CN113095834A - Risk transaction identification method, device and system - Google Patents
Risk transaction identification method, device and system Download PDFInfo
- Publication number
- CN113095834A CN113095834A CN202110388035.7A CN202110388035A CN113095834A CN 113095834 A CN113095834 A CN 113095834A CN 202110388035 A CN202110388035 A CN 202110388035A CN 113095834 A CN113095834 A CN 113095834A
- Authority
- CN
- China
- Prior art keywords
- risk
- transaction
- identification
- identification result
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000026676 system process Effects 0.000 claims abstract description 16
- 230000006870 function Effects 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 13
- 238000010276 construction Methods 0.000 claims description 7
- 238000012804 iterative process Methods 0.000 claims description 4
- 238000013473 artificial intelligence Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 11
- 230000007246 mechanism Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 238000004140 cleaning Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012954 risk control Methods 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Life Sciences & Earth Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Computational Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a risk transaction identification method, device and system, and belongs to the technical field of artificial intelligence. The risk transaction identification method comprises the following steps: acquiring current transaction data in a payment request from an acquiring system, and constructing current transaction characteristics according to the current transaction data; inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result; generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result; and sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result. The invention can effectively improve the efficiency of identifying and avoiding the risk transaction and reduce the compliance risk of the acquirer.
Description
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a risk transaction identification method, device and system.
Background
The existing risk transaction identification method is that an acquirer verifies the operation information of merchants in a payment request by using an image processing technology, is suitable for solving the access control problem of small and micro merchants in an internet mode, and reduces the auditing cost and account opening cost of the acquirer.
Along with the popularization of the internet finance and two-dimension code order collection, the order collection cost of the merchants is lower and lower, the number, the management cost and the supervision cost of the merchants are increased day by day, and the compliance risk of the order collection mechanism is further improved. At present, transaction data in a payment request needs to be manually retrieved for examination and analysis, the efficiency is low, the recognition rate is low, and even if specific risks are positioned, the risks cannot be avoided and loss can be stopped in time. In the conventional merchant portrayal method, the acquiring mechanism verifies the operation information of the merchant in the payment request by using an image processing technology, so that the method is suitable for solving the access control problem of small and micro merchants in an internet mode, but cannot solve the transaction risk control problem in the actual operation process.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a risk transaction identification method, a risk transaction identification device and a risk transaction identification system, so that the efficiency of risk transaction identification and avoidance is effectively improved, and the compliance risk of an acquirer is reduced.
In order to achieve the above object, an embodiment of the present invention provides a risk transaction identification method, including:
acquiring current transaction data in a payment request from an acquiring system, and constructing current transaction characteristics according to the current transaction data;
inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
The embodiment of the invention also provides a risk transaction identification device, which comprises:
the current transaction characteristic construction module is used for acquiring current transaction data in the payment request from the acquiring system and constructing current transaction characteristics according to the current transaction data;
the risk transaction identification module is used for inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
the target transaction risk identification module is used for generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and the sending module is used for sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program stored on the memory and running on the processor, wherein the processor realizes the steps of the risk transaction identification method when executing the computer program.
Embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the risk transaction identification method.
The embodiment of the invention also provides a risk transaction identification system, which comprises:
risk transaction identification means as described above;
and the acquiring system is used for sending the payment request to the risk transaction identification device and processing the transaction according to the target transaction risk identification result from the risk transaction identification device.
According to the risk transaction identification method, the device and the system, the current transaction characteristics are established according to the current transaction data and input into the risk transaction identification model to obtain the risk transaction identification result, the target transaction risk identification result is generated according to the risk merchant identification result and the risk customer identification result and is sent, so that the acquiring system processes the current transaction according to the target transaction risk identification result, the risk transaction identification and avoidance efficiency can be effectively improved, and the compliance risk of the acquiring mechanism is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a risk transaction identification method in one embodiment of the invention;
FIG. 2 is a flow chart of a risk transaction identification method in another embodiment of the present invention;
fig. 3 is a flowchart of S101 in the embodiment of the present invention;
FIG. 4 is a flow diagram of creating a risk transaction identification model in one embodiment of the invention;
FIG. 5 is a flow diagram of creating a risk transaction identification model in another embodiment of the invention;
fig. 6 is a block diagram showing the structure of a risk transaction identifying apparatus according to an embodiment of the present invention;
FIG. 7 is a block diagram of the risk transaction identification device according to another embodiment of the present invention;
FIG. 8 is a block diagram of a computer apparatus in an embodiment of the invention;
fig. 9 is a schematic diagram of a risk transaction identification system in an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
In view of the problems that in the prior art, transaction data in payment requests need to be manually retrieved for examination and analysis, efficiency is low, recognition rate is low, and the problem of transaction risk control in the actual operation process cannot be solved, the embodiment of the invention provides a risk transaction recognition method which is simple to implement, low in implementation cost, and adaptive, can effectively prevent malicious operation of bad merchants and malicious transactions of bad customers, effectively improves efficiency of risk transaction recognition and avoidance, and reduces compliance risks of acquiring organizations.
FIG. 1 is a flow chart of a risk transaction identification method in an embodiment of the invention. Fig. 2 is a flow chart of a risk transaction identification method in another embodiment of the invention. As shown in fig. 1-2, the risk transaction identification method includes:
s101: and acquiring current transaction data in the payment request from the acquiring system, and constructing current transaction characteristics according to the current transaction data.
Fig. 3 is a flowchart of S101 in the embodiment of the present invention. As shown in fig. 3, S101 includes:
s201: and searching corresponding merchant data and customer data according to the current transaction data.
The merchant data comprises merchant operation information such as merchant operation types, merchant attribution areas, operation scales, legal information, transaction numbers and transaction amounts of all dimensions and merchant account information such as credit balance, payment and account running of merchant associated accounts. In specific implementation, the merchant operation information can be searched from an external merchant management system according to the current transaction data, and the merchant account information can be searched from an external account system.
S202: current transaction characteristics are constructed from the current transaction data, merchant data and customer data.
The transaction data includes a payment channel, a transaction amount and the like. The current transaction characteristics are data that has undergone a process cleaning process.
S102: inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; and the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result.
In one embodiment, S102 includes: and inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics according to the preset merchant risk types corresponding to the merchant data and the preset customer risk types corresponding to the customer data to obtain a risk transaction identification result.
For example, the preset merchant risk types include normal merchants, entrusted merchants, and risky merchants. The preset client risk types include normal clients, collection clients and risk clients. When the preset merchant risk type is a risk merchant or the preset customer risk type is a risk customer, determining that the current transaction is a risk transaction, sending the risk transaction as a target transaction risk identification result to an acquiring system, intercepting the current transaction after the acquiring system receives the target transaction risk identification result determined as the risk transaction, and terminating the transaction; otherwise, inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics.
S103: and generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result.
In specific implementation, the highest risk type in the risk merchant identification result and the corresponding preset merchant risk type may be determined as the target merchant risk identification result, the highest risk type in the risk customer identification result and the corresponding preset customer risk type may be determined as the target customer risk identification result, and the highest risk type in the target merchant risk identification result and the target customer risk identification result may be determined as the target transaction risk identification result. Wherein the risk class in the risk type is risk > collecting > normal.
For example, if the risk merchant identification result is a normal merchant, and the preset merchant risk type is an entrusted merchant, the target merchant risk identification result is an entrusted merchant. And if the risk client identification result is a risk client and the preset client risk type is a collection client, the target client risk identification result is a risk client.
When the target customer risk identification result is a risk customer and the target merchant risk identification result is a collection merchant, the risk grade (risk) of the target customer risk identification result is greater than that of the target merchant, and the target transaction risk identification result is risk transaction.
When the target customer risk identification result is the collection customer and the target merchant risk identification result is the normal merchant, the risk grade (collection) of the target customer risk identification result is greater than that (normal) of the target merchant, and the target transaction risk identification result is collection transaction.
And when the target customer risk identification result is a normal customer and the target merchant risk identification result is a normal merchant, the target transaction risk identification result is a normal transaction.
S104: and sending the target transaction risk identification result to an acquiring system so that the acquiring system processes the transaction according to the target transaction risk identification result.
For example, when the target transaction risk identification result is a normal transaction, the acquiring system allows the current transaction to be normally carried out; when the target transaction risk identification result is a collection transaction, the collection system collects the current transaction; and when the target transaction risk identification result is a risk transaction, the acquiring system intercepts the current transaction and terminates the transaction.
In one embodiment, the target transaction risk identification result can be sent to an external front-end control system and displayed. And when the target transaction risk identification result is risk transaction, triggering and pushing a risk checking task to an external front-end control system to improve the subsequent checking efficiency of the risk.
The execution subject of the risk transaction identification method shown in fig. 1 may be a computer. As can be seen from the flow shown in fig. 1, the risk transaction identification method according to the embodiment of the present invention first constructs current transaction characteristics according to current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain a risk transaction identification result, and then generates and transmits a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, which can effectively improve the efficiency of risk transaction identification and avoiding, and reduce the compliance risk of the acquiring mechanism.
FIG. 4 is a flow diagram of creating a risk transaction identification model in an embodiment of the invention. FIG. 5 is a flow chart of creating a risk transaction identification model in another embodiment of the invention. As shown in fig. 4-5, creating a risk transaction identification model based on historical transaction characteristics includes:
the following iterative process is performed:
s301: and inputting the historical transaction characteristics into the initial identification model to obtain a risk transaction prediction result.
The initial recognition model comes from an external front-end control system, and historical transaction characteristics can be constructed according to current historical transaction data, merchant data and customer data.
S302: and determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result.
S303: and judging whether the loss function is smaller than a preset threshold value or not.
S304: and when the loss function is smaller than a preset threshold value, determining the initial identification model in the current iteration as a risk transaction identification model.
S305: and when the loss function is larger than or equal to the preset threshold value, updating the initial recognition model according to the loss function, and continuously executing iterative processing.
The specific process of the embodiment of the invention is as follows:
1. and inputting the historical transaction characteristics into the initial identification model to obtain a risk transaction prediction result.
2. And (3) determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result, determining the initial identification model in the current iteration as the risk transaction identification model when the loss function is smaller than a preset threshold, otherwise updating the initial identification model according to the loss function, and returning to the step 1.
3. And acquiring current transaction data in the payment request from the acquiring system, and searching corresponding merchant data and customer data according to the current transaction data.
4. Current transaction characteristics are constructed from the current transaction data, merchant data and customer data.
5. And inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics according to the preset merchant risk types corresponding to the merchant data and the preset customer risk types corresponding to the customer data to obtain risk transaction identification results, wherein the risk transaction identification results comprise risk merchant identification results and risk customer identification results.
6. And generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, and sending the target transaction risk identification result to the acquiring system.
7. And the acquiring system processes the current transaction according to the target transaction risk identification result.
In summary, the risk transaction identification method provided by the embodiment of the invention has the following beneficial effects:
(1) and performing sample training on the historical transaction data by adopting a machine learning algorithm to obtain a risk transaction identification model so as to further obtain a risk transaction identification result.
(2) The current transaction data, the merchant data and the customer data are acted on the transaction process in real time or quasi-real time by utilizing a computer data transmission technology, a manual identification and post-interception mode is replaced, and the risk identification and avoidance efficiency is improved.
(3) And the risk transaction automatically triggers a risk checking task, so that the subsequent checking efficiency of the risk is improved.
Based on the same inventive concept, the embodiment of the invention also provides a risk transaction identification device, and as the problem solving principle of the device is similar to that of the risk transaction identification method, the implementation of the device can refer to the implementation of the method, and repeated parts are not described again.
Fig. 6 is a block diagram showing the structure of a risk transaction identification device according to an embodiment of the present invention. Fig. 7 is a block diagram showing the structure of a risk transaction identification device according to another embodiment of the present invention. As shown in fig. 6 to 7, the risk transaction recognition apparatus includes:
the current transaction characteristic construction module is used for acquiring current transaction data in the payment request from the acquiring system and constructing current transaction characteristics according to the current transaction data;
the risk transaction identification module is used for inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
the target transaction risk identification module is used for generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and the sending module is used for sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
In one embodiment, the current transaction feature building module comprises:
the data searching unit is used for searching corresponding merchant data and customer data according to the current transaction data;
and the current transaction characteristic construction unit is used for constructing current transaction characteristics according to the current transaction data, the merchant data and the customer data.
In one embodiment, the method further comprises the following steps: a risk transaction identification model creation module for performing the following iterative process:
inputting historical transaction characteristics into an initial identification model to obtain a risk transaction prediction result;
determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result;
and when the loss function is smaller than a preset threshold value, determining that the initial identification model in the current iteration is a risk transaction identification model, otherwise, updating the initial identification model according to the loss function, and continuously executing the iteration processing.
In one embodiment, the risk transaction identification module is specifically configured to:
and inputting the current transaction characteristics into a risk transaction identification model created based on the historical transaction characteristics according to the preset merchant risk types corresponding to the merchant data and the preset customer risk types corresponding to the customer data to obtain a risk transaction identification result.
As shown in fig. 7, in practical application, the product risk early warning device includes a data receiving and transmitting module, a data collecting and processing module, a risk identifying module, a risk task triggering module, and a model training module.
The data receiving and transmitting module comprises a sending module, a receiving module and a processing module, wherein the sending module is used for receiving the initial identification model from the front-end control system, the current transaction data in the payment request from the acquiring system, the merchant operation information from the merchant management system and the merchant account information from the account system; and sending the target transaction risk identification result to an acquiring system.
The data acquisition and processing module comprises a current transaction characteristic construction module and is used for carrying out processing and cleaning treatment on current transaction data, merchant data and customer data according to the business rules so as to construct current transaction characteristics.
The risk identification module comprises a risk transaction identification module and a target transaction risk identification module.
And the risk task triggering module is used for extracting risk checking key information (such as merchant attribution region, customer information, payment channel, transaction amount and the like) when the target transaction risk identification result is risk transaction, converting the risk checking key information into a service language according to a risk task distribution rule set in the system, and triggering and pushing a risk checking task to an external front-end control system.
The model training module comprises a risk transaction identification model creation module.
To sum up, the risk transaction identification device of the embodiment of the invention firstly constructs the current transaction characteristics according to the current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain the risk transaction identification result, and then generates the target transaction risk identification result according to the risk merchant identification result and the risk customer identification result and transmits the target transaction risk identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, the efficiency of risk transaction identification and avoidance can be effectively improved, and the compliance risk of the acquiring mechanism is reduced.
The embodiment of the invention also provides a specific implementation mode of computer equipment, which can realize all the steps in the risk transaction identification method in the embodiment. Fig. 8 is a block diagram of a computer device in an embodiment of the present invention, and referring to fig. 8, the computer device specifically includes the following:
a processor (processor)801 and a memory (memory) 802.
The processor 801 is configured to call a computer program in the memory 802, and the processor implements all the steps of the risk transaction identification method in the above embodiments when executing the computer program, for example, the processor implements the following steps when executing the computer program:
acquiring current transaction data in a payment request from an acquiring system, and constructing current transaction characteristics according to the current transaction data;
inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
To sum up, the computer device of the embodiment of the invention firstly constructs the current transaction characteristics according to the current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain the risk transaction identification result, and then generates the target transaction risk identification result according to the risk merchant identification result and the risk customer identification result and transmits the target transaction risk identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, the efficiency of risk transaction identification and avoidance can be effectively improved, and the compliance risk of the acquiring mechanism is reduced.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all the steps in the risk transaction identification method in the foregoing embodiment, where the computer-readable storage medium stores a computer program, and the computer program implements all the steps of the risk transaction identification method in the foregoing embodiment when executed by a processor, for example, the processor implements the following steps when executing the computer program:
acquiring current transaction data in a payment request from an acquiring system, and constructing current transaction characteristics according to the current transaction data;
inputting the current transaction characteristics into a risk transaction identification model established based on the historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and sending the target transaction risk identification result to the acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
To sum up, the computer-readable storage medium of the embodiment of the present invention first constructs current transaction characteristics according to current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain a risk transaction identification result, and then generates and transmits a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, thereby effectively improving the efficiency of risk transaction identification and avoidance, and reducing the compliance risk of the acquiring mechanism.
Based on the same inventive concept, the embodiment of the invention also provides a risk transaction identification system, and as the problem solving principle of the system is similar to that of the risk transaction identification method, the implementation of the system can refer to the implementation of the method, and repeated parts are not repeated.
Fig. 9 is a schematic diagram of a risk transaction identification system in an embodiment of the invention. As shown in fig. 9, the risk transaction identification system includes:
the risk transaction identification device 1 is a mainframe computer or a midget-mini computer disposed in the background of the acquirer, and is further configured to receive an initial identification model from the front-end control system, merchant operation information from the merchant management system 4, and merchant account information from the account system 5.
And the acquiring system 2 is used for sending a payment request to the risk transaction identification device and processing the transaction according to the target transaction risk identification result from the risk transaction identification device.
In one embodiment, the risk transaction identification system further comprises: a front-end control system 3, a merchant management system 4 and an account system 5.
The front-end control system 3 is used for supporting a system user to enter and modify equipment of the initial identification model, is connected with the risk transaction identification device 1 through a private line network 6, and completes operations of functions such as front-end page display, initial identification model entry and the like.
The private line network 6 is a private line deployed by a telecommunications carrier, and connects the front-end control system 3 and the risk exchange recognition apparatus 1.
The telecommunication network 7 refers to a telephone network, a wireless GPRS, a 3G communication network, a 4G communication network or an Internet Internet network deployed by a telecommunication operator, and the risk transaction identification device 1, the acquiring system 2, the merchant management system 4 and the account system 5 are in data communication through the telecommunication network 7.
To sum up, the risk transaction identification system of the embodiment of the invention firstly constructs the current transaction characteristics according to the current transaction data and inputs the current transaction characteristics into the risk transaction identification model to obtain the risk transaction identification result, and then generates and transmits the target transaction risk identification result according to the risk merchant identification result and the risk customer identification result, so that the acquiring system processes the current transaction according to the target transaction risk identification result, the efficiency of risk transaction identification and avoidance can be effectively improved, and the compliance risk of the acquiring mechanism is reduced.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, or devices described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.
Claims (11)
1. A method for identifying risk transactions, comprising:
acquiring current transaction data in a payment request from an acquiring system, and constructing current transaction characteristics according to the current transaction data;
inputting the current transaction characteristics into a risk transaction identification model established based on historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and sending the target transaction risk identification result to an acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
2. The risk transaction identification method of claim 1, wherein constructing current transaction characteristics from the current transaction data comprises:
searching corresponding merchant data and customer data according to the current transaction data;
and constructing current transaction characteristics according to the current transaction data, the merchant data and the customer data.
3. The risk transaction identification method of claim 2, wherein creating a risk transaction identification model based on historical transaction characteristics comprises:
the following iterative process is performed:
inputting historical transaction characteristics into an initial identification model to obtain a risk transaction prediction result;
determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result;
and when the loss function is smaller than a preset threshold value, determining an initial identification model in the current iteration as the risk transaction identification model, otherwise, updating the initial identification model according to the loss function, and continuously executing the iteration processing.
4. The risk transaction identification method of claim 2, wherein inputting the current transaction characteristics into a risk transaction identification model created based on historical transaction characteristics, and obtaining a risk transaction identification result comprises:
and inputting the current transaction characteristics into a risk transaction identification model created based on historical transaction characteristics according to a preset merchant risk type corresponding to the merchant data and a preset customer risk type corresponding to the customer data to obtain a risk transaction identification result.
5. A risk transaction identification device, comprising:
the current transaction characteristic construction module is used for acquiring current transaction data in a payment request from an acquiring system and constructing current transaction characteristics according to the current transaction data;
the risk transaction identification module is used for inputting the current transaction characteristics into a risk transaction identification model established based on historical transaction characteristics to obtain a risk transaction identification result; the risk transaction identification result comprises a risk merchant identification result and a risk customer identification result;
the target transaction risk identification module is used for generating a target transaction risk identification result according to the risk merchant identification result and the risk customer identification result;
and the sending module is used for sending the target transaction risk identification result to an acquiring system so that the acquiring system processes the current transaction according to the target transaction risk identification result.
6. The risk transaction identification device of claim 5, wherein the current transaction characteristic construction module comprises:
the data searching unit is used for searching corresponding merchant data and customer data according to the current transaction data;
and the current transaction characteristic construction unit is used for constructing current transaction characteristics according to the current transaction data, the merchant data and the customer data.
7. The risk transaction identification device of claim 6, further comprising: a risk transaction identification model creation module for performing the following iterative process:
inputting historical transaction characteristics into an initial identification model to obtain a risk transaction prediction result;
determining a loss function according to the risk transaction prediction result and the corresponding risk transaction actual result;
and when the loss function is smaller than a preset threshold value, determining an initial identification model in the current iteration as the risk transaction identification model, otherwise, updating the initial identification model according to the loss function, and continuously executing the iteration processing.
8. The risk transaction identification device of claim 6, wherein the risk transaction identification module is specifically configured to:
and inputting the current transaction characteristics into a risk transaction identification model created based on historical transaction characteristics according to a preset merchant risk type corresponding to the merchant data and a preset customer risk type corresponding to the customer data to obtain a risk transaction identification result.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, wherein the processor when executing the computer program implements the steps of the risk transaction identification method of any of claims 1 to 4.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the risk transaction identification method according to any one of claims 1 to 4.
11. A risk transaction identification system, comprising:
the risk transaction identification device of any of claims 6-8;
and the acquiring system is used for sending a payment request to the risk transaction identification device and processing the transaction according to the target transaction risk identification result from the risk transaction identification device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110388035.7A CN113095834A (en) | 2021-04-12 | 2021-04-12 | Risk transaction identification method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110388035.7A CN113095834A (en) | 2021-04-12 | 2021-04-12 | Risk transaction identification method, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113095834A true CN113095834A (en) | 2021-07-09 |
Family
ID=76676422
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110388035.7A Pending CN113095834A (en) | 2021-04-12 | 2021-04-12 | Risk transaction identification method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113095834A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101578595A (en) * | 2006-11-17 | 2009-11-11 | 维萨国际服务协会 | Method and system for using payment history for conducting commercial transactions |
CN109191129A (en) * | 2018-07-18 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of air control method, system and computer equipment |
CN109242499A (en) * | 2018-09-19 | 2019-01-18 | 中国银行股份有限公司 | A kind of processing method of transaction risk prediction, apparatus and system |
CN110533536A (en) * | 2019-08-30 | 2019-12-03 | 中国工商银行股份有限公司 | Transaction risk appraisal procedure, device and computer system |
WO2020037942A1 (en) * | 2018-08-20 | 2020-02-27 | 平安科技(深圳)有限公司 | Risk prediction processing method and apparatus, computer device and medium |
CN111768205A (en) * | 2020-06-24 | 2020-10-13 | 中国工商银行股份有限公司 | Attack transaction identification method and system |
CN112016929A (en) * | 2020-08-31 | 2020-12-01 | 中国银行股份有限公司 | Online payment method and device, electronic equipment and computer storage medium |
CN112016931A (en) * | 2020-08-31 | 2020-12-01 | 中国银行股份有限公司 | Online transaction method and device, electronic equipment and computer storage medium |
CN112529575A (en) * | 2020-12-14 | 2021-03-19 | 深圳市快付通金融网络科技服务有限公司 | Risk early warning method, equipment, storage medium and device |
-
2021
- 2021-04-12 CN CN202110388035.7A patent/CN113095834A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101578595A (en) * | 2006-11-17 | 2009-11-11 | 维萨国际服务协会 | Method and system for using payment history for conducting commercial transactions |
CN109191129A (en) * | 2018-07-18 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of air control method, system and computer equipment |
WO2020037942A1 (en) * | 2018-08-20 | 2020-02-27 | 平安科技(深圳)有限公司 | Risk prediction processing method and apparatus, computer device and medium |
CN109242499A (en) * | 2018-09-19 | 2019-01-18 | 中国银行股份有限公司 | A kind of processing method of transaction risk prediction, apparatus and system |
CN110533536A (en) * | 2019-08-30 | 2019-12-03 | 中国工商银行股份有限公司 | Transaction risk appraisal procedure, device and computer system |
CN111768205A (en) * | 2020-06-24 | 2020-10-13 | 中国工商银行股份有限公司 | Attack transaction identification method and system |
CN112016929A (en) * | 2020-08-31 | 2020-12-01 | 中国银行股份有限公司 | Online payment method and device, electronic equipment and computer storage medium |
CN112016931A (en) * | 2020-08-31 | 2020-12-01 | 中国银行股份有限公司 | Online transaction method and device, electronic equipment and computer storage medium |
CN112529575A (en) * | 2020-12-14 | 2021-03-19 | 深圳市快付通金融网络科技服务有限公司 | Risk early warning method, equipment, storage medium and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101364763B1 (en) | Financial fraud warning system using banking transaction pattern analysis and a method thereof | |
US20190287168A1 (en) | System and platform for execution of consolidated resource-based action | |
US11205222B2 (en) | Centralized model for lending risk management system | |
US11086991B2 (en) | Method and system for active risk control based on intelligent interaction | |
CN111092999A (en) | Data request processing method and device | |
CN110751549A (en) | Management and control method and device for overdue financial loan collection and acceptance promotion and electronic equipment | |
CN106503420A (en) | The multi-party reconciliation assessment of hospital and supervisory systems and method | |
CN114912925A (en) | Fraud detection method, device, electronic equipment and computer readable medium | |
CN113095834A (en) | Risk transaction identification method, device and system | |
US11973756B2 (en) | Systems and methods for improving computer identification | |
CN114611482A (en) | Product performance recording method, device, electronic equipment and storage medium | |
CN115563082A (en) | Fraud number identification method and device based on real-time call ticket big data | |
US20150019401A1 (en) | Integrated credit decision platform | |
CN114022206A (en) | Automatic management method and device for blacklist and white list of network appointment platform | |
CN112446708A (en) | Risk identification method and device | |
CN115423599A (en) | Credit evaluation method and device, electronic equipment and storage medium | |
CN114723455A (en) | Service processing method and device, electronic equipment and storage medium | |
CN114757757A (en) | Wind control method | |
CN114049206A (en) | Transaction data processing method and device | |
WO2022038455A1 (en) | System and method for network usage product provisioning | |
CN110197074B (en) | User authority control method and device | |
CN116860898B (en) | Data processing method and device | |
US20240046348A1 (en) | Systems and methods for credit offers, private label prequalification for lenders, and account opening | |
CN114493569A (en) | Pushing method and device in signature checking mode | |
CN117876089A (en) | Asset processing method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |