CN116629873A - Transaction risk assessment method, device, equipment and storage medium - Google Patents

Transaction risk assessment method, device, equipment and storage medium Download PDF

Info

Publication number
CN116629873A
CN116629873A CN202310562925.4A CN202310562925A CN116629873A CN 116629873 A CN116629873 A CN 116629873A CN 202310562925 A CN202310562925 A CN 202310562925A CN 116629873 A CN116629873 A CN 116629873A
Authority
CN
China
Prior art keywords
risk
transaction
user
value
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310562925.4A
Other languages
Chinese (zh)
Inventor
严金蓉
张依墨
王晓婷
洪阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310562925.4A priority Critical patent/CN116629873A/en
Publication of CN116629873A publication Critical patent/CN116629873A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The disclosure provides a transaction risk assessment method, a device, equipment and a storage medium, which can be applied to the technical field of artificial intelligence or the technical field of finance. The method comprises the following steps: acquiring identification information of a user, wherein the user is a user needing to carry out transaction risk assessment in a transaction process, and the transaction process comprises a transaction process of signing a batch agreement and a transaction process of the batch agreement in a duration; querying a user information system for different assessment factors associated with the user based on the identification information, wherein each assessment factor includes risk characteristic data of at least one dimension; determining a value of each evaluation factor according to the risk characteristic data of at least one dimension included in each evaluation factor; respectively inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value of the user; and determining the transaction risk level of the user according to the transaction risk value of the user.

Description

Transaction risk assessment method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of artificial intelligence technology or financial technology, and in particular, to a transaction risk assessment method, apparatus, device, and storage medium.
Background
Bulk transaction services generally refer to services in which a payable fee is charged to an enterprise user or individual user through a banking client by a collection unit that opens a settlement account.
In the process of implementing the inventive concept of the present disclosure, the inventor found that the following problems generally exist in the related art: in the process of carrying out batch transaction business, the transaction is generally carried out only according to the autonomous willingness of both transaction sides, but in some scenes, the payment user in both transaction sides cannot fully know the real risk situation of the collection user, so that the payment user still carries out payment operation to the collection user under the condition that the collection user has transaction risk, and the security of the transaction is further reduced.
Disclosure of Invention
In view of the foregoing, the present disclosure provides transaction risk assessment methods, apparatus, devices, storage media, and program products.
One aspect of the present disclosure provides a transaction risk assessment method, comprising: acquiring identification information of a user, wherein the user is a user needing to carry out transaction risk assessment in a transaction process, and the transaction process comprises a transaction process of signing a batch agreement and a transaction process of the batch agreement in a lifetime; querying a user information system for different assessment factors associated with the user based on the identification information, wherein each of the assessment factors includes risk characteristic data of at least one dimension; determining the value of each of the above-mentioned assessment factors according to the risk characteristic data of at least one dimension included in each of the above-mentioned assessment factors; respectively inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value of the user; and determining the transaction risk level of the user according to the transaction risk value of the user.
According to an embodiment of the present disclosure, the above method further includes: and according to the identification information of the user, retrieving M risk value ranges and M risk levels respectively corresponding to the M risk value ranges from a risk evaluation database. Wherein, the determining the transaction risk level of the user according to the transaction risk value of the user includes: matching the transaction risk value with M risk value ranges respectively; if the transaction risk value is successfully matched with at least one risk value range of M risk value ranges, determining the at least one risk value range successfully matched as a target risk value range; and determining the transaction risk level of the user according to the risk level corresponding to the target risk value range.
According to an embodiment of the present disclosure, the above method further includes: generating a risk protection strategy according to the transaction risk level; and sending the transaction risk level and the risk protection strategy to a user terminal which does not need to carry out transaction risk assessment in the transaction process.
According to an embodiment of the disclosure, M is 3, where the M risk levels include a first risk level, a second risk level, and a third risk level, and risk levels from the first risk level to the third risk level sequentially increase; the generating the risk protection policy according to the transaction risk level includes: generating a first risk protection strategy under the condition that the transaction risk level is the first risk level, wherein the transaction flow of the first risk protection strategy is unchanged, and executing the transaction by using the initial transaction flow; generating a second risk protection policy when the transaction risk level is the second risk level, wherein the second risk protection policy is to add, in the initial transaction flow, an operation of sending a first risk indicator and a first security verification mode to the user side that does not need to perform transaction risk assessment, where the first risk indicator and the first security verification mode are both associated with the second risk level; and generating a third risk protection policy under the condition that the transaction risk level is the third risk level, wherein the third risk protection policy is to suspend the initial transaction flow, and send a second risk indicator and a second security verification mode to the user end which does not need to perform transaction risk assessment, and the second risk indicator and the second security verification mode are both associated with the third risk level.
According to an embodiment of the present disclosure, the relationship among the first risk protection policy, the second risk protection policy, and the third risk protection policy is: the risk protection degree from the first risk protection strategy to the third risk protection strategy increases in sequence.
According to an embodiment of the present disclosure, the identification information of the user includes at least one of an authentication identification of the user and a number of the transaction service, where the transaction service is a service transacted by the user in a lifetime of the batch agreement; the obtaining the identification information of the user includes: acquiring authentication identification of the user in the transaction process of the signing batch agreement, wherein the transaction process of the signing batch agreement comprises a transaction process of the self-service signing batch agreement and a transaction process of the non-self-service signing batch agreement; and acquiring the serial numbers of the transaction services in the transaction process of the batch protocol in the duration.
According to an embodiment of the present disclosure, in the transaction process of signing the batch agreement, obtaining the authentication identifier of the user includes: receiving a transaction contract number of the user in the transaction process of the contract batch agreement, wherein the transaction contract number is obtained according to the transaction contract information of the user; and acquiring the authentication identification of the user from the transaction signing list according to the transaction signing number.
According to an embodiment of the present disclosure, the transaction subscription information of the user includes at least one of: the account, payment type, currency and transaction signing purpose of the user.
According to an embodiment of the present disclosure, the above-mentioned evaluation factor includes at least one of: the credit risk factors, risk prevention and control service factors, service subscription solution ratio factors and deposit factors of the users.
According to an embodiment of the present disclosure, each of the above-described evaluation factors includes risk characteristic data of at least one dimension including: the risk characteristic data of the credit risk factor includes at least one of: data representing whether to open loan deposit business, data representing the rating condition of a credit system, and data representing the repayment condition of a loan; the risk characteristic data of the risk prevention and control service factors comprises at least one of the following: data characterizing a user's financial risk, and financial risk data characterizing an associated user of said user; the risk characteristic data of the service subscription offer ratio factor comprises: in a preset time period, the proportion between the signing quantity of the batch agreement signed by the user and the offering quantity of the batch agreement offered by the user; the risk characteristic data corresponding to the storage factors comprises at least one of the following: enterprise type data characterizing the user, enterprise scale data characterizing the user, and deposit balance data characterizing the user.
According to an embodiment of the present disclosure, determining the value of each of the above-mentioned evaluation factors from the risk characteristic data of at least one dimension included in each of the above-mentioned evaluation factors includes: obtaining the value of the credit risk factor according to the sum of the products of a plurality of first preset coefficients and each risk feature data in the credit risk factor, wherein the plurality of first preset coefficients respectively correspond to each risk feature data in the credit risk factor; obtaining a value of the risk prevention and control service factor according to the product of a plurality of second preset coefficients and each risk characteristic data in the risk prevention and control service factor, wherein the second preset coefficients respectively correspond to each risk characteristic data in the risk prevention and control service factor; calculating the ratio between the subscription number of the batch agreement with the user and the reduction number of the batch agreement with the user to reduce the batch agreement to obtain the value of the service subscription reduction ratio factor; and obtaining the value of the storage factor according to the sum of the products of the third preset coefficients and the risk characteristic data of each storage factor, wherein the third preset coefficients respectively correspond to the risk characteristic data of each storage factor.
According to an embodiment of the disclosure, the risk assessment function is constructed according to a credit risk parameter, a risk prevention and control service parameter, a service subscription solution ratio parameter and a saving parameter; the step of inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value of the user includes: and sequentially inputting the credit risk factor value, the risk prevention and control service factor value, the service subscription solution ratio factor value and the deposit factor value into the credit risk parameter, the risk prevention and control service parameter, the service subscription solution ratio parameter and the deposit parameter of the risk assessment function to obtain the transaction risk value.
Another aspect of the present disclosure also provides a transaction risk assessment device, including: the system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring identification information of a user, wherein the user is a user needing to carry out transaction risk assessment in a transaction process, and the transaction process comprises a transaction process of signing a batch agreement and a transaction process of the batch agreement in a duration; a query module configured to query a user information system for different assessment factors associated with the user based on the identification information, where each of the assessment factors includes risk characteristic data of at least one dimension; a first determining module, configured to determine a value of each of the evaluation factors according to risk characteristic data of at least one dimension included in each of the evaluation factors; the input module is used for respectively inputting the value of each evaluation factor into the risk evaluation function to obtain the transaction risk value of the user; and the second determining module is used for determining the transaction risk level of the user according to the transaction risk value of the user.
Another aspect of the present disclosure also provides an electronic device, including: one or more processors; and a storage device for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the transaction risk assessment method.
Another aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the transaction risk assessment method described above.
Another aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the transaction risk assessment method described above.
According to the transaction risk assessment method, the device, the equipment, the storage medium and the program product provided by the embodiment of the disclosure, the identification information of the user needing to conduct transaction risk assessment is obtained in the subscription batch agreement or the batch agreement duration; inquiring risk characteristic data of different assessment factors and at least one corresponding dimension according to the identification information; determining the value of an evaluation factor according to the risk characteristic data; inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value; and determining the transaction risk level of the user according to the transaction value. In the transaction process, the risk characteristic data of multiple dimensions of a user (such as a receiving user) are processed to obtain the value of the evaluation factor, and the value of the evaluation factor is input into the risk evaluation function, so that the risk level of the user can be determined, the receiving user can be helped to know the transaction risk condition of the receiving user more comprehensively, the problem that the receiving user cannot know the real transaction risk of the receiving user comprehensively is at least partially solved, and the technical effect of improving the transaction safety is achieved.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates a system framework diagram of a transaction risk assessment method apparatus according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a transaction risk assessment method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a transaction risk assessment method in a self-service sign-up scenario according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a transaction risk assessment architecture diagram in a self-service sign-up scenario;
FIG. 5 schematically illustrates a transaction risk assessment method in a non-self-service sign-up scenario according to an embodiment of the present disclosure;
FIG. 6 schematically illustrates a transaction risk assessment method in a scenario within a bulk transaction protocol lifetime according to an embodiment of the present disclosure;
FIG. 7 schematically illustrates a block diagram of a transaction risk assessment device according to an embodiment of the present disclosure; and
fig. 8 schematically illustrates a block diagram of an electronic device adapted to implement a transaction risk assessment method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the related data (such as including but not limited to personal information of a user) are collected, stored, used, processed, transmitted, provided, disclosed, applied and the like, all conform to the regulations of related laws and regulations, necessary security measures are adopted, and the public welcome is not violated.
The enterprise batch deduction business generally mainly comprises two types of business of batch deduction and batch deduction, namely, business that a collection unit which opens a settlement account actively collects the payable fee to an enterprise user or an individual user through an enterprise bank. The batch deduction business process of the signing enterprises is generally divided into two types of self-service signing process and non-self-service signing process.
The self-service signing refers to that after the collection enterprise opens a batch deduction enterprise agreement at the enterprise bank, a payment enterprise or a person binds a deduction account after inputting a corresponding application number through an enterprise (person) bank client to form an association relationship between the collection account and the payment account, and the bank receives funds of the payment account and transfers the funds into the collection account in a batch deduction mode according to deduction time required by the agreement; the non-self-service subscription mainly means that the collection enterprise goes to the website with the authorized bill of the payment user, and after the website checks the qualification of the collection enterprise, the qualification of the payment user and the like, the account hanging is completed according to the mode of the internal management system of the bank under the condition that the check passes.
At present, whether the subscription is self-service or non-self-service, the autonomous willingness of both the payee and the payer is mainly considered, other risk scenes are not checked, and the conditions such as if the change occurs in the effective period of a batch transaction protocol are not considered. For example: the enterprise of the payee uses bankruptcy and closing, but also pays from the account of the payer, and the payer can only maintain rights through legal means. Therefore, the prior art lacks of monitoring the continuous operation state of the collection enterprise, and the payment user cannot comprehensively know the real transaction risk condition of the collection user, so that the transaction safety is reduced.
In view of this, the present disclosure provides a transaction risk assessment method, apparatus, device, storage medium and program product for improving the security of transactions. Specifically, the method comprises the following steps: acquiring identification information of a user, wherein the user is a user needing to carry out transaction risk assessment in a transaction process, and the transaction process comprises a transaction process of signing a batch agreement and a transaction process of the batch agreement in a duration; querying a user information system for different assessment factors associated with the user based on the identification information, wherein each assessment factor includes risk characteristic data of at least one dimension; determining a value of each evaluation factor according to the risk characteristic data of at least one dimension included in each evaluation factor; respectively inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value of the user; and determining the transaction risk level of the user according to the transaction risk value of the user.
It should be noted that, the transaction risk assessment method and apparatus determined in the embodiments of the present disclosure may be used in the field of artificial intelligence technology or the field of financial technology, and may also be used in any field other than the field of artificial intelligence technology or the field of financial technology, where the application field of the determined transaction risk assessment method and apparatus in the embodiments of the present disclosure is not limited.
Fig. 1 schematically illustrates a system framework diagram of a transaction risk assessment method apparatus according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include a first terminal device 101, a second terminal device 102, a third terminal device 103, a network 104, and a server 105. The network 104 is a medium used to provide a communication link between the first terminal device 101, the second terminal device 102, the third terminal device 103, and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using at least one of the first terminal device 101, the second terminal device 102, the third terminal device 103 to receive or transmit identification information of the user, etc., e.g. the paying user transmits identification information of the paying user to the server 105 via at least one of the first terminal device 101, the second terminal device 102, the third terminal device 103, such that the server 105 returns a risk level of the paying user, etc., to the terminal device. Various communication client applications, such as a payment type application, a financial type application, a shopping type application, a web browser application, a search type application, an instant messaging tool, a mailbox client, social platform software, etc., which perform batch protocols, may be installed on the first terminal device 101, the second terminal device 102, the third terminal device 103, as examples only.
The first terminal device 101, the second terminal device 102, the third terminal device 103 may be various electronic devices with display screens supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (merely an example) providing processing to the user with the identification information transmitted by the first terminal apparatus 101, the second terminal apparatus 102, and the third terminal apparatus 103. The background management server may analyze and process the received data such as the identification information, and feed back the processing result (for example, risk level, transaction risk value, web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the transaction risk assessment method provided by the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the transaction risk assessment device provided by embodiments of the present disclosure may be generally disposed in the server 105. The transaction risk assessment method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103, and/or the server 105. Accordingly, the transaction risk assessment apparatus provided by the embodiments of the present disclosure may also be provided in a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103, and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The transaction risk assessment method of the disclosed embodiments will be described in detail below with reference to fig. 2 to 6 based on the system architecture described in fig. 1.
Fig. 2 schematically illustrates a flow chart of a transaction risk assessment method according to an embodiment of the present disclosure.
As shown in fig. 2, the transaction risk assessment of this embodiment includes operations S210 to S250.
In operation S210, identification information of a user is obtained, where the user is a user who needs to perform transaction risk assessment in a transaction process, and the transaction process includes a transaction process of signing up a batch agreement and a transaction process of the batch agreement within a lifetime.
In operation S220, different assessment factors associated with the user are queried from the user information system based on the identification information, wherein each assessment factor includes risk characteristic data of at least one dimension.
In operation S230, a value of each evaluation factor is determined according to risk characteristic data of at least one dimension included in each evaluation factor.
In operation S240, the value of each evaluation factor is input into the risk evaluation function, respectively, to obtain the transaction risk value of the user.
In operation S250, a transaction risk level of the user is determined according to the transaction risk value of the user.
According to the embodiment of the disclosure, the user needing to perform transaction risk assessment in the transaction process may refer to a collecting user in the transaction or a paying user in the transaction, and in the embodiment of the disclosure, the user needing to perform transaction risk assessment in the transaction process of the collecting user is taken as an example to describe.
According to embodiments of the present disclosure, the user identification may refer to an authentication identification of the payee user, such as a subscription registration number of the payee corporation at the bank, such as a Group ID, when signing up for the bulk transaction agreement, which may be a unique authentication identification of the corporation. The user identification information may also be the number of the service that the payee wants to transact during the batch transaction protocol, for example, the payee submits a new proxy receipt and payment application through the enterprise banking client, and the banking server may generate the service number according to the application.
According to an embodiment of the present disclosure, the transaction process of signing up for the batch agreement may be classified into an agreement signing process of self-service batch transaction between the payment user and the collection user, and an agreement signing process of non-self-service batch transaction between the payment user and the collection user. Batch agreement in-process transaction refers to the transaction process during which the contracted batch agreement takes effect.
According to embodiments of the present disclosure, a user information system may be understood as a large database in which feature data for a plurality of different assessment factors for a user and at least one dimension to which each assessment factor corresponds are recorded or linked.
According to embodiments of the present disclosure, the assessment factors may refer to credit risk factors, risk prevention and control business factors, business subscription offer ratio factors, savings factors, and the like. The credit risk factor may be derived from various credit risk indicators determined by the bank credit system at the point in time of the withdrawal, which may include, but is not limited to, the following: whether the user of the collection opens the loan deposit business, the credit system rating of the user of the collection, the repayment loan situation of the user of the collection, the sub-company rating situation of the user of the collection, the risk of the person of the collection, etc., if the information above is not inquired from the user information system, the user information system can return to the null state. Or the user can be firstly inquired whether to open the loan, if the loan business appears in the inquired result, the user is informed to open the loan, and the subsequent credit risk characteristic index can be continuously inquired; if the loan business does not appear in the query result, the user is not informed to open the loan, in this case, the empty query result can be directly returned, and the subsequent credit risk index can be queried according to the actual requirement. And determining the value of the credit risk factor according to the data representing the credit risk indexes and the first preset coefficient corresponding to each credit risk index.
According to embodiments of the present disclosure, the risk prevention and control business factor may be used to characterize the emerging public and social risk situation of the payee business user. The risk prevention and control service factor may be obtained according to each risk service index in the risk service prevention and control system of banking and finance industries and enterprise users at the time point of deduction, and the risk service index may include, but is not limited to, the following indexes: the method comprises the steps of comprehensively obtaining social public risk conditions of enterprises by financial risk reports of the users, economic risk reports, homonymy information between the users and other banks (other banks belonging to the same industry with the currently contracted banks), fund public opinion, enterprise association conditions of the users, risk ratings of several risk businesses of the users, international type fund risks of the users and other information, and obtaining risk prevention and control business factors by integrating the risk business characteristic indexes. If the service is not opened from the user information system, returning to the null state. According to the data capable of representing the risk service indexes and the second preset coefficients corresponding to the risk service indexes, the value of the risk prevention and control service factor can be determined.
According to embodiments of the present disclosure, the service subscription offer ratio factor may refer to a subscription offer ratio factor of a batch transaction service, for example, a ratio of a number of payment users subscribed to a delegated withholding transaction agreement with the payee to a number of payment users of the offer withholding transaction agreement within approximately X months is calculated. And taking the calculation result as the value of the service subscription solution ratio factor.
According to the embodiments of the present disclosure, the deposit factor may refer to a deposit risk index at a deduction time point acquired by a corporate bank side, a legal bank side, and a host side of the payee, including, but not limited to, an index of a corporate nature of the payee, a corporate size (e.g., large, small, micro, etc.) of the payee, a corporate label of the payee (e.g., a label determined according to a storage amount of the payee at a current bank), a user star label of the legal person (e.g., a label determined according to a storage amount of the legal person at the current bank), and a corporate CIS number of a user who has a collection operation in recent x days (when the payee has a plurality of sub-enterprises, one Group ID may have a plurality of CIS numbers, each CIS number corresponds to each sub-enterprise), a full account daily deposit balance, etc., and the deposit factor may be comprehensively derived according to the deposit risk index. According to the data capable of representing the storage risk indexes and the third preset coefficient corresponding to each storage risk index, the value of the storage factor can be determined.
According to an embodiment of the present disclosure, the risk assessment function may be constructed based on a credit risk parameter, a risk prevention service parameter, a service subscription solution ratio parameter, a savings parameter, and the risk assessment function may be as shown in formula (1). Operation S240 may include the following operations: the credit risk parameter, the risk prevention and control business parameter, the business subscription solution ratio parameter and the deposit parameter of the risk assessment function are sequentially input with the credit risk factor value, the risk prevention and control business factor value, the business subscription solution ratio factor value and the deposit factor value to obtain a transaction risk value.
Wherein Y can represent transaction risk value, Y represents parameter to be evaluated, v represents error term of independent same distribution, and is subjected to normal distribution with average value of 0, independent of A i 、B j D m Gamma, v may sometimes be 0.A is that i Data that may represent credit risk parameters, corresponding to each credit risk indicator in the credit assessment factor during subsequent calculations; b (B) j Can represent risk prevention and control service parameters, and corresponds to the data of each risk service index in the risk prevention and control service factors in the subsequent calculation process, +.>The service subscription solution ratio parameter can be represented; d (D) m The deposit parameters may be represented, with data corresponding to each of the deposit risk indicators in the subsequent calculation. Alpha i The coefficient representing each credit risk index can be used as a first presetCoefficients; beta j The coefficient representing each risk business index can be used as a second preset coefficient; delta m The coefficient representing each deposit risk index may be a third preset coefficient. i may be the same as the number of credit risk indicators, j may be the same as the number of risk business indicators, and m may be the same as the number of savings risk indicators. It will be appreciated that α i 、β j 、δ m The range of (2) is generally 0 to 1.Σα i A i A value that may represent a credit risk factor; Σβ j B j The value of the risk prevention and control service factor may be represented,can represent the value of the service subscription solution ratio factor, sigma delta m D m The value of the savings factor may be represented.
According to the embodiment of the disclosure, the credit risk parameter, the risk prevention and control service parameter, the service subscription offer ratio parameter and the deposit factor value in the formula (1) are sequentially input into the credit risk factor, the risk prevention and control service factor, the service subscription offer ratio parameter and the deposit factor, so that a transaction risk value Y can be obtained.
According to the embodiment of the disclosure, based on the transaction risk value Y of the receiving user, a risk range in which the transaction risk value Y is located may be determined, and according to the risk range in which the transaction risk level in which the receiving user is located may be determined to be one of the first risk level, the second risk level, and the third risk level.
According to the transaction risk assessment method, the device, the equipment, the storage medium and the program product provided by the embodiment of the disclosure, the identification information of the user needing to conduct transaction risk assessment is obtained in the subscription batch agreement or the batch agreement duration; inquiring risk characteristic data of different assessment factors and at least one corresponding dimension according to the identification information; determining the value of an evaluation factor according to the risk characteristic data; inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value; and determining the transaction risk level of the user according to the transaction value. In the transaction process, the risk characteristic data of multiple dimensions of a user (such as a receiving user) are processed to obtain the value of the evaluation factor, and the value of the evaluation factor is input into the risk evaluation function, so that the risk level of the user can be determined, the receiving user can be helped to know the transaction risk condition of the receiving user more comprehensively, the problem that the receiving user cannot know the real transaction risk of the receiving user comprehensively is at least partially solved, and the technical effect of improving the transaction safety is achieved.
According to an embodiment of the present disclosure, the identification information of the user may include an authentication identification of the user, a number of transaction services, and the like, wherein the transaction services may be services transacted by the user during the lifetime of the batch agreement. Thus, operation S210 may include the following operations: acquiring authentication identification of a user in a transaction process of a subscription batch agreement, wherein the transaction process of the subscription batch agreement comprises a transaction process of a self-service subscription batch agreement and a transaction process of a non-self-service subscription batch agreement; and acquiring the number of the transaction service in the transaction process of the batch protocol in the duration.
According to an embodiment of the present disclosure, in a transaction process of signing up for a batch agreement, a process of acquiring an authentication identifier of a user may include the following operations: in the transaction process of signing a batch agreement, receiving a transaction signing number of a user, wherein the transaction signing number is obtained according to the transaction signing information of the user; and acquiring the authentication identification of the user from the transaction subscription list according to the transaction subscription number.
According to embodiments of the present disclosure, the transaction subscription information of the user may include at least one of: the account of the payee user, the payment type, the currency, the transaction signing purpose, etc.
According to embodiments of the present disclosure, a transaction contract number may refer to an agreement contract number at the time of contract signing.
According to embodiments of the present disclosure, a transaction subscription list may refer to a batch agreement personal (business) registry in which transaction subscription information is registered.
According to an embodiment of the present disclosure, the risk characteristic data included in each evaluation factor may be as follows: the risk characteristic data included by the credit risk factor may be determined from a credit risk indicator, such as data characterizing whether to open a loan deposit business, data characterizing a rating of a credit system, data characterizing a loan repayment, and the like. The risk characteristic data included by the risk prevention and control business factor may be determined from risk business metrics, such as data characterizing a user's financial risk, financial risk data characterizing an associated user of the user, and so forth. The risk profile data for the service subscription offer ratio factor may be the ratio of the number of subscriptions to the amount of offer data through a batch agreement with the payee. The contracted number and the contracted number may be determined by the number of contracted payers and the number of contracted payers. The risk profile data included with the savings factor may be determined from a savings risk indicator, such as, for example, enterprise-type data characterizing the user, enterprise-scale data characterizing the user, and data characterizing the user's savings balance.
According to an embodiment of the present disclosure, operation S230 may refer to the process shown in formula (1). Specifically, according to the product and sum of a plurality of first preset coefficients and each risk characteristic data in the credit risk factors, obtaining the value of the credit risk factors, wherein the plurality of first preset coefficients respectively correspond to each risk characteristic data in the credit risk factors; obtaining a value of the risk prevention and control service factor according to the sum of products of the second preset coefficients and the risk characteristic data of each risk prevention and control service factor, wherein the second preset coefficients correspond to the risk characteristic data of each risk prevention and control service factor respectively; obtaining a value of a service subscription offer ratio factor by calculating a proportion between the number of subscriptions in a batch agreement with the user and the number of offers in a batch agreement with the user; and obtaining the value of the storage factor according to the sum of the products of the third preset coefficients and the risk characteristic data of each storage factor, wherein the third preset coefficients and the risk characteristic data of each storage factor are respectively corresponding.
For example, assuming i is 1, A1 may represent data corresponding to the payee having opened a loan transaction, α 1 Can represent the adjustment coefficient, alpha, corresponding to the loan opening business 1 A 1 The risk profile data may be represented that characterizes the opening of the loan deposit service. And so on, calculating risk characteristic data representing each credit risk index, and adding the risk characteristic data to obtain sigma alpha i A i The value of the credit risk factor may be represented. Similarly, when j is 1, B 1 The risk level value, beta, in the funds risk report, which may represent the payee user 1 Adjustment coefficient, beta, which may represent a funding risk report 1 B 1 Characteristic data indicative of the risk of funds to the payee user may be represented, and so on Σβ j B j The value of the risk prevention and control business factor may be represented. Similarly, Σδ m D m The value of the savings factor may be represented. And finally, adding the values of the 4 evaluation factors to obtain a transaction risk value.
According to the embodiment of the disclosure, the risk grade of the receiving user is judged by combining the risk characteristic data of the receiving user in multiple dimensions and processing the risk characteristic data by utilizing the transaction risk assessment function, so that the judgment of the transaction risk of the receiving user can be realized, the accuracy and the comprehensiveness of determining the transaction risk can be improved, the receiving user is helped to know the real transaction risk situation of the receiving user more comprehensively, and the transaction safety is improved.
According to the embodiment of the disclosure, after receiving the identification information of the user, M risk value ranges and M risk levels respectively corresponding to the M risk value ranges may be retrieved from the risk assessment database according to the identification information of the user. Therefore, operation S250 may include the following operations: respectively matching transaction risk values with M risk value ranges; in the case that the transaction risk value is successfully matched with at least one risk value range in the M risk value ranges, determining the at least one risk value range successfully matched as a target risk value range; and determining the transaction risk level of the user according to the risk level corresponding to the target risk value range.
Assuming M is 3, three risk value ranges and corresponding risk levels may be as shown in table 1, according to embodiments of the present disclosure.
TABLE 1
Risk level Risk value range
First risk level Y≥K1
Second risk level K1<Y<K2
Third risk level Y≤K2
In Table 1, K1 > K2. The risk value ranges and the risk levels shown in table 1 are only examples, and may be specifically adapted according to actual situations.
According to an embodiment of the disclosure, the method may further include a process of recommending a risk protection policy to the payment user according to the transaction risk, and in particular, the risk protection policy may be generated according to the transaction risk level; and sending the transaction risk level and the risk protection strategy to a user terminal which does not need to carry out transaction risk assessment in the transaction process.
According to an embodiment of the present disclosure, assuming that M is 3, the M risk levels may include a first risk level, a second risk level, and a third risk level, the risk levels from the first risk level to the third risk level may sequentially increase, and in particular, the first risk level, the second risk level, and the third risk level may refer to a normal level, a focus level, and a suspicious level, respectively.
The process of generating a risk protection policy may include the following operations, depending on the transaction risk level: under the condition that the transaction risk level is the first risk level, a first risk protection strategy is generated, wherein the transaction flow of the first risk protection strategy can not change, and the initial transaction flow is directly utilized to normally execute the transaction; generating a second risk protection strategy under the condition that the transaction risk level is a second risk level, wherein the second risk protection strategy is to increase the operation of sending a first risk prompt and a first security verification mode to a user side which does not need to carry out transaction risk assessment in an initial transaction flow, and the first risk prompt and the first security verification mode are both associated with the second risk level; and under the condition that the transaction risk level is a third risk level, generating a third risk protection strategy, wherein the third risk protection strategy pauses the initial transaction flow, and sending a second risk prompt and a second security verification mode to a user terminal which does not need to carry out transaction risk assessment, wherein the second risk prompt and the second security verification mode are both related to the third risk level. It is understood that the risk protection level from the first risk protection policy to the third risk protection policy may also be sequentially increased. It should be noted that, when the risk levels from the first risk level to the third risk level are in a sequentially decreasing relationship, the risk protection levels from the first risk protection policy to the third risk protection policy may also be sequentially decreasing.
According to an embodiment of the present disclosure, the first risk prompt may be to remind the paying user that the current collecting user is the second risk level, and the paying user needs to pay attention to, and confirm whether to modify the signing manner or continue the flow after signing. The first verification may be that a reply from the paying user is received within a preset time period, or that the paying user does not reply within the preset time period, and is regarded as that the user agrees to continue the transaction, etc. The second risk prompt may be to wake up the payment user, the current collection user is a third risk level, the transaction risk is high, and a high degree of attention is required to be paid to the payment user, and the transaction process is suspended or frozen at the same time. The second verification method may be that the reply of the payment user is obtained in a preset time period, or that the payment user does not reply in the preset time period, and the user does not agree to continue the transaction. The second verification mode may be more complex than the first verification mode, or the verification operation may be more, so as to attract importance of the payment user, and the first risk prompt, the second risk prompt, the first verification mode, and the second verification mode may be adaptively adjusted according to actual needs.
The process of determining the transaction risk level of the present disclosure is described exemplarily below by way of one embodiment.
Certain education and training institutions 'xx' are registered and operated in Q years, and have good public praise in the aspect of English teaching of children and absorb the fund of a plurality of Internet companies, so that the scale of the company is rapidly expanded, and training services are widely developed nationwide in a short period of time. The company and the bank sign a consignment batch payment replacement protocol, parents can pay the teaching fee of the child through the bank every month, Q+1 years is cut off, and a credit system of the bank examines the credit of the company and stakeholders and does not find phenomena such as large loans or overdue non-replacement; the risk business prevention and control system evaluates the problems that staff is in charge of the salary, legal litigation of upstream and downstream enterprises and the like are rarely generated in the company; in the contract offer ratio factor, a common contract commission takes the place of the deduction to pay about 20 thousands of people, the number of newly added payers in the month is 5000, and the number of agreement offer payers is 1500; the bank examines the funds flow of the public company account and the legal account and finds that the funds flow is sufficient.
However, in Q month of q+2 years, with the upcoming emergence of the double-reduction policy, the business inside the company changes subtly, and after knowing that the policy may change, many corporate sponsors require immediate withdrawal from "xx" companies, which results in increasing enterprise funds flow, and problems such as employee underserving, partial regional store closing, and the like. The xx company adopts a concealing mode, and requires the rest business personnel to continuously carry out routine fund deduction on payment users who have signed new signing and signed substitute deduction agreements from the two aspects of newly added clients and reserved clients through a price reduction renewal mode and the like.
During routine deduction in q+2 years and q+1 months, banks find possible management risks of the company, and a new transaction risk value Y is calculated through analysis of credit risk factors, risk service prevention and control factors, service subscription solution ratio factors and deposit factors, as shown in table 2.
TABLE 2
At this time, the risk value range and the risk level that can be called up by the identification information of the "xx" company are shown in table 3.
TABLE 3 Table 3
Educational large-scale enterprise Risk value range
Normal level 20.0 or more
Attention level 12.0~19.9
Suspicious level 11.9 and below
According to table 3, since the Y value of the "xx" company after the risk of operation occurs is in the range of 11.9 or less, the current risk of the "xx" company is a suspicious level, and if there is an obligation to transact a self-service subscription batch agreement with the company, the payment user can be notified that the payment user needs to transact a non-self-service subscription to a bank counter; if the payment user is in the agreement duration, the payment user who is about to pay can be informed that the current risk level of the xx company is higher, and the payment is completed after further confirmation, or the payment is not performed, and the like.
According to the transaction risk assessment method provided by the embodiment of the disclosure, continuous control of risk of a collection enterprise in a batch agreement duration can be realized. The method can obviously reduce suspicious deductions with risks caused by the fact that a payer does not know the actual operation state of a payee enterprise when signing and initiating the deductions, and particularly provides a new method for protecting the upper-level payment safety of a user with a long agreement duration in real time.
The transaction risk assessment method of the present disclosure is exemplarily described below by way of three embodiments of transaction processes.
Suppose that a business Z is about to contract with a person (business) for a long-term agency pay-for-deduction service for property fees, for a 5-year period of time. In the following embodiment, description may be made by setting 4 participation roles. Namely, the enterprise banking client of the cash register user, the banking server and the enterprise batch deduction business wind control system. The enterprise batch deduction business wind control system mainly comprises a batch transaction business wind control model, wherein the batch transaction business wind control model is constructed by a transaction risk assessment function.
FIG. 3 schematically illustrates a transaction risk assessment method in a self-service sign-up scenario according to an embodiment of the present disclosure; fig. 4 schematically illustrates a transaction risk assessment architecture diagram in a self-service subscription scenario.
As shown in fig. 3 to 4, the transaction risk assessment method in the self-service subscription scenario may include operations S310 to S350.
In operation S310, the receipts user submits an agreement subscription application.
Specifically, the collection is used for the corresponding enterprise to submit and pay for deduction business application according to the charging type through the enterprise bank client 401 of the collection user, inputting the fields of the collection enterprise name, collection account, payment type, currency, agreement deduction purpose and the like, and submitting the application to complete approval. The bank server 402 obtains the protocol application and generates a command number, records the fields to a batch deduction personal (enterprise) registry, generates a unique protocol number and transmits the unique protocol number back to the collection enterprise client 401.
In operation S320, the payee company informs the unique agreement number to the payer, and the payer inputs the agreement number through the payer bank client 403.
In operation S330, the authentication identifier is acquired and sent to the enterprise batch and buckling service wind control system 404.
Specifically, the payment user bank client 403 refers to a batch deduction personal (enterprise) registry through a protocol number, acquires a group id (unique authentication flag) of the enterprise, and transmits the authentication flag to the enterprise batch deduction service wind control system 404.
In operation S340, a plurality of evaluation factors are queried according to the authentication identification, and a transaction risk level of the payee user is determined according to the value of each evaluation factor.
Specifically, the enterprise batch deduction service wind control system 404 queries the evaluation factors required for wind control from the user information system 405 through the group GroupID number, and brings the evaluation factors into the risk evaluation function shown in formula (1) to determine the transaction risk level.
In operation S350, the banking server 402 transmits different operation instructions to the payor banking client 403 according to the risk level rating result.
Specifically, the operation instruction may be as follows: when the result is normal, checking the identity and account of the paying user, and the process is the same as the business signing process of the original batch. When the result is a level of attention, the return to the receiving enterprise customer is increased for risk prompt and the security verification level is increased. When the result is suspicious, the self-service signing process of the client is limited to be changed into non-self-service signing with the participation of the teller.
Fig. 5 schematically illustrates a transaction risk assessment method in a non-self-service subscription scenario according to an embodiment of the present disclosure.
As shown in fig. 5, the transaction risk assessment method in the non-self-service subscription scenario may include operations S510 to S540.
In operation S510, the payee enterprise holds the batch withholding payment user authentication certificate to the banking website to submit a non-self-service subscription mode batch withholding agreement application to the teller.
In operation S520, the teller checks the batch deduction service risk level by clicking after entering the collection group information through the internal management system of the bank.
In operation S530, the same self-service subscription scenario is adopted, a batch transaction business wind control model is invoked, and after the batch transaction business wind control model is brought into enterprise information, a rating result is returned to the internal management system of the bank through the brought parameters.
In operation S540, the internal management system of the bank transmits different operator operating instructions to the internal management system of the bank according to the customer rating result.
Specifically, when the result is at the normal level, the normal result is fed back to the teller, and the flow is the same as the non-self-service signing flow of the original batch deduction business. When the result is the attention level, the internal management system adds a short message notice to the mobile phone number of the payment user before signing, and the input mobile phone number of the payment user is uploaded through the enterprise bank server and the template is successfully edited and transferred to the short message receiving and transmitting platform. Notifying the paying user of possible risk of the user by the SMS receiving and transmitting platform. The user can release the subscription by replying short message or paying user client or counter. When the result is suspicious, the internal management system adds short message risk confirmation of the mobile phone number of the paying user before signing, and the signing state is set to be confirmed. After risk is confirmed by the cashing user through short message reply or payment user client side or counter side, the cashing user can complete signing.
Fig. 6 schematically illustrates a transaction risk assessment method in a scenario within a bulk transaction protocol lifetime according to an embodiment of the present disclosure.
As shown in fig. 6, the transaction risk assessment method in the scenario within the batch transaction protocol lifetime may include operations S610 to S640.
In operation S610, the payee submits a new agent receipt and payment application through the enterprise banking client, selects each payee and submits an instruction and completes the authorization.
In operation S620, the bank server generates an instruction number and transmits the instruction word client number information to the enterprise batch deduction service wind control model.
In operation S630, the evaluation factor is queried and substituted into the batch transaction business wind control model.
Specifically, with self-help signing scene, enterprise batch deduction business wind control model real-time inquiry parameters are brought into A i 、B jD m Adjustment coefficient alpha i 、β j 、δ m And the like, the parameters are brought back to the grading result to the enterprise banking server.
In operation S640, the enterprise bank server system transmits different operation teller operation instructions to the internal management system of the bank according to the customer rating result.
Specifically, when the result is normal, the instruction normally enters a daily batch waiting process, the identity and accounting check of the payment user is normally carried out, and the process is the same as the business batch deduction process of the original batch deduction. When the result is the attention level, the enterprise bank server side adds and sends a risk confirmation short message to the client through the short message receiving and sending platform, and simultaneously sets the application state to be checked in a batch deduction background system registry, if the client returns an agreeing application in an aging range or exceeds aging without feedback, the client is considered to pass, the registry state is reset to be normal, and the account is processed in a daily terminal batch mode. When the result is suspicious, the enterprise bank server side adds and sends risk confirmation short messages to the clients through the short message receiving and sending platform, and simultaneously sets the application state to be checked in a batch deduction background system registry, if the clients return agreements in an aging range, the clients pass through the registry, the registry state is reset to be normal, and accounts are processed in a daily terminal batch mode; if the customer exceeds the age without feedback within the age range, the receipt status is set to fail.
According to the embodiment of the present disclosure, the contents of operations S310 to S350, operations S510 to S540, and operations S610 to S640 may refer to the related contents of operations S210 to S250, and are not described herein.
According to the embodiment of the disclosure, based on the problem that the risk control of the collection enterprises and accounts in the batch deduction service of the enterprises is insufficient in the batch deduction agreement duration, the embodiment of the disclosure provides a special risk control method, so that the continuous control of the collection enterprises risk in the batch agreement duration is realized. According to the embodiment of the disclosure, the enterprise batch deduction business wind control system can be added in the original batch deduction business flow, and the problem of internal risk control of an enterprise internal payment manager in a payment scene is solved by establishing a risk control model. Continuous control of the risk of the cashing enterprise during the batch agreement lifetime is realized. The method can obviously reduce suspicious deductions with risks caused by the fact that a payer does not know the actual operation state of a payee enterprise when signing and initiating the deductions, and particularly provides a new scheme for helping a long-agreement lifetime customer to protect payment safety in real time.
It should be noted that, unless there is an execution sequence between different operations or an execution sequence between different operations in technical implementation, the execution sequence between multiple operations may be different, and multiple operations may also be executed simultaneously in the embodiment of the disclosure.
Based on the transaction risk assessment method, the disclosure also provides a transaction risk assessment device. The device will be described in detail below in connection with fig. 7.
Fig. 7 schematically illustrates a block diagram of a transaction risk assessment device according to an embodiment of the present disclosure.
As shown in fig. 7, the transaction risk assessment device 700 of this embodiment includes an acquisition module 710, a query module 720, a first determination module 730, an input module 740, and a second determination module 750.
The obtaining module 710 is configured to obtain identification information of a user, where the user is a user who needs to perform transaction risk assessment in a transaction process, and the transaction process includes a transaction process of signing a batch agreement and a transaction process of the batch agreement within a lifetime.
A query module 720 for querying a user information system for different assessment factors associated with the user based on the identification information, wherein each assessment factor comprises risk profile data of at least one dimension.
A first determining module 730, configured to determine a value of each evaluation factor according to risk characteristic data of at least one dimension included in each evaluation factor.
And the input module 740 is used for respectively inputting the value of each evaluation factor into the risk evaluation function to obtain the transaction risk value of the user.
A second determining module 750 is configured to determine a transaction risk level of the user according to the transaction risk value of the user.
According to the transaction risk assessment method, the device, the equipment, the storage medium and the program product provided by the embodiment of the disclosure, the identification information of the user needing to conduct transaction risk assessment is obtained in the subscription batch agreement or the batch agreement duration; inquiring risk characteristic data of different assessment factors and at least one corresponding dimension according to the identification information; determining the value of an evaluation factor according to the risk characteristic data; inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value; and determining the transaction risk level of the user according to the transaction value. In the transaction process, the risk characteristic data of multiple dimensions of a user (such as a receiving user) are processed to obtain the value of the evaluation factor, and the value of the evaluation factor is input into the risk evaluation function, so that the risk level of the user can be determined, the receiving user can be helped to know the transaction risk condition of the receiving user more comprehensively, the problem that the receiving user cannot know the real transaction risk of the receiving user comprehensively is at least partially solved, and the technical effect of improving the transaction safety is achieved.
According to an embodiment of the present disclosure, the transaction risk assessment device further includes a retrieval module, and the second determination module may include a matching unit, a first determination unit, and a second determination unit.
And the calling module is used for calling M risk value ranges and M risk levels respectively corresponding to the M risk value ranges from the risk evaluation database according to the identification information of the user.
And the matching unit is used for respectively matching the transaction risk values with the M risk value ranges.
A first determining unit, configured to determine, as a target risk value range, at least one risk value range that is successfully matched, in a case where the transaction risk value is successfully matched with at least one risk value range of the M risk value ranges.
And the second determining unit is used for determining the transaction risk level of the user according to the risk level corresponding to the target risk value range.
According to an embodiment of the disclosure, the transaction risk assessment device may further include a generation module and a transmission module.
And the generation module is used for generating a risk protection strategy according to the transaction risk level.
And the sending module is used for sending the transaction risk level and the risk protection strategy to a user side which does not need to carry out transaction risk assessment in the transaction process.
According to an embodiment of the present disclosure, the generating module may include a first generating unit, a second generating unit, and a third generating unit.
The first generation unit is used for generating a first risk protection strategy under the condition that the transaction risk level is a first risk level, wherein the transaction flow of the first risk protection strategy is unchanged, and the initial transaction flow is utilized to execute the transaction.
The second generation unit is configured to generate a second risk protection policy under the condition that the transaction risk level is a second risk level, where the second risk protection policy is that in an initial transaction flow, the first risk indicator and the first security verification mode are added to a user side that does not need to perform transaction risk assessment, and the first risk indicator and the first security verification mode are both associated with the second risk level.
And the third generation unit is used for generating a third risk protection strategy under the condition that the transaction risk level is a third risk level, wherein the third risk protection strategy is to suspend the initial transaction flow and send a second risk prompt and a second security verification mode to a user terminal which does not need to carry out transaction risk assessment, and the second risk prompt and the second security verification mode are both associated with the third risk level.
According to an embodiment of the present disclosure, the acquisition module may include a first acquisition unit, a second acquisition unit.
The first acquisition unit is used for acquiring the authentication identification of the user in the transaction process of the signing batch agreement, wherein the transaction process of the signing batch agreement comprises the transaction process of the self-service signing batch agreement and the transaction process of the non-self-service signing batch agreement.
The second acquisition unit is used for acquiring the serial numbers of the transaction services in the transaction process of the batch agreement in the duration.
According to an embodiment of the present disclosure, the first acquisition unit may include a receiving subunit, an acquisition subunit.
And the receiving subunit is used for receiving the transaction signing number of the user in the transaction process of signing the batch agreement, wherein the transaction signing number is obtained according to the transaction signing information of the user.
And the acquisition subunit is used for acquiring the authentication identification of the user from the transaction subscription list according to the transaction subscription number.
According to an embodiment of the present disclosure, the first determining module may include a first processing unit, a second processing unit, a third processing unit, and a fourth processing unit.
And the first processing unit is used for obtaining the value of the credit risk factor according to the sum of the products of the first preset coefficients and the risk characteristic data of each credit risk factor, wherein the first preset coefficients and the risk characteristic data of each credit risk factor are respectively corresponding.
And the second processing unit is used for obtaining the value of the risk prevention and control service factor according to the sum of the products of the second preset coefficients and the risk characteristic data of each risk prevention and control service factor, wherein the second preset coefficients and the risk characteristic data of each risk prevention and control service factor are respectively corresponding.
And the third processing unit is used for obtaining the value of the service subscription offer ratio factor by calculating the proportion between the subscription number of the batch agreement with the user subscription and the offer number of the batch agreement with the user offer.
And the fourth processing unit is used for obtaining the value of the storage factor according to the sum of the products of the third preset coefficients and the risk characteristic data of each storage factor, wherein the third preset coefficients and the risk characteristic data of each storage factor are respectively corresponding.
According to an embodiment of the present disclosure, the input module may include an input unit.
The input unit is used for sequentially inputting the value of the credit risk factor, the value of the risk prevention and control service factor, the value of the service subscription solution ratio factor and the value of the deposit factor into the credit risk parameter, the risk prevention and control service parameter, the service subscription solution ratio parameter and the deposit parameter of the risk assessment function to obtain a transaction risk value.
According to an embodiment of the present disclosure, any of the acquisition module 710, the query module 720, the first determination module 730, the input module 740, and the second determination module 750 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of the acquisition module 710, the query module 720, the first determination module 730, the input module 740, and the second determination module 750 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the acquisition module 710, the query module 720, the first determination module 730, the input module 740, and the second determination module 750 may be at least partially implemented as computer program modules, which when executed, may perform the respective functions.
It should be noted that, in the embodiment of the present disclosure, the transaction risk assessment device portion corresponds to the transaction risk assessment method portion in the embodiment of the present disclosure, and the description of the transaction risk assessment device portion specifically refers to the transaction risk assessment method portion and is not described herein.
Fig. 8 schematically illustrates a block diagram of an electronic device adapted to implement a transaction risk assessment method according to an embodiment of the present disclosure.
As shown in fig. 8, an electronic device 800 according to an embodiment of the present disclosure includes a processor 801 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. The processor 801 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 801 may also include on-board memory for caching purposes. The processor 801 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the disclosure.
In the RAM 803, various programs and data required for the operation of the electronic device 800 are stored. The processor 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. The processor 801 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 802 and/or the RAM 803. Note that the program may be stored in one or more memories other than the ROM 802 and the RAM 803. The processor 801 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 800 may also include an input/output (I/O) interface 805, the input/output (I/O) interface 805 also being connected to the bus 804. The electronic device 800 may also include one or more of the following components connected to an input/output (I/O) interface 805: an input portion 806 including a keyboard, mouse, etc.; an output portion 807 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage section 808 including a hard disk or the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. The drive 810 is also connected to an input/output (I/O) interface 805 as needed. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as needed so that a computer program read out therefrom is mounted into the storage section 808 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 802 and/or RAM 803 and/or one or more memories other than ROM 802 and RAM 803 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the transaction risk assessment method provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 801. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed, and downloaded and installed in the form of a signal on a network medium, and/or from a removable medium 811 via a communication portion 809. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication section 809, and/or installed from the removable media 811. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 801. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (16)

1. A transaction risk assessment method, comprising:
acquiring identification information of a user, wherein the user is a user needing to perform transaction risk assessment in a transaction process, and the transaction process comprises a transaction process of signing a batch agreement and a transaction process of the batch agreement in a lifetime;
Querying a user information system for different assessment factors associated with the user based on the identification information, wherein each of the assessment factors includes risk characteristic data of at least one dimension;
determining a value of each of the assessment factors according to risk characteristic data of at least one dimension included in each of the assessment factors;
respectively inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value of the user;
and determining the transaction risk level of the user according to the transaction risk value of the user.
2. The method of claim 1, further comprising:
and according to the identification information of the user, retrieving M risk value ranges and M risk levels respectively corresponding to the M risk value ranges from a risk evaluation database.
Wherein, the determining the transaction risk level of the user according to the transaction risk value of the user includes:
matching the transaction risk value with M risk value ranges respectively;
if the transaction risk value is successfully matched with at least one risk value range in M risk value ranges, determining the at least one risk value range successfully matched as a target risk value range;
And determining the transaction risk level of the user according to the risk level corresponding to the target risk value range.
3. The method of claim 2, further comprising:
generating a risk protection strategy according to the transaction risk level;
and sending the transaction risk grade and the risk protection strategy to a user terminal which does not need to carry out transaction risk assessment in the transaction process.
4. A method according to claim 3, wherein M is 3, the M risk levels comprising a first risk level, a second risk level, a third risk level, the risk levels increasing in sequence from the first risk level to the third risk level;
the generating a risk protection strategy according to the transaction risk level comprises:
generating a first risk protection strategy under the condition that the transaction risk level is the first risk level, wherein the transaction flow of the first risk protection strategy is unchanged, and executing the transaction by using an initial transaction flow;
generating a second risk protection strategy under the condition that the transaction risk level is the second risk level, wherein the second risk protection strategy is to add an operation of sending a first risk prompt and a first security verification mode to the user side which does not need to carry out transaction risk assessment in the initial transaction flow, and the first risk prompt and the first security verification mode are both associated with the second risk level;
And under the condition that the transaction risk level is the third risk level, generating a third risk protection strategy, wherein the third risk protection strategy pauses the initial transaction flow, and sending a second risk prompt and a second security verification mode to the user side which does not need to carry out transaction risk assessment, wherein the second risk prompt and the second security verification mode are both related to the third risk level.
5. The method of claim 4, wherein the relationship between the first risk protection policy, the second risk protection policy, and the third risk protection policy is:
the risk protection degree from the first risk protection strategy to the third risk protection strategy increases in sequence.
6. The method of claim 1, wherein the identification information of the user includes at least one of an authentication identification of the user, a number of the transaction service, the transaction service being a service transacted by the user during the bulk protocol lifetime;
the step of obtaining the identification information of the user comprises the following steps:
acquiring an authentication identifier of the user in a transaction process of the subscription batch agreement, wherein the transaction process of the subscription batch agreement comprises a transaction process of the self-service subscription batch agreement and a transaction process of the non-self-service subscription batch agreement;
And acquiring the serial numbers of the transaction services in the transaction process of the batch protocol in the duration.
7. The method of claim 6, wherein the acquiring the authentication identification of the user during the transaction of the subscription batch agreement comprises:
receiving a transaction contract number of the user in a transaction process of the contract batch agreement, wherein the transaction contract number is obtained according to transaction contract information of the user;
and acquiring the authentication identification of the user from a transaction signing list according to the transaction signing number.
8. The method of claim 7, wherein the user's transaction subscription information includes at least one of: the account, payment type, currency and transaction signing purpose of the user.
9. The method of claim 1, wherein the evaluation factor comprises at least one of:
the credit risk factors, the risk prevention and control service factors, the service subscription offer ratio factors and the deposit factors of the users.
10. The method of claim 9, wherein each of the assessment factors includes risk characteristics data of at least one dimension comprising:
the risk characteristic data of the credit risk factor includes at least one of: data representing whether to open loan deposit business, data representing the rating condition of a credit system, and data representing the repayment condition of a loan;
The risk characteristic data of the risk prevention and control service factors comprises at least one of the following: data characterizing a user's financial risk, financial risk data characterizing an associated user of the user;
the risk characteristic data of the service subscription offer ratio factor comprises: in a preset time period, the proportion between the signing quantity of the batch agreement signed with the user and the offering quantity of the batch agreement offered by the user;
the risk characteristic data corresponding to the deposit factors comprises at least one of the following: -enterprise type data characterizing the user, -enterprise scale data characterizing the user, -deposit balance data characterizing the user.
11. The method of claim 10, wherein said determining the value of each of said assessment factors from risk characteristics data of at least one dimension that each of said assessment factors includes:
obtaining a value of the credit risk factor according to the sum of products of a plurality of first preset coefficients and each risk feature data in the credit risk factor, wherein the plurality of first preset coefficients respectively correspond to each risk feature data in the credit risk factor;
Obtaining a value of the risk prevention and control service factor according to the product of a plurality of second preset coefficients and each risk characteristic data in the risk prevention and control service factor, wherein the second preset coefficients respectively correspond to each risk characteristic data in the risk prevention and control service factor;
obtaining a value of the service subscription offer ratio factor by calculating a ratio between the number of subscriptions in the user subscription batch agreement and the number of offers in the user offer batch agreement;
and obtaining the value of the storage factor according to the sum of the products of the third preset coefficients and the risk characteristic data in the storage factor, wherein the third preset coefficients respectively correspond to the risk characteristic data in the storage factor.
12. The method of claim 11, wherein the risk assessment function is constructed from a credit risk parameter, a risk prevention and control business parameter, a business subscription solution ratio parameter, a savings parameter;
the step of respectively inputting the value of each evaluation factor into a risk evaluation function to obtain the transaction risk value of the user comprises the following steps:
and sequentially inputting the value of the credit risk factor, the value of the risk prevention and control service factor, the value of the service subscription solution ratio factor and the value of the saving factor into the credit risk parameter, the risk prevention and control service parameter, the service subscription solution ratio parameter and the saving parameter of the risk assessment function to obtain the transaction risk value.
13. A transaction risk assessment device, comprising:
the system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring identification information of a user, wherein the user is a user needing to carry out transaction risk assessment in a transaction process, and the transaction process comprises a transaction process of signing a batch agreement and a transaction process of the batch agreement in a duration;
a query module for querying a user information system for different assessment factors associated with the user based on the identification information, wherein each of the assessment factors includes risk characteristic data of at least one dimension;
a first determining module, configured to determine a value of each of the evaluation factors according to risk characteristic data of at least one dimension included in each of the evaluation factors;
the input module is used for respectively inputting the value of each evaluation factor into a risk evaluation function to obtain a transaction risk value of the user;
and the second determining module is used for determining the transaction risk level of the user according to the transaction risk value of the user.
14. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-12.
15. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1 to 12.
16. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 12.
CN202310562925.4A 2023-05-18 2023-05-18 Transaction risk assessment method, device, equipment and storage medium Pending CN116629873A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310562925.4A CN116629873A (en) 2023-05-18 2023-05-18 Transaction risk assessment method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310562925.4A CN116629873A (en) 2023-05-18 2023-05-18 Transaction risk assessment method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116629873A true CN116629873A (en) 2023-08-22

Family

ID=87637557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310562925.4A Pending CN116629873A (en) 2023-05-18 2023-05-18 Transaction risk assessment method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116629873A (en)

Similar Documents

Publication Publication Date Title
US11924213B2 (en) User permissions for access to secure data at third-party
US20200364781A1 (en) System and method for providing time to cure negative balances in financial accounts while encouraging rapid curing of those balances to a positive net position
US8645264B2 (en) Apparatus and methods for verifying a credit applicant&#39;s income that enhance a credit applicant&#39;s experience
US20160300226A1 (en) Payment real-time funds availability
US20100250407A1 (en) Systems, methods and machine-readable mediums for consolidating financial information from multiple accounts maintained with a plurality of financial institutions
US20180121975A1 (en) Providing security in electronic real-time transactions
US8660942B2 (en) Loan management system and methods
US20190318354A1 (en) Secure electronic billing with real-time funds availability
US20190378182A1 (en) Secure electronic billing with real-time funds availability
CN111681111A (en) Credit increase and financing platform system, method and storage medium based on block chain
US20060259420A1 (en) System and Method for Regulatory Compliance Assessment of Settlement Statement Data
US20170300881A1 (en) Secure electronic billing and collection with real-time funds availability
US11803854B1 (en) System and method for fraud detection using event driven architecture
US20150046318A1 (en) Population of application
JP2011159225A (en) Credit transaction system and method of the same
CN111552733B (en) Operation dynamic analysis system and method based on big data
CN114357523A (en) Method, device, equipment, storage medium and program product for identifying risk object
CN116629873A (en) Transaction risk assessment method, device, equipment and storage medium
US11625772B1 (en) System and method for providing real time financial account information using event driven architecture
US20240095744A1 (en) Data element analysis for fraud mitigation
US20130173328A1 (en) Computerized system and method for managing injection of resources into a flow of multiple resource utilization events
Vering Scaling credit decisions in FinTech
CN118428959A (en) Information processing method, information processing apparatus, device, storage medium, and product
CN116503066A (en) Payment method and device
CN116578433A (en) Message processing method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination