CN109670937A - Risk subscribers recognition methods, user equipment, storage medium and device - Google Patents

Risk subscribers recognition methods, user equipment, storage medium and device Download PDF

Info

Publication number
CN109670937A
CN109670937A CN201811129426.1A CN201811129426A CN109670937A CN 109670937 A CN109670937 A CN 109670937A CN 201811129426 A CN201811129426 A CN 201811129426A CN 109670937 A CN109670937 A CN 109670937A
Authority
CN
China
Prior art keywords
user
risk
target
default
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811129426.1A
Other languages
Chinese (zh)
Inventor
刘中原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811129426.1A priority Critical patent/CN109670937A/en
Publication of CN109670937A publication Critical patent/CN109670937A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses risk subscribers recognition methods, user equipment, storage medium and devices.The personal information of target user is obtained in the present invention, and creates destination node corresponding with the personal information of the target user;The destination node is added in preset relation network, and the preset relation network after addition node is set as relationship by objective (RBO) network;Association user corresponding with the target user is determined in the relationship by objective (RBO) network, and inquires association user role corresponding with the association user;Whether the user role based on target user described in the association user Role judgement is risk subscribers.Significantly, it is different from existing identification method, relational network will individually be constructed, and based on the user role for inferring target user in relational network there are the identity of the other users of relevance with target user, showed in the accuracy of recognition result more excellent, solve that existing identification method there is technical issues that cannot accurately identify.

Description

Risk subscribers recognition methods, user equipment, storage medium and device
Technical field
The present invention relates to technical field of information processing more particularly to risk subscribers recognition methods, user equipment, storage mediums And device.
Background technique
With the appearance of loan fraud clique, loan fraud clique causes one to the normal operation of internet financial institution Fixed negative influence.Because loan fraud clique can maliciously postpone also after handling loan transaction at internet financial institution Money duration is not refunded, also, its behavior be often dolus malus and caused by loss it is larger.
So needing to identify as soon as possible in loan personnel after releasing loan for internet financial institution Hiding loan fraud clique, and collection disposition is carried out as early as possible to the personnel that provided a loan, more effectively to retrieve economic losses.
And the mode of traditional identification loan fraud clique is, financial institution can regularly pull the reference of the personnel of loan Information or third party's data are to be monitored management, to judge whether the personnel that provided a loan may be loan fraud molecule.
But this kind of mode can not identify loan fraud molecule early stage and in hiding state very accurately, These loan fraud molecules being under hiding state are all the user there are risk for financial institution.So can Think, existing identification method there is technical issues that accurately to identify.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill Art.
Summary of the invention
The main purpose of the present invention is to provide risk subscribers recognition methods, user equipment, storage medium and devices, it is intended to Solve that existing identification method there is technical issues that cannot accurately identify.
To achieve the above object, the present invention provides a kind of risk subscribers recognition methods, the risk subscribers recognition methods packet Include following steps:
The personal information of target user is obtained, and creates destination node corresponding with the personal information of the target user;
The destination node is added in preset relation network, and the preset relation network after addition node is set as mesh Mark relational network, the preset relation network by default node corresponding with each user and each default node of connection connection side It constitutes;
Association user corresponding with the target user is determined in the relationship by objective (RBO) network, and is inquired and the association The corresponding association user role of user;
Whether the user role based on target user described in the association user Role judgement is risk subscribers.
Preferably, described that the destination node is added in the preset relation network, and will be pre- after addition node If relational network is set as relationship by objective (RBO) network, comprising:
The personal information of the target user is matched with default personal information;
In successful match, determines default node corresponding with the default personal information of successful match and be set to off interlink Point;
The destination node is added in the preset relation network, and adds the connection associated nodes and the mesh Mark the connection side of node;
Preset relation network after change is set as relationship by objective (RBO) network.
Preferably, described that association user corresponding with the target user is determined in the relationship by objective (RBO) network, and look into Ask association user role corresponding with the association user, comprising:
The default node that there is connection side between the destination node is being searched in the relationship by objective (RBO) network;
User corresponding with there is the connection default node on side is regarded as into association user, and is inquired and the association user Corresponding association user role;
Whether the user role based on target user described in the association user Role judgement is risk subscribers, packet It includes:
When the user role of the association user is default fraud molecule, by the user role identification of the target user For risk subscribers.
Preferably, the personal information of the target user is made of the sub-information of each information type;
The personal information by the target user is matched with default personal information, comprising:
Sub-information in the personal information of the target user is compared with the sub-information in default personal information, and Count the identical target item number of sub-information;
When the target item number is greater than or equal to preset standard item number, personal information and the institute of the target user are assert State default personal information successful match.
Preferably, described in successful match, determine default node corresponding with the default personal information of successful match simultaneously It is set as after associated nodes, the risk subscribers recognition methods further include:
Determine association user corresponding with the associated nodes;
The corresponding relationship between the target item number and the association user is established, and the corresponding relationship is added to pre- It include the corresponding relationship between item number and user if connecting in the mapping relations of side, in the default connection side mapping relations;
Whether the user role based on target user described in the association user Role judgement is risk subscribers, packet It includes:
Obtain role's value-at-risk corresponding with the association user role;
Inquire corresponding target item number in the default connection side mapping relations according to the association user, and determine with The corresponding weight coefficient of the target item number;
Target risk value is calculated according to role's value-at-risk and the weight coefficient;
When the target risk value is greater than or equal to default value-at-risk, the user role of the target user is regarded as Risk subscribers.
Preferably, it is described target risk value is calculated according to role's value-at-risk and the weight coefficient after, it is described Risk subscribers recognition methods further include:
When the target risk value is less than default value-at-risk, the reference information of the target user is obtained;
Corresponding reference credit value is generated according to the reference information;
When the reference credit value is less than default credit value, the user role of the target user is regarded as into risk and is used Family.
Preferably, described when the reference credit value is less than default credit value, by the user role of the target user After regarding as risk subscribers, the risk subscribers recognition methods further include:
The numerical value of the target risk value is revised as the default value-at-risk.
In addition, to achieve the above object, the present invention also proposes a kind of user equipment, the user equipment include memory, Processor and it is stored in the risk subscribers recognizer that can be run on the memory and on the processor, the risk is used Family recognizer is arranged for carrying out the step of risk subscribers recognition methods as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, stored on the storage medium risky User's recognizer, the risk subscribers recognizer realize risk subscribers identification side as described above when being executed by processor The step of method.
In addition, to achieve the above object, the present invention also proposes a kind of risk subscribers identification device, the risk subscribers identification Device includes:
Node creation module for obtaining the personal information of target user, and creates and believes with the personal of the target user Cease corresponding destination node;
Network struction module, for the destination node to be added in preset relation network, and will be after addition node Preset relation network is set as relationship by objective (RBO) network, and the preset relation network is by default node corresponding with each user and connection The connection side of each default node is constituted;
Role determination module, for determining that association corresponding with the target user is used in the relationship by objective (RBO) network Family, and inquire association user role corresponding with the association user;
Role's determination module, for the user role based on target user described in the association user Role judgement whether be Risk subscribers.
Relationship by objective (RBO) network will be constructed based on personal information in the present invention, and according to the association in relationship by objective (RBO) network The user role of user determines the user role of target user, so as to complete the identification for risk subscribers.It is apparent that area Not in existing identification method, the present invention will individually construct relational network, and be based on existing in relational network with target user The identity of the other users of relevance infers the user role of target user, this kind of mode just allows for fraud molecule exists Clique's property crime characteristic, showed in the accuracy of recognition result it is more excellent, so, it is believed that, solve existing identification side What formula be there is technical issues that cannot accurately identify.
Detailed description of the invention
Fig. 1 is the user device architecture schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of risk subscribers recognition methods first embodiment of the present invention;
Fig. 3 is the schematic diagram of relationship by objective (RBO) network;
Fig. 4 is the flow diagram of risk subscribers recognition methods second embodiment of the present invention;
Fig. 5 is the flow diagram of risk subscribers recognition methods 3rd embodiment of the present invention;
Fig. 6 is the structural block diagram of risk subscribers identification device first embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, Fig. 1 is the user device architecture schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
As shown in Figure 1, the user equipment may include: processor 1001, such as CPU, communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), optional user interface 1003 can also include standard wireline interface, Wireless interface, the wireline interface for user interface 1003 can be USB interface in the present invention.Network interface 1004 optionally may be used To include standard wireline interface and wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, can also To be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be Independently of the storage device of aforementioned processor 1001.
It will be understood by those skilled in the art that structure shown in Fig. 1 does not constitute the restriction to user equipment, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium Believe module, Subscriber Interface Module SIM and risk subscribers recognizer.
In user equipment shown in Fig. 1, network interface 1004 is mainly used for connecting background server, takes with the backstage Business device carries out data communication;User interface 1003 is mainly used for connecting peripheral hardware;The user equipment is called by processor 1001 The risk subscribers recognizer stored in memory 1005, and execute risk subscribers recognition methods provided in an embodiment of the present invention.
Based on above-mentioned hardware configuration, the embodiment of risk subscribers recognition methods of the present invention is proposed.
It is the flow diagram of risk subscribers recognition methods first embodiment of the present invention referring to Fig. 2, Fig. 2.
In the first embodiment, the risk subscribers recognition methods the following steps are included:
Step S10: the personal information of target user is obtained, and creates mesh corresponding with the personal information of the target user Mark node;
It is understood that the mode in view of traditional identification loan fraud clique is the reference based on the personnel of having provided a loan Information or third party's data identify operation come the credit risk user completed, still, this kind of mode only by reference information or Third party's data can not guarantee the accuracy of recognition result as voucher is identified well.In order to more accurately identify Whether the identity that user is judged based on relational network is risk subscribers by risk subscribers, the present embodiment, this kind of mode will be based on The identity of other users to judge indirectly the identity of active user, shows in the identification accuracy for identifying loan fraud molecule It is more excellent.
In the concrete realization, after user A has handled loan transaction, user A can fill in it when due to handling loan transaction Personal information can construct relational network based on its personal information.Wherein, personal information include cell-phone number, contact person, address, Mailbox, Business Name and fingerprint etc..
Step S20: the destination node is added in preset relation network, and by add node after preset relation net Network is set as relationship by objective (RBO) network, and the preset relation network is by default node corresponding with each user and each default node of connection Connection side constitute;
It should be understood that the building of relational network and extension will consider relational network based on graph theory Characteristic, the network constructed will be made of the connection side of multiple nodes and each node of connection, wherein node is used to represent not Same entity, and side is then used to the relationship between presentation-entity.
In the concrete realization, the node in the present embodiment indicates user, and side indicates existing incidence relation between user, Specifically, the personal information based on user A is constructed relational network by the present embodiment, will include in the relational network constructed Pre-existing default node and the node A for representing user A.Wherein, presetting node indicates the other users provided a loan.Specifically It can be found in Fig. 3, Fig. 3 is the schematic diagram of relationship by objective (RBO) network, and node B, node C and node D in figure are default node.
In the concrete realization, in order to successfully construct relationship by objective (RBO) network, preset relation network can first be obtained, wherein Preset relation network is made of each default node with the connection side for connecting each default node, reference can be made to Fig. 3, preset relation network packet Between the node D and these three nodes that include the node B for indicating user B, the node C for indicating user C, expression user D Connect side.
It is understood that egress A can be created after getting preset relation network, and node A is added to default In relational network, so that relationship by objective (RBO) network as shown in Figure 3 will be obtained.
Step S30: determining corresponding with target user association user in the relationship by objective (RBO) network, and inquire and The corresponding association user role of the association user;
It should be understood that after constructing relationship by objective (RBO) network as shown in Figure 3, due to node A and other nodes it Between there is connection side, then it represents that there is juxtapositions between the personal information of node A and the personal information of other nodes Situation, for example, the Business Name that may be recorded in the personal information of node A may be with the public affairs that record in the personal information of node D It is identical to take charge of title, it is also possible to which there is social networks etc. between the user that the user and node D that node A is indicated indicate.
It is understood that in view of loan fraud molecule exists mostly in the form of loan fraud clique, so, this implementation Example exactly carries out the identification of potential fraud molecule using the characteristic that its clique's property is committed a crime, so, it can be based on the identity of association user To infer indirectly the identity of user A.
Step S40: whether the user role based on target user described in the association user Role judgement is risk subscribers.
It should be understood that node D expression can be obtained after inquiring the node D that there is connection side between node A The user role of association user.
In the concrete realization, the user role of each user in relational network can be classified, for example, default fraud point Sub, potential fraud molecule, that is, risk subscribers and normal users etc., wherein default fraud molecule indicates existing loan fraud row For user, risk subscribers expression do not record loan fraud behavior also but infer its can be carried out the risk of loan fraud use Family.So if the user role for the user that node D is indicated is to preset fraud molecule or risk subscribers, it can be by target user's User role also regards as risk subscribers, so as to complete the identification for risk subscribers.
Relationship by objective (RBO) network will be constructed based on personal information in the present embodiment, and according to the pass in relationship by objective (RBO) network The user role at family is combined to determine the user role of target user, so as to complete the identification for risk subscribers.It is apparent that It is different from existing identification method, the present embodiment will individually construct relational network, and be based in relational network and target user The user role of target user is inferred there are the identity of the other users of relevance, this kind of mode is just allowing for fraud molecule There are clique's property crime characteristic, showed in the accuracy of recognition result it is more excellent, so, it is believed that, solve existing knowledge What other mode be there is technical issues that cannot accurately identify.
It is the flow diagram of risk subscribers recognition methods second embodiment of the present invention referring to Fig. 4, Fig. 4, is based on above-mentioned Fig. 2 Shown in first embodiment, propose the second embodiment of risk subscribers recognition methods of the present invention.
In second embodiment, the step S20 may include:
Step S201: the personal information of the target user is matched with default personal information;
It is understood that in view of there is connection sides between each node, and connect side will indicate connected node it Between incidence relation.If the information incidence relation regarded as between the personal information of the user of connected node expression is similar Property, the matching operation of personal information can be first carried out.Wherein, presetting personal information indicates the personal information of user of having provided a loan.
Step S202: it in successful match, determines default node corresponding with the default personal information of successful match and sets For associated nodes;
It should be understood that the matching operation of personal information is specifically, can be first by the Business Name of user A with user B's Business Name is matched, if the Business Name of the two is not identical, the addition connection side not between node A and node B;It can incite somebody to action The Business Name of user A is matched with the Business Name of user D, if the Business Name of the two is identical, then it is assumed that user A and use There are certain information similitudes between the D of family.
Step S203: the destination node is added in the preset relation network, and adds the connection association section The connection side of point and the destination node;
It is understood that connection side can be added between node A and node B if there is incidence relation therebetween.
Step S204: the preset relation network after change is set as relationship by objective (RBO) network.
Further, the association user corresponding with the target user determining in the relationship by objective (RBO) network, and Inquire association user role corresponding with the association user, comprising:
The default node that there is connection side between the destination node is being searched in the relationship by objective (RBO) network;
User corresponding with there is the connection default node on side is regarded as into association user, and is inquired and the association user Corresponding association user role;
Whether the user role based on target user described in the association user Role judgement is risk subscribers, packet It includes:
When the user role of the association user is default fraud molecule, by the user role identification of the target user For risk subscribers.
In the concrete realization, for assert that the identification of potential fraud molecule operates specifically, by first finding between node A In the presence of the node D on connection side.
It is understood that after determining node D, if the user role of user D is default fraud molecule, use can be estimated The user role of family A is risk subscribers.Certainly, if the user role of user D is risk subscribers, the user of user A can also be estimated Role is risk subscribers.
In the present embodiment will by comparison target user and existing subscriber personal information come establish target user with There is the connection side between user, so that incidence relation described in relationship by objective (RBO) network has higher confidence level.
It is the flow diagram of risk subscribers recognition methods 3rd embodiment of the present invention referring to Fig. 5, Fig. 5, is based on above-mentioned Fig. 4 Shown in second embodiment, propose the 3rd embodiment of risk subscribers recognition methods of the present invention.
In 3rd embodiment, the personal information of the target user is made of the sub-information of each information type;
The step S201, comprising:
Step S2011: by the sub-information in the sub-information and default personal information in the personal information of the target user It is compared, and counts the identical target item number of sub-information;
It is understood that the matching operation of personal information is directed to, in addition to judging the Business Name of user A with user D's Outside the whether identical mode of Business Name, the personal information of all types can be also comprehensively considered, so that the association finally picked out There is more believable node relevance between node and destination node.
It in the concrete realization, include cell-phone number, contact person, address, postal since there are much information types for personal information Case, Business Name and fingerprint etc., the personal information of each information type are all a sub-information.Judging user A and its When incidence relation between his user, the personal information that user A can be calculated sub-information identical with the personal information of other users Item number, for example, the Business Name of user A, address and cell-phone number are identical with user D, then the target item number counted It is 3.
Step S2012: when the target item number is greater than or equal to preset standard item number, assert of the target user People's information and the default personal information successful match.
It should be understood that if setting preset standard item number is 2.Since target item number is greater than preset standard item number, then may be used Think that there is certain incidence relations between user A and user D, and the connection being successfully established between node A and node D Side.
Further, described in successful match, determine default node corresponding with the default personal information of successful match And it is set as after associated nodes, the risk subscribers recognition methods further include:
Determine association user corresponding with the associated nodes;
The corresponding relationship between the target item number and the association user is established, and the corresponding relationship is added to pre- It include the corresponding relationship between item number and user if connecting in the mapping relations of side, in the default connection side mapping relations;
Whether the user role based on target user described in the association user Role judgement is risk subscribers, packet It includes:
Obtain role's value-at-risk corresponding with the association user role;
Inquire corresponding target item number in the default connection side mapping relations according to the association user, and determine with The corresponding weight coefficient of the target item number;
Target risk value is calculated according to role's value-at-risk and the weight coefficient;
When the target risk value is greater than or equal to default value-at-risk, the user role of the target user is regarded as Risk subscribers.
It is understood that the identical target item number of the sub-information counted is in addition to can be used for judging user A and other It whether there is outside certain incidence relation between user, it may also be used for determine user role belonging to user A.
In the concrete realization, it when the target item number counted is 3, can accordingly be deposited in default connection side mapping relations User D and target item number 3 are stored up, to be used for subsequent role's decision.As for subsequent role's decision specifically, can It first determines the user role of user D, for example, the user role of user D is " default fraud molecule ", and obtains corresponding role's wind Danger value is 100.Wherein, role's value-at-risk is used to characterize the risk of fraud of user;Also, the user role of each type is deposited In corresponding role's value-at-risk, with for further evaluation, there are the risk of fraud of associated other users with the user.
It should be understood that the corresponding relationship for being stored with target item number and weight coefficient can be preset, for example, if target Item number is x=0, and x is integer, then weight coefficient q is 0.5;If target item number is 1≤x≤2, weight coefficient q is 0.7;If mesh Mark item number is 3≤x≤5, then weight coefficient q is 0.8;If target item number is x >=6, weight coefficient q is 0.9.So working as mesh When mark item number is 3, corresponding weight coefficient is 0.8.
It is understood that the risk of fraud in order to determine user A, in combination with the risk of fraud and use of user D Incidence relation between family A and user D determines jointly, so determines that the risk of fraud of user A combines the information of various dimensions Confidence level with higher.Wherein, role's value-at-risk of user D is for judging its risk of fraud, and weight coefficient is for commenting Sentence the power of the incidence relation between user A and user D.
In the concrete realization, the target risk value of user A can be calculated based on default value-at-risk calculation formula, wherein Presetting value-at-risk calculation formula is,
M2=M1*q;
Wherein, M2Indicate target risk value, M1Indicate role's value-at-risk, and q indicates weight coefficient.If role's wind of user D Danger value M1It is 100, weight coefficient 0.8, then calculated M2It is 80, calculated M2For judging the risk of fraud of user A Property, M2Numerical value it is bigger, indicate the user carry out loan fraud behavior a possibility that it is bigger.
It is understood that 75 can be set by default value-at-risk, due to M2Greater than 75, then user A can be regarded as wind Dangerous user.
Further, it is described target risk value is calculated according to role's value-at-risk and the weight coefficient after, institute State risk subscribers recognition methods further include:
When the target risk value is less than default value-at-risk, the reference information of the target user is obtained;
Corresponding reference credit value is generated according to the reference information;
When the reference credit value is less than default credit value, the user role of the target user is regarded as into risk and is used Family.
It is understood that judging whether user A is risk subscribers by relational network in addition to the present embodiment description Judgment mode, the judgement for risk subscribers can be also completed in combination with reference information, can be in combination with two ways Greatly improve the accuracy of judging result.
In the concrete realization, if calculated M2It is less than default value-at-risk for 70, description individual subscriber credit wind can be called The reference information of danger, and obtain a reference credit value.For example, if the reference information of user A is assessed as well, it is corresponding Reference credit value is 85;If the reference information of user A be assessed as it is medium, corresponding reference credit value be 70;If user A's Reference information be assessed as it is poor, then corresponding reference credit value be 60.
It should be understood that if the reference credit value of user A is 60, and pre-set default credit value is 70, then may be used User A is defined as risk subscribers, user A is subsequent repay when will in advance in the normal collection date carry out fund urge It receives, more effectively to retrieve economic losses, and controls economic risk.
Further, described when the reference credit value is less than default credit value, by the user angle of the target user After color regards as risk subscribers, the risk subscribers recognition methods further include:
The numerical value of the target risk value is revised as the default value-at-risk.
In the concrete realization, it is contemplated that after determining user A based on reference information for risk subscribers, due to before based on closing Be network determine user A be not risk subscribers, so, will modify relational network in user A value-at-risk 70.Specifically, Since when value-at-risk is greater than or equal to default value-at-risk, corresponding user role is " risk subscribers ", so, relationship can be modified The value-at-risk of user A in network is 75, and the user role finally to decide user A is being answered for " risk subscribers " convenient for subsequent Exist when being assert with the role that relational network carries out other users and assert error.
User role will be judged by value-at-risk in the present embodiment, not only combines the risk of association user, It is strong and weak with reference to the relevance between association user and this user, so that the judgement for user role is more accurate and comprehensive.
In addition, the embodiment of the present invention also proposes a kind of storage medium, risk subscribers identification is stored on the storage medium Program, the risk subscribers recognizer realize the step of risk subscribers recognition methods as described above when being executed by processor Suddenly.
In addition, the embodiment of the present invention also proposes a kind of risk subscribers identification device, the risk subscribers identification referring to Fig. 6 Device includes:
Node creation module 10 for obtaining the personal information of target user, and creates the individual with the target user The corresponding destination node of information;
It is understood that the mode in view of traditional identification loan fraud clique is the reference based on the personnel of having provided a loan Information or third party's data identify operation come the credit risk user completed, still, this kind of mode only by reference information or Third party's data can not guarantee the accuracy of recognition result as voucher is identified well.In order to more accurately identify Whether the identity that user is judged based on relational network is risk subscribers by risk subscribers, the present embodiment, this kind of mode will be based on The identity of other users to judge indirectly the identity of active user, shows in the identification accuracy for identifying loan fraud molecule It is more excellent.
In the concrete realization, after user A has handled loan transaction, user A can fill in it when due to handling loan transaction Personal information can construct relational network based on its personal information.Wherein, personal information include cell-phone number, contact person, address, Mailbox, Business Name and fingerprint etc..
Network struction module 20, for the destination node to be added in preset relation network, and will be after addition node Preset relation network be set as relationship by objective (RBO) network, the preset relation network is by default node corresponding with each user and company The connection side for connecing each default node is constituted;
It should be understood that the building of relational network and extension will consider relational network based on graph theory Characteristic, the network constructed will be made of the connection side of multiple nodes and each node of connection, wherein node is used to represent not Same entity, and side is then used to the relationship between presentation-entity.
In the concrete realization, the node in the present embodiment indicates user, and side indicates existing incidence relation between user, Specifically, the personal information based on user A is constructed relational network by the present embodiment, will include in the relational network constructed Pre-existing default node and the node A for representing user A.Wherein, presetting node indicates the other users provided a loan.Specifically It can be found in Fig. 3, Fig. 3 is the schematic diagram of relationship by objective (RBO) network, and node B, node C and node D in figure are default node.
In the concrete realization, in order to successfully construct relationship by objective (RBO) network, preset relation network can first be obtained, wherein Preset relation network is made of each default node with the connection side for connecting each default node, reference can be made to Fig. 3, preset relation network packet Between the node D and these three nodes that include the node B for indicating user B, the node C for indicating user C, expression user D Connect side.
It is understood that egress A can be created after getting preset relation network, and node A is added to default In relational network, so that relationship by objective (RBO) network as shown in Figure 3 will be obtained.
Role determination module 30, for determining that association corresponding with the target user is used in the relationship by objective (RBO) network Family, and inquire association user role corresponding with the association user;
It should be understood that after constructing relationship by objective (RBO) network as shown in Figure 3, due to node A and other nodes it Between there is connection side, then it represents that there is juxtapositions between the personal information of node A and the personal information of other nodes Situation, for example, the Business Name that may be recorded in the personal information of node A may be with the public affairs that record in the personal information of node D It is identical to take charge of title, it is also possible to which there is social networks etc. between the user that the user and node D that node A is indicated indicate.
It is understood that in view of loan fraud molecule exists mostly in the form of loan fraud clique, so, this implementation Example exactly carries out the identification of potential fraud molecule using the characteristic that its clique's property is committed a crime, so, it can be based on the identity of association user To infer indirectly the identity of user A.
Role's determination module 40, for the user role based on target user described in the association user Role judgement whether For risk subscribers.
It should be understood that node D expression can be obtained after inquiring the node D that there is connection side between node A The user role of association user.
In the concrete realization, the user role of each user in relational network can be classified, for example, default fraud point Sub, potential fraud molecule, that is, risk subscribers and normal users etc., wherein default fraud molecule indicates existing loan fraud row For user, risk subscribers expression do not record loan fraud behavior also but infer its can be carried out the risk of loan fraud use Family.So if the user role for the user that node D is indicated is to preset fraud molecule or risk subscribers, it can be by target user's User role also regards as risk subscribers, so as to complete the identification for risk subscribers.
Relationship by objective (RBO) network will be constructed based on personal information in the present embodiment, and according to the pass in relationship by objective (RBO) network The user role at family is combined to determine the user role of target user, so as to complete the identification for risk subscribers.It is apparent that It is different from existing identification method, the present embodiment will individually construct relational network, and be based in relational network and target user The user role of target user is inferred there are the identity of the other users of relevance, this kind of mode is just allowing for fraud molecule There are clique's property crime characteristic, showed in the accuracy of recognition result it is more excellent, so, it is believed that, solve existing knowledge What other mode be there is technical issues that cannot accurately identify.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.If listing equipment for drying Unit claim in, several in these devices, which can be, to be embodied by the same item of hardware.Word first, Second and the use of third etc. do not indicate any sequence, can be title by these word explanations.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of risk subscribers recognition methods, which is characterized in that the risk subscribers recognition methods the following steps are included:
The personal information of target user is obtained, and creates destination node corresponding with the personal information of the target user;
The destination node is added in preset relation network, and the preset relation network after addition node is set as target and is closed It is network, the preset relation network is by default node corresponding with each user and the connection side structure of each default node of connection At;
Association user corresponding with the target user is determined in the relationship by objective (RBO) network, and is inquired and the association user Corresponding association user role;
Whether the user role based on target user described in the association user Role judgement is risk subscribers.
2. risk subscribers recognition methods as described in claim 1, which is characterized in that described that the destination node is added to institute It states in preset relation network, and the preset relation network after addition node is set as relationship by objective (RBO) network, comprising:
The personal information of the target user is matched with default personal information;
In successful match, determines default node corresponding with the default personal information of successful match and be set as associated nodes;
The destination node is added in the preset relation network, and adds the connection associated nodes and the target section The connection side of point;
Preset relation network after change is set as relationship by objective (RBO) network.
3. risk subscribers recognition methods as claimed in claim 2, which is characterized in that described true in the relationship by objective (RBO) network Fixed association user corresponding with the target user, and inquire association user role corresponding with the association user, comprising:
The default node that there is connection side between the destination node is being searched in the relationship by objective (RBO) network;
User corresponding with there is the connection default node on side is regarded as into association user, and is inquired corresponding with the association user Association user role;
Whether the user role based on target user described in the association user Role judgement is risk subscribers, comprising:
When the user role of the association user is default fraud molecule, the user role of the target user is regarded as into wind Dangerous user.
4. risk subscribers recognition methods as claimed in claim 2, which is characterized in that the personal information of the target user is by each The sub-information of information type is constituted;
The personal information by the target user is matched with default personal information, comprising:
Sub-information in the personal information of the target user is compared with the sub-information in default personal information, and is counted The identical target item number of sub-information;
When the target item number is greater than or equal to preset standard item number, assert the personal information of the target user with it is described pre- If personal information successful match.
5. risk subscribers recognition methods as claimed in claim 4, which is characterized in that it is described in successful match, determine with With the successful default corresponding default node of personal information and after being set as associated nodes, the risk subscribers recognition methods is also wrapped It includes:
Determine association user corresponding with the associated nodes;
The corresponding relationship between the target item number and the association user is established, and the corresponding relationship is added to default company It include the corresponding relationship between item number and user in edge fit mapping relations, in the default connection side mapping relations;
Whether the user role based on target user described in the association user Role judgement is risk subscribers, comprising:
Obtain role's value-at-risk corresponding with the association user role;
Inquire corresponding target item number in the default connection side mapping relations according to the association user, and it is determining with it is described The corresponding weight coefficient of target item number;
Target risk value is calculated according to role's value-at-risk and the weight coefficient;
When the target risk value is greater than or equal to default value-at-risk, the user role of the target user is regarded as into risk User.
6. risk subscribers recognition methods as claimed in claim 5, which is characterized in that described according to role's value-at-risk and institute State the risk subscribers recognition methods after weight coefficient calculates target risk value further include:
When the target risk value is less than default value-at-risk, the reference information of the target user is obtained;
Corresponding reference credit value is generated according to the reference information;
When the reference credit value is less than default credit value, the user role of the target user is regarded as into risk subscribers.
7. risk subscribers recognition methods as claimed in claim 6, which is characterized in that described to be less than in advance in the reference credit value If when credit value, after the user role of the target user is regarded as risk subscribers, the risk subscribers recognition methods is also Include:
The numerical value of the target risk value is revised as the default value-at-risk.
8. a kind of user equipment, which is characterized in that the user equipment includes: memory, processor and is stored in the storage It operation risk user recognizer, the risk subscribers recognizer can be held on device and by the processor on the processor The step of risk subscribers recognition methods as described in any one of claims 1 to 7 is realized when row.
9. a kind of storage medium, which is characterized in that be stored with risk subscribers recognizer on the storage medium, the risk is used The step of the risk subscribers recognition methods as described in any one of claims 1 to 7 is realized when family recognizer is executed by processor Suddenly.
10. a kind of risk subscribers identification device, which is characterized in that the risk subscribers identification device includes:
Node creation module for obtaining the personal information of target user, and creates the personal information pair with the target user The destination node answered;
Network struction module, for the destination node to be added in preset relation network, and will be default after addition node Relational network is set as relationship by objective (RBO) network, and the preset relation network is each pre- by default node corresponding with each user and connection If the connection side of node is constituted;
Role determination module, for determining association user corresponding with the target user in the relationship by objective (RBO) network, and Inquire association user role corresponding with the association user;
Whether role's determination module is risk for the user role based on target user described in the association user Role judgement User.
CN201811129426.1A 2018-09-26 2018-09-26 Risk subscribers recognition methods, user equipment, storage medium and device Withdrawn CN109670937A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811129426.1A CN109670937A (en) 2018-09-26 2018-09-26 Risk subscribers recognition methods, user equipment, storage medium and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811129426.1A CN109670937A (en) 2018-09-26 2018-09-26 Risk subscribers recognition methods, user equipment, storage medium and device

Publications (1)

Publication Number Publication Date
CN109670937A true CN109670937A (en) 2019-04-23

Family

ID=66142038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811129426.1A Withdrawn CN109670937A (en) 2018-09-26 2018-09-26 Risk subscribers recognition methods, user equipment, storage medium and device

Country Status (1)

Country Link
CN (1) CN109670937A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135978A (en) * 2019-04-25 2019-08-16 北京淇瑀信息科技有限公司 User's financial risks appraisal procedure, device, electronic equipment and readable medium
CN110223165A (en) * 2019-06-14 2019-09-10 哈尔滨哈银消费金融有限责任公司 A kind of anti-fraud and credit risk forecast method and system based on related network
CN110689426A (en) * 2019-09-30 2020-01-14 中诚信征信有限公司 Risk identification method and device, electronic equipment and storage medium
CN110852878A (en) * 2019-11-26 2020-02-28 中国建设银行股份有限公司 Credibility determination method, device, equipment and storage medium
CN110956391A (en) * 2019-11-28 2020-04-03 中信银行股份有限公司 Information processing method based on finance and electronic equipment
CN111049809A (en) * 2019-11-27 2020-04-21 深圳壹账通智能科技有限公司 Risk user identification method and device, computer equipment and storage medium
CN111291234A (en) * 2020-03-31 2020-06-16 京东数字科技控股有限公司 Account risk probability assessment method, device and system and storage medium
CN111861281A (en) * 2020-08-05 2020-10-30 中国银行股份有限公司 Knowledge graph-based risk employee discovery method and device
CN112053174A (en) * 2020-09-29 2020-12-08 中国银行股份有限公司 Method, device and equipment for determining relation between bank customer and teller
CN112102093A (en) * 2020-08-05 2020-12-18 中证征信(深圳)有限公司 Method, device, equipment and medium for identifying subject identity and incidence relation
CN112330468A (en) * 2020-11-03 2021-02-05 中国平安财产保险股份有限公司 Method, device, equipment and storage medium for identifying risk client
CN113762684A (en) * 2020-12-14 2021-12-07 北京沃东天骏信息技术有限公司 New user risk assessment method and device, electronic equipment and medium
CN114003648A (en) * 2021-10-20 2022-02-01 支付宝(杭州)信息技术有限公司 Risk transaction group partner identification method and device, electronic equipment and storage medium

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135978B (en) * 2019-04-25 2021-07-30 北京淇瑀信息科技有限公司 User financial risk assessment method and device, electronic equipment and readable medium
CN110135978A (en) * 2019-04-25 2019-08-16 北京淇瑀信息科技有限公司 User's financial risks appraisal procedure, device, electronic equipment and readable medium
CN110223165A (en) * 2019-06-14 2019-09-10 哈尔滨哈银消费金融有限责任公司 A kind of anti-fraud and credit risk forecast method and system based on related network
CN110689426A (en) * 2019-09-30 2020-01-14 中诚信征信有限公司 Risk identification method and device, electronic equipment and storage medium
CN110852878A (en) * 2019-11-26 2020-02-28 中国建设银行股份有限公司 Credibility determination method, device, equipment and storage medium
CN110852878B (en) * 2019-11-26 2022-08-26 中国建设银行股份有限公司 Credibility determination method, device, equipment and storage medium
CN111049809A (en) * 2019-11-27 2020-04-21 深圳壹账通智能科技有限公司 Risk user identification method and device, computer equipment and storage medium
CN110956391A (en) * 2019-11-28 2020-04-03 中信银行股份有限公司 Information processing method based on finance and electronic equipment
CN111291234A (en) * 2020-03-31 2020-06-16 京东数字科技控股有限公司 Account risk probability assessment method, device and system and storage medium
CN111861281A (en) * 2020-08-05 2020-10-30 中国银行股份有限公司 Knowledge graph-based risk employee discovery method and device
CN112102093A (en) * 2020-08-05 2020-12-18 中证征信(深圳)有限公司 Method, device, equipment and medium for identifying subject identity and incidence relation
CN112053174A (en) * 2020-09-29 2020-12-08 中国银行股份有限公司 Method, device and equipment for determining relation between bank customer and teller
CN112053174B (en) * 2020-09-29 2024-03-29 中国银行股份有限公司 Method, device and equipment for determining relationship between bank clients and teller
CN112330468A (en) * 2020-11-03 2021-02-05 中国平安财产保险股份有限公司 Method, device, equipment and storage medium for identifying risk client
CN112330468B (en) * 2020-11-03 2023-10-27 中国平安财产保险股份有限公司 Method, device, equipment and storage medium for identifying risk clients
CN113762684A (en) * 2020-12-14 2021-12-07 北京沃东天骏信息技术有限公司 New user risk assessment method and device, electronic equipment and medium
CN114003648A (en) * 2021-10-20 2022-02-01 支付宝(杭州)信息技术有限公司 Risk transaction group partner identification method and device, electronic equipment and storage medium
CN114003648B (en) * 2021-10-20 2024-04-26 支付宝(杭州)信息技术有限公司 Identification method and device for risk transaction group partner, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109670937A (en) Risk subscribers recognition methods, user equipment, storage medium and device
WO2019154115A1 (en) Resource transferring monitoring method and device
CN107563757B (en) Data risk identification method and device
CN108615119B (en) Abnormal user identification method and equipment
CN108876600A (en) Warning information method for pushing, device, computer equipment and medium
CN105824813B (en) A kind of method and device for excavating core customer
CN107169629A (en) A kind of telecommunication fraud recognition methods and data processing equipment
CN109949154B (en) Customer information classification method, apparatus, computer device and storage medium
CN107153847A (en) Predict method and computing device of the user with the presence or absence of malicious act
CN109670933A (en) Identify method, user equipment, storage medium and the device of user role
CN110956503B (en) User identification method and device with lending requirements based on user network behaviors
CN106156151A (en) The Risk Identification Method of internetwork operation event and device
CN110378575B (en) Overdue event refund collection method and device and computer readable storage medium
CN109472656B (en) Virtual article display method and device and storage medium
CN110363644A (en) Exception information recognition methods, device, computer equipment and storage medium
CN108595579A (en) Contact person's cohesion evaluation method, device, computer equipment and storage medium
CN109598542A (en) A kind of put-on method, device and the electronic equipment of equity of marketing
CN110609908A (en) Case serial-parallel method and device
CN110728301A (en) Credit scoring method, device, terminal and storage medium for individual user
CN114693192A (en) Wind control decision method and device, computer equipment and storage medium
CN113641827A (en) Phishing network identification method and system based on knowledge graph
CN110909129B (en) Abnormal complaint event identification method and device
CN109636570A (en) Risk analysis method, device, equipment and the readable storage medium storing program for executing of cell-phone number
CN111105064A (en) Method and device for determining suspected information of fraud event
CN113538126A (en) Fraud risk prediction method and device based on GCN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190423

WW01 Invention patent application withdrawn after publication