CN109767326A - Suspicious transaction reporting generation method, device, computer equipment and storage medium - Google Patents

Suspicious transaction reporting generation method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109767326A
CN109767326A CN201811560423.3A CN201811560423A CN109767326A CN 109767326 A CN109767326 A CN 109767326A CN 201811560423 A CN201811560423 A CN 201811560423A CN 109767326 A CN109767326 A CN 109767326A
Authority
CN
China
Prior art keywords
risk
transaction
feature
sample
suspicious
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811560423.3A
Other languages
Chinese (zh)
Inventor
王晓艳
谢翠萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811560423.3A priority Critical patent/CN109767326A/en
Publication of CN109767326A publication Critical patent/CN109767326A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application involves a kind of suspicious transaction reporting generation method, device, computer equipment and the storage mediums of big data field.The described method includes: obtaining transaction data, identify whether the transaction data is suspicious transaction;When the transaction data is suspicious transaction, the corresponding risk classifications of the suspicious transaction are identified;The risk classifications correspond to multiple feature of risk;Calculate the corresponding vector matrix of the multiple feature of risk;Multiple vector matrixs are input to neural network model, suspicious transaction reporting corresponding with the risk classifications is exported by the neural network model.The working efficiency for completing suspicious transaction reporting can be effectively improved using this method.

Description

Suspicious transaction reporting generation method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of suspicious transaction reporting generation method, device, calculating Machine equipment and storage medium.
Background technique
Money laundering is a kind of behavior that illicit gain legalizes, and belongs to economic crime, is made to the safety and stability of financial system At threat.Therefore, it is necessary to the work that financial institution actively carries out anti money washing.Financial institution pair transaction relevant to money laundering is supervised Control, if it find that suspicious transaction needs in time to be reported.On financial institution of giving the correct time need in the form reported to suspicious friendship Easily it is described.In traditional mode, suspicious transaction reporting is completed by manually.If in face of a large amount of suspicious transaction Corresponding report is all write by manually, then it is lower to will lead to working efficiency.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of suspicious transaction reporting for effectively improving working efficiency Generation method, device, computer equipment and storage medium.
A kind of suspicious transaction reporting generation method, which comprises
Transaction data is obtained, identifies whether the transaction data is suspicious transaction;
When the transaction data is suspicious transaction, the corresponding risk classifications of the suspicious transaction are identified;The risk class Type corresponds to multiple feature of risk;
Calculate the corresponding vector matrix of the multiple feature of risk;
Multiple vector matrixs are input to neural network model, pass through neural network model output and the risk class The corresponding suspicious transaction reporting of type.
It is described in one of the embodiments, to identify whether the transaction data is suspicious transaction using the feature of risk Include:
Extract the customer ID in the transaction data and multiple transaction fields;
According to the customer ID, multiple feature fields corresponding with the feature of risk are searched for by big data platform;
Multiple feature fields that the transaction field and the big data platform search are input to monitoring model, are led to It crosses the monitoring model and carries out suspicious transaction identification;
When identifying the transaction data is suspicious transaction, corresponding early warning event is generated.
The identification suspicious corresponding risk classifications of trading include: in one of the embodiments,
According to the search result of big data platform, code corresponding with the feature of risk is called;
Risk identification is carried out to individual features field using the code of the feature of risk, exports corresponding risk label;
The suspicious corresponding risk classifications of trading according to multiple risk tag recognitions.
In one of the embodiments, the method also includes:
The suspicious transaction reporting of a variety of history is obtained, the suspicious transaction reporting of the history is labeled as sample file;The sample This document includes multiple sample sentences and risk classifications;
Identify the corresponding feature of risk of the sample sentence;
Obtain reflecting between the corresponding report template of the risk classifications and the report template and the feature of risk Penetrate relationship;
Generate the corresponding training vector matrix of each sample sentence;
Neural network is trained using the training vector matrix and the mapping relations.
The corresponding training vector matrix of each sample sentence that generates includes: in one of the embodiments,
Subordinate sentence processing is carried out to the sample file, obtains multiple sample sentences;
Word segmentation processing is carried out to the sample sentence, obtains multiple sample words;
Sample word frequency of each sample word in the sample file is counted, calculates each sample using the sample word frequency The corresponding term vector of this word;
Using the corresponding term vector of sample words multiple in each sample sentence, the corresponding vector of each sample sentence is generated Matrix.
A kind of suspicious transaction reporting generating means, described device include:
First identification module identifies whether the transaction data is suspicious transaction for obtaining transaction data;
Second identification module, for when the transaction data is suspicious transaction, identifying the corresponding wind of the suspicious transaction Dangerous type;The risk classifications correspond to multiple feature of risk;
Vector calculating mould is fast, for calculating the corresponding vector matrix of the multiple feature of risk;
Report generation module passes through the neural network mould for multiple vector matrixs to be input to neural network model Type exports suspicious transaction reporting corresponding with the risk classifications.
First identification module is also used to extract the customer ID in the transaction data in one of the embodiments, And multiple transaction fields;According to the customer ID, searched for by big data platform corresponding with the feature of risk multiple Feature field;Multiple feature fields that the transaction field and the big data platform search are input to monitoring model, Suspicious transaction identification is carried out by the monitoring model;When identifying the transaction data is suspicious transaction, generate corresponding pre- Alert event.
Described device in one of the embodiments, further include:
The suspicious transaction reporting of the history is labeled as sample for obtaining the suspicious transaction reporting of a variety of history by training module This document;The sample file includes multiple sample sentences and risk classifications;Identify that the corresponding risk of the sample sentence is special Sign;The mapping obtained between the corresponding report template of the risk classifications and the report template and the feature of risk is closed System;Generate the corresponding training vector matrix of each sample sentence;Utilize the training vector matrix and the mapping relations pair Neural network is trained.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device realizes the step in above-mentioned each embodiment of the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step in above-mentioned each embodiment of the method is realized when row.
Above-mentioned suspicious transaction reporting generation method, device, computer equipment and storage medium are when recognizing transaction data When suspicious transaction, its corresponding risk classifications is further identified.The report template as used by different risk classifications is different, often Kind risk classifications include kinds of risks feature, by calculating the corresponding vector matrix of suspicious transaction risk feature, by moment of a vector Battle array is input to neural network model, and thus, it is possible to make neural network model output suspicious transaction report corresponding with risk classifications It accuses.To realize the report for being automatically performed suspicious transaction.In this process, it is participated in without artificial, effectively increases work Efficiency.
Detailed description of the invention
Fig. 1 is the application scenario diagram of suspicious transaction reporting generation method in one embodiment;
Fig. 2 is the flow diagram of suspicious transaction reporting generation method in one embodiment;
Fig. 3 is to identify whether the transaction data is suspicious transaction step using the feature of risk in one embodiment Flow diagram;
Fig. 4 is the flow diagram of neural network model training step in one embodiment;
Fig. 5 is the structural block diagram of suspicious transaction reporting generating means in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Suspicious transaction reporting generation method provided by the present application, can be applied in application environment as shown in Figure 1.Its In, terminal 102 is communicated by network with server 104.Wherein, terminal 102 can be, but not limited to be various individual calculus Machine, laptop, smart phone, tablet computer and portable wearable device, server 104 can use independent server The either server cluster of multiple servers composition is realized.Server 104 obtains transaction data, and whether identification transaction data For suspicious transaction.When transaction data is suspicious transaction, server 104 further identifies the corresponding risk classifications of suspicious transaction, Risk classifications correspond to multiple feature of risk.Server 104 obtains in suspicious transaction according to the suspicious feature of risk traded and be related to Take corresponding transaction field.The spy that server 104 is searched using the corresponding transaction field of feature of risk and big data platform It levies field and calculates vector matrix.Neural network model has been pre-established on server 104.Server 104 is by multiple vector matrixs It is input to neural network model, suspicious transaction reporting corresponding with risk classifications is exported by neural network model.Server 104 Suspicious transaction reporting is sent to terminal 102.
In one embodiment, it as shown in Fig. 2, providing a kind of suspicious transaction reporting generation method, applies in this way It is illustrated for server in Fig. 1, comprising the following steps:
Step 202, transaction data is obtained, whether identification transaction data is suspicious transaction.
Database is deployed on server.After execution, corresponding transaction data can be stored in database for each transaction. Server can obtain transaction data according to predeterminated frequency in the database, to recognize whether the suspicious friendship of anti money washing Easily.Server can also monitor database in real time, and when having listened to transaction data deposit database, server is obtained The transaction data, to identify whether as suspicious transaction.
Monitoring model has been pre-established on server.Monitoring model has multiple feature of risk, basic including client Information, transaction frequently, the block trade of suspend mode account, transaction amount be more than preset value, transaction address is false, trading account is expired, Connected transaction has treasury trade etc. with blacklist client.Feature of risk can also be considered as the dimension of monitoring.Different feature of risk As different dimensions.Each feature of risk all includes multiple feature fields.Wherein, feature field may include transaction field. Server searches for associated various features field according to customer ID in big data platform.Big data search result with work as Transaction field in preceding transaction data can be used as the corresponding field of feature of risk.Server is by transaction field and big data The feature field that platform searches is input to monitoring model, carries out suspicious transaction identification by monitoring model.Wherein, transaction field Feature of risk can also be corresponded to, i.e. transaction field can belong to the same feature of risk with feature field.When identification transaction data When for suspicious transaction, corresponding early warning event is generated.
Step 204, when transaction data is suspicious transaction, the corresponding risk classifications of suspicious transaction are identified;Risk classifications pair Answer multiple feature of risk.
The feature of risk that different suspicious transaction is related to can be different.In the search result of big data platform, If not including the feature field of some feature of risk, then it represents that suspicious transaction is not directed to the feature of risk.Big data platform Search result in include the corresponding feature field of some feature of risk, then it represents that suspicious transaction is related to the feature of risk.It can In the doubtful multiple feature of risk that are related to of trading, the corresponding feature field of each feature of risk be can be different.
When server recognizes suspicious transaction, according to big data search result, can learn involved by suspicious transaction Feature of risk.Server calls code corresponding with these feature of risk carries out risk analysis.As the corresponding spy of feature of risk When sign field meets risk rule, server adds corresponding risk label to big data search result.Risk label can be with Feature of risk is same or like.Due to the different corresponding monitor control index differences of risk model, i.e. corresponding risk label The risk classifications of suspicious transaction can be recognized accurately according to the corresponding multiple risk labels of suspicious transaction for difference, server.
Step 206, the corresponding vector matrix of multiple feature of risk is calculated.
Server obtains corresponding transaction field according to the suspicious feature of risk traded and be related to.One feature of risk can With a corresponding transaction field, multiple transaction fields can also be corresponded to.The corresponding transaction field of server by utilizing feature of risk with And the feature field that big data platform searches calculates vector matrix.Wherein, transaction field includes field name and field value.Big number It also include field name and field value according to the feature field searched.
Specifically, trained dictionary has been stored in advance in server.It include the corresponding word of multiple trained words in training dictionary Vector.Wherein, training word may include field name and field value etc..Server can be to the corresponding transaction word of feature of risk Section and feature field carry out word segmentation processing, obtain multiple words.Server is searched corresponding with feature of risk in training dictionary Multiple words term vector.For numbers such as time and the amount of money etc., server can use term vector model and calculate its correspondence Term vector.The corresponding multiple term vectors of each feature of risk of server by utilizing generate corresponding vector matrix.
Step 208, multiple vector matrixs are input to neural network model, pass through neural network model output and risk class The corresponding suspicious transaction reporting of type.
Neural network model has been pre-established on server.Neural network model can be Recognition with Recurrent Neural Network.The nerve Network model can first pass through a variety of sample files in advance and be trained.Since suspicious transaction includes a variety of different risk classifications, Report template corresponding to different risk classifications is different.Therefore, the sample file of server by utilizing difference risk classifications is to nerve Network is trained in advance.In training, server is according to the risk classifications of suspicious transaction to multiple sentences in report template Son establishes corresponding mapping relations with kinds of risks feature.Mapping relations between different report templates and feature of risk are not Together.
The corresponding vector matrix of multiple feature of risk is input to neural network model by server, neural network model according to The mapping relations of sentence in vector matrix and report template, carry out calculation process, export according to the format of report template corresponding Suspicious transaction reporting.
In the present embodiment, when recognizing transaction data is suspicious transaction, its corresponding risk classifications is further identified.By The report template used by different risk classifications is different, and every kind of risk classifications include kinds of risks feature, suspicious by calculating The corresponding vector matrix of risk feature of trading, is input to neural network model for vector matrix, thus, it is possible to make nerve net Network model exports suspicious transaction reporting corresponding with risk classifications.To realize the report for being automatically performed suspicious transaction.At this During a, participated in without artificial, effectively increase working efficiency.
In one embodiment, the step of whether transaction data is suspicious transaction identified using feature of risk, such as Fig. 3 institute Show, specifically include:
Step 302, customer ID and the multiple transaction fields in transaction data are extracted.
Step 304, according to customer ID, multiple feature fields corresponding with feature of risk are searched for by big data platform.
Step 306, multiple feature fields transaction field and big data platform searched are input to monitoring model, lead to It crosses monitoring model and carries out suspicious transaction identification.
Step 308, when identifying transaction data is suspicious transaction, corresponding early warning event is generated.
A variety of data relevant to client, including client's essential information, historical trading number are stored in big data platform It is a variety of according to, connected transaction, reference information and crisis management information etc..It wherein not only include client itself in client's essential information Essential information further include other staff relevant to client information, be referred to as with client have social relationships personnel Information.For example, the information of kinsfolk, relatives' information, information of personnel with investment relation etc..In order to ensure big data Information in platform is effective, and the data in big data platform can also be updated according to specific period.
Monitoring model has been pre-established on server.Monitoring model has multiple feature of risk, basic including client Information, transaction frequently, the block trade of suspend mode account, transaction amount be more than preset value, transaction address is false, trading account is expired, Connected transaction has treasury trade etc. with blacklist client.
Server extracts customer ID and multiple transaction fields in transaction data.It include client's mark in transaction data Knowledge and multiple transaction fields.Transaction field includes type of transaction, transaction amount, exchange hour, trading object etc..Server root Various features field associated with customer ID is searched in big data platform according to customer ID.It is hereby achieved that with the friendship The associated a variety of data of easy data, and it is not limited solely to the historical trading data of same client, and it is combined with more dimensions The data of degree expand the data area for identifying suspicious transaction, so as to effectively improve the accuracy of suspicious transaction identification.
The feature field associated with customer ID and transaction field that search can be input to monitoring by server Model.Monitoring model calls corresponding anti money washing rule according to transaction field and multiple feature fields, a transaction field or Feature field can call an anti money washing rule, can also call a plurality of anti money washing rule.Each anti money washing rule is all preparatory Provided with corresponding score.Monitoring model obtains the corresponding rule of every anti money washing rule according to called anti money washing rule Score.Monitoring model can add up multinomial regular score, obtain the corresponding monitoring score of transaction data.Monitoring model will Monitoring score is compared with threshold value, when monitoring score more than threshold value, then transaction data is labeled as suspicious transaction.Work as identification When transaction data is suspicious transaction, monitoring model carries out early warning to transaction data, exports corresponding early warning event.
Further, each feature of risk can be considered as a dimension, each feature of risk can be pre-arranged Corresponding weight.Weight between different feature of risk may be the same or different.The different characteristic word of same feature of risk Section can be set to identical weight.Server by utilizing weight is modified the scoring of each anti money washing rule respectively, will correct Regular score afterwards adds up, and obtains monitoring score corresponding with transaction data.Since the feature of risk of different dimensions is anti- Significance level is different in money laundering identification, by being modified to the scoring of anti money washing rule, can be directed to the risk of different dimensions Feature is adjusted, thus, it is possible to obtain more reasonably monitoring score, so as to more efficiently improve the suspicious friendship of identification Easy accuracy.
In one embodiment, identify that the corresponding risk classifications of suspicious transaction include: the search knot according to big data platform Fruit calls code corresponding with feature of risk;Risk identification, output are carried out to individual features field using the code of feature of risk Corresponding risk label;According to the corresponding risk classifications of the suspicious transaction of multiple risk tag recognitions.
In traditional mode, when carrying out the identification of risk classifications to suspicious transaction, in order to ensure identifying all wind Dangerous type, server need suspicious transaction being input to the corresponding risk model of every kind of risk classifications, and risk model utilizes each The feature field of feature of risk is analyzed, and identifies suspicious transaction with the presence or absence of corresponding risk with this.In conventional manner Risk model is to concentrate in together the code analyzed each feature of risk.And in different risk models, it will usually It is related to the same or like feature of risk in part.For example, the risk model of the risk model of illegal fund collection, multiple level marketing is being raised funds Mode, payee, the amount of money etc. are similar.If the code of each risk model is individually write, it will cause more repetitions The work of property.
In the present embodiment, for the corresponding feature of risk of every kind of risk model, write accordingly according to risk rule respectively Code, every kind of feature of risk have corresponding risk label.When server recognizes suspicious transaction, is searched for and tied according to big data Multiple feature fields in fruit call code corresponding with feature of risk to carry out risk analysis.When the corresponding tagged word of feature of risk When Duan Fuhe risk rule, server adds corresponding risk label to big data search result.Due to different risk models Corresponding monitor control index is different, i.e., corresponding risk label is different, and server is according to the corresponding multiple risk marks of suspicious transaction The risk classifications of suspicious transaction can be recognized accurately in label.
In the present embodiment, by carrying out written in code to each monitor control index, the corresponding code of monitor control index can use Risk identification is carried out to feature field, effectively saves the repetitive operation of written in code.And the code of monitor control index can be with Original all risk models are covered, after exporting risk label by the code of monitor control index, suspicious transaction can be recognized Every kind of risk classifications being related to, so as to ensure the comprehensive and accuracy of suspicious Transaction Exposure Type.
In one embodiment, this method further include: the step of neural network model training, as shown in figure 4, specific packet It includes:
Step 402, the suspicious transaction reporting of a variety of history is obtained, the suspicious transaction reporting of history is labeled as sample file;Sample This document includes multiple sample sentences and risk classifications.
Step 404, the corresponding feature of risk of identification sample sentence.
Step 406, the mapping obtained between the corresponding report template of risk classifications and report template and feature of risk is closed System.
Step 408, the corresponding training vector matrix of each sample sentence is generated.
Step 410, neural network is trained using training vector matrix and mapping relations.
The history that the required sample file of neural network model training can be kinds of risks type in the database is suspicious Transaction reporting.Sample file can write multistage content.It all include multiple sentences in every section of content.It include multiple words in sentence Language.Server carries out subordinate sentence processing to sample file, obtains multiple sample sentences.Server carries out at participle sample sentence Reason, obtains multiple sample words.Server by utilizing sample word generates the corresponding training vector matrix of each sample sentence.
Generating the corresponding training vector matrix of each sample sentence in one of the embodiments, includes: to sample file Subordinate sentence processing is carried out, multiple sample sentences are obtained;Word segmentation processing is carried out to sample sentence, obtains multiple sample words;Statistics is every Sample word frequency of a sample word in sample file calculates the corresponding term vector of each sample word using sample word frequency;Benefit With the corresponding term vector of sample words multiple in each sample sentence, the corresponding vector matrix of each sample sentence is generated.
(i.e. each sample word is in all sample words for word frequency of each sample word of server statistics in sample file In accounting), establish word frequency inverse matrix.Server by utilizing word frequency inverse matrix obtains the corresponding term vector of each sample word.I.e. Each column in word frequency inverse matrix can extract, as the corresponding term vector of each sample word.Server can use Multiple sample words and its corresponding term vector establish training dictionary.Server according to multiple sample words in sample sentence, The term vector that corresponding volume is obtained in training dictionary generates the corresponding vector matrix of sample sentence using multiple term vectors.Service Device can generate the corresponding vector matrix of each sample sentence in this way, and natural language is thus mapped to vector space.
Server obtains the report template of kinds of risks type, includes: the overview of suspicious transaction, suspicious friendship in report template The multistages content such as the easy basic condition of main body, the feature of suspicious transaction and background information, preliminary conclusion.All include in every section of content Multiple sentences.In the report template of different risk classifications, such as in the report templates such as network gambling, illegal fund collection, network multiple level marketing, Sentence in paragraph can be different.The corresponding vector matrix of sentence and report template are to circulation in server by utilizing sample file Neural network is trained.
Specifically, in the available sample file of server can the corresponding risk classifications of suspicious transaction, by the risk class Phenotypic marker is the corresponding risk classifications of sample file.Server carries out subordinate sentence processing for the sample file of different risk classifications, The corresponding vector matrix of sample sentence is calculated.Server identifies that the sample sentence institute in sample file is right according to risk classifications The feature field answered establishes the mapping relations between the sentence in feature field and report template.The server by utilizing mapping is closed System and the corresponding vector matrix of every kind of risk classifications are trained Recognition with Recurrent Neural Network.Recognition with Recurrent Neural Network can be double To Recognition with Recurrent Neural Network, by calculating forward and the two-way reckoning training that calculates backward.Thus, it is possible to make the mind after training Through network model according to the format in report template, the context for compareing each sentence exports suspicious transaction reporting.
Further, in order to ensure the content of suspicious transaction reporting is accurate, suspicious friendship is completed in neural network model Easily after report, suspicious transaction reporting can also be distributed to corresponding staff and checked by server.Specifically, service Device obtains information of multiple staff, including business scope, professional grade, task amount etc..Server will be according to suspicious transaction The risk classifications of report and the corresponding relationship of business scope, and according in suspicious transaction reporting risk class and staff The corresponding relationship of professional grade distributes suspicious transaction reporting to corresponding staff.It is checked by staff, by This can the problems in the suspicious transaction reporting of timely correction, so that it is guaranteed that the content reported is accurate.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of suspicious transaction reporting generating means, comprising: the first identification Module 502, the second identification module 504, vector calculate that mould is fast 506, report generation module 508, in which:
First identification module 502, for obtaining transaction data, whether identification transaction data is suspicious transaction.
Second identification module 504, for when transaction data is suspicious transaction, identifying the corresponding risk class of suspicious transaction Type;Risk classifications correspond to multiple feature of risk.
Vector calculates mould fast 506, for calculating the corresponding vector matrix of multiple feature of risk.
Report generation module 508 passes through neural network model for multiple vector matrixs to be input to neural network model Export suspicious transaction reporting corresponding with risk classifications.
In one embodiment, the first identification module is also used to extract the customer ID in transaction data and multiple transaction Field;According to customer ID, multiple feature fields corresponding with feature of risk are searched for by big data platform;By transaction field with And multiple feature fields that big data platform searches are input to monitoring model, carry out suspicious transaction identification by monitoring model; When identifying transaction data is suspicious transaction, corresponding early warning event is generated.
In one embodiment, the second identification module is also used to the search result according to big data platform, calling and risk The corresponding code of feature;Risk identification is carried out to individual features field using the code of feature of risk, exports corresponding risk mark Label;According to the corresponding risk classifications of the suspicious transaction of multiple risk tag recognitions.
In one embodiment, device further include: training module will for obtaining the suspicious transaction reporting of a variety of history The suspicious transaction reporting of history is labeled as sample file;Sample file includes multiple sample sentences and risk classifications;;Identify sample The corresponding feature of risk of sentence;Obtain reflecting between the corresponding report template of risk classifications and report template and feature of risk Penetrate relationship;Generate the corresponding training vector matrix of each sample sentence;Using training vector matrix and mapping relations to nerve Network is trained.
In one embodiment, training module is also used to carry out subordinate sentence processing to sample file, obtains multiple sample sentences; Word segmentation processing is carried out to sample sentence, obtains multiple sample words;Count sample word of each sample word in sample file Frequently, the corresponding term vector of each sample word is calculated using sample word frequency;Utilize multiple sample words pair in each sample sentence The term vector answered generates the corresponding vector matrix of each sample sentence.
Specific restriction about suspicious transaction reporting generating means may refer to generate above for suspicious transaction reporting The restriction of method, details are not described herein.Modules in above-mentioned suspicious transaction reporting generating means can be fully or partially through Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more The corresponding operation of modules.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for store transaction data, sample file etc..The network interface of the computer equipment is used for and outside Terminal passes through network connection communication.To realize a kind of suspicious transaction reporting generation side when the computer program is executed by processor Method.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Transaction data is obtained, whether identification transaction data is suspicious transaction;
When transaction data is suspicious transaction, the corresponding risk classifications of suspicious transaction are identified;Risk classifications correspond to multiple wind Dangerous feature;
Calculate the corresponding vector matrix of multiple feature of risk;
Multiple vector matrixs are input to neural network model, are exported by neural network model corresponding with risk classifications Suspicious transaction reporting.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Extract the customer ID in transaction data and multiple transaction fields;
According to customer ID, multiple feature fields corresponding with feature of risk are searched for by big data platform;
Multiple feature fields that transaction field and big data platform are searched are input to monitoring model, by monitoring mould Type carries out suspicious transaction identification;
When identifying transaction data is suspicious transaction, corresponding early warning event is generated.
In one embodiment, it is also performed the steps of when computer program is executed by processor
According to the search result of big data platform, code corresponding with feature of risk is called;
Risk identification is carried out to individual features field using the code of feature of risk, exports corresponding risk label;
According to the corresponding risk classifications of the suspicious transaction of multiple risk tag recognitions.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The suspicious transaction reporting of a variety of history is obtained, the suspicious transaction reporting of history is labeled as sample file;Sample file packet Include multiple sample sentences and risk classifications;
Identify the corresponding feature of risk of sample sentence;
Obtain the mapping relations between the corresponding report template of risk classifications and report template and feature of risk;
Generate the corresponding training vector matrix of each sample sentence;
Neural network is trained using training vector matrix and mapping relations.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Subordinate sentence processing is carried out to sample file, obtains multiple sample sentences;
Word segmentation processing is carried out to sample sentence, obtains multiple sample words;
Sample word frequency of each sample word in sample file is counted, calculates each sample word pair using sample word frequency The term vector answered;
Using the corresponding term vector of sample words multiple in each sample sentence, the corresponding vector of each sample sentence is generated Matrix.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of suspicious transaction reporting generation method, which comprises
Transaction data is obtained, identifies whether the transaction data is suspicious transaction;
When the transaction data is suspicious transaction, the corresponding risk classifications of the suspicious transaction are identified;The risk classifications pair Answer multiple feature of risk;
Calculate the corresponding vector matrix of the multiple feature of risk;
Multiple vector matrixs are input to neural network model, pass through neural network model output and the risk classifications pair The suspicious transaction reporting answered.
2. the method according to claim 1, wherein described identify the transaction data using the feature of risk It whether is that suspicious transaction includes:
Extract the customer ID in the transaction data and multiple transaction fields;
According to the customer ID, multiple feature fields corresponding with the feature of risk are searched for by big data platform;
Multiple feature fields that the transaction field and the big data platform search are input to monitoring model, pass through institute It states monitoring model and carries out suspicious transaction identification;
When identifying the transaction data is suspicious transaction, corresponding early warning event is generated.
3. according to the method described in claim 2, it is characterized in that, the identification suspicious corresponding risk classifications packet of trading It includes:
According to the search result of big data platform, code corresponding with the feature of risk is called;
Risk identification is carried out to individual features field using the code of the feature of risk, exports corresponding risk label;
The suspicious corresponding risk classifications of trading according to multiple risk tag recognitions.
4. method according to any one of claims 1 to 3, which is characterized in that the method also includes:
The suspicious transaction reporting of a variety of history is obtained, the suspicious transaction reporting of the history is labeled as sample file;The sample text Part includes multiple sample sentences and risk classifications;
Identify the corresponding feature of risk of the sample sentence;
The mapping obtained between the corresponding report template of the risk classifications and the report template and the feature of risk is closed System;
Generate the corresponding training vector matrix of each sample sentence;
Neural network is trained using the training vector matrix and the mapping relations.
5. according to the method described in claim 4, it is characterized in that, described generate the corresponding training vector square of each sample sentence Battle array include:
Subordinate sentence processing is carried out to the sample file, obtains multiple sample sentences;
Word segmentation processing is carried out to the sample sentence, obtains multiple sample words;
Sample word frequency of each sample word in the sample file is counted, calculates each sample word using the sample word frequency The corresponding term vector of language;
Using the corresponding term vector of sample words multiple in each sample sentence, the corresponding moment of a vector of each sample sentence is generated Battle array.
6. a kind of suspicious transaction reporting generating means, which is characterized in that described device includes:
First identification module identifies whether the transaction data is suspicious transaction for obtaining transaction data;
Second identification module, for when the transaction data is suspicious transaction, identifying the corresponding risk class of the suspicious transaction Type;The risk classifications correspond to multiple feature of risk;
Vector calculating mould is fast, for calculating the corresponding vector matrix of the multiple feature of risk;
Report generation module, it is defeated by the neural network model for multiple vector matrixs to be input to neural network model Suspicious transaction reporting corresponding with the risk classifications out.
7. device according to claim 6, which is characterized in that first identification module is also used to extract the number of deals Customer ID and multiple transaction fields in;According to the customer ID, pass through big data platform search and the risk The corresponding multiple feature fields of feature;Multiple feature fields that the transaction field and the big data platform are searched are defeated Enter to monitoring model, suspicious transaction identification is carried out by the monitoring model;When identifying the transaction data is suspicious transaction, Generate corresponding early warning event.
8. device according to claim 6, which is characterized in that described device further include:
Training module, for obtaining the suspicious transaction reporting of a variety of history, by the suspicious transaction reporting of the history labeled as sample text Part;The sample file includes multiple sample sentences and risk classifications;Identify the corresponding feature of risk of the sample sentence;It obtains Take the mapping relations between the corresponding report template of the risk classifications and the report template and the feature of risk;It is raw At the corresponding training vector matrix of each sample sentence;Using the training vector matrix and the mapping relations to nerve net Network is trained.
9. a kind of computer equipment, including memory and processor, the memory is stored with computer program, and sign is, The step of processor realizes any one of claims 1 to 5 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 5 is realized when being executed by processor.
CN201811560423.3A 2018-12-20 2018-12-20 Suspicious transaction reporting generation method, device, computer equipment and storage medium Pending CN109767326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811560423.3A CN109767326A (en) 2018-12-20 2018-12-20 Suspicious transaction reporting generation method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811560423.3A CN109767326A (en) 2018-12-20 2018-12-20 Suspicious transaction reporting generation method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109767326A true CN109767326A (en) 2019-05-17

Family

ID=66451412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811560423.3A Pending CN109767326A (en) 2018-12-20 2018-12-20 Suspicious transaction reporting generation method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109767326A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110956445A (en) * 2019-11-18 2020-04-03 支付宝(杭州)信息技术有限公司 Method and device for generating risk file
CN111476664A (en) * 2020-05-04 2020-07-31 武汉众邦银行股份有限公司 Risk perception and risk prediction method based on real-time data flow
CN111582886A (en) * 2020-05-07 2020-08-25 支付宝(杭州)信息技术有限公司 False resource transfer identification method, device, equipment and medium
CN111738848A (en) * 2020-05-19 2020-10-02 深圳追一科技有限公司 Feature data generation method and device, computer equipment and storage medium
CN113256121A (en) * 2021-05-26 2021-08-13 杭州云象网络技术有限公司 Artificial intelligent money laundering method and system
CN114662453A (en) * 2020-12-23 2022-06-24 腾讯科技(深圳)有限公司 Message generation method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085812A (en) * 2016-12-06 2017-08-22 雷盈企业管理(上海)有限公司 The anti money washing system and method for block chain digital asset
US20180033006A1 (en) * 2016-07-27 2018-02-01 Intuit Inc. Method and system for identifying and addressing potential fictitious business entity-based fraud
CN108536678A (en) * 2018-04-12 2018-09-14 腾讯科技(深圳)有限公司 Text key message extracting method, device, computer equipment and storage medium
CN108563782A (en) * 2018-04-25 2018-09-21 平安科技(深圳)有限公司 Merchandise news format processing method, device, computer equipment and storage medium
CN108876600A (en) * 2018-08-20 2018-11-23 平安科技(深圳)有限公司 Warning information method for pushing, device, computer equipment and medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180033006A1 (en) * 2016-07-27 2018-02-01 Intuit Inc. Method and system for identifying and addressing potential fictitious business entity-based fraud
CN107085812A (en) * 2016-12-06 2017-08-22 雷盈企业管理(上海)有限公司 The anti money washing system and method for block chain digital asset
CN108536678A (en) * 2018-04-12 2018-09-14 腾讯科技(深圳)有限公司 Text key message extracting method, device, computer equipment and storage medium
CN108563782A (en) * 2018-04-25 2018-09-21 平安科技(深圳)有限公司 Merchandise news format processing method, device, computer equipment and storage medium
CN108876600A (en) * 2018-08-20 2018-11-23 平安科技(深圳)有限公司 Warning information method for pushing, device, computer equipment and medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110956445A (en) * 2019-11-18 2020-04-03 支付宝(杭州)信息技术有限公司 Method and device for generating risk file
CN110956445B (en) * 2019-11-18 2023-03-10 支付宝(杭州)信息技术有限公司 Method and device for generating risk file
CN111476664A (en) * 2020-05-04 2020-07-31 武汉众邦银行股份有限公司 Risk perception and risk prediction method based on real-time data flow
CN111582886A (en) * 2020-05-07 2020-08-25 支付宝(杭州)信息技术有限公司 False resource transfer identification method, device, equipment and medium
CN111738848A (en) * 2020-05-19 2020-10-02 深圳追一科技有限公司 Feature data generation method and device, computer equipment and storage medium
CN111738848B (en) * 2020-05-19 2024-03-19 深圳追一科技有限公司 Method, device, computer equipment and storage medium for generating characteristic data
CN114662453A (en) * 2020-12-23 2022-06-24 腾讯科技(深圳)有限公司 Message generation method and device, computer equipment and storage medium
CN113256121A (en) * 2021-05-26 2021-08-13 杭州云象网络技术有限公司 Artificial intelligent money laundering method and system

Similar Documents

Publication Publication Date Title
CN109767326A (en) Suspicious transaction reporting generation method, device, computer equipment and storage medium
CN109767322A (en) Suspicious transaction analysis method, apparatus and computer equipment based on big data
WO2020253358A1 (en) Service data risk control analysis processing method, apparatus and computer device
CN109523153A (en) Acquisition methods, device, computer equipment and the storage medium of illegal fund collection enterprise
CN108876133B (en) Risk assessment processing method, device, server and medium based on business information
CN109858737B (en) Grading model adjustment method and device based on model deployment and computer equipment
CN110704633A (en) Named entity recognition method and device, computer equipment and storage medium
CN110489520A (en) Event-handling method, device, equipment and the storage medium of knowledge based map
CN109886554B (en) Illegal behavior discrimination method, device, computer equipment and storage medium
CN109657918A (en) Method for prewarning risk, device and the computer equipment of association assessment object
CN110489561A (en) Knowledge mapping construction method, device, computer equipment and storage medium
CN108876600A (en) Warning information method for pushing, device, computer equipment and medium
CN110490720A (en) Financial data analysis and early warning method, apparatus, computer equipment and storage medium
CN109636607A (en) Business data processing method, device and computer equipment based on model deployment
CN109829629A (en) Generation method, device, computer equipment and the storage medium of risk analysis reports
CN109816503A (en) Financial details data creation method, device, computer equipment and storage medium
CN109903045B (en) Behavior track monitoring method, device, computer equipment and medium
CN109801151A (en) Financial fraud risk monitoring and control method, apparatus, computer equipment and storage medium
CN109063921A (en) Optimized treatment method, device, computer equipment and the medium of customer risk early warning
CN109767226A (en) Suspicious transaction statistical views generation method and device based on big data
CN110442713A (en) Abstract generation method, apparatus, computer equipment and storage medium
CN109583682A (en) Recognition methods, device and the computer equipment of business finance fraud risk
CN111861729A (en) Behavior scoring system and method based on lstm
CN113052703A (en) Transaction risk early warning method and device
CN109711301A (en) Driver's checking method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination