CN110163761B - Suspicious item member identification method and device based on image processing - Google Patents

Suspicious item member identification method and device based on image processing Download PDF

Info

Publication number
CN110163761B
CN110163761B CN201910238911.0A CN201910238911A CN110163761B CN 110163761 B CN110163761 B CN 110163761B CN 201910238911 A CN201910238911 A CN 201910238911A CN 110163761 B CN110163761 B CN 110163761B
Authority
CN
China
Prior art keywords
images
suspicious
image
case
members
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910238911.0A
Other languages
Chinese (zh)
Other versions
CN110163761A (en
Inventor
王修坤
程丹妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ANT Financial Hang Zhou Network Technology Co Ltd
Original Assignee
ANT Financial Hang Zhou Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ANT Financial Hang Zhou Network Technology Co Ltd filed Critical ANT Financial Hang Zhou Network Technology Co Ltd
Priority to CN201910238911.0A priority Critical patent/CN110163761B/en
Publication of CN110163761A publication Critical patent/CN110163761A/en
Application granted granted Critical
Publication of CN110163761B publication Critical patent/CN110163761B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Finance (AREA)
  • Evolutionary Computation (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Evolutionary Biology (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Image Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides a suspicious item member identification method and device based on image processing, wherein the suspicious item member identification method based on the image processing comprises the following steps: acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project; extracting feature vectors of the case auditing images in the case auditing image set; determining the image similarity between the case auditing images according to the feature vector; clustering the case review images based on the similarity weights determined by the image similarity; and determining suspicious project members in the project members according to the clustering result of the clusters. According to the suspicious item member identification method based on image processing, suspicious item members are determined in a case auditing image set submitted by the item members based on the similarity of the case auditing images, suspicious group partners are defined on the basis of the suspicious item members, and generalized suspicious group partner identification capacity is established, so that the probability of group partner in the item is reduced.

Description

Suspicious item member identification method and device based on image processing
Technical Field
The application relates to the technical field of image processing, in particular to a suspicious item member identification method based on image processing. The present application also relates to an image processing-based suspicious item member identification apparatus, a computing device, and a computer-readable storage medium.
Background
As public awareness of risk resistance increases, insurance becomes an investment option for more and more people. The wind control is an important link of normal development of insurance business, the wind control of the insurance growing in the Internet environment is more important, and the claim checking link in the wind control of the insurance refers to judging whether the claim accords with the insurance guarantee clause or not, so that the wind control is one of core means for preventing and controlling cheating insurance. The insurance claim links generally require users to upload claim materials, and a plurality of illegal profit organizations form a cheating insurance partner by recruiting volunteers, and most of the claim materials uploaded by the cheating insurance partner have a certain commonality.
In the prior art, the partner identification method of the wind control scene is based on the fact relation, wherein the fact relation refers to the fund transfer relation, the communication relation, the address book relation, the equipment relation and the like among project members participating in the insurance project, and the purpose of determining the cheating insurance partner is achieved by judging whether the fact relation exists among the project members. However, many of today's spoofed partner members use the network as a contact means and thus cannot be identified by a partner identification scheme based on a factual relationship, which has certain drawbacks.
Disclosure of Invention
In view of this, the embodiments of the present application provide a suspicious item member identification method based on image processing, so as to solve the technical defects existing in the prior art. The embodiment of the application also provides a suspicious item member identification device based on image processing, a computing device and a computer readable storage medium.
The embodiment of the application discloses a suspicious item member identification method based on image processing, which comprises the following steps:
acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project;
extracting feature vectors of the case auditing images in the case auditing image set;
determining the image similarity between the case auditing images according to the feature vector;
clustering the case review images based on the similarity weights determined by the image similarity;
and determining suspicious project members in the project members according to the clustering result of the clusters.
Optionally, the extracting the feature vector of the case review image in the case review image set includes:
and inputting the case auditing image into a pre-trained deep learning model for image vectorization processing, and outputting the feature vector of the case auditing image.
Optionally, the determining the image similarity between the case review images according to the feature vector includes:
and calculating the image similarity between the case auditing images by using a word frequency inverse text frequency index algorithm according to the feature vector.
Optionally, the determining the image similarity between the case review images according to the feature vector includes:
and determining the image similarity between the case auditing images based on the vector distance between the feature vectors of the case auditing images.
Optionally, the clustering the case review image based on the similarity weight determined by the image similarity includes:
constructing a communication graph, establishing a one-to-one correspondence between the case auditing images and nodes in the communication graph, and taking a logarithmic value of the image similarity between the case auditing images as an edge weight between the nodes corresponding to the case auditing images;
and inputting the connected graph into a clustering model for clustering, and outputting the clustering identification of the case auditing image.
Optionally, the determining suspicious item members in the item members according to the clustering result of the clustering includes:
Determining the case auditing images with the same cluster identifier as suspicious images;
determining that the submission of the suspicious image is a suspicious one of the item members.
Optionally, after the step of determining suspicious item members in the item members according to the clustering result of the clustering is performed, the method includes:
and determining the set of submitters of the case auditing images with the same cluster identifier in the suspicious image as suspicious group partners.
Optionally, after the step of determining suspicious item members in the item members according to the clustering result of the clustering is performed, the method further includes:
acquiring the factual relationship of the suspicious item members;
determining that the item member with the actual factual relationship is an untrusted item member from the suspicious item members based on the factual relationship;
and determining a member set submitted with the case audit image with the same cluster identifier in the untrusted project members as a suspicious group partner.
Optionally, before the step of acquiring the case auditing image set composed of the case auditing images submitted by the project members participating in the project is executed, the method further includes:
acquiring a factual relationship of the project members;
Determining item members having actual factual relationships based on the factual relationships;
correspondingly, in the case auditing image set step of acquiring case auditing images submitted by project members participating in a project, the case auditing images of the project members with actual facts are acquired to form the case auditing image set.
Optionally, the factual relationship of the item members includes at least one of:
and fund transfer relationship, communication relationship, address book relationship and equipment relationship among the project members.
Optionally, the deep learning model is constructed based on any one of the following neural networks:
convolutional neural network, deep neural network.
Optionally, the clustering model is based on any one of the following algorithms:
label propagation algorithm, maximum connectivity graph algorithm.
The application provides a suspicious item member identification device based on image processing, which comprises:
the case auditing image set acquisition module is configured to acquire a case auditing image set composed of case auditing images submitted by project members participating in a project;
the feature vector extraction module is configured to extract feature vectors of the case auditing images in the case auditing image set;
An image similarity determining module configured to determine image similarity between the case review images according to the feature vector;
a clustering module configured to cluster the case review images based on the similarity weights determined by the image similarities;
and the suspicious item member determining module is configured to determine suspicious item members in the item members according to the clustering result of the clustering.
The present application provides a computing device comprising:
a memory and a processor;
the memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project;
extracting feature vectors of the case auditing images in the case auditing image set;
determining the image similarity between the case auditing images according to the feature vector;
clustering the case review images based on the similarity weights determined by the image similarity;
and determining suspicious project members in the project members according to the clustering result of the clusters.
The present application provides a computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the suspicious item membership identification method based on image processing.
Compared with the prior art, the application has the following advantages:
the application provides a suspicious item member identification method based on image processing, which comprises the following steps: acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project; extracting feature vectors of the case auditing images in the case auditing image set; determining the image similarity between the case auditing images according to the feature vector; clustering the case review images based on the similarity weights determined by the image similarity; and determining suspicious project members in the project members according to the clustering result of the clusters.
According to the suspicious item member identification method based on image processing, image similarity calculation is conducted on the case auditing images in the case auditing image set, and image clustering operation is conducted on the case auditing images according to the image similarity calculation result, so that the case auditing images with similarity are marked with the same identification, suspicious item members with the possibility of cheating and guaranteeing are identified according to the identification, and the occurrence probability of cheating and guaranteeing is reduced.
