Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
In view of the problems that in the prior art, transaction data in payment requests need to be manually retrieved for examination and analysis, efficiency is low, recognition rate is low, and the problem of transaction risk control in the actual operation process cannot be solved, the embodiment of the invention provides a risk transaction recognition method which is simple to implement, low in implementation cost, and adaptive, can effectively prevent malicious operation of bad merchants and malicious transactions of bad customers, effectively improves efficiency of risk transaction recognition and avoidance, and reduces compliance risks of acquiring organizations.
FIG. 1 is a flow chart of a risk transaction identification method in an embodiment of the invention. Fig. 2 is a flow chart of a risk transaction identification method in another embodiment of the invention. As shown in fig. 1-2, the risk transaction identification method includes:
s101: and acquiring current transaction data in the payment request from the acquiring system, and constructing current transaction characteristics according to the current transaction data.
Fig. 3 is a flowchart of S101 in the embodiment of the present invention. As shown in fig. 3, S101 includes:
s201: and searching corresponding merchant data and customer data according to the current transaction data.
The merchant data comprises merchant operation information such as merchant operation types, merchant attribution areas, operation scales, legal information, transaction numbers and transaction amounts of all dimensions and merchant account information such as credit balance, payment and account running of merchant associated accounts. In specific implementation, the merchant operation information can be searched from an external merchant management system according to the current transaction data, and the merchant account information can be searched from an external account system.
S202: current transaction characteristics are constructed from the current transaction data, merchant data and customer data.
The transaction data includes a payment channel, a transaction amount and the like. The current transaction characteristics are data that has undergone a process cleaning process.
S102: inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; and the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result.
In one embodiment, S102 includes: and inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics according to the preset merchant risk types corresponding to the merchant data and the preset customer risk types corresponding to the customer data to obtain a risk transaction identification result.
For example, the preset merchant risk types include normal merchants, entrusted merchants, and risky merchants. The preset client risk types include normal clients, collection clients and risk clients. When the preset merchant risk type is a risk merchant or the preset customer risk type is a risk customer, determining that the current transaction is a risk transaction, sending the risk transaction as a target transaction risk identification result to an acquiring system, intercepting the current transaction after the acquiring system receives the target transaction risk identification result determined as the risk transaction, and terminating the transaction; otherwise, inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics.
S103: and generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result.
In specific implementation, the highest risk type in the risk merchant identification result and the corresponding preset merchant risk type may be determined as the target merchant risk identification result, the highest risk type in the risk customer identification result and the corresponding preset customer risk type may be determined as the target customer risk identification result, and the highest risk type in the target merchant risk identification result and the target customer risk identification result may be determined as the target transaction risk identification result. Wherein the risk class in the risk type is risk > collecting > normal.
For example, if the risk merchant identification result is a normal merchant, and the preset merchant risk type is an entrusted merchant, the target merchant risk identification result is an entrusted merchant. And if the risk client identification result is a risk client and the preset client risk type is a collection client, the target client risk identification result is a risk client.
When the target customer risk identification result is a risk customer and the target merchant risk identification result is a collection merchant, the risk grade (risk) of the target customer risk identification result is greater than that of the target merchant, and the target transaction risk identification result is risk transaction.
When the target customer risk identification result is the collection customer and the target merchant risk identification result is the normal merchant, the risk grade (collection) of the target customer risk identification result is greater than that (normal) of the target merchant, and the target transaction risk identification result is collection transaction.
And when the target customer risk identification result is a normal customer and the target merchant risk identification result is a normal merchant, the target transaction risk identification result is a normal transaction.
S104: and sending the target transaction risk identification result to an acquiring system so that the acquiring system processes the transaction according to the target transaction risk identification result.
For example, when the target transaction risk identification result is a normal transaction, the acquiring system allows the current transaction to be normally carried out; when the target transaction risk identification result is a collection transaction, the collection system collects the current transaction; and when the target transaction risk identification result is a risk transaction, the acquiring system intercepts the current transaction and terminates the transaction.
In one embodiment, the target transaction risk identification result can be sent to an external front-end control system and displayed. And when the target transaction risk identification result is risk transaction, triggering and pushing a risk checking task to an external front-end control system to improve the subsequent checking efficiency of the risk.
The execution subject of the risk transaction identification method shown in fig. 1 may be a computer. As can be seen from the flow shown in fig. 1, the risk transaction identification method according to the embodiment of the present invention first constructs current transaction characteristics according to current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain a risk transaction identification result, and then generates and transmits a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, which can effectively improve the efficiency of risk transaction identification and avoiding, and reduce the compliance risk of the acquiring mechanism.
FIG. 4 is a flow diagram of creating a risk transaction identification model in an embodiment of the invention. FIG. 5 is a flow chart of creating a risk transaction identification model in another embodiment of the invention. As shown in fig. 4-5, creating a risk transaction identification model based on historical transaction characteristics includes:
the following iterative process is performed:
s301: and inputting the historical transaction characteristics into the initial identification model to obtain a risk transaction prediction result.
The initial recognition model comes from an external front-end control system, and historical transaction characteristics can be constructed according to current historical transaction data, merchant data and customer data.
S302: and determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result.
S303: and judging whether the loss function is smaller than a preset threshold value or not.
S304: and when the loss function is smaller than a preset threshold value, determining the initial identification model in the current iteration as a risk transaction identification model.
S305: and when the loss function is larger than or equal to the preset threshold value, updating the initial recognition model according to the loss function, and continuously executing iterative processing.
The specific process of the embodiment of the invention is as follows:
1. and inputting the historical transaction characteristics into the initial identification model to obtain a risk transaction prediction result.
2. And (3) determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result, determining the initial identification model in the current iteration as the risk transaction identification model when the loss function is smaller than a preset threshold, otherwise updating the initial identification model according to the loss function, and returning to the step 1.
3. And acquiring current transaction data in the payment request from the acquiring system, and searching corresponding merchant data and customer data according to the current transaction data.
4. Current transaction characteristics are constructed from the current transaction data, merchant data and customer data.
5. And inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics according to the preset merchant risk types corresponding to the merchant data and the preset customer risk types corresponding to the customer data to obtain risk transaction identification results, wherein the risk transaction identification results comprise risk merchant identification results and risk customer identification results.
6. And generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, and sending the target transaction risk identification result to the acquiring system.
7. And the acquiring system processes the current transaction according to the target transaction risk identification result.
In summary, the risk transaction identification method provided by the embodiment of the invention has the following beneficial effects:
(1) and performing sample training on the historical transaction data by adopting a machine learning algorithm to obtain a risk transaction identification model so as to further obtain a risk transaction identification result.
(2) The current transaction data, the merchant data and the customer data are acted on the transaction process in real time or quasi-real time by utilizing a computer data transmission technology, a manual identification and post-interception mode is replaced, and the risk identification and avoidance efficiency is improved.
(3) And the risk transaction automatically triggers a risk checking task, so that the subsequent checking efficiency of the risk is improved.
Based on the same inventive concept, the embodiment of the invention also provides a risk transaction identification device, and as the problem solving principle of the device is similar to that of the risk transaction identification method, the implementation of the device can refer to the implementation of the method, and repeated parts are not described again.
Fig. 6 is a block diagram showing the structure of a risk transaction identification device according to an embodiment of the present invention. Fig. 7 is a block diagram showing the structure of a risk transaction identification device according to another embodiment of the present invention. As shown in fig. 6 to 7, the risk transaction recognition apparatus includes:
the current transaction characteristic construction module is used for acquiring current transaction data in the payment request from the acquiring system and constructing current transaction characteristics according to the current transaction data;
the risk transaction identification module is used for inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
the target transaction risk identification module is used for generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and the sending module is used for sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
In one embodiment, the current transaction feature building module comprises:
the data searching unit is used for searching corresponding merchant data and customer data according to the current transaction data;
and the current transaction characteristic construction unit is used for constructing current transaction characteristics according to the current transaction data, the merchant data and the customer data.
In one embodiment, the method further comprises the following steps: a risk transaction identification model creation module for performing the following iterative process:
inputting historical transaction characteristics into an initial identification model to obtain a risk transaction prediction result;
determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result;
and when the loss function is smaller than a preset threshold value, determining that the initial identification model in the current iteration is a risk transaction identification model, otherwise, updating the initial identification model according to the loss function, and continuously executing the iteration processing.
In one embodiment, the risk transaction identification module is specifically configured to:
and inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics according to the preset merchant risk types corresponding to the merchant data and the preset customer risk types corresponding to the customer data to obtain a risk transaction identification result.
As shown in fig. 7, in practical application, the product risk early warning device includes a data receiving and transmitting module, a data collecting and processing module, a risk identifying module, a risk task triggering module, and a model training module.
The data receiving and transmitting module comprises a sending module, a receiving module and a processing module, wherein the sending module is used for receiving the initial identification model from the front-end control system, the current transaction data in the payment request from the acquiring system, the merchant operation information from the merchant management system and the merchant account information from the account system; and sending the target transaction risk identification result to an acquiring system.
The data acquisition and processing module comprises a current transaction characteristic construction module and is used for carrying out processing and cleaning treatment on current transaction data, merchant data and customer data according to the business rules so as to construct current transaction characteristics.
The risk identification module comprises a risk transaction identification module and a target transaction risk identification module.
And the risk task triggering module is used for extracting risk checking key information (such as merchant attribution region, customer information, payment channel, transaction amount and the like) when the target transaction risk identification result is risk transaction, converting the risk checking key information into a service language according to a risk task distribution rule set in the system, and triggering and pushing a risk checking task to an external front-end control system.
The model training module comprises a risk transaction identification model creation module.
To sum up, the risk transaction identification device of the embodiment of the invention firstly constructs the current transaction characteristics according to the current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain the risk transaction identification result, and then generates the target transaction risk identification result according to the risk merchant identification result and the risk customer identification result and transmits the target transaction risk identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, the efficiency of risk transaction identification and avoidance can be effectively improved, and the compliance risk of the acquiring mechanism is reduced.
The embodiment of the invention also provides a specific implementation mode of computer equipment, which can realize all the steps in the risk transaction identification method in the embodiment. Fig. 8 is a block diagram of a computer device in an embodiment of the present invention, and referring to fig. 8, the computer device specifically includes the following:
a processor (processor)801 and a memory (memory) 802.
The processor 801 is configured to call a computer program in the memory 802, and the processor implements all the steps of the risk transaction identification method in the above embodiments when executing the computer program, for example, the processor implements the following steps when executing the computer program:
acquiring current transaction data in a payment request from an acquiring system, and constructing current transaction characteristics according to the current transaction data;
inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
To sum up, the computer device of the embodiment of the invention firstly constructs the current transaction characteristics according to the current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain the risk transaction identification result, and then generates the target transaction risk identification result according to the risk merchant identification result and the risk customer identification result and transmits the target transaction risk identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, the efficiency of risk transaction identification and avoidance can be effectively improved, and the compliance risk of the acquiring mechanism is reduced.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all the steps in the risk transaction identification method in the foregoing embodiment, where the computer-readable storage medium stores a computer program, and the computer program implements all the steps of the risk transaction identification method in the foregoing embodiment when executed by a processor, for example, the processor implements the following steps when executing the computer program:
acquiring current transaction data in a payment request from an acquiring system, and constructing current transaction characteristics according to the current transaction data;
inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
To sum up, the computer-readable storage medium of the embodiment of the present invention first constructs current transaction characteristics according to current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain a risk transaction identification result, and then generates and transmits a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, thereby effectively improving the efficiency of risk transaction identification and avoidance, and reducing the compliance risk of the acquiring mechanism.
Based on the same inventive concept, the embodiment of the invention also provides a risk transaction identification system, and as the problem solving principle of the system is similar to that of the risk transaction identification method, the implementation of the system can refer to the implementation of the method, and repeated parts are not repeated.
Fig. 9 is a schematic diagram of a risk transaction identification system in an embodiment of the invention. As shown in fig. 9, the risk transaction identification system includes:
the risk transaction identification device 1 is a mainframe computer or a midget-mini computer disposed in the background of the acquirer, and is further configured to receive an initial identification model from the front-end control system, merchant operation information from the merchant management system 4, and merchant account information from the account system 5.
And the acquiring system 2 is used for sending a payment request to the risk transaction identification device and processing the transaction according to the target transaction risk identification result from the risk transaction identification device.
In one embodiment, the risk transaction identification system further comprises: a front-end control system 3, a merchant management system 4 and an account system 5.
The front-end control system 3 is used for supporting a system user to enter and modify equipment of the initial identification model, is connected with the risk transaction identification device 1 through a private line network 6, and completes operations of functions such as front-end page display, initial identification model entry and the like.
The private line network 6 is a private line deployed by a telecommunications carrier, and connects the front-end control system 3 and the risk exchange recognition apparatus 1.
The telecommunication network 7 refers to a telephone network, a wireless GPRS, a 3G communication network, a 4G communication network or an Internet Internet network deployed by a telecommunication operator, and the risk transaction identification device 1, the acquiring system 2, the merchant management system 4 and the account system 5 are in data communication through the telecommunication network 7.
To sum up, the risk transaction identification system of the embodiment of the invention firstly constructs the current transaction characteristics according to the current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain the risk transaction identification result, and then generates and transmits the target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, the efficiency of risk transaction identification and avoidance can be effectively improved, and the compliance risk of the acquiring mechanism is reduced.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, or devices described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.