CN111161054A - Operation risk monitoring method and system - Google Patents

Operation risk monitoring method and system Download PDF

Info

Publication number
CN111161054A
CN111161054A CN202010002550.2A CN202010002550A CN111161054A CN 111161054 A CN111161054 A CN 111161054A CN 202010002550 A CN202010002550 A CN 202010002550A CN 111161054 A CN111161054 A CN 111161054A
Authority
CN
China
Prior art keywords
user
information data
risk
monitored
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010002550.2A
Other languages
Chinese (zh)
Inventor
丁平
李帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010002550.2A priority Critical patent/CN111161054A/en
Publication of CN111161054A publication Critical patent/CN111161054A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an operation risk monitoring method and system, wherein the method comprises the following steps: obtaining identity information data in a preset relation database according to an identity of a user to be monitored, and obtaining transaction information data of the user in a preset transaction database according to the identity information data; matching the transaction information data with a plurality of preset evaluation rules respectively, and obtaining a risk evaluation result according to a matching result; training through a machine learning algorithm according to the identity information data, the transaction information data and the risk assessment result of the user to obtain a risk prediction model; and monitoring the real-time transaction data of the user to be monitored, and acquiring a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.

Description

Operation risk monitoring method and system
Technical Field
The present invention relates to the field of data monitoring, and in particular, to a method and a system for monitoring operational risk.
Background
In the current data monitoring field, monitoring about illegal operations of users is mainly applied to post analysis and judgment, and due to illegal operations of users, the monitoring result often causes great capital and safety loss, for example, under the conditions that workers in the financial field draw credit funds, credit card funds, collect or transit other person funds into stock markets in an illegal way, and invest and fund precious metals in an illegal way by using working time, and when problems are found after manual investigation is carried out by a service administration department through data screening, letter visit verification, inquiry and complaint information, the losses are often difficult to be recovered.
Therefore, a method and a system capable of effectively exploring potential risks in advance or in the process are urgently needed in the industry to provide a prompt for relevant supervision departments, so that the monitoring efficiency of risk investigation is improved on the premise that the supervision departments can timely stop relevant illegal operations to reduce unnecessary property loss.
Disclosure of Invention
In order to solve the above technical problems, an object of the present invention is to provide an operation risk monitoring method and system, which can early warn a designated person about an illegal operation of a user in advance, so as to eliminate a possible risk in time and reduce a related loss caused by the illegal operation of the user.
To achieve the above object, the operation risk monitoring method provided by the present invention specifically comprises: obtaining identity information data in a preset relation database according to an identity of a user to be monitored, and obtaining transaction information data of the user in a preset transaction database according to the identity information data; matching the transaction information data with a plurality of preset evaluation rules respectively, and obtaining a risk evaluation result according to a matching result; training through a machine learning algorithm according to the identity information data, the transaction information data and the risk assessment result of the user to obtain a risk prediction model; and monitoring the real-time transaction data of the user to be monitored, and acquiring a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
In the above operation risk monitoring method, preferably, the identity information data includes identity basic information, asset information, and relationship information stored in the DCDS system by the user to be monitored; the trading information data comprises trading settlement information and security trading information of the user to be monitored, which are recorded on a predetermined trading platform.
In the above-mentioned job risk monitoring method, preferably, the comparing the transaction information data with a plurality of preset thresholds, and obtaining a risk assessment result according to the comparison result includes: matching the transaction information data with a plurality of preset evaluation rules respectively to obtain a plurality of matching results; and comparing and judging the combination of one or more matching results with a preset corresponding table to obtain a risk evaluation result.
In the above method for monitoring job risk, preferably, the obtaining transaction information data of the user from the predetermined transaction database according to the identity information data includes: and acquiring a family relation map of the user according to the identity information data, and inquiring transaction information data of the user to be monitored and the corresponding family members according to the family relation map.
In the above job risk monitoring method, preferably, matching the transaction information data with a plurality of preset evaluation rules, respectively, and obtaining a risk assessment result according to a matching result includes: matching the transaction information data with a plurality of preset evaluation rules through a preset rule engine and a risk engine, and obtaining a risk evaluation result according to a matching result; generating a prompt strategy according to the risk evaluation result and the prompt category in a preset prompt corresponding table; and executing corresponding promotion processing according to the prompt strategy.
In the above job risk monitoring method, preferably, matching the transaction information data with a plurality of preset evaluation rules, respectively, and obtaining a risk assessment result according to a matching result includes: when a fund flow exists between the user to be monitored and the corresponding family member and is transferred to the account of the user to be monitored, or security trading is carried out, and a first evaluation result is generated; obtaining a second evaluation result of the user to be monitored according to the cash transfer transaction flow record of the user to be monitored in the transaction information data; when the user to be monitored has various loans and all or part of loans are released to a trading market, generating a third evaluation result; when the existence of the user to be monitored is borrowed in real time and the whole or part of borrowed funds are released to a trading market, generating a fourth evaluation result; traversing corresponding prompt categories in a preset prompt corresponding table according to one or more combinations of the first evaluation result, the second evaluation result, the third evaluation result and the fourth evaluation result to obtain a prompt strategy; and executing corresponding promotion processing according to the prompt strategy.
The invention also provides an operation risk monitoring system, which comprises a data acquisition module, a data processing module, a model construction module and an analysis and evaluation module; the data acquisition module is used for acquiring identity information data in a preset relation database according to the identity of a user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data; monitoring real-time transaction data of the user to be monitored; the data processing module is used for matching the transaction information data with a plurality of preset evaluation rules respectively and obtaining a risk evaluation result according to a matching result; the model construction module is used for training through a machine learning algorithm according to the identity information data, the transaction information data and the risk evaluation result of the user to obtain a risk prediction model; and the analysis and evaluation module is used for obtaining a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
In the above operation risk monitoring system, preferably, the data acquisition module includes a real-time data acquisition unit and an offline data acquisition unit; the real-time data acquisition unit is used for monitoring real-time transaction data of the user to be monitored; the off-line data acquisition unit is used for acquiring identity information data in a preset relation database according to the identity of the user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
The invention has the beneficial technical effects that: through stream type calculation, the abnormal transaction behavior of the user can be monitored in real time and early-warning is given; meanwhile, compared with the existing manual inspection, the efficiency is higher and the real-time performance is stronger; meanwhile, the rule definition has stronger adjustability and adaptability and more comprehensive detection.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
fig. 1 is a schematic flow chart illustrating an operation risk monitoring method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of user association information according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a user-related information acquisition channel and content according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a preset mapping table according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an operation risk monitoring system according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a computer device according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a process for constructing a risk prediction model according to an embodiment of the present invention;
fig. 8 is a schematic application flow diagram of an operation risk monitoring method according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided with reference to the drawings and examples, so that how to apply the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented. It should be noted that, unless otherwise specified, the embodiments and features of the embodiments of the present invention may be combined with each other, and the technical solutions formed are within the scope of the present invention.
In the description of the present specification, the terms "comprising," "including," "having," "containing," and the like are used in an open-ended fashion, i.e., to mean including, but not limited to. Reference to the description of the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," etc., means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. The sequence of steps involved in the embodiments is for illustrative purposes to illustrate the implementation of the present application, and the sequence of steps is not limited and can be adjusted as needed.
Additionally, the steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions and, although a logical order is illustrated in the flow charts, in some cases, the steps illustrated or described may be performed in an order different than here.
Referring to fig. 1, the operation risk monitoring method provided by the present invention specifically includes: s101, obtaining identity information data in a preset relation database according to an identity of a user to be monitored, and obtaining transaction information data of the user in a preset transaction database according to the identity information data; s102, the transaction information data are respectively matched with a plurality of preset evaluation rules, and a risk evaluation result is obtained according to a matching result; s103, training through a machine learning algorithm according to the identity information data, the transaction information data and the risk assessment result of the user to obtain a risk prediction model; s104, monitoring the real-time transaction data of the user to be monitored, and acquiring a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model. Therefore, in the actual use process, when the operation risk supervision method is applied to the traditional banking field, the data inside and outside the bank can be integrated and analyzed, and an expert rule base is established through relevant evaluation rules of information integration such as expert rules and model elements provided by auditors and risk management and control personnel, so that flexibly configurable risk rule causes and risk score causes are formed. Giving corresponding risk corresponding processing strategies according to the risk level of the evaluation rule, and monitoring and reminding the staff in real time; according to the operation risk supervision method, the fact that internal personnel have great risks or have great possible loss events is forecasted, early warning is conducted in advance, and offline responsible personnel supervise and check to prevent major events.
Referring to fig. 2, in the above embodiment, the identity information data includes identity basic information, asset information, and relationship information stored in the DCDS system by the user to be monitored; the trading information data comprises trading settlement information and security trading information of the user to be monitored, which are recorded on a predetermined trading platform. Specifically, related files such as personal client basic information files, asset information files, inline information and the like can be obtained through a DCDS system, and mass data obtained in real time or in batch are analyzed and calculated; in this embodiment, specific contents of the identity information data and the transaction information data may be as shown in fig. 3.
In an embodiment of the present invention, comparing the transaction information data with a plurality of preset thresholds, and obtaining a risk assessment result according to the comparison result includes: matching the transaction information data with a plurality of preset evaluation rules respectively to obtain a plurality of matching results; and comparing and judging the combination of one or more matching results with a preset corresponding table to obtain a risk evaluation result. Specifically, matching the transaction information data with a plurality of preset evaluation rules, and obtaining a risk assessment result according to a matching result may further include: matching the transaction information data with a plurality of preset evaluation rules through a preset rule engine and a risk engine, and obtaining a risk evaluation result according to a matching result; generating a prompt strategy according to the risk evaluation result and the prompt category in a preset prompt corresponding table; executing corresponding promotion processing according to the prompt strategy; in this embodiment, one matching result may be compared with a correspondence table set in advance by a worker, or a plurality of matching results may be compared with the correspondence table to obtain a more comprehensive processing policy; the corresponding table can be set by the staff in advance, for example, the corresponding table is processed by adopting which processing strategy when a certain condition occurs so as to eliminate the potential risk; of course, in practical work, a person skilled in the art may set the corresponding table in other ways, and the present invention is not limited herein.
In an embodiment of the present invention, obtaining the transaction information data of the user in the predetermined transaction database according to the identity information data comprises: acquiring a family relation map of a user according to the identity information data, and inquiring transaction information data of the user to be monitored and corresponding family members according to the family relation map; based on this embodiment, please refer to fig. 4, the matching the transaction information data with a plurality of preset evaluation rules, and obtaining the risk assessment result according to the matching result may further include: when a fund flow exists between the user to be monitored and the corresponding family member and is transferred to the account of the user to be monitored, or security trading is carried out, and a first evaluation result is generated; obtaining a second evaluation result of the user to be monitored according to the cash transfer transaction flow record of the user to be monitored in the transaction information data; when the user to be monitored has various loans and all or part of loans are released to a trading market, generating a third evaluation result; when the existence of the user to be monitored is borrowed in real time and the whole or part of borrowed funds are released to a trading market, generating a fourth evaluation result; traversing corresponding prompt categories in a preset prompt corresponding table according to one or more combinations of the first evaluation result, the second evaluation result, the third evaluation result and the fourth evaluation result to obtain a prompt strategy; executing corresponding promotion processing according to the prompt strategy; it should be noted that the drawings and the above embodiments are only one processing and evaluating method provided by the present invention, and the whole scheme is not further limited, and those skilled in the art can select an appropriate processing method, feedback result and approval process according to actual needs.
Referring to fig. 5, the present invention further provides an operation risk monitoring system, which includes a data acquisition module, a data processing module, a model building module, and an analysis and evaluation module; the data acquisition module is used for acquiring identity information data in a preset relation database according to the identity of a user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data; monitoring real-time transaction data of the user to be monitored; the data processing module is used for matching the transaction information data with a plurality of preset evaluation rules respectively and obtaining a risk evaluation result according to a matching result; the model construction module is used for training through a machine learning algorithm according to the identity information data, the transaction information data and the risk evaluation result of the user to obtain a risk prediction model; and the analysis and evaluation module is used for obtaining a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
In the operation risk monitoring system, the data acquisition module may include a real-time data acquisition unit and an offline data acquisition unit; the real-time data acquisition unit is used for monitoring real-time transaction data of the user to be monitored; the off-line data acquisition unit is used for acquiring identity information data in a preset relation database according to the identity of the user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data.
Referring to fig. 7, when the operation risk monitoring system provided by the present invention is used to perform risk prediction in actual work, the principle is to determine a specific group with major abnormality by machine learning according to specific transaction characteristics. The module is a simple two-classification model, a support vector machine is adopted for model training, and the trained model is loaded into a production system, so that a prediction result is obtained. Specifically, please refer to fig. 7, which mainly includes data acquisition, data processing, feature engineering, feature storage, and generation of a machine learning model, and several parts are generated as a result; wherein, the data acquisition: the system comprises internal system data (such as core bank balance and the like), external system data (such as Unionpay transaction data), and real-time receiving data (data of real-time transaction of a client); data processing: preprocessing acquired data, such as null filling and the like; characteristic engineering: analyzing and generating features, such as feature screening, feature combination, and the like; and (4) feature storage: storing the characteristics into a specified wide table, and providing the characteristics for training of a machine learning model; and (3) generating a machine learning model: and (3) carrying out model training by adopting an SVM (support vector machine) to generate a model file. The above steps can be implemented respectively by those skilled in the art through the prior art, and the invention is not described herein; referring to fig. 8 again, based on the model file established in the above embodiment, the corresponding risk prediction may be performed, that is, whether there is a high risk is determined through two links of real-time data reception and online prediction, and then the corresponding processing is performed according to the determination result.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
The invention has the beneficial technical effects that: through stream type calculation, the abnormal transaction behavior of the user can be monitored in real time and early-warning is given; meanwhile, compared with the existing manual inspection, the efficiency is higher and the real-time performance is stronger; meanwhile, the rule definition has stronger adjustability and adaptability and more comprehensive detection.
As shown in fig. 6, the computer device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the computer device 600 does not necessarily include all of the components shown in FIG. 6; furthermore, the computer device 600 may also comprise components not shown in fig. 6, as can be seen in the prior art.
As shown in fig. 6, the central processor 100, sometimes referred to as a controller or operational control, may comprise a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the computer apparatus 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the computer device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the computer apparatus 600 by the central processing unit 100.
Memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by a computer device. The driver storage 144 of the memory 140 may include various drivers for the computer device for communication functions and/or for performing other functions of the computer device (e.g., messaging applications, directory applications, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same computer device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. An operational risk monitoring method, comprising:
obtaining identity information data in a preset relation database according to an identity of a user to be monitored, and obtaining transaction information data of the user in a preset transaction database according to the identity information data;
matching the transaction information data with a plurality of preset evaluation rules respectively, and obtaining a risk evaluation result according to a matching result;
training through a machine learning algorithm according to the identity information data, the transaction information data and the risk assessment result of the user to obtain a risk prediction model;
and monitoring the real-time transaction data of the user to be monitored, and acquiring a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
2. The operation risk monitoring method according to claim 1, wherein the identity information data comprises identity basic information, asset information and relationship information stored in the DCDS system by a user to be monitored; the trading information data comprises trading settlement information and security trading information of the user to be monitored, which are recorded on a predetermined trading platform.
3. The job risk monitoring method according to claim 1, wherein comparing the transaction information data with a plurality of preset thresholds, respectively, and obtaining a risk assessment result according to the comparison result comprises:
matching the transaction information data with a plurality of preset evaluation rules respectively to obtain a plurality of matching results;
and comparing and judging the combination of one or more matching results with a preset corresponding table to obtain a risk evaluation result.
4. The job risk monitoring method according to claim 3, wherein obtaining transaction information data of the user in a predetermined transaction database according to the identity information data comprises: and acquiring a family relation map of the user according to the identity information data, and inquiring transaction information data of the user to be monitored and the corresponding family members according to the family relation map.
5. The job risk monitoring method according to claim 4, wherein the matching the transaction information data with a plurality of preset evaluation rules, respectively, and the obtaining a risk assessment result according to the matching result comprises:
matching the transaction information data with a plurality of preset evaluation rules through a preset rule engine and a risk engine, and obtaining a risk evaluation result according to a matching result;
generating a prompt strategy according to the risk evaluation result and the prompt category in a preset prompt corresponding table;
and executing corresponding promotion processing according to the prompt strategy.
6. The job risk monitoring method according to claim 5, wherein the matching the transaction information data with a plurality of preset evaluation rules, respectively, and the obtaining a risk assessment result according to the matching result comprises:
when a fund flow exists between the user to be monitored and the corresponding family member and is transferred to the account of the user to be monitored, or security trading is carried out, and a first evaluation result is generated;
obtaining a second evaluation result of the user to be monitored according to the cash transfer transaction flow record of the user to be monitored in the transaction information data;
when the user to be monitored has various loans and all or part of loans are released to a trading market, generating a third evaluation result;
when the existence of the user to be monitored is borrowed in real time and the whole or part of borrowed funds are released to a trading market, generating a fourth evaluation result;
traversing corresponding prompt categories in a preset prompt corresponding table according to one or more combinations of the first evaluation result, the second evaluation result, the third evaluation result and the fourth evaluation result to obtain a prompt strategy;
and executing corresponding promotion processing according to the prompt strategy.
7. The operation risk monitoring system is characterized by comprising a data acquisition module, a data processing module, a model building module and an analysis and evaluation module;
the data acquisition module is used for acquiring identity information data in a preset relation database according to the identity of a user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data; monitoring real-time transaction data of the user to be monitored;
the data processing module is used for matching the transaction information data with a plurality of preset evaluation rules respectively and obtaining a risk evaluation result according to a matching result;
the model construction module is used for training through a machine learning algorithm according to the identity information data, the transaction information data and the risk evaluation result of the user to obtain a risk prediction model;
and the analysis and evaluation module is used for obtaining a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
8. The operational risk monitoring system according to claim 7, wherein the data acquisition module comprises a real-time data acquisition unit and an off-line data acquisition unit;
the real-time data acquisition unit is used for monitoring real-time transaction data of the user to be monitored;
the off-line data acquisition unit is used for acquiring identity information data in a preset relation database according to the identity of the user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 6.
CN202010002550.2A 2020-01-02 2020-01-02 Operation risk monitoring method and system Pending CN111161054A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010002550.2A CN111161054A (en) 2020-01-02 2020-01-02 Operation risk monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010002550.2A CN111161054A (en) 2020-01-02 2020-01-02 Operation risk monitoring method and system

Publications (1)

Publication Number Publication Date
CN111161054A true CN111161054A (en) 2020-05-15

Family

ID=70561272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010002550.2A Pending CN111161054A (en) 2020-01-02 2020-01-02 Operation risk monitoring method and system

Country Status (1)

Country Link
CN (1) CN111161054A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932359A (en) * 2020-07-16 2020-11-13 吉林亿联银行股份有限公司 Risk monitoring method and system and electronic equipment
CN111967801A (en) * 2020-09-23 2020-11-20 中国建设银行股份有限公司 Transaction risk prediction method and device
CN112017059A (en) * 2020-07-14 2020-12-01 北京淇瑀信息科技有限公司 Hierarchical optimization risk control method and device and electronic equipment
CN112990707A (en) * 2021-03-12 2021-06-18 深圳工盟科技有限公司 Construction risk assessment method, device, equipment and storage medium
CN113065950A (en) * 2021-04-22 2021-07-02 中国工商银行股份有限公司 Credit card limit evaluation method and device
CN113920660A (en) * 2021-09-30 2022-01-11 中国工商银行股份有限公司 Safety monitoring method and system suitable for safety storage equipment
CN114187086A (en) * 2021-11-02 2022-03-15 浙江惠瀜网络科技有限公司 Monitoring method and system suitable for credit fund flow direction and electronic equipment
TWI776370B (en) * 2021-01-25 2022-09-01 第一商業銀行股份有限公司 Investment risk scoring method and system for fund commodities

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110166982A1 (en) * 2003-10-14 2011-07-07 Ften, Inc. Intraday risk management data cloud computing system capable of controlling execution of orders
US20150106251A1 (en) * 2013-12-31 2015-04-16 Nyse Group, Inc. Risk mitigation in an electronic trading system
CN108269186A (en) * 2018-01-23 2018-07-10 平安好房(上海)电子商务有限公司 User information verification method, device, equipment and readable storage medium storing program for executing
CN108717638A (en) * 2018-05-18 2018-10-30 深圳壹账通智能科技有限公司 Fraudulent trading judgment method, device, computer equipment and storage medium
CN109446276A (en) * 2018-09-19 2019-03-08 平安科技(深圳)有限公司 Order hold-up interception method, device, equipment and medium based on relational data model
CN109919468A (en) * 2019-02-26 2019-06-21 金贝塔网络金融科技(深圳)有限公司 Equity investment methods of risk assessment, device and equipment
CN110009475A (en) * 2019-02-12 2019-07-12 平安科技(深圳)有限公司 Risk checks method for monitoring, device, computer equipment and storage medium
CN110570301A (en) * 2019-09-16 2019-12-13 北京三快在线科技有限公司 Risk identification method, device, equipment and medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110166982A1 (en) * 2003-10-14 2011-07-07 Ften, Inc. Intraday risk management data cloud computing system capable of controlling execution of orders
US20150106251A1 (en) * 2013-12-31 2015-04-16 Nyse Group, Inc. Risk mitigation in an electronic trading system
CN108269186A (en) * 2018-01-23 2018-07-10 平安好房(上海)电子商务有限公司 User information verification method, device, equipment and readable storage medium storing program for executing
CN108717638A (en) * 2018-05-18 2018-10-30 深圳壹账通智能科技有限公司 Fraudulent trading judgment method, device, computer equipment and storage medium
CN109446276A (en) * 2018-09-19 2019-03-08 平安科技(深圳)有限公司 Order hold-up interception method, device, equipment and medium based on relational data model
CN110009475A (en) * 2019-02-12 2019-07-12 平安科技(深圳)有限公司 Risk checks method for monitoring, device, computer equipment and storage medium
CN109919468A (en) * 2019-02-26 2019-06-21 金贝塔网络金融科技(深圳)有限公司 Equity investment methods of risk assessment, device and equipment
CN110570301A (en) * 2019-09-16 2019-12-13 北京三快在线科技有限公司 Risk identification method, device, equipment and medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112017059A (en) * 2020-07-14 2020-12-01 北京淇瑀信息科技有限公司 Hierarchical optimization risk control method and device and electronic equipment
CN111932359A (en) * 2020-07-16 2020-11-13 吉林亿联银行股份有限公司 Risk monitoring method and system and electronic equipment
CN111967801A (en) * 2020-09-23 2020-11-20 中国建设银行股份有限公司 Transaction risk prediction method and device
TWI776370B (en) * 2021-01-25 2022-09-01 第一商業銀行股份有限公司 Investment risk scoring method and system for fund commodities
CN112990707A (en) * 2021-03-12 2021-06-18 深圳工盟科技有限公司 Construction risk assessment method, device, equipment and storage medium
CN113065950A (en) * 2021-04-22 2021-07-02 中国工商银行股份有限公司 Credit card limit evaluation method and device
CN113920660A (en) * 2021-09-30 2022-01-11 中国工商银行股份有限公司 Safety monitoring method and system suitable for safety storage equipment
CN114187086A (en) * 2021-11-02 2022-03-15 浙江惠瀜网络科技有限公司 Monitoring method and system suitable for credit fund flow direction and electronic equipment

Similar Documents

Publication Publication Date Title
CN111161054A (en) Operation risk monitoring method and system
CN111275546B (en) Financial customer fraud risk identification method and device
KR100751965B1 (en) method and system for predicting attrition customers
CN111008896A (en) Financial risk early warning method and device, electronic equipment and storage medium
US11127025B2 (en) Predicting economic conditions
CN112232947B (en) Method and device for predicting risk in lending
CN112435112A (en) Bank internet credit wind control method for small and micro enterprises
CN106651463A (en) Financial institution service access system and access method
CN106203808A (en) Enterprise Credit Risk Evaluation method and apparatus
CN112907243B (en) Block chain transaction auditing method and device
CN111932268A (en) Enterprise risk identification method and device
US20200151824A1 (en) Predicting entity outcomes using taxonomy classifications of transactions
US20170161289A1 (en) System to improve data exchange using advanced data analytics
CN106878236A (en) A kind of user's request processing method and equipment
CN115409518A (en) User transaction risk early warning method and device
CN112950357A (en) Transaction abnormal group partner identification method and device
CN112837149A (en) Method and device for identifying enterprise credit risk
CN113220447B (en) Financial wind control system and method based on edge calculation
CN114971017A (en) Bank transaction data processing method and device
CN115619534A (en) Enterprise loan request processing method and device
KR102409019B1 (en) System and method for risk assessment of financial transactions and computer program for the same
CN111429144A (en) Abnormal remittance transaction identification method and device
CN115994791A (en) Risk judgment method based on integral user state snapshot and quantitative analysis
CN111275545A (en) Method, apparatus, device and medium for on-line mortgage
CN112116164A (en) Regional stock right trading market risk early warning method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination