CN111161054A - Operational risk monitoring method and system - Google Patents

Operational risk monitoring method and system Download PDF

Info

Publication number
CN111161054A
CN111161054A CN202010002550.2A CN202010002550A CN111161054A CN 111161054 A CN111161054 A CN 111161054A CN 202010002550 A CN202010002550 A CN 202010002550A CN 111161054 A CN111161054 A CN 111161054A
Authority
CN
China
Prior art keywords
user
information data
data
transaction
monitored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010002550.2A
Other languages
Chinese (zh)
Inventor
丁平
李帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010002550.2A priority Critical patent/CN111161054A/en
Publication of CN111161054A publication Critical patent/CN111161054A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明提供了一种作业风险监测方法及系统,所述方法包含:根据待监测用户的身份标识于预定关系数据库中获得身份信息数据,并根据所述身份信息数据于预定交易数据库中获得用户的交易信息数据;将所述交易信息数据分别与预设的多个评价规则匹配,根据匹配结果获得风险评估结果;根据用户的身份信息数据、交易信息数据和风险评估结果通过机器学习算法训练获得风险预测模型;监测所述待监测用户的实时交易数据,根据所述实时交易数据和所述风险预测模型获取所述待监测用户的风险评估结果。

Figure 202010002550

The present invention provides an operation risk monitoring method and system. The method includes: obtaining identity information data in a predetermined relational database according to the identity of the user to be monitored, and obtaining the user's identity information in a predetermined transaction database according to the identity information data. transaction information data; match the transaction information data with a plurality of preset evaluation rules respectively, and obtain a risk assessment result according to the matching result; obtain risk through machine learning algorithm training according to the user's identity information data, transaction information data and risk assessment result A prediction model; monitoring the real-time transaction data of the user to be monitored, and obtaining the risk assessment result of the user to be monitored according to the real-time transaction data and the risk prediction model.

Figure 202010002550

Description

Operation risk monitoring method and system
Technical Field
The present invention relates to the field of data monitoring, and in particular, to a method and a system for monitoring operational risk.
Background
In the current data monitoring field, monitoring about illegal operations of users is mainly applied to post analysis and judgment, and due to illegal operations of users, the monitoring result often causes great capital and safety loss, for example, under the conditions that workers in the financial field draw credit funds, credit card funds, collect or transit other person funds into stock markets in an illegal way, and invest and fund precious metals in an illegal way by using working time, and when problems are found after manual investigation is carried out by a service administration department through data screening, letter visit verification, inquiry and complaint information, the losses are often difficult to be recovered.
Therefore, a method and a system capable of effectively exploring potential risks in advance or in the process are urgently needed in the industry to provide a prompt for relevant supervision departments, so that the monitoring efficiency of risk investigation is improved on the premise that the supervision departments can timely stop relevant illegal operations to reduce unnecessary property loss.
Disclosure of Invention
In order to solve the above technical problems, an object of the present invention is to provide an operation risk monitoring method and system, which can early warn a designated person about an illegal operation of a user in advance, so as to eliminate a possible risk in time and reduce a related loss caused by the illegal operation of the user.
To achieve the above object, the operation risk monitoring method provided by the present invention specifically comprises: obtaining identity information data in a preset relation database according to an identity of a user to be monitored, and obtaining transaction information data of the user in a preset transaction database according to the identity information data; matching the transaction information data with a plurality of preset evaluation rules respectively, and obtaining a risk evaluation result according to a matching result; training through a machine learning algorithm according to the identity information data, the transaction information data and the risk assessment result of the user to obtain a risk prediction model; and monitoring the real-time transaction data of the user to be monitored, and acquiring a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
In the above operation risk monitoring method, preferably, the identity information data includes identity basic information, asset information, and relationship information stored in the DCDS system by the user to be monitored; the trading information data comprises trading settlement information and security trading information of the user to be monitored, which are recorded on a predetermined trading platform.
In the above-mentioned job risk monitoring method, preferably, the comparing the transaction information data with a plurality of preset thresholds, and obtaining a risk assessment result according to the comparison result includes: matching the transaction information data with a plurality of preset evaluation rules respectively to obtain a plurality of matching results; and comparing and judging the combination of one or more matching results with a preset corresponding table to obtain a risk evaluation result.
In the above method for monitoring job risk, preferably, the obtaining transaction information data of the user from the predetermined transaction database according to the identity information data includes: and acquiring a family relation map of the user according to the identity information data, and inquiring transaction information data of the user to be monitored and the corresponding family members according to the family relation map.
In the above job risk monitoring method, preferably, matching the transaction information data with a plurality of preset evaluation rules, respectively, and obtaining a risk assessment result according to a matching result includes: matching the transaction information data with a plurality of preset evaluation rules through a preset rule engine and a risk engine, and obtaining a risk evaluation result according to a matching result; generating a prompt strategy according to the risk evaluation result and the prompt category in a preset prompt corresponding table; and executing corresponding promotion processing according to the prompt strategy.
In the above job risk monitoring method, preferably, matching the transaction information data with a plurality of preset evaluation rules, respectively, and obtaining a risk assessment result according to a matching result includes: when a fund flow exists between the user to be monitored and the corresponding family member and is transferred to the account of the user to be monitored, or security trading is carried out, and a first evaluation result is generated; obtaining a second evaluation result of the user to be monitored according to the cash transfer transaction flow record of the user to be monitored in the transaction information data; when the user to be monitored has various loans and all or part of loans are released to a trading market, generating a third evaluation result; when the existence of the user to be monitored is borrowed in real time and the whole or part of borrowed funds are released to a trading market, generating a fourth evaluation result; traversing corresponding prompt categories in a preset prompt corresponding table according to one or more combinations of the first evaluation result, the second evaluation result, the third evaluation result and the fourth evaluation result to obtain a prompt strategy; and executing corresponding promotion processing according to the prompt strategy.
The invention also provides an operation risk monitoring system, which comprises a data acquisition module, a data processing module, a model construction module and an analysis and evaluation module; the data acquisition module is used for acquiring identity information data in a preset relation database according to the identity of a user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data; monitoring real-time transaction data of the user to be monitored; the data processing module is used for matching the transaction information data with a plurality of preset evaluation rules respectively and obtaining a risk evaluation result according to a matching result; the model construction module is used for training through a machine learning algorithm according to the identity information data, the transaction information data and the risk evaluation result of the user to obtain a risk prediction model; and the analysis and evaluation module is used for obtaining a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
In the above operation risk monitoring system, preferably, the data acquisition module includes a real-time data acquisition unit and an offline data acquisition unit; the real-time data acquisition unit is used for monitoring real-time transaction data of the user to be monitored; the off-line data acquisition unit is used for acquiring identity information data in a preset relation database according to the identity of the user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
The invention has the beneficial technical effects that: through stream type calculation, the abnormal transaction behavior of the user can be monitored in real time and early-warning is given; meanwhile, compared with the existing manual inspection, the efficiency is higher and the real-time performance is stronger; meanwhile, the rule definition has stronger adjustability and adaptability and more comprehensive detection.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
fig. 1 is a schematic flow chart illustrating an operation risk monitoring method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of user association information according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a user-related information acquisition channel and content according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a preset mapping table according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an operation risk monitoring system according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a computer device according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a process for constructing a risk prediction model according to an embodiment of the present invention;
fig. 8 is a schematic application flow diagram of an operation risk monitoring method according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided with reference to the drawings and examples, so that how to apply the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented. It should be noted that, unless otherwise specified, the embodiments and features of the embodiments of the present invention may be combined with each other, and the technical solutions formed are within the scope of the present invention.
In the description of the present specification, the terms "comprising," "including," "having," "containing," and the like are used in an open-ended fashion, i.e., to mean including, but not limited to. Reference to the description of the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," etc., means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. The sequence of steps involved in the embodiments is for illustrative purposes to illustrate the implementation of the present application, and the sequence of steps is not limited and can be adjusted as needed.
Additionally, the steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions and, although a logical order is illustrated in the flow charts, in some cases, the steps illustrated or described may be performed in an order different than here.
Referring to fig. 1, the operation risk monitoring method provided by the present invention specifically includes: s101, obtaining identity information data in a preset relation database according to an identity of a user to be monitored, and obtaining transaction information data of the user in a preset transaction database according to the identity information data; s102, the transaction information data are respectively matched with a plurality of preset evaluation rules, and a risk evaluation result is obtained according to a matching result; s103, training through a machine learning algorithm according to the identity information data, the transaction information data and the risk assessment result of the user to obtain a risk prediction model; s104, monitoring the real-time transaction data of the user to be monitored, and acquiring a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model. Therefore, in the actual use process, when the operation risk supervision method is applied to the traditional banking field, the data inside and outside the bank can be integrated and analyzed, and an expert rule base is established through relevant evaluation rules of information integration such as expert rules and model elements provided by auditors and risk management and control personnel, so that flexibly configurable risk rule causes and risk score causes are formed. Giving corresponding risk corresponding processing strategies according to the risk level of the evaluation rule, and monitoring and reminding the staff in real time; according to the operation risk supervision method, the fact that internal personnel have great risks or have great possible loss events is forecasted, early warning is conducted in advance, and offline responsible personnel supervise and check to prevent major events.
Referring to fig. 2, in the above embodiment, the identity information data includes identity basic information, asset information, and relationship information stored in the DCDS system by the user to be monitored; the trading information data comprises trading settlement information and security trading information of the user to be monitored, which are recorded on a predetermined trading platform. Specifically, related files such as personal client basic information files, asset information files, inline information and the like can be obtained through a DCDS system, and mass data obtained in real time or in batch are analyzed and calculated; in this embodiment, specific contents of the identity information data and the transaction information data may be as shown in fig. 3.
In an embodiment of the present invention, comparing the transaction information data with a plurality of preset thresholds, and obtaining a risk assessment result according to the comparison result includes: matching the transaction information data with a plurality of preset evaluation rules respectively to obtain a plurality of matching results; and comparing and judging the combination of one or more matching results with a preset corresponding table to obtain a risk evaluation result. Specifically, matching the transaction information data with a plurality of preset evaluation rules, and obtaining a risk assessment result according to a matching result may further include: matching the transaction information data with a plurality of preset evaluation rules through a preset rule engine and a risk engine, and obtaining a risk evaluation result according to a matching result; generating a prompt strategy according to the risk evaluation result and the prompt category in a preset prompt corresponding table; executing corresponding promotion processing according to the prompt strategy; in this embodiment, one matching result may be compared with a correspondence table set in advance by a worker, or a plurality of matching results may be compared with the correspondence table to obtain a more comprehensive processing policy; the corresponding table can be set by the staff in advance, for example, the corresponding table is processed by adopting which processing strategy when a certain condition occurs so as to eliminate the potential risk; of course, in practical work, a person skilled in the art may set the corresponding table in other ways, and the present invention is not limited herein.
In an embodiment of the present invention, obtaining the transaction information data of the user in the predetermined transaction database according to the identity information data comprises: acquiring a family relation map of a user according to the identity information data, and inquiring transaction information data of the user to be monitored and corresponding family members according to the family relation map; based on this embodiment, please refer to fig. 4, the matching the transaction information data with a plurality of preset evaluation rules, and obtaining the risk assessment result according to the matching result may further include: when a fund flow exists between the user to be monitored and the corresponding family member and is transferred to the account of the user to be monitored, or security trading is carried out, and a first evaluation result is generated; obtaining a second evaluation result of the user to be monitored according to the cash transfer transaction flow record of the user to be monitored in the transaction information data; when the user to be monitored has various loans and all or part of loans are released to a trading market, generating a third evaluation result; when the existence of the user to be monitored is borrowed in real time and the whole or part of borrowed funds are released to a trading market, generating a fourth evaluation result; traversing corresponding prompt categories in a preset prompt corresponding table according to one or more combinations of the first evaluation result, the second evaluation result, the third evaluation result and the fourth evaluation result to obtain a prompt strategy; executing corresponding promotion processing according to the prompt strategy; it should be noted that the drawings and the above embodiments are only one processing and evaluating method provided by the present invention, and the whole scheme is not further limited, and those skilled in the art can select an appropriate processing method, feedback result and approval process according to actual needs.
Referring to fig. 5, the present invention further provides an operation risk monitoring system, which includes a data acquisition module, a data processing module, a model building module, and an analysis and evaluation module; the data acquisition module is used for acquiring identity information data in a preset relation database according to the identity of a user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data; monitoring real-time transaction data of the user to be monitored; the data processing module is used for matching the transaction information data with a plurality of preset evaluation rules respectively and obtaining a risk evaluation result according to a matching result; the model construction module is used for training through a machine learning algorithm according to the identity information data, the transaction information data and the risk evaluation result of the user to obtain a risk prediction model; and the analysis and evaluation module is used for obtaining a risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model.
In the operation risk monitoring system, the data acquisition module may include a real-time data acquisition unit and an offline data acquisition unit; the real-time data acquisition unit is used for monitoring real-time transaction data of the user to be monitored; the off-line data acquisition unit is used for acquiring identity information data in a preset relation database according to the identity of the user to be monitored, and acquiring transaction information data of the user in a preset transaction database according to the identity information data.
Referring to fig. 7, when the operation risk monitoring system provided by the present invention is used to perform risk prediction in actual work, the principle is to determine a specific group with major abnormality by machine learning according to specific transaction characteristics. The module is a simple two-classification model, a support vector machine is adopted for model training, and the trained model is loaded into a production system, so that a prediction result is obtained. Specifically, please refer to fig. 7, which mainly includes data acquisition, data processing, feature engineering, feature storage, and generation of a machine learning model, and several parts are generated as a result; wherein, the data acquisition: the system comprises internal system data (such as core bank balance and the like), external system data (such as Unionpay transaction data), and real-time receiving data (data of real-time transaction of a client); data processing: preprocessing acquired data, such as null filling and the like; characteristic engineering: analyzing and generating features, such as feature screening, feature combination, and the like; and (4) feature storage: storing the characteristics into a specified wide table, and providing the characteristics for training of a machine learning model; and (3) generating a machine learning model: and (3) carrying out model training by adopting an SVM (support vector machine) to generate a model file. The above steps can be implemented respectively by those skilled in the art through the prior art, and the invention is not described herein; referring to fig. 8 again, based on the model file established in the above embodiment, the corresponding risk prediction may be performed, that is, whether there is a high risk is determined through two links of real-time data reception and online prediction, and then the corresponding processing is performed according to the determination result.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
The invention has the beneficial technical effects that: through stream type calculation, the abnormal transaction behavior of the user can be monitored in real time and early-warning is given; meanwhile, compared with the existing manual inspection, the efficiency is higher and the real-time performance is stronger; meanwhile, the rule definition has stronger adjustability and adaptability and more comprehensive detection.
As shown in fig. 6, the computer device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the computer device 600 does not necessarily include all of the components shown in FIG. 6; furthermore, the computer device 600 may also comprise components not shown in fig. 6, as can be seen in the prior art.
As shown in fig. 6, the central processor 100, sometimes referred to as a controller or operational control, may comprise a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the computer apparatus 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the computer device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the computer apparatus 600 by the central processing unit 100.
Memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by a computer device. The driver storage 144 of the memory 140 may include various drivers for the computer device for communication functions and/or for performing other functions of the computer device (e.g., messaging applications, directory applications, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same computer device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1.一种作业风险监测方法,其特征在于,所述方法包含:1. An operation risk monitoring method, characterized in that the method comprises: 根据待监测用户的身份标识于预定关系数据库中获得身份信息数据,并根据所述身份信息数据于预定交易数据库中获得用户的交易信息数据;Obtain identity information data from a predetermined relational database according to the identity of the user to be monitored, and obtain user transaction information data from a predetermined transaction database according to the identity information data; 将所述交易信息数据分别与预设的多个评价规则匹配,根据匹配结果获得风险评估结果;Matching the transaction information data with a plurality of preset evaluation rules respectively, and obtaining a risk evaluation result according to the matching result; 根据用户的身份信息数据、交易信息数据和风险评估结果通过机器学习算法训练获得风险预测模型;Obtain a risk prediction model through machine learning algorithm training according to the user's identity information data, transaction information data and risk assessment results; 监测所述待监测用户的实时交易数据,根据所述实时交易数据和所述风险预测模型获取所述待监测用户的风险评估结果。Monitoring the real-time transaction data of the user to be monitored, and obtaining the risk assessment result of the user to be monitored according to the real-time transaction data and the risk prediction model. 2.根据权利要求1所述的作业风险监测方法,其特征在于,所述身份信息数据包含待监测用户在DCDS系统中存储的身份基本信息、资产信息和关系信息;所述交易信息数据包含预定交易平台上记录的待监测用户的交易结算信息和证券交易信息。2. The operation risk monitoring method according to claim 1, wherein the identity information data includes basic identity information, asset information and relationship information stored in the DCDS system of the user to be monitored; the transaction information data includes predetermined information. The transaction settlement information and securities transaction information of the user to be monitored recorded on the trading platform. 3.根据权利要求1所述的作业风险监测方法,其特征在于,将所述交易信息数据分别与预设的多个阈值比较,根据比较结果获得风险评估结果包含:3. The operation risk monitoring method according to claim 1, wherein comparing the transaction information data with a plurality of preset thresholds respectively, and obtaining a risk assessment result according to the comparison result comprises: 将所述交易信息数据分别与预设的多个评价规则匹配,获得多个匹配结果;Matching the transaction information data with a plurality of preset evaluation rules respectively to obtain a plurality of matching results; 将一个或多个匹配结果的组合与预设对应表比较判断获得风险评估结果。A risk assessment result is obtained by comparing the combination of one or more matching results with a preset correspondence table. 4.根据权利要求3所述的作业风险监测方法,其特征在于,根据所述身份信息数据于预定交易数据库中获得用户的交易信息数据包含:根据身份信息数据获得用户的家庭关系图谱,根据所述家庭关系图谱查询待监测用户及对应的家庭成员的交易信息数据。4. The operation risk monitoring method according to claim 3, wherein obtaining the user's transaction information data in the predetermined transaction database according to the identity information data comprises: obtaining the user's family relationship map according to the identity information data, and obtaining the user's family relationship map according to the identity information data. The family relationship graph is used to query the transaction information data of the user to be monitored and the corresponding family members. 5.根据权利要求4所述的作业风险监测方法,其特征在于,将所述交易信息数据分别与预设的多个评价规则匹配,根据匹配结果获得风险评估结果包含:5. The operation risk monitoring method according to claim 4, wherein the transaction information data is respectively matched with a plurality of preset evaluation rules, and obtaining a risk evaluation result according to the matching result comprises: 通过预设规则引擎和风险引擎将所述交易信息数据分别与预设的多个评价规则匹配,根据匹配结果获得风险评估结果;Match the transaction information data with a plurality of preset evaluation rules respectively through a preset rule engine and a risk engine, and obtain a risk evaluation result according to the matching result; 根据所述风险评估结果和预置提示对应表中提示类别,生成提示策略;generating a prompt strategy according to the risk assessment result and the prompt category in the preset prompt corresponding table; 根据所述提示策略执行对应的提升处理。The corresponding promotion process is performed according to the prompt policy. 6.根据权利要求5所述的作业风险监测方法,其特征在于,将所述交易信息数据分别与预设的多个评价规则匹配,根据匹配结果获得风险评估结果包含:6. The operation risk monitoring method according to claim 5, wherein the transaction information data is respectively matched with a plurality of preset evaluation rules, and obtaining a risk evaluation result according to the matching result comprises: 当待监测用户及对应的家庭成员之间存在资金流转到待监测用户账户上,或进行证券交易,生成第一评估结果;When there is a flow of funds between the user to be monitored and the corresponding family member to the account of the user to be monitored, or to conduct securities transactions, the first evaluation result is generated; 根据所述交易信息数据中待监测用户的银证转账交易流转记录获得待监测用户的第二评估结果;Obtain the second evaluation result of the user to be monitored according to the transaction flow record of the user to be monitored in the transaction information data; 当待监测用户的存在多种借贷,且借贷的资金全部或部分投放至交易市场时,生成第三评估结果;When there are multiple loans of the user to be monitored, and all or part of the loaned funds are put into the trading market, a third evaluation result is generated; 当待监测用户的存在实时借贷,且借贷的资金全部或部分投放至交易市场时,生成第四评估结果;When the existence of the user to be monitored lends in real time, and all or part of the borrowed funds are put into the trading market, a fourth evaluation result is generated; 根据所述第一评估结果、所述第二评估结果、所述第三评估结果和所述第四评估结果中一个或多个的组合,遍历预置提示对应表中对应的提示类别,获得提示策略;According to the combination of one or more of the first evaluation result, the second evaluation result, the third evaluation result and the fourth evaluation result, traverse the corresponding prompt categories in the preset prompt correspondence table to obtain prompts Strategy; 根据所述提示策略执行对应的提升处理。The corresponding promotion process is performed according to the prompt policy. 7.一种作业风险监测系统,其特征在于,所述系统包含数据采集模块、数据处理模块、模型构建模块和分析评估模块;7. An operation risk monitoring system, characterized in that the system comprises a data acquisition module, a data processing module, a model building module and an analysis and evaluation module; 所述数据采集模块用于根据待监测用户的身份标识于预定关系数据库中获得身份信息数据,并根据所述身份信息数据于预定交易数据库中获得用户的交易信息数据;以及,监测所述待监测用户的实时交易数据;The data acquisition module is used to obtain identity information data in a predetermined relational database according to the identity of the user to be monitored, and obtain user transaction information data from a predetermined transaction database according to the identity information data; and, monitor the to-be-monitored data. real-time transaction data of users; 所述数据处理模块用于将所述交易信息数据分别与预设的多个评价规则匹配,根据匹配结果获得风险评估结果;The data processing module is used to respectively match the transaction information data with a plurality of preset evaluation rules, and obtain a risk evaluation result according to the matching result; 所述模型构建模块用于根据用户的身份信息数据、交易信息数据和风险评估结果通过机器学习算法训练获得风险预测模型;The model building module is used to obtain a risk prediction model through machine learning algorithm training according to the user's identity information data, transaction information data and risk assessment results; 所述分析评估模块用于根据所述实时交易数据和所述风险预测模型获取所述待监测用户的风险评估结果。The analysis and evaluation module is configured to obtain the risk evaluation result of the user to be monitored according to the real-time transaction data and the risk prediction model. 8.根据权利要求7所述的作业风险监测系统,其特征在于,所述数据采集模块包含实时数据采集单元和离线数据采集单元;8. The operation risk monitoring system according to claim 7, wherein the data collection module comprises a real-time data collection unit and an offline data collection unit; 所述实时数据采集单元用于监测所述待监测用户的实时交易数据;The real-time data collection unit is used to monitor the real-time transaction data of the user to be monitored; 所述离线数据采集单元用于根据待监测用户的身份标识于预定关系数据库中获得身份信息数据,并根据所述身份信息数据于预定交易数据库中获得用户的交易信息数据。The offline data collection unit is configured to obtain identity information data in a predetermined relational database according to the identity of the user to be monitored, and obtain transaction information data of the user in a predetermined transaction database according to the identity information data. 9.一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求1至6任一所述方法。9. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, wherein the processor implements any of claims 1 to 6 when the processor executes the computer program the method. 10.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有执行权利要求1至6任一所述方法的计算机程序。10 . A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for executing any one of the methods of claims 1 to 6 . 11 .
CN202010002550.2A 2020-01-02 2020-01-02 Operational risk monitoring method and system Pending CN111161054A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010002550.2A CN111161054A (en) 2020-01-02 2020-01-02 Operational risk monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010002550.2A CN111161054A (en) 2020-01-02 2020-01-02 Operational risk monitoring method and system

Publications (1)

Publication Number Publication Date
CN111161054A true CN111161054A (en) 2020-05-15

Family

ID=70561272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010002550.2A Pending CN111161054A (en) 2020-01-02 2020-01-02 Operational risk monitoring method and system

Country Status (1)

Country Link
CN (1) CN111161054A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932359A (en) * 2020-07-16 2020-11-13 吉林亿联银行股份有限公司 Risk monitoring method and system and electronic equipment
CN111967801A (en) * 2020-09-23 2020-11-20 中国建设银行股份有限公司 Transaction risk prediction method and device
CN112017059A (en) * 2020-07-14 2020-12-01 北京淇瑀信息科技有限公司 Hierarchical optimization risk control method and device and electronic equipment
CN112990707A (en) * 2021-03-12 2021-06-18 深圳工盟科技有限公司 Construction risk assessment method, device, equipment and storage medium
CN113065950A (en) * 2021-04-22 2021-07-02 中国工商银行股份有限公司 Credit card limit evaluation method and device
CN113920660A (en) * 2021-09-30 2022-01-11 中国工商银行股份有限公司 Safety monitoring method and system suitable for safety storage equipment
CN114066597A (en) * 2021-11-09 2022-02-18 中国建设银行股份有限公司 Information prompting method, device, equipment and computer storage medium
CN114187086A (en) * 2021-11-02 2022-03-15 浙江惠瀜网络科技有限公司 Monitoring method and system suitable for credit fund flow direction and electronic equipment
CN114493861A (en) * 2021-12-21 2022-05-13 中国建设银行股份有限公司 Transaction event monitoring method, device and equipment
TWI776370B (en) * 2021-01-25 2022-09-01 第一商業銀行股份有限公司 Investment risk scoring method and system for fund commodities

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110166982A1 (en) * 2003-10-14 2011-07-07 Ften, Inc. Intraday risk management data cloud computing system capable of controlling execution of orders
US20150106251A1 (en) * 2013-12-31 2015-04-16 Nyse Group, Inc. Risk mitigation in an electronic trading system
CN108269186A (en) * 2018-01-23 2018-07-10 平安好房(上海)电子商务有限公司 User information verification method, device, equipment and readable storage medium storing program for executing
CN108717638A (en) * 2018-05-18 2018-10-30 深圳壹账通智能科技有限公司 Fraudulent trading judgment method, device, computer equipment and storage medium
CN109446276A (en) * 2018-09-19 2019-03-08 平安科技(深圳)有限公司 Order hold-up interception method, device, equipment and medium based on relational data model
CN109919468A (en) * 2019-02-26 2019-06-21 金贝塔网络金融科技(深圳)有限公司 Equity investment methods of risk assessment, device and equipment
CN110009475A (en) * 2019-02-12 2019-07-12 平安科技(深圳)有限公司 Risk checks method for monitoring, device, computer equipment and storage medium
CN110570301A (en) * 2019-09-16 2019-12-13 北京三快在线科技有限公司 Risk identification method, device, equipment and medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110166982A1 (en) * 2003-10-14 2011-07-07 Ften, Inc. Intraday risk management data cloud computing system capable of controlling execution of orders
US20150106251A1 (en) * 2013-12-31 2015-04-16 Nyse Group, Inc. Risk mitigation in an electronic trading system
CN108269186A (en) * 2018-01-23 2018-07-10 平安好房(上海)电子商务有限公司 User information verification method, device, equipment and readable storage medium storing program for executing
CN108717638A (en) * 2018-05-18 2018-10-30 深圳壹账通智能科技有限公司 Fraudulent trading judgment method, device, computer equipment and storage medium
CN109446276A (en) * 2018-09-19 2019-03-08 平安科技(深圳)有限公司 Order hold-up interception method, device, equipment and medium based on relational data model
CN110009475A (en) * 2019-02-12 2019-07-12 平安科技(深圳)有限公司 Risk checks method for monitoring, device, computer equipment and storage medium
CN109919468A (en) * 2019-02-26 2019-06-21 金贝塔网络金融科技(深圳)有限公司 Equity investment methods of risk assessment, device and equipment
CN110570301A (en) * 2019-09-16 2019-12-13 北京三快在线科技有限公司 Risk identification method, device, equipment and medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112017059A (en) * 2020-07-14 2020-12-01 北京淇瑀信息科技有限公司 Hierarchical optimization risk control method and device and electronic equipment
CN111932359A (en) * 2020-07-16 2020-11-13 吉林亿联银行股份有限公司 Risk monitoring method and system and electronic equipment
CN111967801A (en) * 2020-09-23 2020-11-20 中国建设银行股份有限公司 Transaction risk prediction method and device
TWI776370B (en) * 2021-01-25 2022-09-01 第一商業銀行股份有限公司 Investment risk scoring method and system for fund commodities
CN112990707A (en) * 2021-03-12 2021-06-18 深圳工盟科技有限公司 Construction risk assessment method, device, equipment and storage medium
CN113065950A (en) * 2021-04-22 2021-07-02 中国工商银行股份有限公司 Credit card limit evaluation method and device
CN113920660A (en) * 2021-09-30 2022-01-11 中国工商银行股份有限公司 Safety monitoring method and system suitable for safety storage equipment
CN114187086A (en) * 2021-11-02 2022-03-15 浙江惠瀜网络科技有限公司 Monitoring method and system suitable for credit fund flow direction and electronic equipment
CN114066597A (en) * 2021-11-09 2022-02-18 中国建设银行股份有限公司 Information prompting method, device, equipment and computer storage medium
CN114493861A (en) * 2021-12-21 2022-05-13 中国建设银行股份有限公司 Transaction event monitoring method, device and equipment

Similar Documents

Publication Publication Date Title
CN111161054A (en) Operational risk monitoring method and system
CN111275546B (en) Financial customer fraud risk identification method and device
US10839454B2 (en) System and platform for execution of consolidated resource-based action
CN111476660B (en) Intelligent wind control system and method based on data analysis
EP2555153A1 (en) Financial activity monitoring system
US20120101930A1 (en) Software and Methods for Risk and Fraud Mitigation
CN112435112A (en) Bank internet credit wind control method for small and micro enterprises
CN111008896A (en) Financial risk early warning method and device, electronic equipment and storage medium
US20210312452A1 (en) Systems and methods real-time institution analysis based on message traffic
US20170161289A1 (en) System to improve data exchange using advanced data analytics
WO2020102462A1 (en) Predicting entity outcomes using taxonomy classifications of transactions
CN112037043A (en) Method and device for determining high-quality loan enterprise based on knowledge graph
CN111833182A (en) Method and device for identifying risk object
CN112232950A (en) Loan risk assessment method and device, equipment and computer-readable storage medium
CN115409518A (en) User transaction risk early warning method and device
CN113887984A (en) Early warning reminding method and device based on enterprise credit investigation blacklist and electronic equipment
KR102409019B1 (en) System and method for risk assessment of financial transactions and computer program for the same
JP2021072057A (en) Information processing device and information processing method
WO2022136692A1 (en) Method for calculating at least one score representative of a probable activity breakage of a merchant, system, apparatus and corresponding computer program
CN114757757A (en) Wind control method
US11410178B2 (en) Systems and methods for message tracking using real-time normalized scoring
CN113129003A (en) Two-dimensional code payment control method and device
CN118297688A (en) Multi-dimensional data comprehensive risk management and control method and system based on key areas of banks
CN205176935U (en) Financial transaction information processing system
CN111275545A (en) Method, apparatus, device and medium for on-line mortgage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200515

RJ01 Rejection of invention patent application after publication