Drawings
FIG. 1 is a flowchart of a suspicious item member identification method based on image processing according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a suspicious item member identification procedure based on image processing according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a suspicious item member identification device based on image processing according to an embodiment of the present application;
fig. 4 is a block diagram of a computing device provided in an embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is, however, susceptible of embodiment in many other ways than those herein described and similar generalizations can be made by those skilled in the art without departing from the spirit of the application and the application is therefore not limited to the specific embodiments disclosed below.
The terminology used in the one or more embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the specification. As used in this specification, one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of this specification to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
The application provides a suspicious item member identification method based on image processing, and also provides a suspicious item member identification device based on image processing, a computing device and a computer readable storage medium. The following detailed description, together with the drawings of the embodiments provided herein, respectively, describes the steps of the method one by one.
The embodiment of the suspicious item member identification method based on image processing provided by the application is as follows:
referring to fig. 1, a flowchart of a suspicious item member identification method based on image processing according to the present embodiment is shown; referring to fig. 2, a schematic diagram of a suspicious item member identification procedure based on image processing according to the present embodiment is shown.
Step S102, a case auditing image set composed of case auditing images submitted by project members participating in a project is obtained.
The insurance claim link generally requires the user to upload claim materials, such as real figures, and takes car insurance as an example, the insurance company can require the user to submit the appearance figures of the damaged vehicles so as to judge whether the claim application submitted by the user accords with the insurance guarantee clause. The project members participating in the project are users participating in the insurance project, and the case auditing images are physical pictures in claim materials submitted by the users participating in the insurance project, such as appearance pictures of damaged vehicles, traffic accident scene pictures and the like. In practical application, the claim-settling pictures uploaded by the claim-settling partners have similarity to a certain extent, so that the claim-settling partners can be identified by analyzing the claim-settling pictures, and the probability of occurrence of the claim-settling conditions of the claim-settling partners in the insurance claim-settling links is reduced.
According to the embodiment, the case auditing images in the case auditing image set are subjected to image recognition, so that generalized similarity relations of all the case auditing images in the case auditing image set are obtained, the similarity relations are expressed as that similar case auditing images belong to the same community and are gathered into the same class, suspicious item members are recognized by tracing submitters of the case auditing images belonging to the same community, and further, suspicious group partners can be defined according to communities to which the suspicious item members belong on the basis of recognizing the suspicious item members, so that the occurrence of cheating protection conditions is prevented.
For the purpose of reducing the calculation amount of image recognition, the range of the image recognition object may be narrowed before the image recognition is performed, and in a preferred implementation provided in the embodiment of the present application, before the case review image set composed of the case review images submitted by the project members of the participating project is acquired, the range of the image recognition object is narrowed by the following implementation manner:
acquiring a factual relationship of the project members;
determining item members having actual factual relationships based on the factual relationships;
correspondingly, in the process of acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project, acquiring the case auditing images of the project members with actual facts, and composing the case auditing image set.
According to the implementation mode, firstly, screening is conducted on the project members based on whether the project members have actual fact relations, then, the case auditing image set formed by the case auditing images submitted by the project members with the actual fact relations is obtained, and image recognition is conducted on the basis of the case auditing image set formed, so that the image recognition range is reduced, and meanwhile, the possibility of recognizing suspicious project members is higher.
Wherein the factual relationship of the item members includes at least one of: and fund transfer relationship, communication relationship, address book relationship and equipment relationship among the project members.
The partner members participating in the cheating and guaranteeing the partner can carry out transaction exchange and intercommunication information through a certain medium in actual application, have funds transfer transaction records, communicate through communication equipment, the opposite sides are address book contacts, the multiple parties use the same login equipment, and the like, and all the parties belong to the fact relation, wherein the fact relation means that the project members are detected to have at least one relation in the fact relation, and the project members with the fact relation are judged to be suspicious project members under the condition that the project members are identified to submit case audit images belonging to the same community.
And step S104, extracting the characteristic vector of the case auditing image in the case auditing image set.
In practical application, the number of claim settlement pictures obtained by an insurance company in an insurance claim settlement link in a verification process is relatively large, so as to improve image processing efficiency, and in a preferred implementation manner provided in the embodiment of the application, the extracting feature vectors of the case audit images in the case audit image set includes: and inputting the case auditing image into a pre-trained deep learning model for image vectorization processing, and outputting the feature vector of the case auditing image.
In the process of calculating the similarity of the case auditing images, the images are required to be subjected to vectorization processing, the process of converting the images into vectors is realized based on a deep learning model, the deep learning model is a model which is trained by training samples in advance, the case auditing images are used as input quantities and are input into the deep learning model, and the output of the model is the feature vector of the case auditing images.
The deep learning model is preferably constructed based on a convolutional neural network (CNN, convolutional Neural Network) or a deep neural network (DNN, deep Neural Network), but other neural networks may be used, and the embodiment is not limited thereto.
And S106, determining the image similarity between the case auditing images according to the feature vectors.
In a preferred implementation manner provided in the embodiments of the present application, the determining, according to the feature vector, the image similarity between the case review images includes: and calculating the image similarity between the case auditing images by using a word Frequency inverse text Frequency index (TF-IDF, term Frequency-Inverse Document Frequency) algorithm according to the feature vector.
The word frequency inverse text frequency index algorithm is a statistical method, and an object is used for texts to evaluate the importance degree of a word to one document in a document set or a corpus.
In a preferred implementation manner provided in the embodiments of the present application, the determining, according to the feature vector, the image similarity between the case review images includes: and determining the image similarity between the case auditing images based on the vector distance between the feature vectors of the case auditing images.
The vector distance between the feature vectors of the case auditing image comprises at least one of the following: euclidean distance, cosine distance; the cosine distance is characterized in that the cosine value is close to 1, the included angle tends to be 0, and the image similarity is higher as the two vectors are more similar, and the Euclidean distance is characterized in that the smaller the Euclidean distance is, the more similar the two vectors are, and the higher the image similarity is.
And S108, clustering the case auditing images based on the similarity weight determined by the image similarity.
In a preferred implementation manner provided in the embodiments of the present application, the clustering the case review images based on the similarity weights determined by the image similarity includes:
constructing a communication graph, establishing a one-to-one correspondence between the case auditing images and nodes in the communication graph, and taking a logarithmic value of the image similarity between the case auditing images as an edge weight between the nodes corresponding to the case auditing images;
and inputting the connected graph into a clustering model for clustering, and outputting the clustering identification of the case auditing image.
Preferably, the clustering model is preferably implemented based on a label propagation algorithm (LPA, label Propagation Algorithm) or a maximum connectivity graph algorithm, but other algorithms may be used, which is not limited herein.
Taking the implementation of the clustering model based on a label propagation algorithm as an example, the clustering step is described:
the method comprises the steps that a clustering model is input into a communication graph constructed based on case auditing images and image similarity, in particular, in the process of constructing the communication graph, a one-to-one correspondence is established between nodes contained in the communication graph and the case auditing images, each node contains an image number corresponding to the case auditing image, the obtained image similarity between the case auditing images is taken as a logarithmic value to serve as edge weight between the case auditing image corresponding nodes, and the construction of the communication graph required by the clustering model is completed.
The clustering model is based on a label propagation algorithm, and the application scene of the label propagation algorithm is as follows: community discovery in the traditional sense refers to a group of nodes in a network with larger similarity, so that an internal connection is compact, an external sparse group structure is formed, a process of searching a community structure of a given network diagram is called community discovery, and a process of community discovery is a clustering process in general; the basic idea of the tag propagation algorithm is: the label with the largest number in the labels of the neighbor nodes of one node is used as the label of the node, specifically, each node is added with the label to represent the community to which the node belongs, and the community structure of the same label is formed through the propagation of the label.
The propagation process of the tag propagation algorithm can be summarized as:
1) Initially, each node is given a unique tag;
2) Each node uses the most tags in the tags of the neighbor nodes to update the own tag;
3) Step 2) is repeatedly performed until no more changes in the label of each node occur.
Inputting the connected graph into the clustering model to run a label propagation algorithm for clustering, dividing the case auditing images into communities, and outputting labels representing each community after division, wherein the labels are the clustering identifications of the case auditing images.
And step S110, determining suspicious ones of the item members according to the clustering result of the clusters.
In a preferred implementation manner provided in the embodiment of the present application, the determining a suspicious item member among the item members according to the clustering result of the clustering includes:
determining the case auditing images with the same cluster identifier as suspicious images;
determining that the submission of the suspicious image is a suspicious one of the item members.
In the step of constructing the connected graph, the image similarity between the case auditing images is taken as a logarithmic value to be used as the edge weight between the nodes corresponding to the case auditing images, so that the case auditing images with high similarity between the case auditing images are also high in weight of the edges of the corresponding nodes in the connected graph, the nodes are more tightly connected, the same community is easier to form, the clustering identification of the case auditing images output by the clustering model can be used as a standard for dividing the community, the case auditing images with the same clustering identification belong to the same community, the case auditing images are determined to be suspicious images, and accordingly, the suspicious images are submitted to suspicious item members in the item members.
Preferably, after the step of determining suspicious item members among the item members according to the clustering result of the clustering is performed, the method includes: and determining the set of submitters of the case auditing images with the same cluster identifier in the suspicious image as suspicious group partners.
After the suspicious item members are determined, the case auditing images with the same clustering identification form the same community according to the clustering result, and a group consisting of submitters corresponding to the case auditing images in the same community is likely to be suspicious group partners.
In a preferred implementation manner provided in this embodiment of the present application, after determining suspicious item members among the item members according to the clustering result of the clustering, on the basis of the clustering result obtained by the clustering, whether the suspicious item members are from the same spoofing party may also be determined by analyzing the factual relationship, which is specifically implemented as follows:
1) Acquiring the factual relationship of the suspicious item members;
2) Determining that the item member with the actual factual relationship is an untrusted item member from the suspicious item members based on the factual relationship;
3) And determining a member set submitted with the case audit image with the same cluster identifier in the untrusted project members as a suspicious group partner.
After determining the suspicious item members, screening the item members with actual fact relationships as unreliable item members based on the obtained fact relationships of the suspicious item members, wherein the graph clustering operation firstly realizes the first round of screening, screens case auditing images divided into the same community, submitters of the case auditing images have suspicions of group cheating, and secondly judges whether the suspicious item members have actual relationships in real life by judging whether the suspicious item members have the actual relationships or not, and through the two rounds of screening, the screened item members simultaneously have two conditions that submitted case auditing images are the suspicious images and the fact relationships among the item members exist, and the accuracy of the cheating security group counseling formed by the set of the unreliable item members is determined to be higher on the basis.
The suspicious item member identification method based on image processing provided by the application is further described with reference to fig. 2, and the method is specifically implemented as follows:
step S202, N claim pictures uploaded by a user are acquired in an insurance claim link.
The insurance claim link generally requires the user to upload claim materials, such as claim pictures, and the insurance company analyzes the claim materials to determine whether the user meets the claim conditions. In this embodiment, suspicious item members are identified based on an image processing technology, first, N claim pictures uploaded by a user need to be acquired, where the N claim pictures are respectively expressed as: image1, image2, image3, … …, imageN.
And S204, extracting the characteristic vectors of the N claim pictures by using a deep learning model.
Based on the problems of large number of the claim pictures and large occupied calculation space, N claim pictures are uniformly processed by adopting a model, so that the image processing efficiency is improved. The method is characterized in that Image clustering operation is carried out according to Image similarity among claim pictures, in the process of calculating the Image similarity, vectorization processing is needed to be carried out on the images, the process of converting the images into vectors is realized based on an open-source deep learning framework, specifically, under the deep learning framework, a deep learning model is built and trained in advance by utilizing a convolutional neural network, and feature vectors of each of Image1 to Image N are obtained by inputting the claim pictures of the Image1 to the Image N into the deep learning model.
Step S206, calculating the image similarity between the N claim pictures by using a word frequency inverse text frequency index algorithm.
And carrying out vectorization operation on the N claim pictures to obtain corresponding feature vectors, and then calculating the image similarity between the claim pictures by adopting a word frequency inverse text frequency index algorithm as the basis of the picture clustering operation.
And step S208, clustering the N claim pictures by using a label propagation algorithm.
Specifically, the clustering operation of the claim-settling pictures is performed by a clustering model, and an algorithm adopted by the clustering model in the clustering process is a label propagation algorithm, and the steps are as follows:
1) Constructing a connected graph, wherein the N claim pictures Image1 to Image N correspond to nodes in the connected graph one by one, the corresponding nodes can be marked as Image1, image2, image3, … … and Image N, and the Image similarity among the N claim pictures takes a logarithmic value as edge weight among the nodes corresponding to the claim pictures;
2) Inputting the connected graph into a clustering model, obtaining the labels of the nodes by using a label propagation algorithm, wherein the nodes corresponding to the claim pictures with higher similarity have the same labels and are gathered into the same type.
Step S210, determining suspicious item members.
And taking the identification of the claim-settling pictures output by the clustering model as a standard for dividing communities, dividing the claim-settling pictures with the same clustering identification into the same communities, determining the claim-settling pictures with community attributes as suspicious pictures, and determining that the submission of the suspicious pictures is a suspicious project member.
Step S212, obtaining the factual relationship of the suspicious item members.
After the suspicious item members are determined, whether the suspicious item members are suspicious or not can be further judged through the fact relation among the suspicious item members, wherein the fact relation comprises fund transfer relation, communication relation, address book relation, equipment relation and the like among the item members, and the suspicious item members with fund transfer transaction records, communication through the communication equipment, mutual address book contact of the other party, the behavior that multiple parties use the same login equipment and the like are recognized as the fact relation.
Step S214, determining that the item member with the actual factual relation is an untrusted item member in the suspicious item members.
After the suspicious item members with similarity of the submitted claim-settling pictures are screened out through clustering operation of the claim-settling pictures, if the suspicious item members have a fact relation at the same time, the suspicious item members are more likely to participate in cheating protection, so that the item members with the fact relation can be screened out of the suspicious item members based on the fact relation to serve as unreliable item members.
Step S216, determining the member set of the claim image submitted by the member of the untrustworthy project and provided with the same label as a suspicious group partner.
The determined unreliable project members in the project members have great suspicion of cheating, while the project members belonging to the same cheating party mostly have similarity in some aspects and are easy to identify the same label, so that the collection of the member components of the claim images with the same label submitted in the unreliable project members can be determined to be suspicious, according to the clustering result obtained before.
The embodiment of the suspicious item member identification device based on image processing provided by the application is as follows:
In the foregoing embodiments, a method for identifying suspicious item members based on image processing is provided, and accordingly, the present application also provides a suspicious item member identification device based on image processing, which is described below with reference to the accompanying drawings.
Referring to fig. 3, a schematic diagram of an embodiment of a suspicious item member identification device based on image processing is provided.
Since the apparatus embodiments are substantially similar to the method embodiments, the description is relatively simple, and reference should be made to the corresponding descriptions of the method embodiments provided above for relevant parts. The device embodiments described below are merely illustrative.
The application provides a suspicious item member identification device based on image processing, which comprises:
the case review image set acquisition module 302 is configured to acquire a case review image set composed of case review images submitted by project members participating in a project;
a feature vector extraction module 304 configured to extract feature vectors of the case review images in the case review image set;
an image similarity determination module 306 configured to determine image similarity between the case review images from the feature vectors;
A clustering module 308 configured to cluster the case review images based on the similarity weights determined by the image similarities;
a suspicious item member determination module 310 configured to determine suspicious item members from the item members based on the clustering results of the clustering.
Optionally, the feature vector extraction module 304 is specifically configured to input the case review image into a pre-trained deep learning model to perform image vectorization processing, and output a feature vector of the case review image.
Optionally, the image similarity determining module 306 is specifically configured to calculate, according to the feature vector, the image similarity between the case review images by using a word frequency inverse text frequency index algorithm.
Optionally, the image similarity determining module 306 is specifically configured to determine the image similarity between the case review images based on the vector distance between the feature vectors of the case review images.
Optionally, the clustering module 308 includes:
the communication diagram construction submodule is configured to construct a communication diagram, establish a one-to-one correspondence between the case auditing images and nodes in the communication diagram, and take the logarithmic value of the image similarity between the case auditing images as the edge weight between the nodes corresponding to the case auditing images;
And the cluster identifier output module is configured to input the connected graph into a cluster model for clustering and output the cluster identifier of the case auditing image.
Optionally, the suspicious item member determination module 310 includes:
a suspicious image determination submodule configured to determine that the case review images having the same cluster identity are suspicious images;
a suspicious item member determination submodule configured to determine that submission of the suspicious image is a suspicious item member of the item members.
Optionally, the suspicious item member identification device based on image processing further includes:
a first suspicious group partner determination module configured to determine that a set of submitters of the case review images having the same cluster identity in the suspicious image is a suspicious group partner.
Optionally, the suspicious item member identification device based on image processing further includes:
a second factual relationship acquisition module configured to acquire a factual relationship of the suspicious item members;
an untrusted item member determination module configured to determine, among the suspicious item members, that an item member having an actual factual relationship is an untrusted item member based on the factual relationship;
A second suspicious group partner determination module configured to determine that a set of members of the untrusted item members submitting the case audit image having the same cluster identity are suspicious group partners.
Optionally, the suspicious item member identification device based on image processing further includes:
a first factual relationship acquisition module configured to acquire a factual relationship of the item members;
a case review image acquisition object determination module configured to determine item members having actual factual relationships based on the factual relationships;
correspondingly, the case review image set obtaining module 302 is specifically configured to obtain case review images of the project members with actual facts, so as to form the case review image set.
Optionally, the factual relationship of the item members includes at least one of:
and fund transfer relationship, communication relationship, address book relationship and equipment relationship among the project members.
Optionally, the deep learning model is constructed based on any one of the following neural networks:
convolutional neural network, deep neural network.
Optionally, the clustering model is based on any one of the following algorithms:
Label propagation algorithm, maximum connectivity graph algorithm.
An embodiment of a computing device provided herein is as follows:
fig. 4 is a block diagram illustrating a configuration of a computing device 400 according to an embodiment of the present description. The components of the computing device 400 include, but are not limited to, a memory 410 and a processor 420. Processor 420 is coupled to memory 410 via bus 430 and database 450 is used to hold data.
Computing device 400 also includes access device 440, access device 440 enabling computing device 400 to communicate via one or more networks 460. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. The access device 440 may include one or more of any type of network interface, wired or wireless (e.g., a Network Interface Card (NIC)), such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 400, as well as other components not shown in FIG. 4, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device shown in FIG. 4 is for exemplary purposes only and is not intended to limit the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 400 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 400 may also be a mobile or stationary server.
The present application provides a computing device comprising a memory 410, a processor 420, and computer instructions stored on the memory and executable on the processor, the processor 420 for executing computer executable instructions to:
acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project;
extracting feature vectors of the case auditing images in the case auditing image set;
determining the image similarity between the case auditing images according to the feature vector;
clustering the case review images based on the similarity weights determined by the image similarity;
And determining suspicious project members in the project members according to the clustering result of the clusters.
Optionally, the extracting the feature vector of the case review image in the case review image set includes:
and inputting the case auditing image into a pre-trained deep learning model for image vectorization processing, and outputting the feature vector of the case auditing image.
Optionally, the determining the image similarity between the case review images according to the feature vector includes:
and calculating the image similarity between the case auditing images by using a word frequency inverse text frequency index algorithm according to the feature vector.
Optionally, the determining the image similarity between the case review images according to the feature vector includes:
and determining the image similarity between the case auditing images based on the vector distance between the feature vectors of the case auditing images.
Optionally, the clustering the case review image based on the similarity weight determined by the image similarity includes:
constructing a communication graph, establishing a one-to-one correspondence between the case auditing images and nodes in the communication graph, and taking a logarithmic value of the image similarity between the case auditing images as an edge weight between the nodes corresponding to the case auditing images;
And inputting the connected graph into a clustering model for clustering, and outputting the clustering identification of the case auditing image.
Optionally, the determining suspicious item members in the item members according to the clustering result of the clustering includes:
determining the case auditing images with the same cluster identifier as suspicious images;
determining that the submission of the suspicious image is a suspicious one of the item members.
Optionally, after the step of determining suspicious item members in the item members according to the clustering result of the clustering is performed, the method includes:
and determining the set of submitters of the case auditing images with the same cluster identifier in the suspicious image as suspicious group partners.
Optionally, after the step of determining suspicious item members in the item members according to the clustering result of the clustering is performed, the method further includes:
acquiring the factual relationship of the suspicious item members;
determining that the item member with the actual factual relationship is an untrusted item member from the suspicious item members based on the factual relationship;
and determining a member set submitted with the case audit image with the same cluster identifier in the untrusted project members as a suspicious group partner.
Optionally, before the step of acquiring the case auditing image set composed of the case auditing images submitted by the project members participating in the project is executed, the method further includes:
acquiring a factual relationship of the project members;
determining item members having actual factual relationships based on the factual relationships;
correspondingly, in the case auditing image set step of acquiring case auditing images submitted by project members participating in a project, the case auditing images of the project members with actual facts are acquired to form the case auditing image set.
Optionally, the factual relationship of the item members includes at least one of:
and fund transfer relationship, communication relationship, address book relationship and equipment relationship among the project members.
Optionally, the deep learning model is constructed based on any one of the following neural networks:
convolutional neural network, deep neural network.
An embodiment of the present application also provides a computer-readable storage medium storing computer instructions that, when executed by a processor, implement:
acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project;
Extracting feature vectors of the case auditing images in the case auditing image set;
determining the image similarity between the case auditing images according to the feature vector;
clustering the case review images based on the similarity weights determined by the image similarity;
and determining suspicious project members in the project members according to the clustering result of the clusters.
Optionally, the extracting the feature vector of the case review image in the case review image set includes:
and inputting the case auditing image into a pre-trained deep learning model for image vectorization processing, and outputting the feature vector of the case auditing image.
Optionally, the determining the image similarity between the case review images according to the feature vector includes:
and calculating the image similarity between the case auditing images by using a word frequency inverse text frequency index algorithm according to the feature vector.
Optionally, the determining the image similarity between the case review images according to the feature vector includes:
and determining the image similarity between the case auditing images based on the vector distance between the feature vectors of the case auditing images.
Optionally, the clustering the case review image based on the similarity weight determined by the image similarity includes:
constructing a communication graph, establishing a one-to-one correspondence between the case auditing images and nodes in the communication graph, and taking a logarithmic value of the image similarity between the case auditing images as an edge weight between the nodes corresponding to the case auditing images;
and inputting the connected graph into a clustering model for clustering, and outputting the clustering identification of the case auditing image.
Optionally, the determining suspicious item members in the item members according to the clustering result of the clustering includes:
determining the case auditing images with the same cluster identifier as suspicious images;
determining that the submission of the suspicious image is a suspicious one of the item members.
Optionally, after the step of determining suspicious item members in the item members according to the clustering result of the clustering is performed, the method includes:
and determining the set of submitters of the case auditing images with the same cluster identifier in the suspicious image as suspicious group partners.
Optionally, after the step of determining suspicious item members in the item members according to the clustering result of the clustering is performed, the method further includes:
Acquiring the factual relationship of the suspicious item members;
determining that the item member with the actual factual relationship is an untrusted item member from the suspicious item members based on the factual relationship;
and determining a member set submitted with the case audit image with the same cluster identifier in the untrusted project members as a suspicious group partner.
Optionally, before the step of acquiring the case auditing image set composed of the case auditing images submitted by the project members participating in the project is executed, the method further includes:
acquiring a factual relationship of the project members;
determining item members having actual factual relationships based on the factual relationships;
correspondingly, in the case auditing image set step of acquiring case auditing images submitted by project members participating in a project, the case auditing images of the project members with actual facts are acquired to form the case auditing image set.
Optionally, the factual relationship of the item members includes at least one of:
and fund transfer relationship, communication relationship, address book relationship and equipment relationship among the project members.
Optionally, the deep learning model is constructed based on any one of the following neural networks:
Convolutional neural network, deep neural network.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the suspicious item member identification method based on image processing belong to the same concept, and details of the technical solution of the storage medium, which are not described in detail, can be referred to the description of the technical solution of the suspicious item member identification method based on image processing.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for the sake of simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all necessary for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The above-disclosed preferred embodiments of the present application are provided only as an aid to the elucidation of the present application. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the application and the practical application, to thereby enable others skilled in the art to best understand and utilize the application. This application is to be limited only by the claims and the full scope and equivalents thereof.

Claims (14)

1. The suspicious item member identification method based on image processing is characterized by comprising the following steps:
acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project;
extracting feature vectors of the case auditing images in the case auditing image set;
determining the image similarity between the case auditing images according to the feature vector;
clustering the case review images based on the similarity weights determined by the image similarity;
determining suspicious item members in the item members according to the clustering result of the clustering;
the determining suspicious ones of the item members according to the clustering result of the clustering includes:
determining the case auditing images with the same cluster identifier as suspicious images;
determining that the submission of the suspicious image is a suspicious one of the item members.
2. The method for identifying suspicious item members based on image processing according to claim 1, wherein said extracting feature vectors of the case review images in the case review image set comprises:
and inputting the case auditing image into a pre-trained deep learning model for image vectorization processing, and outputting the feature vector of the case auditing image.
3. The method for identifying suspicious item members based on image processing according to claim 1, wherein said determining the image similarity between the case review images according to the feature vector comprises:
and calculating the image similarity between the case auditing images by using a word frequency inverse text frequency index algorithm according to the feature vector.
4. The method for identifying suspicious item members based on image processing according to claim 1, wherein said determining the image similarity between the case review images according to the feature vector comprises:
and determining the image similarity between the case auditing images based on the vector distance between the feature vectors of the case auditing images.
5. The method for identifying suspicious item members based on image processing according to claim 1, wherein the clustering the case review images based on the similarity weights determined by the image similarity comprises:
constructing a communication graph, establishing a one-to-one correspondence between the case auditing images and nodes in the communication graph, and taking a logarithmic value of the image similarity between the case auditing images as an edge weight between the nodes corresponding to the case auditing images;
And inputting the connected graph into a clustering model for clustering, and outputting the clustering identification of the case auditing image.
6. The method for identifying suspicious item members based on image processing according to claim 1, wherein after the step of determining suspicious item members among the item members according to the clustering result of the clustering is performed, comprising:
and determining the set of submitters of the case auditing images with the same cluster identifier in the suspicious image as suspicious group partners.
7. The method for identifying suspicious item members based on image processing according to claim 1, wherein after the step of determining suspicious item members among the item members according to the clustering result of the clustering is performed, further comprising:
acquiring the factual relationship of the suspicious item members;
determining that the item member with the actual factual relationship is an untrusted item member from the suspicious item members based on the factual relationship;
and determining a member set submitted with the case audit image with the same cluster identifier in the untrusted project members as a suspicious group partner.
8. The method for identifying suspicious item members based on image processing according to claim 1, wherein before the step of acquiring a case audit image set composed of case audit images submitted by item members participating in the item is performed, further comprising:
Acquiring a factual relationship of the project members;
determining item members having actual factual relationships based on the factual relationships;
correspondingly, in the case auditing image set step of acquiring case auditing images submitted by project members participating in a project, the case auditing images of the project members with actual facts are acquired to form the case auditing image set.
9. The method for identifying suspicious item members based on image processing according to claim 7 or 8, wherein the factual relationship of item members comprises at least one of:
and fund transfer relationship, communication relationship, address book relationship and equipment relationship among the project members.
10. The method for identifying suspicious item members based on image processing according to claim 2, wherein the deep learning model is constructed based on any one of the following neural networks:
convolutional neural network, deep neural network.
11. The method for identifying suspicious item members based on image processing according to claim 5, wherein the clustering model is based on any one of the following algorithms:
Label propagation algorithm, maximum connectivity graph algorithm.
12. A suspicious item member identification apparatus based on image processing, comprising:
the case auditing image set acquisition module is configured to acquire a case auditing image set composed of case auditing images submitted by project members participating in a project;
the feature vector extraction module is configured to extract feature vectors of the case auditing images in the case auditing image set;
an image similarity determining module configured to determine image similarity between the case review images according to the feature vector;
a clustering module configured to cluster the case review images based on the similarity weights determined by the image similarities;
a suspicious item member determination module configured to determine suspicious item members among the item members according to the clustered results of the clusters, wherein the determining suspicious item members among the item members according to the clustered results of the clusters includes:
determining the case auditing images with the same cluster identifier as suspicious images;
determining that the submission of the suspicious image is a suspicious one of the item members.
13. A computing device, comprising:
a memory and a processor;
the memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
acquiring a case auditing image set composed of case auditing images submitted by project members participating in a project;
extracting feature vectors of the case auditing images in the case auditing image set;
determining the image similarity between the case auditing images according to the feature vector;
clustering the case review images based on the similarity weights determined by the image similarity;
determining suspicious ones of the item members according to the clustered results of the clusters, wherein the determining suspicious ones of the item members according to the clustered results of the clusters comprises: determining the case auditing images with the same cluster identifier as suspicious images; determining that the submission of the suspicious image is a suspicious one of the item members.
14. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the method of any one of claims 1 to 11.
CN201910238911.0A 2019-03-27 2019-03-27 Suspicious item member identification method and device based on image processing Active CN110163761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910238911.0A CN110163761B (en) 2019-03-27 2019-03-27 Suspicious item member identification method and device based on image processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910238911.0A CN110163761B (en) 2019-03-27 2019-03-27 Suspicious item member identification method and device based on image processing

Publications (2)

Publication Number Publication Date
CN110163761A CN110163761A (en) 2019-08-23
CN110163761B true CN110163761B (en) 2023-05-12

Family

ID=67638486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910238911.0A Active CN110163761B (en) 2019-03-27 2019-03-27 Suspicious item member identification method and device based on image processing

Country Status (1)

Country Link
CN (1) CN110163761B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111325265B (en) * 2020-02-17 2023-09-01 中国银联股份有限公司 Detection method and device for tampered image

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358596A (en) * 2017-04-11 2017-11-17 阿里巴巴集团控股有限公司 A kind of car damage identification method based on image, device, electronic equipment and system
CN108573286A (en) * 2018-05-10 2018-09-25 阿里巴巴集团控股有限公司 A kind of data processing method, device, equipment and the server of Claims Resolution business
CN108734479A (en) * 2018-04-12 2018-11-02 阿里巴巴集团控股有限公司 Data processing method, device, equipment and the server of Insurance Fraud identification
CN109271418A (en) * 2018-08-14 2019-01-25 阿里巴巴集团控股有限公司 Suspicious clique's recognition methods, device, equipment and computer readable storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8724904B2 (en) * 2011-10-25 2014-05-13 International Business Machines Corporation Anomaly detection in images and videos
US10628890B2 (en) * 2017-02-23 2020-04-21 International Business Machines Corporation Visual analytics based vehicle insurance anti-fraud detection
CN107403424B (en) * 2017-04-11 2020-09-18 阿里巴巴集团控股有限公司 Vehicle loss assessment method and device based on image and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358596A (en) * 2017-04-11 2017-11-17 阿里巴巴集团控股有限公司 A kind of car damage identification method based on image, device, electronic equipment and system
CN108734479A (en) * 2018-04-12 2018-11-02 阿里巴巴集团控股有限公司 Data processing method, device, equipment and the server of Insurance Fraud identification
CN108573286A (en) * 2018-05-10 2018-09-25 阿里巴巴集团控股有限公司 A kind of data processing method, device, equipment and the server of Claims Resolution business
CN109271418A (en) * 2018-08-14 2019-01-25 阿里巴巴集团控股有限公司 Suspicious clique's recognition methods, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN110163761A (en) 2019-08-23

Similar Documents

Publication Publication Date Title
CN111738357B (en) Junk picture identification method, device and equipment
CN112613501A (en) Information auditing classification model construction method and information auditing method
CN110636445B (en) WIFI-based indoor positioning method, device, equipment and medium
US20230401833A1 (en) Method, computer device, and storage medium, for feature fusion model training and sample retrieval
WO2023185539A1 (en) Machine learning model training method, service data processing method, apparatuses, and systems
CN115994226B (en) Clustering model training system and method based on federal learning
CN112348081A (en) Transfer learning method for image classification, related device and storage medium
CN112258254B (en) Internet advertisement risk monitoring method and system based on big data architecture
CN113657087B (en) Information matching method and device
CN112231592A (en) Network community discovery method, device, equipment and storage medium based on graph
CN111127185A (en) Credit fraud identification model construction method and device
CN112258250A (en) Target user identification method and device based on network hotspot and computer equipment
CN114139013A (en) Image searching method and device, electronic equipment and computer readable storage medium
WO2023024408A1 (en) Method for determining feature vector of user, and related device and medium
CN112995414B (en) Behavior quality inspection method, device, equipment and storage medium based on voice call
CN110163761B (en) Suspicious item member identification method and device based on image processing
CN113011966A (en) Credit scoring method and device based on deep learning
CN115221954B (en) User portrait method, device, electronic equipment and storage medium
CN115640401A (en) Text content extraction method and device
CN113011503B (en) Data evidence obtaining method of electronic equipment, storage medium and terminal
CN111552846B (en) Method and device for identifying suspicious relationships
CN113487389A (en) Information recommendation method and device
CN114970670A (en) Model fairness assessment method and device
KR102060110B1 (en) Method, apparatus and computer program for classifying object in contents
CN111275261A (en) Resource flow prediction method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200929

Address after: 27 Hospital Road, George Town, Grand Cayman ky1-9008

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

Effective date of registration: 20200929

Address after: 27 Hospital Road, George Town, Grand Cayman ky1-9008

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: 27 Hospital Road, George Town, Grand Cayman ky1-9008

Applicant before: Advanced innovation technology Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230404

Address after: 801-10, Section B, 8th floor, 556 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province

Applicant after: Ant financial (Hangzhou) Network Technology Co.,Ltd.

Address before: 27 Hospital Road, George Town, Grand Cayman ky1-9008

Applicant before: Innovative advanced technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant