コンテンツにスキップ
アカウント作成/サインイン
Stripe ドキュメントのロゴ
/
AI に質問
アカウントを作成サインイン
導入方法
決済管理
売上管理
プラットフォームとマーケットプレイス
資金管理
開発者向けリソース
API & SDKヘルプ
概要決済を受け付ける構築済みのシステムをアップグレード
オンライン決済
概要ユースケースを見つける
Payment Links を使用する
事前構築済みの決済ページを使用する
Elements を使用したカスタム統合の構築
アプリ内実装を構築
Managed Payments を使用する
継続課金
対面決済
Terminal
決済手段
決済手段を追加
決済手段を管理
Link による購入の迅速化
決済業務
アナリティクス
残高と売上処理にかかる期間
コンプライアンスとセキュリティ
通貨
支払い拒否
不審請求の申請
Radar の不正防止
    概要
    Radar の仕組み
    不正利用シグナルの最適化
    不正利用データをキャプチャする
    リスク評価
    顧客乱用調査
    複数の決済代行業者の Rader スコア
    リスク管理と設定
    審査
    リスト
    ルール
    地域固有の決済手段
    Radar アナリティクス
    Radar for Platforms
    不正利用について
入金
領収書返金とキャンセル
高度な連携システム
カスタムの決済フロー
柔軟なアクワイアリング
オフセッション決済
複数の決済代行業者のオーケストレーション
決済以外の機能
会社を設立する
暗号資産
エージェント型コマース
M2M 決済
Financial Connections
Climate
本人確認
アメリカ
日本語
  1. ホーム/
  2. 決済管理/
  3. Radar fraud protection

メモ

このページはまだ日本語ではご利用いただけません。より多くの言語で文書が閲覧できるように現在取り組んでいます。準備が整い次第、翻訳版を提供いたしますので、もう少しお待ちください。

リスク管理

Radar for Teams を使用して、不正使用をブロックする度合いを調整することができます。

Stripe Radar lets you choose a risk setting that automatically adjusts your protection thresholds based on your business needs and tolerance. Based on the risk setting you choose, we recommend the risk controls that help protect against fraud.

リスク設定

Risk settings let you balance authorization and fraud on your account by using risk controls. These risk controls set different thresholds to block payments that might result in fraudulent disputes or early fraud warnings. Certain risk settings also recommend that you enable or disable additional risk controls, such as adaptive 3DS, to help protect your account from fraud while allowing non-fraudulent payments.

On the risk controls page, you can choose or modify your risk setting from the options below. You might need to upgrade your plan to adjust your risk setting.

  • Maximize protection: Prioritize protecting your business against fraud by blocking payments that are likely to receive early fraud warnings.
  • Balance risk and revenue: Balance protecting your business against fraud with tolerating some risk.
  • Maximize revenue: Prioritize revenue by blocking high-risk payments, which can help minimize losses because of fraud.

When you change your risk setting, the modal displays the impact to payments with the following statistics. The numbers shown are estimated projections based on your last four months of payment data.

指標説明
FraudThe estimated payments this setting blocks before they become fraudulent disputes or early fraud warnings.
PaymentsThe estimated payments and percentage change your business accepts, based on what this setting allows.

Adjust your blocking preference using risk settings

Beginning March 1, 2026, existing Radar for Fraud Teams users can change blocking preferences using risk settings, instead of the default risk thresholds. If you previously set a risk score block threshold, the Block if :risk_level: = 'highest' default rule is likely still enabled. If this is the case, you won’t see the option to change your risk score threshold on the risk controls page.

If you want to change your default block threshold, you can do either of the following:

  • (Recommended) Modify your risk setting. Changing your risk setting alters the enabled risk controls and the thresholds set for each control. Each risk control uses individualized machine learning to improve cost and fraud protection on your behalf. When you first enable a risk setting, Stripe disables the corresponding high risk block rule that uses risk score.
  • (Legacy) For users on Radar for Fraud Teams, you can still write custom rules on the risk score, but we don’t recommend this method for most users.

リスク管理

Risk controls use AI to protect your account. You enable them on your account to block payments that might result in fraudulent disputes or early fraud warnings. Risk settings determine which risk controls are enabled and recommend additional risk controls, such as adaptive 3DS.

Risk settings automatically manage the blocking thresholds for risk controls, so you can’t adjust a threshold manually. To block more or less traffic from a risk control, you can change your risk setting, which automatically changes the blocking threshold for the risk control, but doesn’t allow you to select your own threshold.

Risk controls and risk settings won’t override the custom rules you created. You can continue to update your controls, settings, and rules at any time.

You can find the following controls on the risk controls page in the Dashboard.

不審請求の申し立て

This risk control dynamically blocks payments that are likely to result in fraudulent disputes. Radar determines the number of payments to block versus accept based on your risk setting, and maximizes conversion while preventing the risk of entering monitoring programs.

To change how much this control blocks, change your risk setting.

Early fraud warning

This risk control determines which payments are likely to result in an early fraud warning. Radar determines the threshold based on your risk preferences, and maximizes conversion while preventing the risk of entering monitoring programs.

This control is only available if you choose the Maximize protection risk setting. We recommend turning on this setting if you’re in a card brand monitoring program, which counts early fraud warnings toward the VAMP monitoring program.

適応型 3DS

Radar’s adaptive 3D Secure (3DS) authentication control adds an extra layer of authentication during checkout to help protect against fraud. Stripe runs machine learning in the background to authenticate medium-risk payments.

In most cases, 3DS authentication happens with no action required by your customer. If the customer’s bank detects anything unusual, they might ask the customer to confirm their identity through a security challenge. If 3DS authenticates a payment, the liability for any fraud-related disputes for that payment typically shifts from your business to the issuer. This means that in most cases, the seller isn’t responsible for fraud costs on 3DS-authenticated payments.

Stripe activates 3DS automatically, if required by a regulatory mandate such as Strong Customer Authentication (SCA). Disabling adaptive 3DS doesn’t prevent 3DS from activating when required for compliance. Authentication fraud prevention control isn’t available in testing environments.

Risk score Deprecated

Stripe Radar gives each payment a numerical risk score between 0 and 99, where 0 is the lowest risk and 99 is the highest. This risk score is the probability that a payment results in a fraudulent dispute or early fraud warning.

メモ

Adjusting the risk score applies to card, ACH, and SEPA Direct Debit payments. You can select a specific payment method to test different thresholds and view affected payments.

Block payments

Radar is deprecating the high risk block rule that uses risk score to block payments. To change your block preference, you must use risk settings, which use separate models to block payments. When you select a risk setting, your default high risk block rule is disabled and you can’t re-enable it.

If you use Radar for Fraud Teams and want to block payments based on the risk score (even after selecting a risk setting) you can continue writing custom rules on :risk_score:.

参照情報

  • Access risk evaluations
  • Review card payments
  • Optimize fraud signals
このページはお役に立ちましたか。
はいいいえ
  • お困りのことがございましたら 、サポートにお問い合わせください。
  • Discord で Stripe の開発者とチャットしてください。
  • 変更ログをご覧ください。
  • ご不明な点がございましたら、お問い合わせください。
  • LLM は llms.txt を参照してください。
  • Powered by Markdoc
このページの内容