to each dimension value combination for each index; and according to the index value sequence, mining the abnormal dimension value combination, and obtaining and outputting abnormal information including the abnormal dimension value combination.

Description

technical field [0001] The embodiments of this specification relate to the field of information processing, and more specifically, to an abnormal information mining method, an abnormal information mining device, a terminal device, an abnormal information mining system, and a computer-readable storage medium. Background technique [0002] With the development of Internet technology, there are more and more types of online transactions, such as transactions based on e-commerce scenarios and transactions based on e-wallet scenarios. While attracting a large number of users to conduct online transactions, these trading platforms have also encountered the problem of making profits through improper transactions, causing the trading platforms to face many transaction risks. Taking the e-commerce scenario as an example, the main risk type in the e-commerce scenario is the risk of misappropriation. When the embezzler obtains a large amount of card materials, he can conduct improper t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/02G06F16/2458
CPCG06Q30/0225G06F16/2465G06F16/2474G06F2216/03
Inventor 周琦梦金梦姗
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products