CN110135978B - User financial risk assessment method and device, electronic equipment and readable medium - Google Patents
User financial risk assessment method and device, electronic equipment and readable medium Download PDFInfo
- Publication number
- CN110135978B CN110135978B CN201910341297.0A CN201910341297A CN110135978B CN 110135978 B CN110135978 B CN 110135978B CN 201910341297 A CN201910341297 A CN 201910341297A CN 110135978 B CN110135978 B CN 110135978B
- Authority
- CN
- China
- Prior art keywords
- network
- user
- nodes
- relationship
- attributes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012502 risk assessment Methods 0.000 title claims abstract description 42
- 238000011156 evaluation Methods 0.000 claims description 13
- 230000003993 interaction Effects 0.000 claims description 9
- 230000002452 interceptive effect Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 6
- 238000010276 construction Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 238000012216 screening Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000005111 flow chemistry technique Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The disclosure relates to a user financial risk assessment method, device, electronic equipment and computer readable medium. The method comprises the following steps: acquiring basic information of a current user; comparing the similarity of the current user with at least one registered user in at least one relationship network based on the basic information; determining a target relationship network from the at least one relationship network according to the comparison result; and performing financial risk assessment of the current user according to the characteristic attribute of the target relationship network. The user financial risk assessment method, the device, the electronic equipment and the computer readable medium can quickly and accurately estimate the financial risk of the user comprehensively.
Description
Technical Field
The present disclosure relates to the field of computer information processing, and in particular, to a method and an apparatus for evaluating a financial risk of a user, an electronic device, and a computer-readable medium.
Background
Credit refers to a form of value movement subject to repayment and payment, and generally includes credit activities such as bank deposits, loans, and the like. The loan is necessarily accompanied by risks, and in order to avoid the risks of being open to debt, bad account and the like, the financial risk of the user needs to be evaluated during the credit process to determine whether to provide credit service for the user.
Traditional financial institutions' assessment of financial risk may depend on basic information provided by the user and the experience set by the administrator. Such as basic wages, fixed assets, and work filled by the user, the manager determines the financial risk of the user based on historical experience. However, some users currently have malicious spoofing situations, and often provide false work, education, and other information to obtain higher financial services. Under the condition, the mode of judging the financial risk of the user only by depending on the experience of management personnel has a plurality of disadvantages, and brings great financial risk to enterprises. Traditional financial institution assessment of financial risk may also rely on big data processing means, such as determining whether the user is at financial risk based on a user representation or previous financial historical activities of the user. However, this way of handling big data also fails to provide an accurate assessment of the financial risk of the user when the user has concealed or tampered with personal information.
Therefore, there is a need for a new method, apparatus, electronic device and computer readable medium for user financial risk assessment.
The above information disclosed in this background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of this, the present disclosure provides a method and an apparatus for evaluating a financial risk of a user, an electronic device, and a computer readable medium, which can quickly and accurately estimate a financial risk of a user and reduce a financial risk of an enterprise.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to an aspect of the present disclosure, a method for assessing financial risk of a user is provided, the method including: acquiring basic information of a current user; comparing the similarity of the current user with at least one registered user in at least one relationship network based on the basic information; determining a target relationship network from the at least one relationship network according to the comparison result; and performing financial risk assessment of the current user according to the characteristic attribute of the target relationship network.
In an exemplary embodiment of the present disclosure, further comprising: and constructing the at least one relationship network according to the basic information of a plurality of registered users.
In an exemplary embodiment of the present disclosure, constructing the at least one relationship network according to the basic information of the registered users includes: acquiring basic information of a plurality of registered users, wherein the basic information comprises contact persons and interactive record information; determining an association relationship between the plurality of registered users based on the basic information; and constructing the at least one relationship network by the plurality of registered users based on the incidence relationship.
In an exemplary embodiment of the present disclosure, determining the association relationship between the plurality of registered users based on the basic information further includes: determining a number of associations between the plurality of registered users based on the base information.
In an exemplary embodiment of the present disclosure, constructing the at least one relationship network by the registered user based on the incidence relation comprises: taking the incidence relation as the edge of the network; using a registered user as a node of a network; and building the at least one relational network based on the edges and the nodes.
In an exemplary embodiment of the present disclosure, the registering a user as a node of a network includes: determining attributes of the registered user; and determining attributes of the node based on the attributes; the attributes comprise positive attributes and negative attributes.
In an exemplary embodiment of the present disclosure, constructing the at least one relational network based on the edges and the nodes comprises: constructing a global network based on the edges and the nodes; determining similarity between nodes in the global network; and dividing the global network into at least one relational network based on the similarity between the nodes.
In an exemplary embodiment of the present disclosure, determining a target relationship network from the at least one relationship network according to the comparison result includes: determining a target registered user from the at least one registered user according to the comparison result; and determining the relationship network to which the target registered user belongs as the target relationship network.
In an exemplary embodiment of the present disclosure, the performing the financial risk assessment of the current user according to the characteristic attribute of the target relationship network further comprises: acquiring attributes of all nodes in the target relation network; determining the characteristic attribute of the target relational network according to the attributes of all the nodes; the feature attributes comprise positive feature attributes and negative feature attributes.
In an exemplary embodiment of the present disclosure, the performing the financial risk assessment of the current user according to the characteristic attribute of the target relationship network includes: and when the characteristic attribute of the target relationship network is a negative characteristic attribute, determining the current user as a high financial risk user.
According to an aspect of the present disclosure, there is provided a user financial risk assessment apparatus, the apparatus including: the information module is used for acquiring basic information of a current user; a comparison module, configured to compare similarity between the current user and at least one registered user in at least one relationship network based on the basic information; the target module is used for determining a target relational network from the at least one relational network according to the comparison result; and the evaluation module is used for carrying out financial risk evaluation on the current user according to the characteristic attribute of the target relationship network.
In an exemplary embodiment of the present disclosure, further comprising: and the network construction module is used for constructing the at least one relationship network according to the basic information of the plurality of registered users.
In an exemplary embodiment of the present disclosure, the network construction module includes: the data unit is used for acquiring basic information of a plurality of registered users, wherein the basic information comprises contact persons and interactive record information; a relation unit, configured to determine an association relation between the plurality of registered users based on the basic information; and a construction unit for constructing the at least one relationship network by the plurality of registered users based on the incidence relationship.
In an exemplary embodiment of the disclosure, the relationship unit is further configured to determine a number of association relationships between the plurality of registered users based on the basic information.
In an exemplary embodiment of the present disclosure, the relationship unit is further configured to treat the association relationship as an edge of a network; using a registered user as a node of a network; and building the at least one relational network based on the edges and the nodes.
In an exemplary embodiment of the present disclosure, the relationship unit is further configured to determine an attribute of the registered user; and determining attributes of the node based on the attributes; the attributes comprise positive attributes and negative attributes.
In an exemplary embodiment of the present disclosure, the relationship unit is further configured to construct a global network based on the edges and the nodes; determining similarity between nodes in the global network; and dividing the global network into at least one relational network based on the similarity between the nodes.
In an exemplary embodiment of the present disclosure, the target module includes: the subscriber unit is used for determining a target registered subscriber from the at least one registered subscriber according to the comparison result; and the target unit is used for determining the relationship network to which the target registered user belongs as the target relationship network.
In an exemplary embodiment of the disclosure, the evaluation module further includes: the attribute unit is used for acquiring the attributes of all nodes in the target relational network; the characteristic unit is used for determining the characteristic attribute of the target relational network according to the attributes of all the nodes; the feature attributes comprise positive feature attributes and negative feature attributes.
In an exemplary embodiment of the disclosure, the evaluation module includes: and the evaluation unit is used for determining the current user as the high-financial-risk user when the characteristic attribute of the target relationship network is a negative characteristic attribute.
According to an aspect of the present disclosure, an electronic device is provided, the electronic device including: one or more processors; storage means for storing one or more programs; when executed by one or more processors, cause the one or more processors to implement a method as above.
According to an aspect of the disclosure, a computer-readable medium is proposed, on which a computer program is stored, which program, when being executed by a processor, carries out the method as above.
According to the user financial risk assessment method, the device, the electronic equipment and the computer readable medium, similarity comparison is carried out on the current user and at least one relationship network based on the basic information; determining a target relation network according to the comparison result; and performing financial risk assessment of the current user according to the characteristic attribute of the target relationship network. The financial risk of the user can be rapidly and accurately estimated comprehensively, and the financial risk probability of an enterprise is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings. The drawings described below are merely some embodiments of the present disclosure, and other drawings may be derived from those drawings by those of ordinary skill in the art without inventive effort.
Fig. 1 is a block diagram illustrating an application scenario of a user financial risk assessment method and apparatus according to an exemplary embodiment.
FIG. 2 is a flow diagram illustrating a method for user financial risk assessment, according to an example embodiment.
FIG. 3 is a schematic diagram illustrating a method for user financial risk assessment, according to another exemplary embodiment.
FIG. 4 is a flow chart illustrating a method for user financial risk assessment according to another exemplary embodiment.
FIG. 5 is a block diagram illustrating a user financial risk assessment device according to an exemplary embodiment.
FIG. 6 is a block diagram illustrating a user financial risk assessment device according to another exemplary embodiment.
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another. Thus, a first component discussed below may be termed a second component without departing from the teachings of the disclosed concept. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It is to be understood by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present disclosure and are, therefore, not intended to limit the scope of the present disclosure.
Fig. 1 is a block diagram illustrating an application scenario of a user financial risk assessment method and apparatus according to an exemplary embodiment.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a financial service platform application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server that provides various services, such as a background management server that supports financial services websites browsed by the user using the terminal apparatuses 101, 102, and 103. The server 105 may perform processing such as analysis on the received data such as the financial service request, and feed back the processing result (user financial risk prompt) to the administrator terminal device.
The server 105 may, for example, obtain basic information of the current user; server 105 may compare the current user to at least one registered user in at least one relationship network, e.g., based on the base information; the server 105 may determine a target relationship network from the at least one relationship network, e.g. according to the comparison result; the server 105 may make a financial risk assessment of the current user, for example, based on the characteristic attributes of the target relationship network.
The server 105 may also construct the at least one relationship network, for example, from the underlying information of a plurality of registered users.
The server 105 may be a single entity server, or may be composed of a plurality of servers, for example, it should be noted that the user financial risk assessment method provided by the embodiment of the present disclosure may be executed by the server 105, and accordingly, the user financial risk assessment apparatus may be disposed in the server 105. The web page end for providing financial platform browsing and the request end for making financial service request are generally located in the terminal equipment 101, 102, 103.
According to the user financial risk assessment method and device, similarity comparison is carried out on the current user and at least one relationship network based on the basic information; determining a target relation network according to the comparison result; and performing financial risk assessment of the current user according to the characteristic attribute of the target relationship network. The financial risk of the user can be rapidly and accurately estimated comprehensively, and the financial risk probability of an enterprise is reduced.
The user financial risk assessment method of the present disclosure is described in detail below with the aid of specific embodiments.
FIG. 2 is a flow diagram illustrating a method for user financial risk assessment, according to an example embodiment. The user financial risk assessment method 20 is a detailed description of "building the at least one relationship network from the basic information of a plurality of registered users", and the user financial risk assessment method 20 includes at least steps S202 to S208.
As shown in fig. 2, in S202, basic information of a plurality of registered users is obtained, where the basic information includes contact and interaction record information. The basic information of the user can be acquired through the registered data of the user on the financial network platform. It is worth mentioning that, in order to avoid the fraud of the user, when the user performs the registration of the financial network platform, the mobile phone number provided by the user is checked, and after the check is passed, the user is registered. The real-name verification mode of the mobile phone number of the user can fundamentally avoid the fraudulent behavior of the mobile phone number of the user.
In an embodiment, the related information in the contact of the user may be acquired through the mobile phone number of the user, and specifically may include mobile phone numbers of other users held in the contact and call records stored in the contact.
In one embodiment, the interaction record information of the mobile phone number on other platforms can be obtained through registration information of the mobile phone number of the user on other social networks, and the interaction record information can be retrieved in certain communication software through the mobile phone number of the user, so that the relevant other user IDs of the user ID bound with the number and transmitted with the interaction information can be determined.
In S204, an association relationship between the plurality of registered users is determined based on the basic information. The interactive relationship between users in the basic information can determine the incidence relationship between users.
In an embodiment, the obtaining of the relevant information in the contact of the a user through the mobile phone number of the a user may include: and the mobile phone numbers of other users and the call records stored in the contact persons. The mobile phone numbers of other users can be determined from the mobile phone numbers and the call records of other users, the mobile phone numbers of the users B, C and C can be obtained through the mobile phone number of the user A, the mobile phone numbers of the users B, C and C are searched on the current financial platform, and users who are registered on the current financial platform are screened out. An association between a and B users, a and D users, may be determined, for example, by screening that B and D users are also registered users of the current financial platform.
In one embodiment, the registration information of the mobile phone number of the user a on other social networks is obtained through the mobile phone number of the user a, the relevant other user IDs of the user ID bound with the number and transmitted by the interactive information are determined, and then the mobile phone numbers of other users are determined through the other user IDs. And continuously screening on the current financial platform through the mobile phone numbers of other users to determine the association relationship between the users.
The method for determining the incidence relation between the registered users on the current financial network platform through the interaction relation between the users on different communication platforms can avoid the fraudulent behaviors of the users to a great extent.
In one embodiment, determining the associative relationship between the plurality of registered users based on the base information further comprises: determining a number of associations between the plurality of registered users based on the base information. For example, if the association relationship between the a user and the B user only exists in the channel of the contact, if the number of the association relationship between the a user and the B user is 1; if the incidence relation of 2 channels (contact persons and interactive record information) exists between the user A and the user B, the number of the incidence relation between the user A and the user B is 2.
In one embodiment, the association relationship between users may also include other relationships, such as two users having an edge when they have a phone call or a text message, or two people having an invitation or a contact, or sharing the same wifi and the same device, and having an edge between them.
In S206, the association is used as an edge of the network. The edge of the network generated by the association relationship may be a non-directional line segment edge or a directional edge.
In one embodiment, when an edge has a direction, the direction is pointed by an active user to a passive user. The active user is worthy of being the initiator of the call or the interaction, and the passive user refers to the receiver of the call or the interaction.
In S208, the registered user is regarded as a node of the network. Wherein, using the registered user as a node of the network comprises: determining attributes of the registered user; and determining attributes of the node based on the attributes; the attributes comprise positive attributes and negative attributes. Where each registered user is pre-assigned attributes, a positive attribute may, for example, represent that the user has good financial credit and a negative attribute represents that the user belongs to a frequently defaulting user. For example, the positive attribute represents that the user has a strong payment capability, the negative attribute represents that the user has a poor payment capability, and the like, which is not limited in the present application.
In S210, the at least one relational network is constructed based on the edges and the nodes.
In one embodiment, constructing the at least one relational network based on the edges and the nodes comprises: constructing a global network based on the edges and the nodes; determining similarity between nodes in the global network; and dividing the global network into at least one relational network based on the similarity between the nodes.
In one embodiment, the similarity may be calculated by, for example, the length of the call between each two users, or by sending a short message to each other, or by leaving the number of the contact to each other. The similarity between the online social network nodes describes the similarity between the online social network users, and according to different requirements and definitions, the similarity can be measured by using corresponding indexes, which specifically include the following indexes:
the Salton metric, also known as cosine similarity, is defined as the square root of the product of the ratio of the mutual neighbors of two nodes over their respective node degrees.
The Jaccard index is defined by the sum of the number of their neighbors over the ratio of the common neighbors of the two vertices.
The index is obtained by the sum of the degrees of two times of the mutual neighbor ratios of the two nodes.
The large node is a favorable index (HPI), and the number of common neighbors of two nodes is larger than the smaller node degree of the two nodes, so that the large node and other nodes are easier to have high similarity.
The high-degree node adverse index (HDI) is similar to HPI, and the denominator is obtained by taking the maximum value of the node degrees at both ends.
LHN-I index, the product of the ratio of the two vertex mutual neighbors to their degree.
The similarity between nodes may be determined by one or more of the metrics above.
In one embodiment, the similarity between nodes in the global network may be determined, for example, by hierarchical clustering. In the field of sociology, the similarity or distance between network nodes is generally defined by the topology of a given network, and then the network nodes are grouped into a tree-graph hierarchy by adopting single-connection hierarchical clustering or full-connection hierarchical clustering. Wherein leaf nodes of the tree represent network nodes, and non-leaf nodes are generally obtained by merging similar or closely spaced child nodes.
FIG. 3 is a schematic diagram illustrating a method for user financial risk assessment, according to another exemplary embodiment. As shown in FIG. 3, in one embodiment, the global network may be clustered by similarities between nodes, such that the global network is divided into a plurality of relational networks.
The global network may be partitioned to form at least one relational network by: and calculating the similarity between the nodes according to the number of incidence relations between every two nodes in the global network, and gradually reconnecting the nodes according to the sequence of the similarity from high to low. The method has the advantages that the division can be stopped at any time, and the method mainly comprises the following steps:
removing all edges in the network to obtain an initial state with n isolated nodes;
calculating the similarity of each pair of nodes in the network;
connecting corresponding node pairs from strong to weak according to the similarity to form a tree diagram;
and cutting the tree diagram according to the actual requirement to obtain a global network containing a plurality of relational networks.
According to the user financial risk assessment method disclosed by the invention, the global network formed by the users is divided into a plurality of relationship networks according to the association relationship between the users and the similarity between the users, so that the registered users with close relationship can be accurately and reasonably divided into one relationship network, and the user similarity in the relationship network is close, so that the relationship network can reflect the integrated characteristics of the users, and the financial risk classification judgment and the user characteristic description of the newly registered users in the later period are facilitated.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
FIG. 4 is a flow chart illustrating a method for user financial risk assessment according to another exemplary embodiment. The flowchart 40 shown in fig. 4 includes at least steps S402 to S408.
As shown in fig. 4, in S402, basic information of the current user is acquired. The basic information comprises contact persons and interactive record information; the interactive record information can be searched and determined on other communication network platforms by the mobile phone number in the contact of the current user.
In S404, the current user is compared with at least one registered user in at least one relationship network for similarity based on the basic information. For example, a random screening method may be adopted, in which one relationship network is determined from a plurality of relationship networks, and then a registered user is randomly determined from the relationship network for similarity comparison.
For example, the relationship networks having common characteristics with the user may be determined by performing a preliminary screening among the plurality of relationship networks according to other basic information of the user, such as the geographic location of the user, the gender or work information of the user, and the like, so as to perform a subsequent similarity comparison.
For example, the target user may be randomly determined among the registered users for similarity comparison, and a plurality of registered users may be preliminarily screened according to other basic information of the current user, such as the geographic location of the user, the gender or work information of the user, and the like, to determine registered users having common characteristics with the user for subsequent similarity comparison.
In S406, a target relationship network is determined from the at least one relationship network according to the comparison result.
In one embodiment, determining the target relationship network from the at least one relationship network according to the comparison result comprises: determining a target registered user from the at least one registered user according to the comparison result; and determining the relationship network to which the target registered user belongs as the target relationship network.
After the similarity comparison is performed for a plurality of times, the target registered user may be determined, for example, based on the comparison hijacking, and more specifically, a similarity threshold may be determined, for example, and when the similarity between the current user and the registered user is less than the threshold, the target registered user is determined. For example, the threshold of the comparison times may be determined, and for example, the threshold may be 100 times, after the current user is compared with 100 registered users, the similarity comparison is stopped, and then the comparison results of the 100 times of similarities are sequentially sorted from large to small, and the registered user with the largest similarity is taken as the target registered user.
In S408, the financial risk assessment of the current user is performed according to the characteristic attribute of the target relationship network.
In one embodiment, the performing the financial risk assessment of the current user according to the characteristic attributes of the target relationship network further comprises: acquiring attributes of all nodes in the target relation network; determining the characteristic attribute of the target relational network according to the attributes of all the nodes; the feature attributes comprise positive feature attributes and negative feature attributes. More specifically, the attributes of all nodes in the target relational network are obtained, and the number of the attributes of each node is counted.
In one embodiment, there may be, for example, 100 nodes in the target relationship network, with 90 nodes for positive attributes and 10 nodes for negative attributes. The attributes of the target relationship network may be determined based on the number of positive-going attribute nodes and negative-going attribute nodes. More specifically, the attribute of the target relationship network may be determined by setting a negative attribute probability.
The attribute of the target network may be determined as a positive attribute, for example, when the probability of the positive attribute is 95%, that is, when the proportion of the negative node in the target network is less than 5%. In practical situations, different forward attribute probabilities can be set for different regions or credit amounts according to specific situations, and the application is not limited to this.
In one embodiment, the performing the financial risk assessment of the current user based on the characteristic attributes of the target relationship network comprises: and when the characteristic attribute of the target relationship network is a negative characteristic attribute, determining the current user as a high financial risk user.
Those skilled in the art will appreciate that all or part of the steps implementing the above embodiments are implemented as computer programs executed by a CPU. When executed by the CPU, performs the functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
In an embodiment, the most similar user of the current user may also be directly determined, the attribute of the current user may be determined by calculating how many people are positive attributes and how many people are negative attributes in the first-degree and second-degree contacts of the current user, and then the financial risk determination of the current user is performed, which is not limited in this application.
Furthermore, it should be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
FIG. 5 is a block diagram illustrating a user financial risk assessment device according to an exemplary embodiment. As shown in fig. 5, the user financial risk assessment apparatus 50 includes: an information module 502, a comparison module 504, a goal module 506, and an evaluation module 508.
The information module 502 is used for acquiring basic information of a current user;
the comparison module 504 is configured to compare similarity between the current user and at least one registered user in at least one relationship network based on the basic information;
the target module 506 is configured to determine a target relationship network from the at least one relationship network according to the comparison result; the goal module 506 includes: the subscriber unit is used for determining a target registered subscriber from the at least one registered subscriber according to the comparison result; and the target unit is used for determining the relationship network to which the target registered user belongs as the target relationship network.
The evaluation module 508 is configured to perform financial risk evaluation of the current user according to the characteristic attribute of the target relationship network. The evaluation module 508 further comprises: the attribute unit is used for acquiring the attributes of all nodes in the target relational network; the characteristic unit is used for determining the characteristic attribute of the target relational network according to the attributes of all the nodes; the feature attributes comprise positive feature attributes and negative feature attributes. The evaluation module 508 includes: and the evaluation unit is used for determining the current user as the high-financial-risk user when the characteristic attribute of the target relationship network is a negative characteristic attribute.
FIG. 6 is a block diagram illustrating a user financial risk assessment device according to another exemplary embodiment. As shown in fig. 6, the user financial risk evaluating apparatus 60 further includes, in addition to the user financial risk evaluating apparatus 50: a network construction module 602.
The network construction module 602 is configured to construct the at least one relationship network according to basic information of a plurality of registered users. Wherein the network building module 602 includes:
the data unit is used for acquiring basic information of a plurality of registered users, wherein the basic information comprises contact persons and interactive record information;
a relation unit, configured to determine an association relation between the plurality of registered users based on the basic information; the relationship unit is further configured to determine the number of association relationships between the plurality of registered users based on the basic information. The relationship unit is further configured to use the association relationship as an edge of the network; using a registered user as a node of a network; and building the at least one relational network based on the edges and the nodes. The relation unit is further used for determining the attribute of the registered user; and determining attributes of the node based on the attributes; the attributes comprise positive attributes and negative attributes. The relation unit is further used for constructing a global network based on the edges and the nodes; determining similarity between nodes in the global network; and dividing the global network into at least one relational network based on the similarity between the nodes.
A construction unit for constructing the at least one relationship network by the plurality of registered users based on the incidence relation.
According to the user financial risk assessment device disclosed by the invention, similarity comparison is carried out on the current user and at least one relationship network based on the basic information; determining a target relation network according to the comparison result; and performing financial risk assessment of the current user according to the characteristic attribute of the target relationship network. The financial risk of the user can be rapidly and accurately estimated comprehensively, and the financial risk probability of an enterprise is reduced.
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
An electronic device 200 according to this embodiment of the present disclosure is described below with reference to fig. 7. The electronic device 200 shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, the electronic device 200 is embodied in the form of a general purpose computing device. The components of the electronic device 200 may include, but are not limited to: at least one processing unit 210, at least one memory unit 220, a bus 230 connecting different system components (including the memory unit 220 and the processing unit 210), a display unit 240, and the like.
Wherein the storage unit stores program code executable by the processing unit 210 to cause the processing unit 210 to perform the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, the processing unit 210 may perform the steps as shown in fig. 2 and 4.
The memory unit 220 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)2201 and/or a cache memory unit 2202, and may further include a read only memory unit (ROM) 2203.
The storage unit 220 may also include a program/utility 2204 having a set (at least one) of program modules 2205, such program modules 2205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The electronic device 200 may also communicate with one or more external devices 300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 200, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, the electronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 260. The network adapter 260 may communicate with other modules of the electronic device 200 via the bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiments of the present disclosure.
The software product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions of: acquiring basic information of a current user; comparing the similarity of the current user with at least one registered user in at least one relationship network based on the basic information; determining a target relationship network from the at least one relationship network according to the comparison result; and performing financial risk assessment of the current user according to the characteristic attribute of the target relationship network.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
Claims (10)
1. A method for assessing financial risk of a user, comprising:
constructing a global network according to basic information of a plurality of registered users, wherein the basic information comprises contacts and interaction record information, nodes in the global network are the registered users, attributes of the nodes in the global network comprise positive characteristic attributes and negative characteristic attributes, and edges between the nodes in the global network are non-unique directed connection edges;
calculating the similarity between nodes in the global network by using a hierarchical clustering algorithm so as to divide a plurality of registered users in the global network into at least one relationship network according to the similarity;
acquiring basic information of a current user;
comparing the similarity of the current user with at least one registered user in at least one relationship network based on the basic information;
taking the relation network where the registered user with the maximum similarity of the comparison results is as a target relation network; and
and determining the characteristic attributes of the target relationship network according to the quantity of the characteristic attributes of the middle nodes of the target relationship network, so as to carry out financial risk assessment on the current user according to the characteristic attributes of the target relationship network.
2. The method of claim 1, further comprising:
and constructing the at least one relationship network according to the basic information of a plurality of registered users.
3. The method of claim 2, wherein constructing the at least one relationship network from the underlying information of registered users comprises:
acquiring basic information of a plurality of registered users, wherein the basic information comprises contact persons and interactive record information;
determining an association relationship between the plurality of registered users based on the basic information; and
and constructing the at least one relationship network through the plurality of registered users based on the incidence relationship.
4. The method of claim 3, wherein determining the associative relationship between the plurality of registered users based on the base information further comprises:
determining a number of associations between the plurality of registered users based on the base information.
5. The method of claim 3, wherein building the at least one relationship network by the registered user based on the associative relationship comprises:
taking the incidence relation as the edge of the network;
using a registered user as a node of a network; and
building the at least one relational network based on the edges and the nodes.
6. The method of claim 5, wherein using the registered user as a node of the network comprises:
determining attributes of the registered user; and
determining attributes of the node based on the attributes;
the attributes comprise positive attributes and negative attributes.
7. The method of claim 6, wherein constructing the at least one relational network based on the edges and the nodes comprises:
constructing a global network based on the edges and the nodes;
determining similarity between nodes in the global network; and
and dividing the global network into at least one relation network based on the similarity between the nodes.
8. A user financial risk assessment device, comprising:
the network establishing module is used for establishing a global network according to basic information of a plurality of registered users, wherein the basic information comprises contacts and interaction record information, nodes in the global network are the registered users, the attributes of the nodes in the global network comprise positive characteristic attributes and negative characteristic attributes, and edges between the nodes in the global network are non-unique directed connecting edges;
the network splitting module is used for calculating the similarity among a plurality of nodes in the global network by utilizing a hierarchical clustering algorithm so as to divide a plurality of registered users in the global network into at least one relationship network according to the similarity;
the information module is used for acquiring basic information of a current user;
a comparison module, configured to compare similarity between the current user and at least one registered user in at least one relationship network based on the basic information;
the target module is used for taking the relation network where the registered user with the maximum similarity of the comparison results is as a target relation network; and
and the evaluation module is used for determining the characteristic attributes of the target relationship network according to the number of the characteristic attributes of the middle nodes of the target relationship network so as to carry out financial risk evaluation on the current user according to the characteristic attributes of the target relationship network.
9. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
10. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910341297.0A CN110135978B (en) | 2019-04-25 | 2019-04-25 | User financial risk assessment method and device, electronic equipment and readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910341297.0A CN110135978B (en) | 2019-04-25 | 2019-04-25 | User financial risk assessment method and device, electronic equipment and readable medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110135978A CN110135978A (en) | 2019-08-16 |
CN110135978B true CN110135978B (en) | 2021-07-30 |
Family
ID=67571043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910341297.0A Active CN110135978B (en) | 2019-04-25 | 2019-04-25 | User financial risk assessment method and device, electronic equipment and readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110135978B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110956391A (en) * | 2019-11-28 | 2020-04-03 | 中信银行股份有限公司 | Information processing method based on finance and electronic equipment |
CN111199473A (en) * | 2019-12-16 | 2020-05-26 | 北京淇瑀信息科技有限公司 | Anti-cheating method, device and system based on transaction record information |
CN112115381B (en) * | 2020-09-28 | 2024-08-02 | 北京百度网讯科技有限公司 | Construction method, device, electronic equipment and medium of fusion relation network |
CN112348659B (en) * | 2020-10-21 | 2024-03-19 | 上海淇玥信息技术有限公司 | User identification policy distribution method and device and electronic equipment |
CN113297436B (en) * | 2021-04-28 | 2023-09-05 | 上海淇玥信息技术有限公司 | User policy distribution method and device based on relational graph network and electronic equipment |
CN118096392B (en) * | 2024-04-22 | 2024-07-19 | 珠海凤泽信息科技有限公司 | Intelligent identification method and system for economic risk |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003052621A1 (en) * | 2001-12-14 | 2003-06-26 | The Primiter Group, Llc | System for identifying data relationships |
CN108734479A (en) * | 2018-04-12 | 2018-11-02 | 阿里巴巴集团控股有限公司 | Data processing method, device, equipment and the server of Insurance Fraud identification |
CN109003089A (en) * | 2018-06-28 | 2018-12-14 | 中国工商银行股份有限公司 | risk identification method and device |
CN109543108A (en) * | 2018-11-26 | 2019-03-29 | 中国人民解放军陆军工程大学 | User role mining system facing network multi-domain information |
CN109559192A (en) * | 2018-10-25 | 2019-04-02 | 深圳壹账通智能科技有限公司 | Risk checking method, device, equipment and storage medium based on association map |
CN109670937A (en) * | 2018-09-26 | 2019-04-23 | 平安科技(深圳)有限公司 | Risk subscribers recognition methods, user equipment, storage medium and device |
-
2019
- 2019-04-25 CN CN201910341297.0A patent/CN110135978B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003052621A1 (en) * | 2001-12-14 | 2003-06-26 | The Primiter Group, Llc | System for identifying data relationships |
CN108734479A (en) * | 2018-04-12 | 2018-11-02 | 阿里巴巴集团控股有限公司 | Data processing method, device, equipment and the server of Insurance Fraud identification |
CN109003089A (en) * | 2018-06-28 | 2018-12-14 | 中国工商银行股份有限公司 | risk identification method and device |
CN109670937A (en) * | 2018-09-26 | 2019-04-23 | 平安科技(深圳)有限公司 | Risk subscribers recognition methods, user equipment, storage medium and device |
CN109559192A (en) * | 2018-10-25 | 2019-04-02 | 深圳壹账通智能科技有限公司 | Risk checking method, device, equipment and storage medium based on association map |
CN109543108A (en) * | 2018-11-26 | 2019-03-29 | 中国人民解放军陆军工程大学 | User role mining system facing network multi-domain information |
Also Published As
Publication number | Publication date |
---|---|
CN110135978A (en) | 2019-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110135978B (en) | User financial risk assessment method and device, electronic equipment and readable medium | |
US11985037B2 (en) | Systems and methods for conducting more reliable assessments with connectivity statistics | |
CN112148987B (en) | Message pushing method based on target object activity and related equipment | |
CN108009915B (en) | Marking method and related device for fraudulent user community | |
CN110148053B (en) | User credit line evaluation method and device, electronic equipment and readable medium | |
US9785989B2 (en) | Determining a characteristic group | |
CN111199474B (en) | Risk prediction method and device based on network map data of two parties and electronic equipment | |
CN112508694B (en) | Method and device for processing resource limit application by server and electronic equipment | |
CN111046237B (en) | User behavior data processing method and device, electronic equipment and readable medium | |
CN111210335B (en) | User risk identification method and device and electronic equipment | |
US20210136120A1 (en) | Universal computing asset registry | |
CN112348659B (en) | User identification policy distribution method and device and electronic equipment | |
CN111598360B (en) | Service policy determination method and device and electronic equipment | |
CN109376287B (en) | House property map construction method, device, computer equipment and storage medium | |
CN111414490A (en) | Method and device for determining lost connection restoration information, electronic equipment and storage medium | |
CN111191677B (en) | User characteristic data generation method and device and electronic equipment | |
CN109829593B (en) | Credit determining method and device for target object, storage medium and electronic device | |
WO2019095569A1 (en) | Financial analysis method based on financial and economic event on microblog, application server, and computer readable storage medium | |
CN116739605A (en) | Transaction data detection method, device, equipment and storage medium | |
US10970341B2 (en) | Predictive modeling in event processing systems for big data processing in cloud | |
CN114443663A (en) | Data table processing method, device, equipment and medium | |
CN113297436A (en) | User policy distribution method and device based on relational graph network and electronic equipment | |
CN112348661A (en) | Service strategy distribution method and device based on user behavior track and electronic equipment | |
CN114219053B (en) | User position information processing method and device and electronic equipment | |
US11847229B1 (en) | System, device, and method for transient event detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |