CN111737287A - Suspicious case determination method and device, computer equipment and storage medium - Google Patents
Suspicious case determination method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN111737287A CN111737287A CN202010473593.9A CN202010473593A CN111737287A CN 111737287 A CN111737287 A CN 111737287A CN 202010473593 A CN202010473593 A CN 202010473593A CN 111737287 A CN111737287 A CN 111737287A
- Authority
- CN
- China
- Prior art keywords
- case
- target
- cases
- key
- important
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000012216 screening Methods 0.000 claims description 99
- 238000012544 monitoring process Methods 0.000 claims description 45
- 238000004590 computer program Methods 0.000 claims description 31
- 238000010801 machine learning Methods 0.000 claims description 24
- 238000012546 transfer Methods 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 9
- 238000012549 training Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 238000012550 audit Methods 0.000 description 3
- 238000004140 cleaning Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/248—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application relates to a method and a device for determining suspicious cases, computer equipment and a storage medium. The method comprises the following steps: receiving case search conditions; searching in a pre-acquired key case set according to the case searching conditions, and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the important cases are important concerned cases screened from a preset time period; case information of the target key case is displayed in a case display interface; and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported. By adopting the method, the auditing efficiency can be improved, and the suspicious cases can be reported in time.
Description
Technical Field
The present application relates to the field of identifying illegal fund transfers, and in particular, to a method and an apparatus for determining suspicious cases, a computer device, and a storage medium.
Background
At present, business personnel of a plurality of financial institutions report suspicious cases with suspicions of illegal fund transfer to related supervision departments regularly. In the related art, a fixed rule is usually first implanted in the illegal fund transfer recognition software according to the law and expert experience, and then the illegal fund transfer recognition software determines whether the relevant information of the transaction subject (customer) triggers the fixed rule. And if the related information of the transaction main body triggers one or more fixed rules, determining the case corresponding to the transaction main body as the case to be audited. And then, the business personnel checks the cases to be checked one by one, judges whether the cases really have illegal fund transfer suspicion, and reports the cases to the supervision department if the cases have illegal fund transfer suspicion.
However, since there are many cases for triggering the fixed rule, the workload of the auditor is large, which results in slow audit progress and untimely reporting.
Disclosure of Invention
Therefore, it is necessary to provide a method, an apparatus, a computer device, and a storage medium for determining a suspicious case, which can improve the auditing efficiency and report the suspicious case in time, in order to solve the above technical problems.
A method for suspicious case determination, the method comprising:
receiving case search conditions;
searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the key cases are key attention cases screened from a preset time period;
case information of the target key case is displayed in a case display interface;
and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
In one embodiment, after performing case finding in the pre-acquired important case set according to the case finding condition, the method further includes:
if the key case meeting the case searching condition is not searched in the key case set, generating feedback information of the not-searched case;
and displaying the feedback information in the case display interface.
In one embodiment, after the important cases meeting the case finding condition are not found in the set of important cases, the method further includes:
searching in a non-key case set acquired in advance according to case searching conditions; the non-important case set comprises a plurality of non-important cases; the non-key cases are cases except the key cases within a preset time period;
if the non-key case meeting the case searching condition is searched in the non-key case set, the searched non-key case is taken as a target non-key case;
and displaying the case information of the target non-key case in the case display interface.
In one embodiment, the case display interface includes a search condition input area and a case information display area;
the receiving case searching condition includes:
receiving case searching conditions input in a searching condition input area;
the above case information for displaying the target major cases in the case display interface includes:
case information of the target key case is displayed in the case information display area; the case information comprises at least one of transaction subject identification, case state, suspicious confidence and case generation time; the suspicious confidence degree represents the probability that the illegal fund transfer suspicion exists in the target key case.
In one embodiment, the case presentation interface includes a screening area, the screening area including a plurality of screening options; before the case information of the target important case is displayed in the case information display area, the method further includes:
receiving a trigger operation aiming at a target screening option;
correspondingly, the case information of the target key case is displayed in the case information display area, and the method comprises the following steps:
and displaying the case information of the multiple target key cases in the case information display area according to the target screening options.
In one embodiment, the screening options include an unchecked status and a checked status; the displaying of the case information of the plurality of target major cases in the case information display area according to the target screening options includes:
if the target screening option is in an unviewed state, screening a plurality of unviewed target key cases from the plurality of target key cases;
and displaying the plurality of unaudited target key cases according to the sequence of the suspicious confidence degrees from high to low.
In one embodiment, after the screening out a plurality of unaudited target important cases from the plurality of target important cases, the method further includes:
and displaying a plurality of unaudited target key cases with the same suspicious confidence degrees according to the sequence of case generation time from near to far.
In one embodiment, the screening option includes a monitoring list and a white list, the monitoring list includes a plurality of identifications of transaction bodies needing to be monitored, and the white list includes a plurality of identifications of transaction bodies not needing to be monitored;
the displaying of the case information of the plurality of target major cases in the case information display area according to the target screening options includes:
if the target screening option is a monitoring list, determining whether the identification of the transaction main body corresponding to each target key case is in the monitoring list;
and if the identification of the transaction main body corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
In one embodiment, before performing the search in the pre-acquired important case set according to the case search condition, the method further includes:
acquiring transaction data of a plurality of transaction main bodies within a preset time period;
screening a target trading subject from a plurality of trading subjects according to the trading data;
determining the case corresponding to the target transaction subject as a major case, and forming a major case set by a plurality of major cases.
In one embodiment, the screening a target transaction body from a plurality of transaction bodies according to the transaction data includes:
inputting transaction data into a preset machine learning model aiming at each transaction main body to obtain a suspicious confidence coefficient corresponding to the transaction main body output by the machine learning model;
and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as a target transaction main body.
An apparatus for suspicious case determination, the apparatus comprising:
the case searching condition receiving module is used for receiving case searching conditions;
the case searching module is used for searching in a pre-acquired key case set according to the case searching conditions and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the important cases are important concerned cases screened from a preset time period;
the case information display module is used for displaying the case information of the target key case in a case display interface;
and the suspicious case determining module is used for receiving a selection operation based on the case display interface and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
In one embodiment, the case searching module is further configured to generate feedback information of the case that is not found if the case that meets the case searching condition is not found in the set of cases;
the case information display module is further used for displaying the feedback information in the case display interface.
In one embodiment, the apparatus further comprises:
the case searching module is further configured to search in a pre-acquired non-key case set according to case searching conditions; the non-important case set comprises a plurality of non-important cases; the non-key cases are cases except the key cases within a preset time period;
the case information display module is further configured to, if a non-important case meeting the case search condition is found in the non-important case set, use the found non-important case as a target non-important case; and displaying the case information of the target non-key case in the case display interface.
In one embodiment, the case display interface includes a search condition input area and a case information display area;
the case searching condition receiving module is specifically configured to receive case searching conditions input in the searching condition input area;
the case information display module is specifically used for displaying case information of the target key case in the case information display area; the case information comprises at least one of transaction subject identification, case state, suspicious confidence and case generation time; the suspicious confidence degree represents the probability that the illegal fund transfer suspicion exists in the target key case.
In one embodiment, the case presentation interface includes a screening area, the screening area including a plurality of screening options; the device also includes:
the screening triggering operation receiving module is used for receiving triggering operation aiming at the target screening option;
correspondingly, the case information display module is specifically configured to display case information of a plurality of target key cases in the case information display area according to the target screening option.
In one embodiment, the screening options include an unchecked status and a checked status; the case information display module is specifically used for screening a plurality of unapproved target key cases from the plurality of target key cases if the target screening option is in an unapproved state; and displaying the plurality of unaudited target key cases according to the sequence of the suspicious confidence degrees from high to low.
In one embodiment, the case information presentation module is specifically configured to present a plurality of unapproved target important cases with the same suspicious confidence degrees in the order from near to far according to the case generation time.
In one embodiment, the screening option includes a monitoring list and a white list, the monitoring list includes a plurality of identifications of transaction bodies needing to be monitored, and the white list includes a plurality of identifications of transaction bodies not needing to be monitored;
the case information display module is specifically configured to determine whether the identifier of the transaction subject corresponding to each target key case is in the monitoring list if the target screening option is the monitoring list; and if the identification of the transaction main body corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
In one embodiment, the apparatus further comprises:
the transaction data acquisition module is used for acquiring transaction data of a plurality of transaction main bodies within a preset time period;
the target transaction main body screening module is used for screening out a target transaction main body from a plurality of transaction main bodies according to the transaction data;
the important case set obtaining module is used for determining cases corresponding to the target transaction main body as important cases and forming an important case set by the important cases.
In one embodiment, the target transaction subject screening module is specifically configured to, for each transaction subject, input transaction data into a preset machine learning model to obtain a suspicious confidence level corresponding to the transaction subject output by the machine learning model; and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as a target transaction main body.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving case search conditions;
searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the key cases are key attention cases screened from a preset time period;
case information of the target key case is displayed in a case display interface;
and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving case search conditions;
searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the key cases are key attention cases screened from a preset time period;
case information of the target key case is displayed in a case display interface;
and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
The method, the device, the computer equipment and the storage medium for determining the suspicious cases receive case searching conditions; searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case. Case information of the target key case is displayed in a case display interface; and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported. According to the embodiment of the application, the user does not need to check the cases to be checked one by one, only needs to input the case searching conditions according to the checking requirements, can search the target key cases meeting the checking requirements, and then preferentially checks the searched target key cases, so that the checking efficiency can be improved, and the suspicious cases can be reported in time.
Drawings
FIG. 1 is a diagram of an exemplary implementation of a suspicious case determination method;
FIG. 2 is a schematic flow chart diagram illustrating a method for suspicious case determination in one embodiment;
fig. 3 is a schematic flow chart of a suspicious case determination method according to another embodiment;
FIG. 4 is a schematic diagram of a case presentation interface in accordance with one embodiment;
FIG. 5 is a diagram of screening options in one embodiment;
fig. 6 is a schematic flow chart of a suspicious case determination method according to another embodiment;
FIG. 7 is a schematic diagram of a case presentation interface in accordance with another embodiment;
fig. 8 is a block diagram of the suspicious case determination apparatus according to an embodiment;
FIG. 9 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for determining the suspicious case can be applied to the application environment shown in fig. 1. The application environment comprises a terminal 01 and a server 02; wherein, the terminal 01 receives the case searching condition; searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case; case information of the target key case is displayed in a case display interface; and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported. Then, the terminal 01 may communicate with the server 02 through the network, and transmit the suspicious case to the server 02. The terminal 01 may be, but not limited to, various personal computers, notebook computers, smart phones, and tablet computers, and the server 02 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In an embodiment, as shown in fig. 2, a method for determining a suspicious case is provided, where this embodiment is illustrated by applying the method to a terminal, and may include the following steps:
The case display interface can be preset, and when a user needs to perform case examination, the terminal displays the case display interface after receiving the opening operation of the case display interface. And when the user inputs case searching conditions in the case display interface according to the auditing requirements, the terminal receives the case searching conditions.
For example, if the user needs to examine a case corresponding to a certain transaction principal, an identifier of the transaction principal, such as a name of the transaction principal or a number of the transaction principal, may be input in the case display interface. And the terminal receives the identification of the transaction main body, and the identification of the transaction main body is used as a case searching condition. The case searching conditions are not limited in detail in the embodiment of the application, and can be set according to actual conditions.
Or the terminal receives the voice input by the user and determines the case searching condition according to the voice. Or the case finding condition is received in other ways, which is not limited in detail in the embodiment of the present application and can be set according to the actual situation.
And 102, searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case.
A key case set is obtained in advance, wherein the key case set comprises a plurality of key cases; the important cases are the cases with important attention screened from the preset time period. For example, 100 cases of major interest are screened from 1 month and 1 day to 1 month and 31 days, and the 100 cases of major interest constitute a major case set. The screening mode is not limited in detail in the embodiment of the application, and can be set according to actual conditions.
After the case searching conditions are received, searching is carried out in the key case set according to the case searching conditions, and if the key case meeting the case searching conditions is searched, the searched key case is used as a target key case.
For example, searching is performed in the set of important cases according to the identification of the transaction subject, wherein the identification of the transaction subject corresponding to the important cases 1, 5, 8, and 11 meets the case searching condition, and then the important cases 1, 5, 8, and 11 are taken as the target important cases.
And 103, displaying the case information of the target key case in the case display interface.
And after the target key case is found, displaying case information of the target key case in a case display interface. For example, the identification of the transaction subject, the transaction time, the transaction amount, the transaction opponent, the triggered fixed rule and the like corresponding to the target key case are displayed. The embodiment of the application does not limit the case information in detail, and can be set according to actual conditions.
And 104, receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
And if the user determines that one of the target key cases is the suspicious case to be reported according to the case information, inputting a selection operation in the case display interface. The terminal receives the selection operation based on the case display interface, and determines the target key case corresponding to the selection operation as the suspicious case.
The selection operation may be a click operation or a click operation. The embodiment of the present application is not limited in detail, and may be set according to actual situations.
In one embodiment, after the suspicious case is determined, a popup for reporting is generated, and a report button is set in the popup. And when the terminal receives the triggering operation aiming at the reporting key, reporting the suspicious case to a relevant supervision department.
In the method for determining the suspicious cases, case searching conditions are received; searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case. Case information of the target key case is displayed in a case display interface; and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported. According to the embodiment of the application, the user does not need to check the cases to be checked one by one, only needs to input the case searching conditions according to the checking requirements, can search the target key cases meeting the checking requirements, and then preferentially checks the searched target key cases, so that the checking efficiency can be improved, and the suspicious cases can be reported in time.
In an embodiment, as shown in fig. 3, an optional process related to the method for determining a suspicious case may specifically include the following steps based on the foregoing embodiment:
A case display interface is displayed, as shown in fig. 4, the case display interface includes a search condition input area and a case information display area, and the terminal receives a case search condition input by the user according to the audit requirement in the search condition input area.
In one embodiment, the case display interface further includes icons of the function modules, such as the left icon shown in fig. 4, and the mouse is suspended for detail display.
Wherein the case information comprises at least one of an identification of the transaction subject, a case state, a suspicious confidence level, and a case generation time; the suspicious confidence degree represents the probability that the illegal fund transfer suspicion exists in the target key case. For example, if it is determined that the target important case is the important case 1 in the important case set, the case information of the important case 1 is shown: the name of the transaction subject is A, the case state is an unchecked state, the suspicious confidence is 90%, and the case generation time is X years and X days. The embodiment of the application does not limit the case information in detail, and can be set according to actual conditions.
As shown in fig. 4, the case presentation interface includes a screening area that includes a plurality of screening options; the embodiment of the application can further comprise the following steps:
The trigger operation may be a click operation or other operations, which is not limited in detail in the embodiment of the present application and may be set according to actual situations.
Wherein the screening options comprise an unchecked state and a checked state; if the target screening option is in an unviewed state, screening a plurality of unviewed target key cases from the plurality of target key cases; and displaying the plurality of unaudited target key cases according to the sequence of the suspicious confidence degrees from high to low.
Specifically, after the target major cases are found from the major case set, if the user wants to view the unaudited target major cases, the user may click on the unaudited state in the screening options. After the terminal receives the clicking operation, the target major cases with the case states being the non-auditing states are screened out from the target major cases. And displaying the screened target key cases according to the sequence of the suspicious confidence degrees from high to low.
For example, the target important cases are important cases 1, 5, 8, 11, wherein the case status of the important case 1 is an audited status, and the case status of the important cases 5, 8, 11 is an unchecked status; also, the confidence of the suspect in the important case 5 was 89%, and the confidence of the suspect in the important cases 8 and 11 was 90%. After the terminal receives the clicking operation, when the case information of the key cases 1, 5, 8 and 11 is displayed, the key cases 8, 11, 5 and 1 are displayed in sequence.
In one embodiment, a plurality of unaudited target important cases with the same suspicious confidence coefficient are displayed according to the sequence of case generation time from near to far.
For example, the suspicious confidences of the important cases 8 and 11 are the same, the case generation time of the important case 8 is 1 month and 1 day, the case generation time of the important case 11 is 1 month and 2 days, and when the case information is displayed, the display is performed according to the sequence of the important cases 11, 8, 5 and 1.
The screening options may further include suspicious confidence and case generation time, as shown in fig. 5. The screening options may also include a reported status, an excluded status.
The screening options comprise a monitoring list and a white list, the monitoring list comprises a plurality of identifications of transaction main bodies needing to be monitored, and the white list comprises a plurality of identifications of transaction main bodies not needing to be monitored; if the target screening option is a monitoring list, determining whether the identification of the transaction main body corresponding to each target key case is in the monitoring list; and if the identification of the transaction main body corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
Specifically, after the target major cases are found from the major case set, if the user wants to check the cases corresponding to the transaction subjects in the monitoring list, the monitoring list in the screening option may be clicked. After the terminal receives the clicking operation, whether the identification of the trading subject corresponding to the target key case is in the monitoring list or not is judged one by one, and if the identification of the trading subject corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
For example, the target major cases are major cases 1, 5, 8, and 11, the name of the transaction subject included in the monitoring list is a, and the identifier of the transaction subject corresponding to the major case 11 is determined to be a, then the major case 11 is displayed at the top. It can be understood that when the identifications of the transaction subjects corresponding to the multiple target major cases are in the monitoring list, the identifications can be displayed according to the sequence from high to low of the suspicious confidence degrees or the sequence from near to far of the case generation time. The display mode is not limited in detail in this embodiment, and may be set according to actual situations.
And step 206, receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
When a user determines that a certain target key case is a suspicious case according to the case information displayed by the terminal, a selection operation is input, and after the terminal receives the selection operation, the suspicious case to be reported is determined according to the selection operation.
In the method for determining the suspicious cases, the case searching conditions input in the searching condition input area are received; searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case; case information of the target key case is displayed in the case information display area; receiving a trigger operation aiming at a target screening option; displaying case information of a plurality of target key cases in a case information display area according to the target screening options; and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported. According to the embodiment of the application, the user can further screen the target key cases according to the auditing requirement, and then preferentially audit the further screened target key cases, so that the auditing efficiency can be further improved, and the suspicious cases can be reported in time.
In an embodiment, as shown in fig. 6, an optional procedure of the method for determining a suspicious case may include the following steps based on the above-mentioned embodiment:
And the transaction data is stored in the transaction database after being subjected to data cleaning. And when the suspicious case is determined, acquiring transaction data of a plurality of transaction subjects in a preset time period from a transaction database. Then, aiming at each transaction main body, inputting transaction data into a preset machine learning model to obtain a suspicious confidence coefficient corresponding to the transaction main body output by the machine learning model; and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as a target transaction main body. Then, determining a case corresponding to the target transaction main body as a key case; after obtaining the plurality of important cases, the important case set is composed of the plurality of important cases.
For example, suspicious confidences corresponding to 100 transaction subjects are obtained, and the transaction subjects with the suspicious confidences larger than 60% are determined as target transaction subjects. The preset threshold value is not limited in detail in the embodiment of the application, and can be set according to actual conditions.
In one embodiment, the transaction data corresponding to the reported suspicious cases can be used as a training sample of the machine learning model. The machine learning model is updated by adopting the training samples, so that the suspicious confidence degree output by the machine learning model is more accurate. The training of the machine learning model is not limited in detail in the embodiment of the application, and the training can be set according to actual conditions.
And step 303, searching in a pre-acquired key case set according to case searching conditions.
If the important case is found, step 304 is executed, and if the important case is not found, step 305 is executed.
And step 304, taking the found key cases as target key cases, and displaying case information of the target key cases in a case display interface.
As shown in fig. 7, if a key case meeting the case finding condition is not found in the key case set, feedback information of the not-found case is generated, and the feedback information is displayed in the case display interface.
And step 306, searching in the non-important case set acquired in advance according to the case searching conditions.
And searching in the non-key case set according to case searching conditions while displaying the feedback information. The non-emphasis case set comprises a plurality of non-emphasis cases; the non-important cases are cases except the important cases within a preset time period. For example, there are 300 cases in the preset time period, 100 of which are important cases, and the other 200 cases are non-important cases, and the non-important case set is composed of the 200 non-important cases.
And searching in the non-key case set according to the case searching condition, and if the non-key case meeting the case searching condition is searched, taking the searched non-key case as a target non-key case. And if the non-important case meeting the case searching condition is not found in the non-important case set, searching in an archived case database.
And 308, displaying the case information of the target non-key case in the case display interface.
If the target non-major case is found in the non-major case set or the archived case database, case information of the target non-major case is displayed; and if the target non-important case is not found in the non-important case set and the archived case data, displaying the feedback information of the case which is not found.
In the method for determining the suspicious cases, firstly, transaction data of a plurality of transaction subjects in a preset time period are obtained, and a key case set is obtained according to the transaction data; then, displaying a case display interface, and receiving case searching conditions input in a searching condition input area; searching in a pre-acquired key case set according to case searching conditions; taking the found key cases as target key cases, and displaying case information of the target key cases in a case display interface; if the key case meeting the case searching condition is not found in the key case set, generating feedback information of the case not found in the key case set; and displaying the feedback information in the case display interface. Further, searching in a non-key case set acquired in advance according to case searching conditions; if the non-key case meeting the case searching condition is searched in the non-key case set, the searched non-key case is taken as a target non-key case; and displaying the case information of the target non-key case in the case display interface. According to the method and the device, the important case set, the non-important case set and even the filed case database are searched according to the case searching conditions, so that the searched cases meet the checking requirement, and the user can conveniently check the cases.
It should be understood that although the various steps in the flowcharts of fig. 2-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-6 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 8, there is provided a suspicious case determination apparatus, including:
a case search condition receiving module 401, configured to receive a case search condition;
a case searching module 402, configured to search in a pre-obtained key case set according to the case searching condition, and use the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the important cases are important concerned cases screened from a preset time period;
the case information display module 403 is configured to display the case information of the target major case in a case display interface;
the suspicious case determining module 404 is configured to receive a selection operation based on the case display interface, and determine a target key case corresponding to the selection operation as a suspicious case to be reported.
In the embodiment of the application, a case display interface can be displayed, and case searching conditions are received based on the case display interface. Or the terminal receives the voice input by the user and determines the case searching condition according to the voice. Or receive case finding conditions in other ways.
A key case set is obtained in advance, wherein the key case set comprises a plurality of key cases; the important cases are the cases with important attention screened from the preset time period. After the case searching conditions are received, searching is carried out in the key case set according to the case searching conditions, and if the key case meeting the case searching conditions is searched, the searched key case is used as a target key case.
And after the target key case is found, displaying case information of the target key case in a case display interface. And if the user determines that one of the target key cases is the suspicious case to be reported according to the case information, inputting a selection operation in the case display interface. The terminal receives the selection operation based on the case display interface, and determines the target key case corresponding to the selection operation as the suspicious case.
In one embodiment, the case searching module 402 is further configured to generate feedback information of an unslotted case if the important case meeting the case searching condition is not found in the important case set;
the case information display module 403 is further configured to display the feedback information in the case display interface.
In one embodiment, the apparatus further comprises:
the case searching module 402 is further configured to search in a pre-acquired non-key case set according to case searching conditions; the non-important case set comprises a plurality of non-important cases; the non-key cases are cases except the key cases within a preset time period;
the case information displaying module 403 is further configured to, if a non-important case meeting the case finding condition is found in the non-important case set, take the found non-important case as a target non-important case; and displaying the case information of the target non-key case in the case display interface.
In the embodiment of the application, if the key case meeting the case searching condition is not found in the key case set, the feedback information of the case which is not found is generated, and the feedback information is displayed in the case display interface. And the feedback information is displayed, and meanwhile, the searching can be carried out in the non-key case set according to case searching conditions. The non-emphasis case set comprises a plurality of non-emphasis cases; the non-important cases are cases except the important cases within a preset time period.
And if the non-important case meeting the case searching condition is searched in the non-important case set, taking the searched non-important case as the target non-important case. And if the non-important case meeting the case searching condition is not found in the non-important case set, searching in an archived case database.
If the target non-major case is found in the non-major case set or the archived case database, case information of the target non-major case is displayed; and if the target non-important case is not found in the non-important case set and the archived case data, displaying the feedback information of the case which is not found.
In one embodiment, the case display interface includes a search condition input area and a case information display area;
the case search condition receiving module 401 is specifically configured to receive a case search condition input in the search condition input area;
the case information display module 403 is specifically configured to display case information of a target key case in a case information display area; the case information comprises at least one of transaction subject identification, case state, suspicious confidence and case generation time; the suspicious confidence degree represents the probability that the illegal fund transfer suspicion exists in the target key case.
In one embodiment, the case presentation interface includes a screening area, the screening area including a plurality of screening options; the device also includes:
the screening triggering operation receiving module is used for receiving triggering operation aiming at the target screening option;
correspondingly, the case information display module 403 is specifically configured to display the case information of a plurality of target major cases in the case information display area according to the target screening option.
In one embodiment, the screening options include an unchecked status and a checked status; the case information display module 403 is specifically configured to, if the target screening option is in an unchecked state, screen a plurality of unchecked target key cases from the plurality of target key cases; and displaying the plurality of unaudited target key cases according to the sequence of the suspicious confidence degrees from high to low.
In one embodiment, the case information displaying module 403 is specifically configured to display a plurality of unapproved target important cases with the same suspicious confidence degrees in the order from near to far according to the case generation time.
In one embodiment, the screening option includes a monitoring list and a white list, the monitoring list includes a plurality of identifications of transaction bodies needing to be monitored, and the white list includes a plurality of identifications of transaction bodies not needing to be monitored;
the case information display module 403 is specifically configured to determine whether the identifier of the transaction subject corresponding to each target key case is in the monitoring list if the target screening option is the monitoring list; and if the identification of the transaction main body corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
In the embodiment of the application, after the target major cases are found from the major case set, if the user wants to check the unapproved target major cases, the user can click the unapproved state in the screening options. After the terminal receives the clicking operation, the target major cases with the case states being the non-auditing states are screened out from the target major cases. And displaying the screened target key cases according to the sequence of the suspicious confidence degrees from high to low. And if a plurality of unapproved target key cases with the same suspicious confidence degree exist, displaying the plurality of unapproved target key cases with the same suspicious confidence degree according to the sequence of case generation time from near to far.
After the target major cases are found out from the major case set, if the user wants to check the cases corresponding to the transaction main bodies in the monitoring list, the monitoring list in the screening options can be clicked. After the terminal receives the clicking operation, whether the identification of the trading subject corresponding to the target key case is in the monitoring list or not is judged one by one, and if the identification of the trading subject corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
In one embodiment, the apparatus further comprises:
the transaction data acquisition module is used for acquiring transaction data of a plurality of transaction main bodies within a preset time period;
the target transaction main body screening module is used for screening out a target transaction main body from a plurality of transaction main bodies according to the transaction data;
the important case set obtaining module is used for determining cases corresponding to the target transaction main body as important cases and forming an important case set by the important cases.
In one embodiment, the target transaction subject screening module is specifically configured to, for each transaction subject, input transaction data into a preset machine learning model to obtain a suspicious confidence level corresponding to the transaction subject output by the machine learning model; and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as a target transaction main body.
In the embodiment of the application, the transaction data is stored in the transaction database after being subjected to data cleaning. And when the suspicious case is determined, acquiring transaction data of a plurality of transaction subjects in a preset time period from a transaction database. Then, aiming at each transaction main body, inputting transaction data into a preset machine learning model to obtain a suspicious confidence coefficient corresponding to the transaction main body output by the machine learning model; and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as a target transaction main body. Then, determining a case corresponding to the target transaction main body as a key case; after obtaining the plurality of important cases, the important case set is composed of the plurality of important cases.
The reported transaction data corresponding to the suspicious cases can be used as a training sample of the machine learning model. The machine learning model is updated by adopting the training samples, so that the suspicious confidence degree output by the machine learning model is more accurate. The training of the machine learning model is not limited in detail in the embodiment of the application, and the training can be set according to actual conditions.
The specific definition of the suspicious case determination device can be referred to the above definition of the suspicious case determination method, and is not described herein again. The various modules in the above-described suspicious case determination apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of determining suspicious cases. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
receiving case search conditions;
searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the key cases are key attention cases screened from a preset time period;
case information of the target key case is displayed in a case display interface;
and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
if the key case meeting the case searching condition is not searched in the key case set, generating feedback information of the not-searched case;
and displaying the feedback information in the case display interface.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
searching in a non-key case set acquired in advance according to case searching conditions; the non-important case set comprises a plurality of non-important cases; the non-key cases are cases except the key cases within a preset time period;
if the non-key case meeting the case searching condition is searched in the non-key case set, the searched non-key case is taken as a target non-key case;
and displaying the case information of the target non-key case in the case display interface.
In one embodiment, the case display interface includes a search condition input area and a case information display area;
the processor, when executing the computer program, further performs the steps of:
receiving case searching conditions input in a searching condition input area;
case information of the target key case is displayed in the case information display area; the case information comprises at least one of transaction subject identification, case state, suspicious confidence and case generation time; the suspicious confidence degree represents the probability that the illegal fund transfer suspicion exists in the target key case.
In one embodiment, the case presentation interface includes a screening area, the screening area including a plurality of screening options; the processor, when executing the computer program, further performs the steps of:
receiving a trigger operation aiming at a target screening option;
and displaying the case information of the multiple target key cases in the case information display area according to the target screening options.
In one embodiment, the screening options include an unchecked status and a checked status; the processor, when executing the computer program, further performs the steps of:
if the target screening option is in an unviewed state, screening a plurality of unviewed target key cases from the plurality of target key cases;
and displaying the plurality of unaudited target key cases according to the sequence of the suspicious confidence degrees from high to low.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and displaying a plurality of unaudited target key cases with the same suspicious confidence degrees according to the sequence of case generation time from near to far.
In one embodiment, the screening option includes a monitoring list and a white list, the monitoring list includes a plurality of identifications of transaction subjects needing to be monitored, and the white list includes a plurality of identifications of transaction subjects needing not to be monitored;
the processor, when executing the computer program, further performs the steps of:
if the target screening option is a monitoring list, determining whether the identification of the transaction main body corresponding to each target key case is in the monitoring list;
and if the identification of the transaction main body corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring transaction data of a plurality of transaction main bodies within a preset time period;
screening a target trading subject from a plurality of trading subjects according to the trading data;
determining the case corresponding to the target transaction subject as a major case, and forming a major case set by a plurality of major cases.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
inputting transaction data into a preset machine learning model aiming at each transaction main body to obtain a suspicious confidence coefficient corresponding to the transaction main body output by the machine learning model;
and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as a target transaction main body.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving case search conditions;
searching in a pre-acquired key case set according to case searching conditions, and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the key cases are key attention cases screened from a preset time period;
case information of the target key case is displayed in a case display interface;
and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the key case meeting the case searching condition is not searched in the key case set, generating feedback information of the not-searched case;
and displaying the feedback information in the case display interface.
In one embodiment, the computer program when executed by the processor further performs the steps of:
searching in a non-key case set acquired in advance according to case searching conditions; the non-important case set comprises a plurality of non-important cases; the non-key cases are cases except the key cases within a preset time period;
if the non-key case meeting the case searching condition is searched in the non-key case set, the searched non-key case is taken as a target non-key case;
and displaying the case information of the target non-key case in the case display interface.
In one embodiment, the case display interface includes a search condition input area and a case information display area;
the computer program when executed by the processor further realizes the steps of:
receiving case searching conditions input in a searching condition input area;
case information of the target key case is displayed in the case information display area; the case information comprises at least one of transaction subject identification, case state, suspicious confidence and case generation time; the suspicious confidence degree represents the probability that the illegal fund transfer suspicion exists in the target key case.
In one embodiment, the case presentation interface includes a screening area, the screening area including a plurality of screening options; the computer program when executed by the processor further realizes the steps of:
receiving a trigger operation aiming at a target screening option;
and displaying the case information of the multiple target key cases in the case information display area according to the target screening options.
In one embodiment, the screening options include an unchecked status and a checked status; the computer program when executed by the processor further realizes the steps of:
if the target screening option is in an unviewed state, screening a plurality of unviewed target key cases from the plurality of target key cases;
and displaying the plurality of unaudited target key cases according to the sequence of the suspicious confidence degrees from high to low.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and displaying a plurality of unaudited target key cases with the same suspicious confidence degrees according to the sequence of case generation time from near to far.
In one embodiment, the screening option includes a monitoring list and a white list, the monitoring list includes a plurality of identifications of transaction subjects needing to be monitored, and the white list includes a plurality of identifications of transaction subjects needing not to be monitored;
the computer program when executed by the processor further realizes the steps of:
if the target screening option is a monitoring list, determining whether the identification of the transaction main body corresponding to each target key case is in the monitoring list;
and if the identification of the transaction main body corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring transaction data of a plurality of transaction main bodies within a preset time period;
screening a target trading subject from a plurality of trading subjects according to the trading data;
determining the case corresponding to the target transaction subject as a major case, and forming a major case set by a plurality of major cases.
In one embodiment, the computer program when executed by the processor further performs the steps of:
inputting transaction data into a preset machine learning model aiming at each transaction main body to obtain a suspicious confidence coefficient corresponding to the transaction main body output by the machine learning model;
and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as a target transaction main body.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (13)
1. A method for determining suspicious cases, the method comprising:
receiving case search conditions;
searching in a pre-acquired key case set according to the case searching conditions, and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the important cases are important concerned cases screened from a preset time period;
case information of the target key case is displayed in a case display interface;
and receiving a selection operation based on the case display interface, and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
2. The method according to claim 1, wherein after the case finding is performed in the pre-acquired important case set according to the case finding condition, the method further comprises:
if the key case meeting the case searching condition is not searched in the key case set, generating feedback information of the case which is not searched;
and displaying the feedback information in the case display interface.
3. The method as claimed in claim 2, wherein after no case-finding meeting the case finding condition is found in the set of cases, the method further comprises:
searching in a non-key case set acquired in advance according to the case searching condition; the non-emphasized case set comprises a plurality of non-emphasized cases; the non-important cases are cases except the important cases in the preset time period;
if the non-key case meeting the case searching condition is searched in the non-key case set, the searched non-key case is taken as a target non-key case;
and displaying the case information of the target non-key case in the case display interface.
4. The method of claim 1, wherein the case presentation interface comprises a search condition input area and a case information presentation area;
the receiving case searching condition comprises:
receiving the case searching condition input in the searching condition input area;
the displaying of the case information of the target important case in the case display interface includes:
case information of the target key case is displayed in the case information display area; the case information comprises at least one of transaction subject identification, case state, suspicious confidence level and case generation time; the suspicious confidence degree represents the probability that the target key case has illegal fund transfer suspicion.
5. The method of claim 4, wherein the case presentation interface includes a screening area, the screening area including a plurality of screening options; before the case information of the target important case is displayed in the case information display area, the method further includes:
receiving a trigger operation aiming at a target screening option;
correspondingly, the displaying of the case information of the target major case in the case information display area includes:
and displaying the case information of the multiple target key cases in the case information display area according to the target screening options.
6. The method of claim 5, wherein the screening options include an unchecked status and a checked status; the displaying of the case information of the multiple target major cases in the case information display area according to the target screening options includes:
if the target screening option is in the non-auditing state, screening a plurality of non-auditing target key cases from the plurality of target key cases;
and displaying the plurality of the unaudied target key cases according to the sequence of the suspicious confidence degrees from high to low.
7. The method of claim 6, further comprising, after the screening of the plurality of unaudited target highlight cases from the plurality of target highlight cases:
and displaying the plurality of the unaudited target key cases with the same suspicious confidence degrees according to the sequence of case generation time from near to far.
8. The method of claim 4, wherein the screening options include a monitoring list and a white list, the monitoring list includes the identities of a plurality of transaction bodies that need to be monitored, and the white list includes the identities of a plurality of transaction bodies that do not need to be monitored;
the displaying of the case information of the multiple target major cases in the case information display area according to the target screening options includes:
if the target screening option is a monitoring list, determining whether the identification of the transaction main body corresponding to each target key case is in the monitoring list;
and if the identification of the transaction main body corresponding to the target key case is in the monitoring list, the target key case is displayed at the top.
9. The method according to claim 1, wherein before the searching in the pre-obtained important case set according to the case searching condition, the method further comprises:
acquiring transaction data of a plurality of transaction main bodies within the preset time period;
screening out a target trading subject from the plurality of trading subjects according to the trading data;
determining the case corresponding to the target transaction subject as the important case, and forming the important case set by a plurality of important cases.
10. The method of claim 9, wherein said screening a target transaction body from a plurality of said transaction bodies based on said transaction data comprises:
inputting the transaction data into a preset machine learning model aiming at each transaction main body to obtain a suspicious confidence coefficient corresponding to the transaction main body output by the machine learning model;
and determining the transaction main body with the suspicious confidence degree larger than a preset threshold value as the target transaction main body.
11. An apparatus for determining suspicious cases, said apparatus comprising:
the case searching condition receiving module is used for receiving case searching conditions;
the case searching module is used for searching in a pre-acquired key case set according to the case searching conditions and taking the searched key case as a target key case; wherein the set of important cases comprises a plurality of important cases; the important cases are important concerned cases screened from a preset time period;
the case information display module is used for displaying the case information of the target key case in a case display interface;
and the suspicious case determining module is used for receiving a selection operation based on the case display interface and determining a target key case corresponding to the selection operation as a suspicious case to be reported.
12. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 10 when executing the computer program.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010473593.9A CN111737287A (en) | 2020-05-29 | 2020-05-29 | Suspicious case determination method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010473593.9A CN111737287A (en) | 2020-05-29 | 2020-05-29 | Suspicious case determination method and device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111737287A true CN111737287A (en) | 2020-10-02 |
Family
ID=72646511
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010473593.9A Pending CN111737287A (en) | 2020-05-29 | 2020-05-29 | Suspicious case determination method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111737287A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106021479A (en) * | 2016-05-18 | 2016-10-12 | 广东源恒软件科技有限公司 | Project key index automatic association method and system |
CN109242658A (en) * | 2018-06-05 | 2019-01-18 | 平安科技(深圳)有限公司 | Suspicious transaction reporting generation method, system, computer equipment and storage medium |
CN109377339A (en) * | 2018-10-22 | 2019-02-22 | 中信网络科技股份有限公司 | A kind of the auxiliary discriminating method and system of suspicious transaction case |
CN109461078A (en) * | 2018-10-22 | 2019-03-12 | 中信网络科技股份有限公司 | A kind of abnormal transaction identification method and system based on funds transaction network |
CN110246045A (en) * | 2019-04-23 | 2019-09-17 | 阿里巴巴集团控股有限公司 | Case methods of exhibiting, calculates equipment and computer readable storage medium at device |
CN110276618A (en) * | 2019-06-28 | 2019-09-24 | 第四范式(北京)技术有限公司 | The method and system for generating money laundering ancestor prediction model, predicting money laundering ancestor |
-
2020
- 2020-05-29 CN CN202010473593.9A patent/CN111737287A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106021479A (en) * | 2016-05-18 | 2016-10-12 | 广东源恒软件科技有限公司 | Project key index automatic association method and system |
CN109242658A (en) * | 2018-06-05 | 2019-01-18 | 平安科技(深圳)有限公司 | Suspicious transaction reporting generation method, system, computer equipment and storage medium |
CN109377339A (en) * | 2018-10-22 | 2019-02-22 | 中信网络科技股份有限公司 | A kind of the auxiliary discriminating method and system of suspicious transaction case |
CN109461078A (en) * | 2018-10-22 | 2019-03-12 | 中信网络科技股份有限公司 | A kind of abnormal transaction identification method and system based on funds transaction network |
CN110246045A (en) * | 2019-04-23 | 2019-09-17 | 阿里巴巴集团控股有限公司 | Case methods of exhibiting, calculates equipment and computer readable storage medium at device |
CN110276618A (en) * | 2019-06-28 | 2019-09-24 | 第四范式(北京)技术有限公司 | The method and system for generating money laundering ancestor prediction model, predicting money laundering ancestor |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109672741B (en) | Micro-service monitoring method and device, computer equipment and storage medium | |
US20220004662A1 (en) | Secure multi-client data analysis | |
US10484413B2 (en) | System and a method for detecting anomalous activities in a blockchain network | |
US11159556B2 (en) | Predicting vulnerabilities affecting assets of an enterprise system | |
US11531734B2 (en) | Determining optimal machine learning models | |
WO2019061664A1 (en) | Electronic device, user's internet surfing data-based product recommendation method, and storage medium | |
CN108182633B (en) | Loan data processing method, loan data processing device, loan data processing program, and computer device and storage medium | |
CN113971527A (en) | Data risk assessment method and device based on machine learning | |
CN112669039B (en) | Knowledge graph-based customer risk management and control system and method | |
CN109542764B (en) | Webpage automatic testing method and device, computer equipment and storage medium | |
CN114693192A (en) | Wind control decision method and device, computer equipment and storage medium | |
CN114036059A (en) | Automatic penetration testing system and method for power grid system and computer equipment | |
US20220414262A1 (en) | Rule-based anonymization of datasets | |
Zhang et al. | Introducing privacy in screen event frequency analysis for Android apps | |
CN113918738A (en) | Multimedia resource recommendation method and device, electronic equipment and storage medium | |
CN111597299A (en) | Knowledge point monitoring method and device, computer equipment and storage medium | |
CN111737287A (en) | Suspicious case determination method and device, computer equipment and storage medium | |
CN115883172A (en) | Anomaly monitoring method and device, computer equipment and storage medium | |
CN115189963A (en) | Abnormal behavior detection method and device, computer equipment and readable storage medium | |
EP3671467A1 (en) | Gui application testing using bots | |
US10248924B2 (en) | Network change auditing system | |
CN111736742B (en) | Fixed rule configuration method and device, computer equipment and storage medium | |
US20240256959A1 (en) | Bias detection in machine learning tools | |
CN113094709B (en) | Detection method, device and server for risk application | |
US20240289622A1 (en) | Ai model recommendation based on system task analysis and interaction data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |