CN111681004A - Business wind control method and system - Google Patents

Business wind control method and system Download PDF

Info

Publication number
CN111681004A
CN111681004A CN202010331893.3A CN202010331893A CN111681004A CN 111681004 A CN111681004 A CN 111681004A CN 202010331893 A CN202010331893 A CN 202010331893A CN 111681004 A CN111681004 A CN 111681004A
Authority
CN
China
Prior art keywords
user
risk
business
information
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010331893.3A
Other languages
Chinese (zh)
Inventor
陈方毅
胡艺宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meishao Co ltd
Original Assignee
Xiamen Meishao Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meishao Co ltd filed Critical Xiamen Meishao Co ltd
Priority to CN202010331893.3A priority Critical patent/CN111681004A/en
Publication of CN111681004A publication Critical patent/CN111681004A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a business wind control method and a business wind control system. The method comprises the following steps of obtaining the service type of the current service and user login information, wherein the service type comprises the following steps: the order business and the fund operation are combined with the business type to carry out safety monitoring according to the user login information and the risk information base to obtain the user risk level, the subsequent process of the current business is executed according to the user risk level, and the specific user risk level comprises the following steps: safety, normal, risk, high risk. And safety monitoring is carried out on the user login information through the risk information stored in the risk information base to obtain the risk level during the current service execution period, and corresponding measures are taken to improve the wind control efficiency. Can be widely applied to the business field.

Description

Business wind control method and system
Technical Field
The invention relates to the field of software, in particular to a business wind control method and a business wind control system.
Background
Wind control, i.e., risk control, refers to taking various measures and methods to eliminate or reduce the possibility of occurrence of risk events in the business process or reduce the loss caused by the occurrence of the risk events. Nowadays, business handling is faster and more convenient, risks are increased, wind control importance is increasingly prominent, user experience is improved through wind control loss prevention, but at present, many wind control methods are tedious in operation and long in response time, and influence on user experience, so that a wind control method convenient to operate needs to be provided.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a wind control method which can be used for conveniently and rapidly carrying out wind control.
In a first aspect, an embodiment of the present invention provides a: a service wind control method comprises the following steps:
acquiring the service type of the current service and user login information, wherein the service type comprises: order business and fund operation;
performing safety monitoring according to the user login information and a risk information base by combining the service types to obtain a user risk level;
executing the subsequent flow of the current business according to the user risk level;
the user risk levels include: safety, normal, risk, high risk.
Further, the risk information in the risk information base comprises: login environment, user login IP or MAC address, user login account, user login equipment, login canvas fingerprint, user login mobile phone number, user login address and risk type.
Further, the safety monitoring is performed according to the user information and the risk information base by combining the service type, and the specific process is as follows:
acquiring risk information of a current user in a risk information base;
and comparing the risk information with the user login information, and generating a current user risk level according to a preset judgment strategy.
Further, the method comprises the steps of obtaining sesame credit scores of the users according to user authorization, setting up the rapid return amount according to the sesame credit scores, and performing rapid return operation on the users when the user risk levels are safe or normal.
Further, the method also comprises the step of updating the sesame credit score and the rapid credit limit of the user at preset time intervals.
Further, when the user risk level is a risk, re-auditing is required, and if the auditing is passed, a subsequent process is performed; and when the user risk level is high risk, rejecting a subsequent process.
In a second aspect, an embodiment of the present invention provides B, a traffic wind control system, including:
an acquisition module: the method is used for acquiring the service type and user login information of the current service, and the service type comprises the following steps: order business and fund operation;
a safety detection module: the system is used for carrying out safety monitoring according to the user login information and the risk information base by combining the service types to obtain a user risk level, wherein the user risk level comprises: safety, normal, risk and high risk
An execution module: and the subsequent process of the current business is executed according to the user risk level.
In a third aspect, the present invention provides a service wind control device, including:
at least one processor, and a memory communicatively coupled to the at least one processor;
wherein the processor is adapted to perform the method of any of the first aspects by invoking a computer program stored in the memory.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored thereon computer-executable instructions for causing a computer to perform the method of any of the first aspects.
The invention has the beneficial effects that:
the invention obtains the service type of the current service and the user login information, wherein the service type comprises the following steps: the order business and the fund operation are combined with the business type to carry out safety monitoring according to the user login information and the risk information base to obtain the user risk level, the subsequent process of the current business is executed according to the user risk level, and the specific user risk level comprises the following steps: safety, normal, risk, high risk. And safety monitoring is carried out on the user login information through the risk information stored in the risk information base to obtain the risk level during the current service execution period, and corresponding measures are taken to improve the wind control efficiency. Can be widely applied to the business field.
Drawings
Fig. 1 is a schematic flow chart of a specific embodiment of a service wind control method according to an embodiment of the present invention;
fig. 2 is a block diagram of a specific embodiment of a service wind control system according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following description will be made with reference to the accompanying drawings. It is obvious that the drawings in the following description are only some examples of the invention, and that for a person skilled in the art, other drawings and embodiments can be derived from them without inventive effort.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
The first embodiment is as follows:
fig. 1 is a flowchart illustrating an implementation of a service wind control method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
s1: acquiring the service type of the current service and user login information, wherein the service type comprises the following steps: order business and fund operation.
In this embodiment, the order service is, for example, a panning order, and the fund operation is, for example, a withdrawal, a telephone charge, and the like, which relate to the fund operation.
S2: and carrying out safety monitoring according to the user login information and the risk information base by combining the service types to obtain a user risk level, wherein the user risk level comprises the following steps: safety, normal, risk, high risk.
S3: and executing the subsequent flow of the current business according to the user risk level.
Specifically, in step S2, the risk information in the risk information base includes: the method comprises the steps of logging in the environment, logging in an IP (Internet protocol) or MAC (media access control) address by a user, logging in an account by the user, logging in equipment by the user, logging in canvas fingerprints, logging in a mobile phone number by the user, logging in the address by the user and risk types, wherein the logging in environment comprises a user logging in place, common logging in time and the like. And obtaining the risk information related to the current user by recording the service state of the user every time for the safety monitoring of the next service.
Meanwhile, the risk type corresponding to the current user obtained through statistics in the risk information base comprises the following steps: the account security abnormity, the fund abnormity and the file brushing line are, for example, when the user logs in the account for a plurality of times of login in different places, the risk type of the account is determined as the account security abnormity; for example, if the same user logs in an account and frequently operates the same service for many times, judging that the risk type of the user account is a list-swiping behavior; for example, if a user logs in a mobile phone number and often unbinds the binding, the mobile phone number is judged to be an account security exception; for example, if abnormal account entry or transfer occurs many times in the fund operation of the current user login account, it is determined that the risk type of the user login account is abnormal fund, and the like, and the risk type may be flexibly set according to the actual business requirements, which is only an example and is not limited.
Specifically, the safety monitoring is carried out according to the user information and the risk information base by combining the service types, and the specific process is as follows:
s21: acquiring risk information of a current user in a risk information base;
s22: and comparing the risk information with the user login information, and generating the current user risk level according to a preset judgment strategy.
Wherein different service types correspond to different preset judgment strategies.
For example, when the service type is an order service, the preset judgment policy includes:
1) safety, it needs to satisfy:
a. the user login account is registered on the same day and the mobile phone number of the user is bound on the same day;
b. the user account has no balance fund;
c. the login environment is a common login environment;
2) normally, it is required to satisfy:
a. matching a user login account, a user login mobile phone number, user login equipment and the like;
3) risks, the following need to be met:
a. account security abnormity and list swiping behaviors exist;
4) high risk, need to satisfy:
a. at least two kinds of information such as a user login IP or MAC address, a user login account, user login equipment, login canvas fingerprints, a user login mobile phone number, a user login address, a risk type and the like are not matched.
For example, when the service type is a fund operation, the preset judgment policy includes:
1) safety, it needs to satisfy:
a. the user login account is registered on the same day and the mobile phone number of the user is bound on the same day;
b. the user account has no balance fund;
c. the login environment is a common login environment;
2) normally, it is required to satisfy:
a. matching a user login account, a user login mobile phone number, user login equipment and the like;
3) risks, the following need to be met:
a. the presence of one or more risk types;
4) high risk, need to satisfy:
a. at least two kinds of information such as a user login IP or MAC address, a user login account, user login equipment, login canvas fingerprints, a user login mobile phone number, a user login address, a risk type and the like are not matched.
In the embodiment, the fund operation related to the fund operation, such as cash withdrawal, telephone fee recharge and the like, does not depend on the user account login credential, so that the security guarantee in the service process is improved.
Further, the method comprises the steps of obtaining sesame credit scores of the user according to user authorization, setting the extreme speed return amount according to the sesame credit scores, carrying out extreme speed return operation on the user when the user risk level is safe or normal, updating the sesame credit scores and the extreme speed return amount of the user at preset time intervals, for example, pushing and obtaining sesame credit score information of the user authorized to update the user every month, and resetting the extreme speed return amount according to the latest sesame credit score information.
The problems that after the user places orders to confirm the receipt, if the user needs to return goods or refund, the user needs to wait for the period of the right to pay for the next payment, the payment returning time is long, and the user experience is poor are solved through the extremely-fast return, so that the time of waiting for funds to pay by the high-quality user is greatly shortened, and the user experience is improved.
When the user risk level is a risk, re-checking is required, for example, the necessary service information is checked manually, and a subsequent process is performed if the checking is passed; and when the user risk level is high risk, rejecting the subsequent process and storing and registering the current information, such as rejecting fund operation and the like.
According to the method and the system, the risk information stored in the risk information base is used for carrying out safety monitoring on the user login information to obtain the risk level during the current service execution period, corresponding measures are taken, and the wind control efficiency is improved.
Example two:
the present embodiment provides a service wind control system, configured to execute the method according to the first embodiment, as shown in fig. 2, which is a structural block diagram of the service wind control system according to the present embodiment, and includes:
the acquisition module 100: the method is used for acquiring the service type and user login information of the current service, and the service type comprises the following steps: order business and fund operation;
the security detection module 200: the method is used for carrying out safety monitoring according to user login information and a risk information base by combining with service types to obtain a user risk level, wherein the user risk level comprises the following steps: safe, normal, risk, high risk execution module 300: and the subsequent process is used for executing the current business according to the user risk level.
The specific details of the service wind control system module in the above description have been described in detail in the service wind control method corresponding to the embodiment, and therefore are not described herein again.
In addition, the present invention also provides a service wind control device, including:
at least one processor, and a memory communicatively coupled to the at least one processor;
wherein the processor is configured to perform the method according to embodiment one by calling the computer program stored in the memory. A computer program, i.e. a program code, for causing a service wind control device to perform the steps of the service wind control method described in the above part of the present description, when the program code runs on the service wind control device.
In addition, the present invention also provides a computer-readable storage medium, which stores computer-executable instructions for causing a computer to perform the method according to the first embodiment.
The invention obtains the service type of the current service and the user login information, wherein the service type comprises the following steps: the order business and the fund operation are combined with the business type to carry out safety monitoring according to the user login information and the risk information base to obtain the user risk level, the subsequent process of the current business is executed according to the user risk level, and the specific user risk level comprises the following steps: safety, normal, risk, high risk.
The above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same, although the present invention is described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (9)

1. A method for traffic scheduling, comprising:
acquiring the service type of the current service and user login information, wherein the service type comprises: order business and fund operation;
performing safety monitoring according to the user login information and a risk information base by combining the service types to obtain a user risk level;
executing the subsequent flow of the current business according to the user risk level;
the user risk levels include: safety, normal, risk, high risk.
2. The business wind control method of claim 1, wherein the risk information in the risk information base comprises: login environment, user login IP or MAC address, user login account, user login equipment, login canvas fingerprint, user login mobile phone number, user login address and risk type.
3. The service wind control method according to claim 1, wherein the safety monitoring is performed according to the user information and risk information base in combination with the service type, and the specific process is as follows:
acquiring risk information of a current user in a risk information base;
and comparing the risk information with the user login information, and generating a current user risk level according to a preset judgment strategy.
4. The service wind control method according to claim 1, further comprising obtaining sesame credit score of the user according to user authorization, setting an extreme speed return amount according to the sesame credit score, and performing extreme speed return operation on the user when the user risk level is safe or normal.
5. The method as claimed in claim 4, further comprising updating the sesame credit score and the rapid credit limit of the subscriber at predetermined time intervals.
6. The business wind control method according to any one of claims 1 to 6, wherein when the user risk level is a risk, a re-audit is required, and if the audit is passed, a subsequent process is performed; and when the user risk level is high risk, rejecting a subsequent process.
7. A business wind control system, comprising:
an acquisition module: the method is used for acquiring the service type and user login information of the current service, and the service type comprises the following steps: order business and fund operation;
a safety detection module: the system is used for carrying out safety monitoring according to the user login information and the risk information base by combining the service types to obtain a user risk level, wherein the user risk level comprises: safety, normal, risk and high risk
An execution module: and the subsequent process of the current business is executed according to the user risk level.
8. A traffic wind control device, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the processor is adapted to perform the method of any one of claims 1 to 6 by invoking a computer program stored in the memory.
9. A computer-readable storage medium having stored thereon computer-executable instructions for causing a computer to perform the method of any one of claims 1 to 6.
CN202010331893.3A 2020-04-24 2020-04-24 Business wind control method and system Pending CN111681004A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010331893.3A CN111681004A (en) 2020-04-24 2020-04-24 Business wind control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010331893.3A CN111681004A (en) 2020-04-24 2020-04-24 Business wind control method and system

Publications (1)

Publication Number Publication Date
CN111681004A true CN111681004A (en) 2020-09-18

Family

ID=72433812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010331893.3A Pending CN111681004A (en) 2020-04-24 2020-04-24 Business wind control method and system

Country Status (1)

Country Link
CN (1) CN111681004A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112633895A (en) * 2021-01-05 2021-04-09 交通银行股份有限公司 Risk control method and system for bank online website business digital currency transaction
CN112887105A (en) * 2021-01-11 2021-06-01 卓望数码技术(深圳)有限公司 Conference security monitoring method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015043491A1 (en) * 2013-09-30 2015-04-02 腾讯科技(深圳)有限公司 Method and system for performing security verification on login of internet account
CN106600414A (en) * 2015-10-19 2017-04-26 阿里巴巴集团控股有限公司 Service processing method and device
CN107067157A (en) * 2017-03-01 2017-08-18 北京奇艺世纪科技有限公司 Business risk appraisal procedure, device and air control system
CN109753772A (en) * 2018-11-29 2019-05-14 武汉极意网络科技有限公司 A kind of account safety verification method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015043491A1 (en) * 2013-09-30 2015-04-02 腾讯科技(深圳)有限公司 Method and system for performing security verification on login of internet account
CN106600414A (en) * 2015-10-19 2017-04-26 阿里巴巴集团控股有限公司 Service processing method and device
CN107067157A (en) * 2017-03-01 2017-08-18 北京奇艺世纪科技有限公司 Business risk appraisal procedure, device and air control system
CN109753772A (en) * 2018-11-29 2019-05-14 武汉极意网络科技有限公司 A kind of account safety verification method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112633895A (en) * 2021-01-05 2021-04-09 交通银行股份有限公司 Risk control method and system for bank online website business digital currency transaction
CN112887105A (en) * 2021-01-11 2021-06-01 卓望数码技术(深圳)有限公司 Conference security monitoring method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US9774726B1 (en) Detecting and preventing fraud and abuse in real time
US8302187B1 (en) System and method for preventing large-scale account lockout
CN110827032A (en) Intelligent wind control decision method and system and service processing method and system
CN110992020A (en) Data processing method based on intelligent contract, related node and storage medium
CN111556059A (en) Abnormity detection method, abnormity detection device and terminal equipment
CN109145590B (en) Function hook detection method, detection equipment and computer readable medium
EP3432542A1 (en) Method and device for linking to account and providing service process
CN111681004A (en) Business wind control method and system
CN107993053A (en) Data of settling a claim checking method, device, computer equipment and storage medium
CN111191925B (en) Data processing method, device, equipment and storage medium
CN110266676A (en) A kind of method and device of pre- preventing malicious attack
CN107872446B (en) Communication account management method and device and server
US11074586B2 (en) Methods and apparatuses for fraud handling
CN110930161A (en) Method for determining operation time of business operation and self-service business operation equipment
CN107040497B (en) Network account anti-theft method and device
CN112101691A (en) Method and device for dynamically adjusting risk level and server
CN111951084B (en) Method, electronic device, and medium for vehicle rental order management
CN112686542A (en) Service processing method and device, electronic equipment and storage medium
CN108038667A (en) Declaration form generation method, device and equipment
CN110232069B (en) Customer information intelligent input method and device based on big data
CN110442466B (en) Method, device, computer equipment and storage medium for preventing repeated access request
CN1801228A (en) Method for real-time authorization of bank card transaction based on interactive voice response
CN115130577A (en) Method and device for identifying fraudulent number and electronic equipment
CN108471422B (en) Method, device, server and medium for judging remote login
CN112101810A (en) Risk event control method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200918

RJ01 Rejection of invention patent application after publication