[go: up one dir, main page]

CN114331593A - Malicious order identification and processing method, device, equipment and storage medium - Google Patents

Malicious order identification and processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN114331593A
CN114331593A CN202111525100.2A CN202111525100A CN114331593A CN 114331593 A CN114331593 A CN 114331593A CN 202111525100 A CN202111525100 A CN 202111525100A CN 114331593 A CN114331593 A CN 114331593A
Authority
CN
China
Prior art keywords
address
order
malicious
abnormal
orders
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111525100.2A
Other languages
Chinese (zh)
Inventor
刘培明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN202111525100.2A priority Critical patent/CN114331593A/en
Publication of CN114331593A publication Critical patent/CN114331593A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

本发明公开了一种恶意订单的识别及处理方法、装置、设备及存储介质,其中方法包括:获取用户下订单时的IP地址、联系电话、收货地址和行为数据;将行为数据输入至预先训练好的行为分析预测模型,得到行为数据是异常行为的概率;当概率超过预设概率阈值时,基于预设规则分析IP地址、联系电话和收货地址是否异常;当IP地址、联系电话和收货地址存在一个以上维度异常时,将订单标记为恶意订单并拉黑用户;当IP地址、联系电话和收货地址均正常时,将订单打上可疑标签。本发明通过对存在恶意订单概率较大的行为数据进行分析,再辅以其他多个维度分析订单是否为恶意订单,提高了恶意订单识别的准确率。

Figure 202111525100

The invention discloses a method, device, equipment and storage medium for identifying and processing malicious orders, wherein the method includes: obtaining an IP address, a contact phone number, a delivery address and behavior data when a user places an order; inputting the behavior data into a pre-order The trained behavior analysis and prediction model obtains the probability that the behavior data is abnormal behavior; when the probability exceeds the preset probability threshold, it analyzes whether the IP address, contact number and delivery address are abnormal based on preset rules; when the IP address, contact number and When the delivery address is abnormal in more than one dimension, the order will be marked as malicious and the user will be blocked; when the IP address, contact number and delivery address are all normal, the order will be marked as suspicious. The present invention improves the accuracy of identifying malicious orders by analyzing behavior data with a high probability of malicious orders, and supplementing other multiple dimensions to analyze whether an order is a malicious order.

Figure 202111525100

Description

恶意订单的识别及处理方法、装置、设备及存储介质Method, device, device and storage medium for identifying and processing malicious orders

技术领域technical field

本申请涉及电子商务及数据处理技术领域,特别是涉及一种恶意订单的识别及处理方法、装置、设备及存储介质。The present application relates to the technical field of electronic commerce and data processing, and in particular, to a method, device, device and storage medium for identifying and processing malicious orders.

背景技术Background technique

伴随电商行业发展,平台流量越来越高,客户的恶意手法也日渐丰富,商家出现集中性投诉被恶意订单攻击情况,由于恶意订单造成的损失日益加剧。且被商家主动提报的恶意订单仅仅占恶意订单本身的一部分,大量的恶意订单还在张狂的增长,商家如遇到恶意下单,不仅会影响到商品库存积压,也会导致商家到供应商的订单的退货申请增加,影响商家在供应商那里的评价。With the development of the e-commerce industry, the traffic on the platform is getting higher and higher, and the malicious tactics of customers are also becoming more and more abundant. And the malicious orders actively reported by merchants only account for a part of the malicious orders themselves, and a large number of malicious orders are still growing wildly. If merchants encounter malicious orders, it will not only affect the backlog of commodity inventory, but also lead to merchants to suppliers. The increase in the return application of the order affects the evaluation of the merchant on the supplier.

目前,客服人员在识别恶意订单时,缺乏对订单的所有信息进行综合性的客观分析,导致分析结果不够准确,同时还要耗费大量人力。At present, when customer service personnel identify malicious orders, they lack a comprehensive and objective analysis of all order information, resulting in inaccurate analysis results and a lot of manpower.

发明内容SUMMARY OF THE INVENTION

本申请提供一种恶意订单的识别及处理方法、装置、设备及存储介质,以解决恶意订单识别准确率不高的问题。The present application provides a method, device, device and storage medium for identifying and processing malicious orders, so as to solve the problem of low identification accuracy of malicious orders.

为解决上述技术问题,本申请采用的一个技术方案是:提供一种恶意订单的识别及处理方法,包括:获取用户下订单时的IP地址、联系电话、收货地址和行为数据;将行为数据输入至预先训练好的行为分析预测模型,得到行为数据是异常行为的概率,行为分析预测模型根据预先准备的群体用户样本中的历史恶意订单数据训练得到;当概率超过预设概率阈值时,基于预设规则分析IP地址、联系电话和收货地址是否异常;当IP地址、联系电话和收货地址存在一个以上维度异常时,将订单标记为恶意订单并拉黑用户;当IP地址、联系电话和收货地址均正常时,将订单打上可疑标签。In order to solve the above technical problems, a technical solution adopted in this application is to provide a method for identifying and processing malicious orders, including: obtaining the IP address, contact phone number, delivery address and behavior data of the user when placing the order; Input to the pre-trained behavior analysis and prediction model to obtain the probability that the behavior data is abnormal behavior. The behavior analysis and prediction model is trained according to the historical malicious order data in the pre-prepared group user samples; when the probability exceeds the preset probability threshold, based on The preset rules analyze whether the IP address, contact number and delivery address are abnormal; when more than one dimension of IP address, contact number and delivery address is abnormal, the order is marked as malicious and the user is blocked; When the shipping address and shipping address are OK, label the order suspicious.

作为本申请的进一步改进,得到行为数据是异常行为的概率之后,还包括:当概率未超过预设概率阈值时,基于预设规则分析IP地址、联系电话和收货地址是否异常;当IP地址、联系电话和收货地址中存在两个或两个以上维度异常时,将订单标记为恶意订单并拉黑用户;当IP地址、联系电话和收货地址中存在一个维度异常时,将订单打上可疑标签。As a further improvement of the present application, after obtaining the probability that the behavior data is an abnormal behavior, the method further includes: when the probability does not exceed the preset probability threshold, analyzing whether the IP address, contact number and delivery address are abnormal based on preset rules; When two or more dimensions are abnormal in , contact number and delivery address, mark the order as malicious and block the user; when there is an abnormality in one dimension in IP address, contact number and delivery address, mark the order as a malicious order Suspicious tags.

作为本申请的进一步改进,将订单打上可疑标签之后,还包括:统计用户的所有历史订单中被打上可疑标签的订单数量;当订单数量超过预设订单数量时,将订单标记为恶意订单并拉黑用户。As a further improvement of this application, after marking an order with suspicious labels, it also includes: counting the number of orders marked with suspicious labels in all historical orders of the user; when the number of orders exceeds the preset number of orders, marking the order as malicious and pulling the black user.

作为本申请的进一步改进,基于预设规则分析IP地址,包括:将IP 地址与所有用户的历史订单数据中的历史IP地址匹配,以确定使用过 IP地址下过订单的用户数量;当用户数量超过预设用户数量时,将IP地址标记为异常;当用户数量未超过预设用户数量时,解析IP地址的层级关系并当确认IP地址使用了代理时,将IP地址标记为异常。As a further improvement of this application, analyzing IP addresses based on preset rules includes: matching the IP addresses with the historical IP addresses in the historical order data of all users to determine the number of users who have placed orders using the IP addresses; when the number of users When the number of users exceeds the preset number, the IP address is marked as abnormal; when the number of users does not exceed the preset number of users, the hierarchical relationship of IP addresses is analyzed and the IP address is marked as abnormal when it is confirmed that the IP address uses a proxy.

作为本申请的进一步改进,基于预设规则分析联系电话,包括:将联系电话与预先从运营商获取到的虚拟号码号段进行匹配,以确认联系电话是否为虚拟号码;若是,则将联系电话标记为异常。As a further improvement of the present application, analyzing the contact number based on the preset rules includes: matching the contact number with the virtual number segment obtained from the operator in advance to confirm whether the contact number is a virtual number; Mark as exception.

作为本申请的进一步改进,基于预设规则分析收货地址,包括:判断收货地址是否接收过历史正常订单;若否,则根据地图数据,确认收货地址不满足预设收货地址条件时,将收货地址标记为异常。As a further improvement of this application, analyzing the delivery address based on preset rules includes: judging whether the delivery address has received normal historical orders; if not, confirming that the delivery address does not meet the preset delivery address conditions according to map data , marking the shipping address as exception.

作为本申请的进一步改进,将订单打上可疑标签之后,还包括:将订单转人工核验,并当人工核验结果为恶意订单时,将用户拉黑。As a further improvement of this application, after marking the order as suspicious, it also includes: transferring the order to manual verification, and blocking the user when the manual verification result is a malicious order.

为解决上述技术问题,本申请采用的另一个技术方案是:提供一种恶意订单的识别及处理装置,包括:获取模块,用于获取用户下订单时的IP地址、联系电话、收货地址和行为数据;预测模块,用于将行为数据输入至预先训练好的行为分析预测模型,得到行为数据是异常行为的概率,行为分析预测模型根据预先准备的群体用户样本中的历史恶意订单数据训练得到;多维度分析模块,用于当概率超过预设概率阈值时,基于预设规则分析IP地址、联系电话和收货地址是否异常;第一处理模块,用于当IP地址、联系电话和收货地址存在一个以上维度异常时,将订单标记为恶意订单并拉黑用户;第二处理模块,用于当IP地址、联系电话和收货地址均正常时,将订单打上可疑标签。In order to solve the above technical problems, another technical solution adopted in this application is to provide a device for identifying and processing malicious orders, including: an acquisition module for acquiring the IP address, contact phone number, delivery address and Behavior data; the prediction module is used to input the behavior data into the pre-trained behavior analysis and prediction model to obtain the probability that the behavior data is abnormal behavior. The behavior analysis and prediction model is trained according to the historical malicious order data in the pre-prepared group user samples. ;The multi-dimensional analysis module is used to analyze whether the IP address, contact number and delivery address are abnormal based on preset rules when the probability exceeds the preset probability threshold; the first processing module is used to analyze whether the IP address, contact number and delivery address are abnormal When the address is abnormal in more than one dimension, the order will be marked as malicious and the user will be blocked; the second processing module is used to mark the order as suspicious when the IP address, contact number and delivery address are all normal.

为解决上述技术问题,本申请采用的再一个技术方案是:提供一种计算机设备,所述计算机设备包括处理器、与所述处理器耦接的存储器,所述存储器中存储有程序指令,所述程序指令被所述处理器执行时,使得所述处理器执行如上述中任一项所述的恶意订单的识别及处理方法的步骤。In order to solve the above technical problem, another technical solution adopted in the present application is to provide a computer device, the computer device includes a processor and a memory coupled to the processor, the memory stores program instructions, and the When the program instructions are executed by the processor, the processor executes the steps of the method for identifying and processing malicious orders as described in any one of the above.

为解决上述技术问题,本申请采用的再一个技术方案是:提供一种存储介质,存储有能够实现上述恶意订单的识别及处理方法的程序指令。本申请的有益效果是:本申请的恶意订单的识别及处理方法通过首先对容易确认出异常操作的行为数据,结合行为分析预测模型预测用户下订单时行为数据存在异常的概率,当该概率超过预设概率阈值时,再辅以 IP地址、联系电话和收货地址三个维度对该订单进行分析,当该三个维度中存在异常则直接确认该订单是否为异常订单,从而实现了以用户下单时的行为数据为主,IP地址、联系电话和收货地址为辅的恶意订单识别方式,大大提高了恶意订单的识别准确率,而当该三个维度不存在异常时,则为订单打上可疑标签,方便用户查看快速查找到这些订单进行核验,最终还实现了对下过恶意订单的用户进行拉黑处理,防止其恶意骚扰。In order to solve the above technical problem, another technical solution adopted in the present application is to provide a storage medium storing program instructions capable of realizing the above method for identifying and processing malicious orders. The beneficial effects of the present application are as follows: the method for identifying and processing malicious orders of the present application first predicts the probability of abnormal behavior data when a user places an order by combining behavior data that is easy to identify abnormal operations, combined with a behavior analysis prediction model, and when the probability exceeds When the probability threshold is preset, the order is analyzed with the three dimensions of IP address, contact number and delivery address. When there is an abnormality in the three dimensions, it is directly confirmed whether the order is an abnormal order, so as to realize the user When placing an order, the behavior data is the main, and the IP address, contact number and delivery address are supplemented by the malicious order identification method, which greatly improves the identification accuracy of malicious orders. When there is no abnormality in these three dimensions, it is an order. Marking suspicious labels makes it easier for users to view and quickly find these orders for verification. Finally, users who have placed malicious orders can be blocked to prevent malicious harassment.

附图说明Description of drawings

图1是本发明第一实施例的恶意订单的识别及处理方法的流程示意图;1 is a schematic flowchart of a method for identifying and processing malicious orders according to a first embodiment of the present invention;

图2是本发明实施例的恶意订单的识别及处理装置的功能模块示意图;2 is a schematic diagram of functional modules of an apparatus for identifying and processing malicious orders according to an embodiment of the present invention;

图3是本发明实施例的计算机设备的结构示意图;3 is a schematic structural diagram of a computer device according to an embodiment of the present invention;

图4是本发明实施例的存储介质的结构示意图。FIG. 4 is a schematic structural diagram of a storage medium according to an embodiment of the present invention.

具体实施方式Detailed ways

下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请的一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

本申请中的术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”、“第三”的特征可以明示或者隐含地包括至少一个该特征。本申请的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。本申请实施例中所有方向性指示(诸如上、下、左、右、前、后……)仅用于解释在某一特定姿态(如附图所示)下各部件之间的相对位置关系、运动情况等,如果该特定姿态发生改变时,则该方向性指示也相应地随之改变。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second" and "third" in this application are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature defined as "first", "second", "third" may expressly or implicitly include at least one of that feature. In the description of the present application, "a plurality of" means at least two, such as two, three, etc., unless otherwise expressly and specifically defined. All directional indications (such as up, down, left, right, front, rear...) in the embodiments of the present application are only used to explain the relative positional relationship between components under a certain posture (as shown in the accompanying drawings). , motion situation, etc., if the specific posture changes, the directional indication also changes accordingly. Furthermore, the terms "comprising" and "having" and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally also includes For other steps or units inherent to these processes, methods, products or devices.

在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor a separate or alternative embodiment that is mutually exclusive of other embodiments. It is explicitly and implicitly understood by those skilled in the art that the embodiments described herein may be combined with other embodiments.

图1是本发明实施例的恶意订单的识别及处理方法的流程示意图。需注意的是,若有实质上相同的结果,本发明的方法并不以图1所示的流程顺序为限。如图1所示,该方法包括步骤:FIG. 1 is a schematic flowchart of a method for identifying and processing malicious orders according to an embodiment of the present invention. It should be noted that, if there is substantially the same result, the method of the present invention is not limited to the sequence of the processes shown in FIG. 1 . As shown in Figure 1, the method includes the steps:

步骤S101:获取用户下订单时的IP地址、联系电话、收货地址和行为数据。Step S101: Obtain the IP address, contact phone number, delivery address and behavior data of the user when placing the order.

具体地,用户在购物平台上下单后,平台记录用户下单的相关数据信息,该相关数据信息包括但不限于IP地址、联系电话、收货地址和行为数据,其中,该行为数据包括订单商品的数量、订单支付时间、订单支付方式、订单退款操作等。需要理解的是,通常情况下,用户下订单时的行为数据能够很大层面上判断用户的操作是否包含有恶意,因此,本实施例中,以用户下单时的行为数据作为主要判断标准,而IP地址、联系电话和收货地址的判断作用则比较小,例如,用户可能会不小心填写错误联系电话或错误地址,但用户并不是要下恶意订单,因此将IP地址、联系电话和收货地址作为次要判断标准,综合分析基于行为数据的判断和基于IP地址、联系电话、收货地址的判断,以确认订单是否为恶意订单。步骤S102:将行为数据输入至预先训练好的行为分析预测模型,得到行为数据是异常行为的概率,行为分析预测模型根据预先准备的群体用户样本中的历史恶意订单数据训练得到。Specifically, after the user places an order on the shopping platform, the platform records the relevant data information of the order placed by the user, and the relevant data information includes but is not limited to IP address, contact number, delivery address and behavior data, wherein the behavior data includes the order commodities Quantity, order payment time, order payment method, order refund operation, etc. It should be understood that, under normal circumstances, the behavior data of the user when placing an order can determine whether the user's operation contains malicious intent. The IP address, contact phone number and delivery address have a relatively small role in judgment. For example, the user may accidentally fill in the wrong contact number or wrong address, but the user does not intend to place a malicious order, so the IP address, contact number and delivery address The delivery address is used as a secondary judgment criterion, and the judgment based on the behavior data and the judgment based on the IP address, contact number, and delivery address are comprehensively analyzed to confirm whether the order is a malicious order. Step S102: Input the behavior data into the pre-trained behavior analysis and prediction model to obtain the probability that the behavior data is an abnormal behavior. The behavior analysis and prediction model is trained according to the historical malicious order data in the pre-prepared group user samples.

需要说明的是,该行为分析预测模型根据预先准备的群体用户样本中的历史恶意订单数据训练得到。优选地,该行为分析预测模型基于二分类模型构建,分析行为数据得到异常行为的概率和正常行为的概率。常见的二分类模型包括有逻辑回归算法、k最近邻算法、决策树算法、支持向量机算法和朴素贝叶斯算法,本实施例的二分类模型基于其中任一种算法来实现,本实施例不做限制。It should be noted that the behavior analysis and prediction model is trained according to the historical malicious order data in the pre-prepared group user samples. Preferably, the behavior analysis and prediction model is constructed based on a binary classification model, and analyzes the behavior data to obtain the probability of abnormal behavior and the probability of normal behavior. Common binary classification models include logistic regression algorithm, k nearest neighbor algorithm, decision tree algorithm, support vector machine algorithm and naive Bayesian algorithm. The binary classification model in this embodiment is implemented based on any of these algorithms. This embodiment No restrictions.

进一步的,基于预设规则分析IP地址,包括:Further, analyze IP addresses based on preset rules, including:

1.1、将IP地址与所有用户的历史订单数据中的历史IP地址匹配,以确定使用过IP地址下过订单的用户数量。1.1. Match the IP address with the historical IP address in the historical order data of all users to determine the number of users who have placed orders using the IP address.

1.2、当用户数量超过预设用户数量时,将IP地址标记为异常。1.2. When the number of users exceeds the preset number of users, the IP address will be marked as abnormal.

1.3、当用户数量未超过预设用户数量时,解析IP地址的层级关系并当确认IP地址使用了代理时,将IP地址标记为异常。1.3. When the number of users does not exceed the preset number of users, analyze the hierarchical relationship of IP addresses and mark the IP address as abnormal when it is confirmed that the IP address uses a proxy.

具体地,在分析IP地址维度时,首先获取所有用户的历史订单数据,并获取历史订单数据中的历史IP地址,将所有历史IP地址分别与当前的IP地址进行匹配,从而找到与当前的IP地址相同的历史IP地址所对应的目标用户,需要说明的是,该目标用户需要在该IP地址下过一定数量的订单,从统计得到目标用户的用户数量,当该用户数量超过预设用户数量时,则可认为该IP地址维度存在异常,例如,当同一IP地址下存在数十个用户且均多次下过订单时,该IP地址很大可能出现通过众多的用户账号进行恶意刷单的行为。而当用户的数量未超过预设数量时,则进一步对IP地址进行解析,分析出IP地址的层级关系,以及IP地址对应的物理地址,分析物理地址的层级关系是否正式合理,比如用户在国内访问IP层级中出现了国外的IP地址,极有可能是黑客批量下单行为。Specifically, when analyzing the IP address dimension, first obtain the historical order data of all users, and obtain the historical IP addresses in the historical order data, and match all the historical IP addresses with the current IP addresses respectively, so as to find the IP address that matches the current IP address. For the target user corresponding to the historical IP address with the same address, it should be noted that the target user needs to place a certain number of orders at the IP address, and the number of users of the target user is obtained from statistics. When the number of users exceeds the preset number of users If the IP address dimension is abnormal, for example, when there are dozens of users under the same IP address and they have placed orders multiple times, the IP address is likely to be maliciously swiped through numerous user accounts. Behavior. When the number of users does not exceed the preset number, the IP address is further analyzed, and the hierarchical relationship of IP addresses and the physical address corresponding to the IP address are analyzed to analyze whether the hierarchical relationship of physical addresses is formal and reasonable. Foreign IP addresses appear in the access IP level, which is most likely due to hackers placing orders in batches.

进一步的,基于预设规则分析联系电话,包括:Further, the contact numbers are analyzed based on preset rules, including:

2.1、将联系电话与预先从运营商获取到的虚拟号码号段进行匹配,以确认联系电话是否为虚拟号码。2.1. Match the contact number with the virtual number segment obtained from the operator in advance to confirm whether the contact number is a virtual number.

2.2、若是,则将联系电话维度标记为异常。2.2. If so, mark the contact phone dimension as abnormal.

具体地,手机号作为用户接受快递时的联系方式,是需要可以正常接听电话的,恶意下单的情况,用户会使用虚拟号码来注册账号下单,特点是只能接受短信,不能接听电话,通过从运营商获取到虚拟号码号段,可以识别虚拟号码。Specifically, the mobile phone number, as the user's contact method when accepting express delivery, needs to be able to answer the phone normally. In the case of maliciously placing an order, the user will use a virtual number to register an account to place an order. The virtual number can be identified by obtaining the virtual number segment from the operator.

进一步的,还可通过其他风控渠道来获取网络诈骗的手机号黑名单,当使用该手机号黑名单中的联系电话进行下单时,也可视为联系电话维度异常。Further, other risk control channels can also be used to obtain the mobile phone number blacklist of online fraud. When placing an order using the contact number in the mobile phone number blacklist, it can also be regarded as an abnormal contact number dimension.

需要说明的是,在一些实施例中,还可直接通过虚拟拨号系统对该联系电话拨打电话,若该联系电话正常接通则说明该联系电话正常,若无法接通则说明该联系电话存在异常。It should be noted that, in some embodiments, the contact number can also be dialed directly through the virtual dialing system. If the contact number is connected normally, it means that the contact number is normal, and if it cannot be connected, it means that the contact number is abnormal. .

进一步的,基于预设规则分析收货地址,包括:Further, the delivery address is analyzed based on preset rules, including:

3.1、判断收货地址是否接收过历史正常订单。3.1. Determine whether the delivery address has received normal historical orders.

3.2、若否,则根据地图数据,确认收货地址不满足预设收货地址条件时,将收货地址标记为异常。3.2. If not, according to the map data, when it is confirmed that the delivery address does not meet the preset delivery address conditions, the delivery address will be marked as abnormal.

需要说明的是,该预设收货地址条件预先设置,例如,预设收货地址条件包括小区地址、写字楼地址、工厂地址、仓库地址中的至少一种。It should be noted that the preset delivery address condition is preset, for example, the preset delivery address condition includes at least one of a community address, an office building address, a factory address, and a warehouse address.

具体地,在获取到收货地址后,查询历史订单信息中的历史收货地址,从而确认该收货地址是否曾经接收过正常的订单,若是,则将该收货地址维度视为正常,若否,则说明该收货地址是一个新的地址,根据地图数据,确认该收货地址是否满足预设收货地址条件,例如,该地址是否为正常的住宅地址或者是办公场所地址,若是,则将该收货地址标记为正常,若否,则将该收货地址标记为异常。步骤S103:当概率超过预设概率阈值时,基于预设规则分析IP地址、联系电话和收货地址是否异常。当IP地址、联系电话和收货地址存在一个以上维度异常时,执行步骤S104;当IP地址、联系电话和收货地址均正常时,执行步骤S105。Specifically, after obtaining the delivery address, query the historical delivery address in the historical order information to confirm whether the delivery address has received normal orders. If so, the delivery address dimension is regarded as normal. No, it means that the delivery address is a new address. According to the map data, confirm whether the delivery address meets the preset delivery address conditions, for example, whether the address is a normal residential address or an office address, and if so, The delivery address is marked as normal, if not, the delivery address is marked as abnormal. Step S103: When the probability exceeds a preset probability threshold, analyze whether the IP address, contact phone number and delivery address are abnormal based on preset rules. When more than one dimension of the IP address, contact phone number, and delivery address is abnormal, step S104 is performed; when the IP address, contact phone number, and delivery address are all normal, step S105 is performed.

具体地,当行为数据为异常行为的概率超过预设概率阈值时,说明当前时恶意订单的可能性较高,此时为了增加识别的准确率,对订单的 IP地址、联系电话和收货地址做进一步的分析判断,以确认该订单是否为恶意订单。在当IP地址、联系电话和收货地址存在一个以上维度异常时,进一步提高了该订单是恶意订单的概率,因此,执行步骤S104以将该订单标记为恶意订单。而当IP地址、联系电话和收货地址均正常时,虽然为进一步提高该订单时恶意订单的概率,但是还是不能排除该订单为潜在的恶意订单的可能性,因此,执行步骤S105以对该订单打上可疑标签。Specifically, when the probability that the behavior data is abnormal behavior exceeds the preset probability threshold, it indicates that the current possibility of malicious orders is high. Do further analysis and judgment to confirm whether the order is a malicious order. When there are more than one dimension anomalies in the IP address, contact phone number, and delivery address, the probability that the order is a malicious order is further increased. Therefore, step S104 is performed to mark the order as a malicious order. When the IP address, contact phone number and delivery address are all normal, although the probability of a malicious order in the order is further increased, the possibility that the order is a potential malicious order cannot be ruled out. Therefore, step S105 is executed to Orders are marked suspicious.

进一步的,在一些实施例中,步骤S102之后,还包括:当概率未超过预设概率阈值时,基于预设规则分析IP地址、联系电话和收货地址是否异常。当IP地址、联系电话和收货地址中存在两个或两个以上维度异常时,执行步骤S104;当IP地址、联系电话和收货地址中存在一个维度异常时,执行步骤S105。Further, in some embodiments, after step S102, the method further includes: when the probability does not exceed a preset probability threshold, analyzing whether the IP address, contact number and delivery address are abnormal based on preset rules. When two or more dimensions are abnormal in IP address, contact phone number, and delivery address, step S104 is performed; when one dimension is abnormal in IP address, contact phone number, and delivery address, step S105 is performed.

具体地,在概率未超过预设概率阈值时,虽然根据用户的行为数据预测为异常行为的概率较低,但是仍不能排除该订单为恶意订单的可能性。因此,进一步判断IP地址、联系电话和收货地址,且当IP地址、联系电话和收货地址中存在两个或两个以上维度异常时,其中的异常维度过多,因此,该订单为恶意订单的可能性很高,因此,执行步骤S104 以将该订单标记为恶意订单。当IP地址、联系电话和收货地址中存在一个维度异常时,还是不能排除该订单是恶意订单的可能性,因此,执行步骤S105以对该订单打上可疑标签。Specifically, when the probability does not exceed the preset probability threshold, although the probability of abnormal behavior predicted according to the user's behavior data is low, the possibility that the order is a malicious order cannot be ruled out. Therefore, the IP address, contact number and delivery address are further judged, and when two or more dimensions are abnormal in the IP address, contact number and delivery address, there are too many abnormal dimensions. Therefore, the order is malicious The probability of the order is high, so step S104 is performed to mark the order as malicious. When there is an abnormality in one dimension in the IP address, contact phone number and delivery address, the possibility that the order is a malicious order cannot be ruled out. Therefore, step S105 is performed to mark the order as suspicious.

本实施例中,需要理解的是,只要当根据行为数据预测的异常行为的概率低于预设概率阈值,且IP地址、联系电话和收货地址均正常时,才可将该订单视为正常订单。In this embodiment, it should be understood that only when the probability of abnormal behavior predicted according to the behavior data is lower than the preset probability threshold, and the IP address, contact number and delivery address are all normal, the order can be regarded as normal. Order.

步骤S104:将订单标记为恶意订单并拉黑用户。Step S104: Mark the order as a malicious order and block the user.

步骤S105:将订单打上可疑标签。进一步的,对于一些客户的订单,其是否为恶意订单的识别难度较高,则可结合其历史订单中的数据作为进一步参考,以提高恶意订单的识别准确率,因此,在一些实施例中,在步骤S105之后,还包括:Step S105: Mark the order with a suspicious label. Further, for some customer orders, it is difficult to identify whether they are malicious orders, and the data in their historical orders can be used as further reference to improve the identification accuracy of malicious orders. Therefore, in some embodiments, After step S105, it also includes:

4.1、统计用户的所有历史订单中被打上可疑标签的订单数量。4.1. Count the number of orders marked with suspicious labels in all historical orders of the user.

需要说明的是,用户的所有订单记录均需保存。It should be noted that all order records of users need to be saved.

4.2、当订单数量超过预设订单数量时,将订单标记为恶意订单,并将用户添加至预设黑名单。4.2. When the order quantity exceeds the preset order quantity, mark the order as malicious and add the user to the preset blacklist.

具体地,当对用户当前下的订单打上可疑标签时,获取该用户的所有历史订单,再从所有历史订单中筛选出被打上了可疑标签的所有历史订单并统计订单数量,再判断该订单数量是否超过了预设订单数量,若超过了,则说明该用户已经下过多次可疑的订单,该用户可能会下恶意订单的可能性较高,因此,将该客户当前下的订单标记为恶意订单,并将该客户拉黑。Specifically, when a suspicious label is placed on an order currently placed by a user, all historical orders of the user are obtained, and then all historical orders marked with a suspicious label are screened out from all historical orders, and the number of orders is counted, and then the number of orders is determined. Whether it exceeds the preset number of orders, if it exceeds, it means that the user has placed suspicious orders many times, and the user may place a high possibility of malicious orders. Therefore, the current order placed by the customer is marked as malicious order and block the customer.

进一步的,为了提升恶意订单识别的准确率,在一些实施例中,步骤S105之后,还包括:将订单转人工核验,并当人工核验结果为恶意订单时,将用户拉黑。Further, in order to improve the accuracy of identifying malicious orders, in some embodiments, after step S105, the method further includes: transferring the order to manual verification, and blocking the user when the manual verification result is a malicious order.

具体地,当识别当前的订单为打上可疑标签的订单时,将该订单转到人工进行核验,利用工作人员的丰富工作经验进行判断,从而将可疑的订单中潜在的恶意订单识别出来,并且,当人工核验结果为恶意订单时,将该用户拉黑。Specifically, when the current order is identified as an order marked with a suspicious label, the order is transferred to manual verification, and the rich work experience of the staff is used to make judgments, so as to identify potential malicious orders in the suspicious orders, and, When the manual verification result is a malicious order, block the user.

进一步的,在一些实施例中,将订单标记为恶意订单并拉黑用户的步骤,还可以为:Further, in some embodiments, the steps of marking the order as a malicious order and blocking the user may also be:

将订单标记为恶意订单,再将该订单对应的IP地址、联系电话和收货地址均拉入对应的黑名单中。Mark the order as a malicious order, and then pull the IP address, contact number and delivery address corresponding to the order into the corresponding blacklist.

其中,IP地址、联系电话和收货地址均预设设置有对应的黑名单,用于记录下过恶意订单的IP地址、联系电话和收货地址。因此,当接收到订单后,还可以先从用户的ID信息、IP地址、联系电话和收货地址四个维度分别件黑名单判断,当其中存在一项被拉入黑名单时,直接将该订单标记为恶意订单。The IP address, contact phone number, and delivery address are preset with corresponding blacklists, which are used to record IP addresses, contact numbers, and delivery addresses that have placed malicious orders. Therefore, when an order is received, it can also be judged from the four dimensions of the user's ID information, IP address, contact number and delivery address. The order is marked as malicious.

本发明实施例的恶意订单的识别及处理方法通过首先对容易确认出异常操作的行为数据,结合行为分析预测模型预测用户下订单时行为数据存在异常的概率,当该概率超过预设概率阈值时,再辅以IP地址、联系电话和收货地址三个维度对该订单进行分析,当该三个维度中存在异常则直接确认该订单是否为异常订单,从而实现了以用户下单时的行为数据为主,IP地址、联系电话和收货地址为辅的恶意订单识别方式,大大提高了恶意订单的识别准确率,而当该三个维度不存在异常时,则为订单打上可疑标签,方便用户查看快速查找到这些订单进行核验,最终还实现了对下过恶意订单的用户进行拉黑处理,防止其恶意骚扰。图 2是本发明实施例的恶意订单的识别及处理装置的功能模块示意图。如图2所示,该恶意订单的识别及处理装置50包括获取模块51、预测模块52、多维度分析模块53、第一处理模块54和第二处理模块55。The method for identifying and processing malicious orders according to the embodiment of the present invention predicts the probability that the behavior data is abnormal when the user places an order by first analyzing the behavior data that is easy to identify abnormal operations, and combining with the behavior analysis prediction model. When the probability exceeds a preset probability threshold , supplemented by the three dimensions of IP address, contact number and delivery address to analyze the order, when there is an abnormality in the three dimensions, it will directly confirm whether the order is an abnormal order, thus realizing the behavior of the user when placing an order The malicious order identification method based on data and supplemented by IP address, contact phone number and delivery address greatly improves the identification accuracy of malicious orders. Users can quickly find these orders for verification, and finally block users who have placed malicious orders to prevent malicious harassment. FIG. 2 is a schematic diagram of functional modules of an apparatus for identifying and processing malicious orders according to an embodiment of the present invention. As shown in FIG. 2 , the malicious order identification and processing device 50 includes an acquisition module 51 , a prediction module 52 , a multi-dimensional analysis module 53 , a first processing module 54 and a second processing module 55 .

获取模块51,用于获取用户下订单时的IP地址、联系电话、收货地址和行为数据;The obtaining module 51 is used to obtain the IP address, contact phone number, delivery address and behavior data when the user places an order;

预测模块52,用于将行为数据输入至预先训练好的行为分析预测模型,得到行为数据是异常行为的概率,行为分析预测模型根据预先准备的群体用户样本中的历史恶意订单数据训练得到;The prediction module 52 is used for inputting the behavior data into the pre-trained behavior analysis prediction model to obtain the probability that the behavior data is an abnormal behavior, and the behavior analysis prediction model is obtained by training according to the historical malicious order data in the pre-prepared group user samples;

多维度分析模块53,用于当概率超过预设概率阈值时,基于预设规则分析IP地址、联系电话和收货地址是否异常;A multi-dimensional analysis module 53, configured to analyze whether the IP address, contact number and delivery address are abnormal based on preset rules when the probability exceeds a preset probability threshold;

第一处理模块54,用于当IP地址、联系电话和收货地址存在一个以上维度异常时,将订单标记为恶意订单并拉黑用户;The first processing module 54 is used to mark the order as a malicious order and block the user when more than one dimension is abnormal in the IP address, contact phone number and delivery address;

第二处理模块55,用于当IP地址、联系电话和收货地址均正常时,将订单打上可疑标签。The second processing module 55 is used to label the order suspicious when the IP address, contact phone number and delivery address are all normal.

可选地,预测模块52执行将行为数据输入至预先训练好的行为分析预测模型,得到行为数据是异常行为的概率的操作之后,多维度分析模块53还用于:当概率未超过预设概率阈值时,基于预设规则分析IP 地址、联系电话和收货地址是否异常;第一处理模块54还用于:当IP 地址、联系电话和收货地址中存在两个或两个以上维度异常时,将订单标记为恶意订单;第二处理模块55,还用于当IP地址、联系电话和收货地址中存在一个维度异常时,将订单打上可疑标签。Optionally, after the prediction module 52 performs the operation of inputting the behavioral data into the pre-trained behavioral analysis prediction model to obtain the probability that the behavioral data is an abnormal behavior, the multidimensional analysis module 53 is also used for: when the probability does not exceed the preset probability When the threshold is set, analyze whether the IP address, contact phone number and delivery address are abnormal based on preset rules; the first processing module 54 is also used for: when there are two or more dimension abnormalities in the IP address, contact phone number and delivery address , marking the order as a malicious order; the second processing module 55 is also used for marking the order as suspicious when there is a dimension abnormality in the IP address, contact number and delivery address.

可选地,第二处理模块55执行将订单打上可疑标签的操作之后,还用于:统计用户的所有历史订单中被打上可疑标签的订单数量;当订单数量超过预设订单数量时,将订单标记为恶意订单,并将用户添加至预设黑名单。Optionally, after the second processing module 55 performs the operation of marking the order with suspicious labels, it is also used to: count the number of orders marked with suspicious labels in all historical orders of the user; Flag as malicious and add users to a preset blacklist.

可选地,多维度分析模块53执行基于预设规则分析IP地址的操作,具体包括:将IP地址与所有用户的历史订单数据中的历史IP地址匹配,以确定使用过IP地址下过订单的用户数量;当用户数量超过预设用户数量时,将IP地址标记为异常;当用户数量未超过预设用户数量时,解析 IP地址的层级关系并当确认IP地址使用了代理时,将IP地址标记为异常。Optionally, the multi-dimensional analysis module 53 performs an operation of analyzing IP addresses based on preset rules, specifically including: matching the IP addresses with the historical IP addresses in the historical order data of all users, to determine those who have placed orders using the IP addresses. Number of users; when the number of users exceeds the preset number of users, the IP address is marked as abnormal; when the number of users does not exceed the preset number of users, the hierarchical relationship of IP addresses is analyzed and when it is confirmed that the IP address uses a proxy, the IP address is marked as abnormal. Mark as exception.

可选地,多维度分析模块53执行基于预设规则分析联系电话的操作,具体包括:将联系电话与预先从运营商获取到的虚拟号码号段进行匹配,以确认联系电话是否为虚拟号码;若是,则将联系电话标记为异常。Optionally, the multi-dimensional analysis module 53 performs an operation of analyzing the contact phone number based on a preset rule, specifically including: matching the contact phone number with a virtual number segment obtained in advance from the operator to confirm whether the contact phone number is a virtual number; If so, mark the contact number as abnormal.

可选地,多维度分析模块53执行基于预设规则分析收货地址的操作,具体包括:判断收货地址是否接收过历史正常订单;若否,则根据地图数据,确认收货地址不满足预设收货地址条件时,将收货地址标记为异常。Optionally, the multi-dimensional analysis module 53 performs an operation of analyzing the delivery address based on preset rules, which specifically includes: judging whether the delivery address has received historical normal orders; if not, confirming that the delivery address does not meet the predetermined requirements according to map data. When setting the shipping address condition, mark the shipping address as abnormal.

可选地,第二处理模块55执行将订单打上可疑标签的操作之后,还用于:将订单转人工核验,并当人工核验结果为恶意订单时,将用户拉黑。Optionally, after the second processing module 55 performs the operation of labeling the order suspicious, it is further configured to: transfer the order to manual verification, and block the user when the manual verification result is a malicious order.

关于上述实施例恶意订单的识别及处理装置中各模块实现技术方案的其他细节,可参见上述实施例中的恶意订单的识别及处理方法中的描述,此处不再赘述。For other details of the technical solutions implemented by the modules in the device for identifying and processing malicious orders in the above embodiments, reference may be made to the description in the methods for identifying and processing malicious orders in the above embodiments, which will not be repeated here.

需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置类实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。It should be noted that the various embodiments in this specification are described in a progressive manner, and each embodiment focuses on the differences from other embodiments. For the same and similar parts among the various embodiments, refer to each other Can. As for the apparatus type embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for the relevant part, please refer to the partial description of the method embodiment.

请参阅图3,图3为本发明实施例的计算机设备的结构示意图。如图3所示,该计算机设备60包括处理器61及和处理器61耦接的存储器62,存储器62中存储有程序指令,程序指令被处理器61执行时,使得处理器61执行上述任一实施例所述的恶意订单的识别及处理方法的步骤。Please refer to FIG. 3 , which is a schematic structural diagram of a computer device according to an embodiment of the present invention. As shown in FIG. 3 , the computer device 60 includes a processor 61 and a memory 62 coupled to the processor 61. The memory 62 stores program instructions. When the program instructions are executed by the processor 61, the processor 61 executes any one of the above. The steps of the method for identifying and processing malicious orders described in the embodiment.

其中,处理器61还可以称为CPU(Central Processing Unit,中央处理单元)。处理器61可能是一种集成电路芯片,具有信号的处理能力。处理器61还可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The processor 61 may also be referred to as a CPU (Central Processing Unit, central processing unit). The processor 61 may be an integrated circuit chip with signal processing capability. The processor 61 may also be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components . A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.

参阅图4,图4为本发明实施例的存储介质的结构示意图。本发明实施例的存储介质存储有能够实现上述所有方法的程序指令71,其中,该程序指令71可以以软件产品的形式存储在上述存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施方式所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质,或者是计算机、服务器、手机、平板等计算机设备设备。Referring to FIG. 4, FIG. 4 is a schematic structural diagram of a storage medium according to an embodiment of the present invention. The storage medium of this embodiment of the present invention stores program instructions 71 capable of implementing all the above methods, wherein the program instructions 71 may be stored in the above-mentioned storage medium in the form of a software product, including several instructions to enable a computer device (which may A personal computer, a server, or a network device, etc.) or a processor (processor) executes all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes , or computer equipment such as computers, servers, mobile phones, and tablets.

在本申请所提供的几个实施例中,应该理解到,所揭露的计算机设备,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed computer equipment, apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are only illustrative. For example, the division of units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be combined or integrated. to another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。以上仅为本申请的实施方式,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units. The above are only the embodiments of the present application, and are not intended to limit the scope of the patent of the present application. Any equivalent structure or equivalent process transformation made by using the contents of the description and drawings of the present application, or directly or indirectly applied in other related technical fields, All are similarly included in the scope of patent protection of the present application.

Claims (10)

1. A method for identifying and processing a malicious order is characterized by comprising the following steps:
acquiring related data information of a user order, wherein the related data information comprises an IP address, a contact telephone, a receiving address and behavior data;
inputting the behavior data into a pre-trained behavior analysis prediction model to obtain the probability that the behavior data is abnormal behavior, wherein the behavior analysis prediction model is obtained by training according to historical malicious order data in a group user sample prepared in advance;
when the probability exceeds a preset probability threshold value, analyzing whether the IP address, the contact telephone and the receiving address are abnormal or not based on a preset rule;
when more than one dimension of the IP address, the contact telephone and the receiving address is abnormal, marking the order as a malicious order and blacking out the user;
and when the IP address, the contact telephone and the receiving address are normal, printing a suspicious label on the order.
2. The malicious order identification and processing method according to claim 1, wherein after obtaining the probability that the behavior data is an abnormal behavior, the method further comprises:
when the probability does not exceed the preset probability threshold, analyzing whether the IP address, the contact telephone and the receiving address are abnormal or not based on the preset rule;
when two or more dimensions of the IP address, the contact telephone and the receiving address are abnormal, marking the order as a malicious order and blacking out the user;
and when one dimension among the IP address, the contact telephone and the receiving address is abnormal, marking the order with a suspicious label.
3. The malicious order identification and processing method according to claim 1 or 2, wherein after the order is labeled with a suspicious tag, the method further comprises:
counting the number of orders with suspicious labels in all historical orders of the user;
and when the order quantity exceeds a preset order quantity, marking the order as a malicious order and blacking out the user.
4. The malicious order identification and processing method according to claim 1 or 2, wherein the analyzing the IP address based on the preset rule comprises:
matching the IP address with historical IP addresses in historical order data of all users to determine the number of users who have placed orders by using the IP address;
when the number of the users exceeds the preset number of the users, the IP address is marked as abnormal;
when the number of the users does not exceed the preset number of the users, analyzing the hierarchical relation of the IP address and marking the IP address as abnormal when confirming that the IP address uses the proxy.
5. The malicious order identification and processing method according to claim 1 or 2, wherein the analyzing the contact call based on the preset rule comprises:
matching the contact telephone with a virtual number segment acquired from an operator in advance to confirm whether the contact telephone is a virtual number or not;
if yes, the contact telephone is marked as abnormal.
6. The malicious order identification and processing method according to claim 1 or 2, wherein the analyzing the shipping address based on the preset rule comprises:
judging whether the receiving address receives a historical normal order or not;
if not, according to the map data, when the receiving address does not meet the preset receiving address condition, the receiving address is marked as abnormal.
7. The malicious order identification and processing method according to claim 1 or 2, wherein after the order is labeled with a suspicious tag, the method further comprises:
and converting the order into manual checking, and blacking the user when the manual checking result is a malicious order.
8. An apparatus for identifying and processing malicious orders, comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring related data information of a user order, and the related data information comprises an IP address, a contact telephone, a receiving address and behavior data;
the prediction module is used for inputting the behavior data into a pre-trained behavior analysis prediction model to obtain the probability that the behavior data is abnormal behavior, and the behavior analysis prediction model is obtained by training according to historical malicious order data in a group user sample prepared in advance;
the multidimensional analysis module is used for analyzing whether the IP address, the contact telephone and the receiving address are abnormal or not based on a preset rule when the probability exceeds a preset probability threshold;
the first processing module is used for marking the order as a malicious order and blacking out the user when more than one dimension of the IP address, the contact telephone and the receiving address is abnormal;
and the second processing module is used for marking the order with a suspicious label when the IP address, the contact telephone and the receiving address are normal.
9. A computer device comprising a processor, a memory coupled to the processor, the memory having stored therein program instructions which, when executed by the processor, cause the processor to carry out the steps of the method of identifying and processing a malicious order according to any of claims 1 to 7.
10. A storage medium storing program instructions capable of implementing the method for identifying and processing malicious orders according to any one of claims 1 to 7.
CN202111525100.2A 2021-12-14 2021-12-14 Malicious order identification and processing method, device, equipment and storage medium Pending CN114331593A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111525100.2A CN114331593A (en) 2021-12-14 2021-12-14 Malicious order identification and processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111525100.2A CN114331593A (en) 2021-12-14 2021-12-14 Malicious order identification and processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114331593A true CN114331593A (en) 2022-04-12

Family

ID=81049856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111525100.2A Pending CN114331593A (en) 2021-12-14 2021-12-14 Malicious order identification and processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114331593A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114757201A (en) * 2022-04-14 2022-07-15 阿里巴巴(中国)有限公司 Method for identifying delivery address, storage medium and processor
CN116934418A (en) * 2023-06-15 2023-10-24 广州淘通科技股份有限公司 Abnormal order detection and early warning method, system, equipment and storage medium
CN117635276A (en) * 2023-12-21 2024-03-01 爱来(广州)信息网络有限公司 Order processing method, device and system and computer readable storage medium
CN118863898A (en) * 2024-07-08 2024-10-29 深圳市宏逸信息技术有限公司 A comprehensive payment reconciliation service system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341716A (en) * 2017-07-11 2017-11-10 北京奇艺世纪科技有限公司 A kind of method, apparatus and electronic equipment of the identification of malice order
CN107798571A (en) * 2016-08-31 2018-03-13 阿里巴巴集团控股有限公司 Identifying system, the method and device of malice address/malice order
CN107944976A (en) * 2017-12-15 2018-04-20 康成投资(中国)有限公司 Online order checking method
CN113112323A (en) * 2021-03-16 2021-07-13 中国平安财产保险股份有限公司 Abnormal order identification method, device, equipment and medium based on data analysis
CN113469789A (en) * 2021-07-01 2021-10-01 易纳购科技(北京)有限公司 Abnormal order detection method and device and computer equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107798571A (en) * 2016-08-31 2018-03-13 阿里巴巴集团控股有限公司 Identifying system, the method and device of malice address/malice order
CN107341716A (en) * 2017-07-11 2017-11-10 北京奇艺世纪科技有限公司 A kind of method, apparatus and electronic equipment of the identification of malice order
CN107944976A (en) * 2017-12-15 2018-04-20 康成投资(中国)有限公司 Online order checking method
CN113112323A (en) * 2021-03-16 2021-07-13 中国平安财产保险股份有限公司 Abnormal order identification method, device, equipment and medium based on data analysis
CN113469789A (en) * 2021-07-01 2021-10-01 易纳购科技(北京)有限公司 Abnormal order detection method and device and computer equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114757201A (en) * 2022-04-14 2022-07-15 阿里巴巴(中国)有限公司 Method for identifying delivery address, storage medium and processor
CN116934418A (en) * 2023-06-15 2023-10-24 广州淘通科技股份有限公司 Abnormal order detection and early warning method, system, equipment and storage medium
CN116934418B (en) * 2023-06-15 2024-03-19 广州淘通科技股份有限公司 Abnormal order detection and early warning method, system, equipment and storage medium
CN117635276A (en) * 2023-12-21 2024-03-01 爱来(广州)信息网络有限公司 Order processing method, device and system and computer readable storage medium
CN118863898A (en) * 2024-07-08 2024-10-29 深圳市宏逸信息技术有限公司 A comprehensive payment reconciliation service system

Similar Documents

Publication Publication Date Title
CN114331593A (en) Malicious order identification and processing method, device, equipment and storage medium
CN111260129B (en) Multi-yard vehicle path planning method and device, computer equipment and storage medium
CN107341716A (en) A kind of method, apparatus and electronic equipment of the identification of malice order
CN105808655A (en) Processing method, device and system for mass data anomaly checking
CN108596759A (en) loan application information detecting method and server
CN112101965A (en) Commodity after-sale processing method and device, electronic equipment and readable storage medium
CN113837617A (en) Anti-bill-swiping risk management method and device
CN110807050B (en) Performance analysis method, device, computer equipment and storage medium
CN113313279A (en) Document auditing method and device
CN111461620A (en) Block chain-based distributed storage method and device for logistics data
CN113435900A (en) Transaction risk determination method and device and server
CN112907263B (en) Abnormal order quantity detection method, device, equipment and storage medium
CN113743435B (en) Training of service data classification model, and service data classification method and device
CN111415168A (en) Transaction warning method and device
US20230099904A1 (en) Machine learning model prediction of interest in an object
CN111768139B (en) Stock processing method, apparatus, device and storage medium
CN111507773A (en) Coupon management method, device and storage medium
CN118193590B (en) Service data processing method and system based on stream computing
CN117273861B (en) Sales order management method and system
CN115296840B (en) Security early warning method and device based on security state of associated node and electronic equipment
KR20030028682A (en) Customer relationship management system using e-mail header information and method thereof
US20230145924A1 (en) System and method for detecting a fraudulent activity on a digital platform
JP4425231B2 (en) High-priced user management program, high-priced user management system, and high-priced user management method
CN113255710A (en) Mobile phone number classification method, device, equipment and storage medium
JP2023165480A (en) Notification device, notification system, and notification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination