Risk Control System Architecture and Practices at Meituan

Meituan’s risk‑control architecture transforms diverse, high‑volume e‑commerce services into a middleware‑based platform that unifies data collection, combines expert rules with machine‑learning models, and employs a three‑stage defense—pre‑risk, real‑time detection, and post‑incident response—to continuously adapt to evolving fraud threats.

Meituan Technology Team
Meituan Technology Team
Meituan Technology Team
Risk Control System Architecture and Practices at Meituan

This article summarizes a talk from the 8th China System Architect Conference, describing Meituan’s risk control system built to combat black‑industry threats across its diverse e‑commerce services.

Background : Meituan’s rapid expansion from group‑buying to a multi‑vertical platform (food delivery, hotel, travel, etc.) created a large attack surface: millions of users, millions of merchants, and high‑frequency transactions, attracting fraud, fake orders, and account theft.

Risk control challenges include:

Numerous business lines and risk points.

Fast‑changing attack techniques.

Uncertainty about when and how attackers will strike.

System‑building experience is organized around three challenges.

Challenge 1: Business Diversity and Many Risk Points

Risk perception requires collecting complete data (who, when, how, what, action). Controlling risk means focusing on attacker incentives (promotions, merchant ranking, user balance). Integration with over 100 business scenarios and multiple client types (iOS, Android, H5, PC) demands a low‑overhead interface.

To reduce integration burden, Meituan moved the risk‑control logic from a function call to an independent service accessed via a central user‑center, merchant‑center, or payment‑center, turning risk control into middleware.

Challenge 2: Rapid Change

Static rules quickly become ineffective. A robust strategy combines expert‑crafted rules with machine‑learning models, using a “rule platform” that separates scenario, rule, and factor layers, enabling many‑to‑many relationships and dynamic configuration without code changes.

The platform supports synchronous decision APIs and asynchronous data‑collection APIs, and allows runtime selection of strategies via a rule engine.

Challenge 3: Unknown Attackers

Since attackers only need to find a single weak point, Meituan adopts a three‑stage defense: pre‑risk (education, participation, data preparation, proactive protection), real‑time detection (rule platform, verification center), and post‑incident response (case handling, compensation, feedback loops).

Data is categorized into event snapshots, aggregated facts, derived information, and auxiliary base data to support both operational and analytical needs.

Conclusion : A mature risk‑control system requires tight integration, efficient rule execution, a verification service, and continuous feedback. Learning from adversaries and applying systematic, layered defenses are essential for long‑term success.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

risk managementSystem Architecturefraud detectiononline commerce
Meituan Technology Team
Written by

Meituan Technology Team

Over 10,000 engineers powering China’s leading lifestyle services e‑commerce platform. Supporting hundreds of millions of consumers, millions of merchants across 2,000+ industries. This is the public channel for the tech teams behind Meituan, Dianping, Meituan Waimai, Meituan Select, and related services.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.