CN105243588A - Analysis method for insider trading behaviors of securities markets - Google Patents

Analysis method for insider trading behaviors of securities markets Download PDF

Info

Publication number
CN105243588A
CN105243588A CN201510710880.6A CN201510710880A CN105243588A CN 105243588 A CN105243588 A CN 105243588A CN 201510710880 A CN201510710880 A CN 201510710880A CN 105243588 A CN105243588 A CN 105243588A
Authority
CN
China
Prior art keywords
account
data
suspicion
insider
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510710880.6A
Other languages
Chinese (zh)
Inventor
王帅
亓兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510710880.6A priority Critical patent/CN105243588A/en
Publication of CN105243588A publication Critical patent/CN105243588A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention aims to provide an analysis method for insider trading behaviors of securities market. The purpose of the invention is realized by the following technical scheme: the specific implementation method comprises the following steps: step 1), extracting related data required for insider trading analysis; step 2), inputting the extracted data into a data analysis system; step 3), analyzing the data, and filtering the analyzed results based on preset judging criteria; and 4) generating an analysis report, and locking main to-be-investigated personnel. The analysis method, by analyzing the information of call records, address lists, bank transaction flow, securities trading flow, trading hardware information and the like of information insiders and suspicious accounts, judges whether two parties have insider trading behaviors or not.

Description

A kind of securities market insider trading behavior analysis method
Technical field
The invention belongs to data analysis and digging technology field, particularly relate to the method that log in securities market insider trading, address list, bank capital flowing water, security exchange flowing water and transaction hardware information etc. are analyzed.
Background technology
Along with the fast development of Chinese capital market, securities futures trading activity is increasingly active.With the development and progression of securities and futures market, the insider trading behavior on market also grows in intensity, the grievous injury interests of numerous investors.The generation development of insider trading crime and securities market is accompanied, and is the chronic illness that harm securities market develops in a healthy way.Due to the characteristic such as disguise, the popularity of acceptance personnel, the ambiguity of boundary of determining a crime of insider trading behavior, investigator is made to run into great difficulty in the extraction, analytic process of evidence.The present invention is intended to the characteristic utilizing large data, solves the problem of data analysis difficulty in stock futures insider trading.
At present, because supervision department is to the increasing of stock futures illegal activities hitting dynamics, and marketing personnel are to the understanding of supervision department's investigative technique, and the means of insider trading become more hidden, and supervision department is difficult to obtain direct vaild evidence.In order to more effectively hit the behavior of insider trading, the law enforcement mode of supervision department is also changing, and transfers the extraction of circumstantial evidence gradually from the collection of positive evidence to.At present, the analysis of insider trading also mainly concentrates in the analyses and comparison of message registration.A kind of main analytical approach is: first the message registration transferred is organized into the form that analysis software designs in advance by analyst, then by data inputting in analysis software, operating analysis software, the direct call therefrom acquired inside information between insider and suspicion account contacts and contact of indirectly conversing, feature according to call judges whether there is insider trading behavior, investigates for the personnel with insider trading suspicion at emphasis.
There is larger limitation in above-mentioned data analysis, first the adjustment of data layout requires a great deal of time.Because insider trading case needs the data transferred more, only the adjustment of data layout often needs the time of one week, have impact on the speed of investigation greatly.Secondly, com-parison and analysis is unilateral, can only carry out analysis and search, easily cause larger error from message registration.Meanwhile, the data such as address list, bank capital flowing water and security exchange flowing water that early stage is transferred can only utilize manually to be analyzed, and has both reduced efficiency, may have been omitted important clue again.3rd, data analysis is completed by a people often, not only needs the time of at substantial, and in investigation group, other members cannot participate in data analysis in real time, can not play the advantage of team.
Summary of the invention
The object of the invention is to propose a kind of securities market insider trading behavior analysis method:
By data analyses such as the message registration to inside news insider and suspicion account, address list, bank transaction flowing water, security exchange flowing water and transaction hardware informations, the present invention judges whether both sides exist insider trading behavior.The object of the invention is to be achieved through the following technical solutions: concrete methods of realizing of the present invention comprises the following steps:
Step 1) extract the related data that needs are analyzed in insider trading;
Step 2) by extract data inputting in data analysis system;
Step 3) analyze data, according to the decision condition filter analysis result preset;
Step 4) generate analysis report, locking focal investigation personnel;
Wherein, step 1) in extract insider trading analyze data complete by following steps:
Step 1-1) the securities account data of suspicion account is transferred from securities broker company;
Step 1-2) the bank transaction flowing water of fund account is transferred from the bank of deposit of suspicion account;
Step 1-3) message registration of suspicion account is transferred from business halls such as movement, UNICOM, telecommunications;
Step 1-4) message registration of insider information insider is transferred from business halls such as movement, UNICOM, telecommunications;
Step 1-5) from inside news insider mobile phone, transfer address list.
Step 1-6) from the mobile phone of suspicion account, transfer address list.
It is noted that the above a kind of method instead of all method that just obtain data, the acquisition of data can also utilize other legal means to realize.
Step 2) data inputting comprised the following steps:
Step 2-1) select file to be logged in option, can once select multiple, but the form of multiple file to be logged obtain identical;
Step 2-2) in input interface, the field of correspondence writes the row number of this attribute column in file to be logged.Such as, " air time " one hurdle be positioned in message registration file the 3rd row, then in input interface " air time " one hurdle write 3;
Step 2-3) file is entered in database;
Step 2-4) repeat above-mentioned four steps, until by complete for the file typing of all Water demand.
This input method is an innovative point of the present invention, can ignore the difference in file layout, not need adjustment to get final product typing, greatly reduce the time of data inputting.
According to method for designing of the present invention, step 3) analyze data and comprise the following steps:
Step 3-1) analyze message registration in logging data, obtain between insider information insider and suspicion account direct call contacts, indirectly conversing contacts;
Step 3-2) analyze address list in logging data, all communication numbers of acquire inside information insider and suspicion account;
Step 3-3) analyze security exchange record in logging data, obtain the security exchange feature of suspicion account;
Step 3-4) analyze hardware information in logging data, obtain suspicion account and utilize hardware to carry out the situation of concluding the business;
Step 3-5) analyze bank capital flowing water in logging data, obtain suspicion account fund contact situation;
According to method for designing of the present invention, step 4) generate analysis report and comprise the following steps:
Step 4-1) according to the Rule of judgment preset, by step 3) in meet Rule of judgment analysis result be written in report file;
Step 4-2) analyst according to report content, the significance level of autonomous examination suspicion account;
According to method for designing of the present invention, wherein, step 2) support many people logging data simultaneously, step 3) support that many people carry out data analysis simultaneously.
Compared with existing system, the invention has the advantages that: data inputting is compatible strong, can adapt to various data layout; Data analysis function is comprehensive, can provide the analysis to data such as message registration, address list, security exchange record, bank capital flowing water, make full use of the various data that can obtain; The typing of many personal data, analysis can be supported, be convenient to team and fight.
Accompanying drawing explanation
Fig. 1 is process flow diagram of the present invention.
Embodiment
Referring to accompanying drawing, embodiments of the present invention is further illustrated, wherein:
In order to make object of the present invention, technical scheme and advantage clearly understand, below by way of specific embodiment, the present invention is described in more detail.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
In an embodiment of the present invention, a set of insider trading information analysis system is provided.First, the data that will analyze are obtained; Then, by the data inputting of Water demand in analytic system; Then, utilize system to the various data analysis of typing, and generate analysis report according to the Rule of judgment preset.Concrete implementation step is described below:
First, the data needed for insider trading analysis are obtained.
At present, the data that can obtain in insider trading case mainly comprise message registration, the address list of inside news insider, the chat record etc. of the message registration of suspicion account actual controller, address list, bank transaction flowing water, security exchange flowing water and two.In certain embodiments, any legal means that this area personnel that collect evidence can be adopted to know obtains these data.In the present embodiment, mainly adopt method to obtain and analyze data: the securities account data transferring suspicion account from securities broker company; The bank transaction flowing water of fund account is transferred from the bank of deposit of suspicion account; The message registration of suspicion account is transferred from business halls such as movement, UNICOM, telecommunications; The message registration of insider information insider is transferred from business halls such as movement, UNICOM, telecommunications; Address list, relevant chat record is transferred from inside news insider mobile phone; Address list, relevant chat record is transferred from the mobile phone of suspicion account.
It is noted that a kind of approach of above just acquisition data instead of whole approach, supervision department can select corresponding approach to obtain data according to authority of self enforcing the law.
Next, by the data inputting of acquisition in system.
In the data transferred, not all attribute is all effective, only has limited several general-purpose attributes to be only analyst and is concerned about most in the process analyzed.Although the document format data that different modes obtains varies, All Files all possesses these general-purpose attributes.In embodiments of the invention, we utilize the typing mode of this feature design data, make the data inputting function of system can compatible various file layout.Data inputting step of the present invention is as follows:
(1) corresponding data inputting interface is opened.Such as, for message registration typing, first analyst needs the message registration input interface of system of opening.
(2) in data inputting interface, the file needing typing is selected.Can once select multiple, but the All Files of a typing must possess identical file layout.Such as, analyst's message registration file that a suspicion account once can be selected all.
(3) in the attribute that input interface is corresponding, write the position at this attribute place in file to be logged.For message registration typing, " other party number " one hurdle be in file to be logged 5th row, then in input interface " other party number " place write 5.The like, all properties required in interface is all write corresponding row number.
(4) file is entered in corresponding database.
(5) (1)-(4) are repeated, until by whole for the file of all Water demand input database.
The general Water demand personnel of traditional data entry method before file typing, the form that the system that is organized into by All Files specifies.Because the file amount of insider trading Water demand is larger, data preparation often requires a great deal of time.Compared with traditional data input method, data-entry-form of the present invention has better adaptability, for the data file of various form, without the need to the form that arranges the document in advance, can greatly improve the efficiency of data inputting, decrease redundant data simultaneously.This input method is also an innovative point of the present invention.
3rd, to the data analysis of typing.
Data analysis obtains the most key step of evidence.Data analysis of the present invention mainly comprises following step:
(1) message registration analysis.Message registration analysis analyzes for the message registration file of typing above, finds out to contact directly record, indirect association record between inside news insider and suspicion account from message registration.In embodiments of the invention, message registration analysis is divided into the following steps again:
(1-1) analysis is contacted directly.Contact directly and refer to that inside news insider and suspicion account exist during information sensing and directly converse.In embodiments of the invention, contact directly analysis result and include but not limited to following attribute: both call sides name, both call sides number, air time, calling and called, call place, the duration of call etc.
(1-2) indirect association analysis.Indirect association refers to that there are third party personnel and inside news insider and suspicion account exists call within the information sensing phase simultaneously.In embodiments of the invention, indirect association analysis result includes but not limited to following attribute: third party personnel numbers, inside news insider and suspicion account name, air time, call place, the duration of call etc.
Compared with traditional call log analysis methodology, due to data entry system of the present invention to the data of typing through having gone optimization, decrease a lot of redundant attributes, thus greatly improve the efficiency of data analysis.
(2) address list analysis.Address list analysis analyzes for the address list file of typing above, find out from address list inside news insider, suspicion account hide phone number, provide effective support for discovering a clue further.In embodiments of the invention, address list analysis obtains hiding number and comprises following step:
(2-1) at the name of the personnel of address list assay surface input Water demand.Such as, Zhang San is inputted.
(2-2) first all numbers corresponding with input name feed back by system.Such as, Zhang San 150********; 152********; 139******** etc.
(2-3) system is according to the number returned, then inquires about personnel's name corresponding to all numbers fed back successively.Such as, 150******** Zhang San; 152******** always opens; 139******** opens fat person etc.
(2-4) according to the name that system feedback is returned, again inquire about, all numbers corresponding for these names are all checked out.
(2-5) system carries out (2-1)-(2-4) four steps automatically, until the result returned no longer increases.
(2-6) net result is shown to analyst.Analyst, according to analysis result, judges whether the number returned is significant number.
Existing insider trading data analysis tool, temporarily not to the situation that address list is analyzed.The present invention is directed to the feature of insider trading, utilize the mode that address list is analyzed, excavate the phone number that suspect hides, discovery hidden line rigging is had very great help.
(3) security exchange record analysis.Security exchange record analysis is for suspicion account All Activity data analysis, therefrom finds out the feature of suspicion account trading.Feature includes but not limited to following characteristics: the share-holding cycle of every stock, the average buying price of every stock, every stock on average buy in quantity, every stock on average buy in the amount of money, proportion etc. that the amount of money of at every turn buying in stocks accounts for account fund.In embodiments of the invention, the step obtaining suspicion account security exchange feature comprises:
(3-1) security exchange record analysis interface is opened.
(3-2) analysis button clicked on interface is analyzed.The security bargain data of typing, comprise the name of account, account number, stock name, running time, action type (buy in or sell), operation price etc., the process analyzed is as follows: divide into groups according to stock name, according to every stock running time and running time the latest the earliest, add up the share-holding cycle of every stock; The number of times bought according to every stock and the total amount bought in, that adds up every stock on average buys in quantity; The total price bought according to every stock and buy in number of times, adds up every stock and on average buys in the amount of money; According to treasury trade in database, in conjunction with the funds transfer of trading security, the fund sum of retrodicting in fixed time account, in conjunction with the amount of money of buying in stocks at every turn, calculating that this amount of money of buying in stocks accounts for must the proportion of capital.
(3-3) whether there is obvious exception according to analysis result comprehensive descision suspicion account when buying and specifying stock.Such as, the quantity that the time bought in obviously relatively concentrates, buy in obviously wants the proportion of fund in account fund that is large, that buy in stocks to significantly improve than usual.
Traditional insider trading analysis tool is not also to the record that security transaction record is analyzed.Security exchange is in the past analyzed main dependence and is manually completed, and the analysis of an account often needs more than 2 hours.The present invention sums up the emphasis paid close attention in Traditional Man analytical process, the arithmetic capability of computer simultaneously, by cannot realize during manual analysis but very crucial some attributes add, such as buy in stocks and account for the proportion etc. of account fund total value, generate short and sweet analysis result, while improve analysis efficiency, also improve the degree of accuracy of analysis result.
(4) hardware information analysis.Hardware information analysis analyzes for the hardware device used during the security exchange of suspicion account.The data that analyst is concerned about mainly are excavated in hardware information analysis from the information such as the cell-phone number of transaction, IP, MAC and hard disk serial number, and such as, whether there is contact between suspicion account, suspicion account was once concluded the business etc. on which equipment.Concrete analysis step is as follows:
(4-1) hardware information assay surface is opened.
(4-2) add up suspicion account and once in which equipment, carry out security exchange.The process of statistics is mainly according to attributes such as cell-phone number, MAC and the hard disk serial number in the security exchange record of suspicion account, the cell-phone number of every same account trading, MAC or hard disk serial number are different, we then think that the account concluded the business on different devices, and all different equipment is all enumerated out, for analyst's reference, investigator's scene evidence taking hourglass is avoided to get key evidence.
(4-3) the different suspicion accounts once having operation on same equipment are searched.According to attributes such as the cell-phone number in security exchange record, MAC and hard disk serial number, judge whether to exist in different suspicion account operation record to utilize common cell-phone number, MAC or hard disk serial number etc. to carry out the situation of concluding the business, and the Account History that there is common transaction is extracted, for analyst's reference.This function can excavate the relation between different suspicion account, for finding that hiding clue provides a great help further.
Whether the mode that conventional hardware is analyzed inquires about by artificial mode computer, the cellphone information fetched at scene to occur in security exchange record.Limited in one's ability due to manual analysis, is difficult to the traction equipment that discovery suspicion account is hidden, is more difficult to the different suspicion accounts finding once to have operation on the same device.Hardware analysis method in the present invention can effectively address these problems, and makes full use of security exchange record, and the degree of depth excavates the clue hidden in transaction record, makes investigator from a passive one to an active one.
(5) bank transaction flowing water is analyzed.The analysis of bank transaction flowing water analyzes for suspicion account bank treasury trade.The ins and outs of appointment fund are mainly excavated in the analysis of bank transaction flowing water from the treasury trade record of suspicion account, find out suspicion account further and whether there is with inside news insider contact.Such as, whether inside news insider exists treasury trade etc. with suspicion account.The analysis of bank transaction flowing water comprises following step:
(5-1) bank capital flowing water assay surface in system is opened.
(5-2) the bank capital pipelined data of typing module typing is analyzed.Analyze mainly for attributes such as the fund account in data, dealing money, funds transfer direction, funds transfer time, analogue's accounts.First with the funds source of suspicion account securities account for starting point, according to time that transfers of analogue's information of the amount of fund, fund, fund, fund transfer the attributes such as direction, trace the source of one fund.In like manner, to each source of upper one fund, the mode of recurrence is adopted to continue to trace, until trace the three above funds in road.
(5-3) analyst is according to analysis result, and that therefrom searches that a few fund oneself paid close attention to transfers flow process, determines whether there is inside news insider in the capital chain of suspicion account successively.
The analysis of bank capital flowing water is an innovative point of the present invention, does not have insider information analysis tool to analyze deployment analysis to bank capital flowing water in the past.The analysis of bank capital flowing water can reflect the source of fund in suspicion account, facilitates analyst therefrom to find out useful clue fast.
4th, generate analysis report.
After analysis terminates, meet the content of following Rule of judgment, system can write results in analysis report automatically.Rule of judgment comprises following components:
(1) in message registration analysis there is directly call contact or contact of indirectly conversing in insider information insider and suspicion account within sensitive periods;
(2) in address list analysis there is the communication modes hidden in insider information insider or suspicion account;
(3) in security exchange record analysis, suspicion account has obviously abnormal trading activity within sensitive periods;
(4) in hardware information analysis, multiple suspicion account once had transaction on same hardware device.
(5) the used all transaction hardware devices of suspicion account in hardware information analysis;
(6) in the analysis of bank capital flowing water, insider information insider and suspicion account have the fund Flow Record of treasury trade.
Analyst, by analysis report, can find out useful clue, fast for the hasty breaching of case provides strong support.
Should point out, insider trading information analysis method provided by the present invention is not limited to any software or hardware platform, insider information analytic system cited in the above-described embodiments, only play example effect, this area those skilled in the art should understand and the method can be used in other insider trading analytic system.The insider trading analytic system that the analytical approach that every the present invention of utilization proposes realizes, all within right of the present invention.
According to the data analysing method that the present invention proposes, we can make full use of the electronic data that evidence obtaining personnel can transfer, and maximized is useful clue by data transformations, for the breakthrough of case provides sound assurance.
Although the present invention is described by preferred embodiment, but the present invention is not limited to embodiment as described herein, also comprises done various change and change without departing from the present invention.

Claims (2)

1. a securities market insider trading behavior analysis method, comprises the following steps:
Step 1) extract the related data that needs are analyzed in insider trading;
Step 2) by extract data inputting in data analysis system;
Step 3) analyze data, according to the decision condition filter analysis result preset;
Step 4) generate analysis report, locking focal investigation personnel;
Wherein, step 1) in extract insider trading analyze data complete by following steps:
Step 1-1) the securities account data of suspicion account is transferred from securities broker company;
Step 1-2) the bank transaction flowing water of fund account is transferred from the bank of deposit of suspicion account;
Step 1-3) message registration of suspicion account is transferred from business halls such as movement, UNICOM, telecommunications;
Step 1-4) message registration of insider information insider is transferred from business halls such as movement, UNICOM, telecommunications;
Step 1-5) from inside news insider mobile phone, transfer address list;
Step 1-6) from the mobile phone of suspicion account, transfer address list;
Step 2) data inputting comprised the following steps:
Step 2-1) select file to be logged in option, can once select multiple, but the form of multiple file to be logged obtain identical;
Step 2-2) in input interface, the field of correspondence writes the row number of this attribute column in file to be logged.Such as, " air time " one hurdle be positioned in message registration file the 3rd row, then in input interface " air time " one hurdle write 3;
Step 2-3) file is entered in database;
Step 2-4) repeat above-mentioned four steps, until by complete for the file typing of all Water demand;
Step 3) analyze data comprise the following steps:
Step 3-1) analyze message registration in logging data, obtain between insider information insider and suspicion account direct call contacts, indirectly conversing contacts;
Step 3-2) analyze address list in logging data, all communication numbers of acquire inside information insider and suspicion account;
Step 3-3) analyze security exchange record in logging data, obtain the security exchange feature of suspicion account;
Step 3-4) analyze hardware information in logging data, obtain suspicion account and utilize hardware to carry out the situation of concluding the business;
Step 3-5) analyze bank capital flowing water in logging data, obtain suspicion account fund contact situation;
Step 4) generate analysis report comprise the following steps:
Step 4-1) according to the Rule of judgment preset, by step 3) in meet Rule of judgment analysis result be written in report file;
Step 4-2) analyst according to report content, the significance level of autonomous examination suspicion account.
2. a kind of securities market insider trading behavior analysis method according to claim, is characterized in that: above-mentioned steps 2) support many people logging data simultaneously, step 3) support that many people carry out data analysis simultaneously.
CN201510710880.6A 2015-10-28 2015-10-28 Analysis method for insider trading behaviors of securities markets Pending CN105243588A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510710880.6A CN105243588A (en) 2015-10-28 2015-10-28 Analysis method for insider trading behaviors of securities markets

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510710880.6A CN105243588A (en) 2015-10-28 2015-10-28 Analysis method for insider trading behaviors of securities markets

Publications (1)

Publication Number Publication Date
CN105243588A true CN105243588A (en) 2016-01-13

Family

ID=55041224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510710880.6A Pending CN105243588A (en) 2015-10-28 2015-10-28 Analysis method for insider trading behaviors of securities markets

Country Status (1)

Country Link
CN (1) CN105243588A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110728570A (en) * 2019-09-30 2020-01-24 珠海市新德汇信息技术有限公司 Anti-fraud fund analysis method
CN112445870A (en) * 2020-10-27 2021-03-05 福建中锐电子科技有限公司 Knowledge graph string parallel case analysis method based on mobile phone evidence obtaining electronic data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101706930A (en) * 2009-10-22 2010-05-12 杭州信雅达科技有限公司 Ontology-based anti-money laundering early-warning method
CN104850663A (en) * 2015-06-09 2015-08-19 苏州点通教育科技有限公司 System and method for inputting and analyzing test scores
CN104867055A (en) * 2015-06-16 2015-08-26 咸宁市公安局 Financial network doubtable money tracking and identifying method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101706930A (en) * 2009-10-22 2010-05-12 杭州信雅达科技有限公司 Ontology-based anti-money laundering early-warning method
CN104850663A (en) * 2015-06-09 2015-08-19 苏州点通教育科技有限公司 System and method for inputting and analyzing test scores
CN104867055A (en) * 2015-06-16 2015-08-26 咸宁市公安局 Financial network doubtable money tracking and identifying method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110728570A (en) * 2019-09-30 2020-01-24 珠海市新德汇信息技术有限公司 Anti-fraud fund analysis method
CN110728570B (en) * 2019-09-30 2023-04-28 珠海市新德汇信息技术有限公司 Anti-fraud fund analysis method
CN112445870A (en) * 2020-10-27 2021-03-05 福建中锐电子科技有限公司 Knowledge graph string parallel case analysis method based on mobile phone evidence obtaining electronic data

Similar Documents

Publication Publication Date Title
US9552615B2 (en) Automated database analysis to detect malfeasance
US11200500B2 (en) Self learning data loading optimization for a rule engine
JP2003523578A (en) System and method for determining the validity of an interaction on a network
CN112669039B (en) Knowledge graph-based customer risk management and control system and method
CN111414402A (en) Log threat analysis rule generation method and device
CN114357000A (en) Block chain transaction data retrieval system, method, equipment and storage medium
TW202107382A (en) Method and system for active risk control based on intelligent interaction
CN110851485B (en) Social relation mining method and device, computer equipment and readable medium
CN102982048A (en) Method and device for assessing junk information mining rule
CN109478219A (en) For showing the user interface of network analysis
CN114140123B (en) Method and system for tracing two-layer network transaction of Ethernet workshop
CN110197426A (en) A kind of method for building up of credit scoring model, device and readable storage medium storing program for executing
CN112884442B (en) Audit monitoring data acquisition method and system based on audit model
CN105243588A (en) Analysis method for insider trading behaviors of securities markets
CN113837512B (en) Abnormal user identification method and device
US8204900B2 (en) Metrics library
CN111427883A (en) Data processing method and device based on AeroPike, computer equipment and storage medium
CN110807702A (en) Method, device, equipment and storage medium for managing information after loan
CN106407254A (en) User click behavior chain processing method and apparatus
CN108009927A (en) One B shareB methods of marking and platform
CN114723548A (en) Data processing method, apparatus, device, medium, and program product
CN115222531A (en) Case analysis method, device and system
Sengottuvelan et al. An improved session identification approach in web log mining for web personalization
CN110147406A (en) A kind of visual numeric simulation system and its framework method towards cloud computing
CN111447082B (en) Determination method and device of associated account and determination method of associated data object

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160113

WD01 Invention patent application deemed withdrawn after publication