CN113641878B - Real control person identification method, device, equipment and medium suitable for directed loop - Google Patents

Real control person identification method, device, equipment and medium suitable for directed loop Download PDF

Info

Publication number
CN113641878B
CN113641878B CN202110908874.7A CN202110908874A CN113641878B CN 113641878 B CN113641878 B CN 113641878B CN 202110908874 A CN202110908874 A CN 202110908874A CN 113641878 B CN113641878 B CN 113641878B
Authority
CN
China
Prior art keywords
control
share
identifier
share ratio
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110908874.7A
Other languages
Chinese (zh)
Other versions
CN113641878A (en
Inventor
庞宇嘉
彭琛
汪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202110908874.7A priority Critical patent/CN113641878B/en
Publication of CN113641878A publication Critical patent/CN113641878A/en
Application granted granted Critical
Publication of CN113641878B publication Critical patent/CN113641878B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9038Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to the technical field of artificial intelligence, and discloses a method, a device, equipment and a medium for identifying a real control person applicable to a directed loop, wherein the method comprises the following steps: acquiring a target enterprise identifier and a control party set, a stay link set and a tenure link set corresponding to the target enterprise identifier, wherein the stay link set comprises a control party directed loop; according to the stock-holding link set and the target enterprise identifier, calculating the effective stock right proportion of each control party in the control party directional loop to obtain an effective stock right proportion set; according to the share-holding link set and the effective share ratio set, respectively carrying out real share ratio calculation on each controller in the controller set to obtain a real share ratio set; and carrying out actual control person identification on the target enterprise identification according to the tenure link set and the real share right proportion set to obtain an actual control person identification result. The equity loss of the directional loop of the control party is realized through the effective equity proportion calculation, and the accuracy of the identification result of the real control person is improved.

Description

Real control person identification method, device, equipment and medium suitable for directed loop
Technical Field
The application relates to the technical field of artificial intelligence, in particular to a method, a device, equipment and a medium for identifying a real control person applicable to a directed loop.
Background
The traditional real control person identification method based on the atlas technology comprises the following steps: firstly, an enterprise association relationship network is constructed, then, the enterprise is given, the enterprise association relationship network is traversed through association relationships such as a stock holding, high management, transaction partner executing and the like, all the controllers of the given enterprise are searched, finally, the control proportion of each controller is calculated, and finally, the actual control person is judged according to the control proportion of each controller and path dependence.
The situation that cross strand holding exists among hidden enterprises, the cross strand holding can form a directional loop in an enterprise association relationship network, deviation can occur in a traditional real control person identification method, a final control proportion can not be accurately defined, and a final real control person can not be judged. As shown in fig. 1, a directed loop is formed between enterprises A, B, C, and when we want to search for the actual person of enterprise T, A, B, C cannot form the final control condition, and enterprise D is the actual person of T. If a directed loop is allowed to exist in the traditional real control person identification method during traversing search, the search process can circulate among A-B-C, and finally the control proportion of A, B, C enterprises can be infinitely accumulated, so that although the control proportion of D is close to 100%, extremely large computing resources are required, and the computing result cannot be used as a judgment basis of a real control person; if the conventional actual control person identification method does not allow a directed loop to exist in traversing searching, the conventional actual control person identification method can judge that C is an actual control person, is not in line with the actual situation, and cannot accurately identify the final actual control person.
Disclosure of Invention
The application mainly aims to provide a method, a device, equipment and a medium for identifying a real control person applicable to a directed loop, and aims to solve the technical problems that deviation occurs in an application scene of forming the directed loop by intersecting strands, a final control proportion cannot be accurately defined and a final real control person cannot be judged in the traditional method for identifying the real control person based on a map technology.
In order to achieve the above object, the present application proposes a method for identifying a person in real control suitable for a directed loop, the method comprising:
Acquiring a target enterprise identifier, and a control party set, a share-holding link set and a job-holding link set corresponding to the target enterprise identifier, wherein the share-holding link set comprises a control party directed loop;
according to the stock-holding link set and the target enterprise identifier, calculating the effective share ratio of each control party in the control party directional loop to obtain an effective share ratio set;
According to the share-holding link set and the effective share ratio set, respectively carrying out real share ratio calculation on each controller in the controller set to obtain a real share ratio set;
And carrying out actual control person identification on the target enterprise identifier according to the tenure link set and the real share right proportion set to obtain an actual control person identification result.
Further, the step of obtaining the target enterprise identifier and the set of controllers, the set of persistent links and the set of incumbent links corresponding to the target enterprise identifier includes:
Acquiring the target enterprise identifier and a control party associated knowledge graph corresponding to the target enterprise identifier, wherein the control party associated knowledge graph comprises the control party directed loop;
And respectively performing controller identification, stock-holding link identification and job-holding link identification on the target enterprise identification according to the controller associated knowledge graph by adopting a depth-first search algorithm to obtain the controller set, the stock-holding link set and the job-holding link set.
Further, the step of calculating the effective share ratio of each control party in the control party directional loop according to the share-holding link set and the target enterprise identifier to obtain an effective share ratio set includes:
Acquiring a holding link from the holding link set as a first holding link;
acquiring a first node counter, a single record table and a double record table, initializing the first node counter to 2, and initializing the single record table and the double record table;
the target enterprise identifier is adopted as a starting node, and a node corresponding to the first node counter is searched from the first stay link to obtain a first searching result;
when the first search result is successful, the controller identifier of the node corresponding to the first node counter is used as a first controller identifier;
Acquiring a circulating link record table and an effective share ratio mapping table;
updating the single record table, the twice record table, the circulating link record table and the effective share ratio mapping table according to the first control party identifier to obtain an updating end signal;
Adding 1 to the first node counter according to the updating end signal, repeatedly executing the step of searching the node corresponding to the first node counter from the first persistent link by adopting the target enterprise identifier as a starting node, and obtaining a first searching result until the first searching result is failure;
Repeating the step of acquiring the holdback link from the holdback link set as a first holdback link until the acquisition of the holdback link in the holdback link set is completed;
And determining the effective share ratio set according to the effective share ratio mapping table.
Further, the step of updating the single record table, the twice record table, the circulation link record table and the effective share ratio mapping table according to the first controller identifier to obtain an update end signal includes:
judging whether the first control party identifier exists in the single record table or not;
when the first controller identifier does not exist in the single record table, adding the first controller identifier into the single record table;
When the first controller identifier exists in the single record table, judging whether the first controller identifier exists in the twice record table or not;
Generating the update end signal when the first controller identifier exists in the twice record table;
When the first control party identifier does not exist in the twice record table, adding the first control party identifier into the single record table, acquiring a control party directed loop from the single record table according to the first control party identifier as a control party directed loop to be analyzed, performing cumulative calculation on initial share ratios corresponding to each control party in the control party directed loop to be analyzed to obtain share loss data, and judging whether the control party directed loop to be analyzed exists in the circulating link record table;
Generating the update end signal when the control direction loop to be analyzed exists in the circulating link record table;
When the control direction loop to be analyzed does not exist in the circulating link record table, adding the control direction loop to be analyzed into the circulating link record table, and judging whether the first control party identifier exists in the effective share ratio mapping table;
When the first control party identifier exists in the effective share ratio mapping table, searching from the effective share ratio mapping table according to the first control party identifier to obtain a stored share ratio, subtracting the share loss data from the stored share ratio to obtain a share ratio after first loss, and replacing the stored share ratio in the effective share ratio mapping table by the share ratio after first loss to generate the update ending signal;
When the first controller identifier does not exist in the effective share ratio mapping table, subtracting the share loss data from 1 to obtain a share ratio after second loss, and adding the share ratio after second loss into the effective share ratio mapping table to generate the updating end signal.
Further, the step of respectively performing real share ratio calculation on each of the controllers in the controller set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set includes:
Acquiring a holding link from the holding link set as a second holding link;
Acquiring a second node counter, and initializing the second node counter to 2;
acquiring a target node counter, and initializing the target node counter to 1;
the target enterprise identifier is adopted as a starting node, and a node corresponding to the second node counter is searched from the second stay link to obtain a second searching result;
When the second searching result is successful, the controller identifier of the node corresponding to the second node counter is used as a second controller identifier, the target enterprise identifier is used as a starting node, the node corresponding to the target node counter is searched from the second stock-holding link, the controller identifier of the node corresponding to the target node counter is used as a third controller identifier, a real stock right proportion mapping table is obtained, and the third controller identifier is searched in the effective stock right proportion set to obtain an effective stock right proportion searching result;
When the effective share ratio searching result is successful, taking the effective share ratio corresponding to the effective share ratio searching result as a target effective share ratio, dividing the initial share ratio corresponding to the second controller identifier by the target effective share ratio to obtain an adjusted share ratio, and taking the second controller identifier, the third controller identifier and the adjusted share ratio as associated data to update the real share ratio mapping table;
When the searching result of the effective share ratio is failure, updating the real share ratio mapping table according to the initial share ratio corresponding to the third controller identifier, the third controller identifier and the second controller identifier;
Adding 1 to the second node counter and the target node counter, repeatedly executing the step of searching the node corresponding to the second node counter from the second persistent link by adopting the target enterprise identifier as a starting node, and obtaining a second searching result until the second searching result is failure;
When the second search result is failure, repeating the step of acquiring the holding link from the holding link set as a second holding link until the acquisition of the holding link in the holding link set is completed;
and determining the real share ratio set according to the real share ratio mapping table.
Further, the step of performing real control person identification on the target enterprise identifier according to the tenure link set and the real share ratio set to obtain a real control person identification result includes:
carrying out a stock holding control proportion calculation on the target enterprise identifier according to the real stock right proportion set by adopting a stock holding proportion transition algorithm to obtain a first control proportion set;
Acquiring a tenure and a control proportion dictionary;
performing job control proportion calculation on the target enterprise identifier according to the job link set by adopting the job and control proportion dictionary to obtain a second control proportion set;
And carrying out actual control person identification on the target enterprise identifier according to the first control proportion set and the second control proportion set to obtain an actual control person identification result.
Further, the step of performing actual control person identification on the target enterprise identifier according to the first control proportion set and the second control proportion set to obtain the actual control person identification result includes:
performing fusion control proportion calculation according to the first control proportion set and the second control proportion set to obtain a third control proportion set;
Finding out the maximum fusion control proportion from the third control proportion set to obtain a target control proportion;
And taking the control party corresponding to the target control proportion as the identification result of the real control person.
The application also provides a real control person identification device suitable for the directed loop, which comprises:
the system comprises a data acquisition module, a control party acquisition module and a control party management module, wherein the data acquisition module is used for acquiring a target enterprise identifier, a control party set, a share-holding link set and a tenure link set corresponding to the target enterprise identifier, and the share-holding link set comprises a control party directed loop;
The effective share ratio set determining module is used for calculating the effective share ratio of each control party in the control party directional loop according to the share-holding link set and the target enterprise identifier to obtain an effective share ratio set;
The real share ratio set determining module is used for respectively carrying out real share ratio calculation on each controller in the controller set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set;
And the real control person identification result determining module is used for carrying out real control person identification on the target enterprise identification according to the tenure link set and the real share right proportion set to obtain a real control person identification result.
The application also proposes a computer device comprising a memory storing a computer program and a processor implementing the steps of any of the methods described above when the processor executes the computer program.
The application also proposes a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the method of any of the above.
The application discloses a real-control person identification method, device, equipment and medium suitable for a directed loop, wherein the method comprises the steps of firstly acquiring a target enterprise identifier, a control party set, a share-holding link set and an optional link set corresponding to the target enterprise identifier, wherein the share-holding link set comprises the directed loop of the control party, then carrying out effective share ratio calculation on each control party in the directed loop of the control party according to the share-holding link set and the target enterprise identifier to obtain an effective share ratio set, carrying out real share ratio calculation on each control party in the control party set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set, finally carrying out real-control person identification on the target enterprise identifier according to the optional link set and the real share ratio set to obtain a real-control person identification result, and realizing the weight loss of the directed loop of the control party through the effective share ratio calculation, thereby improving the real share ratio calculation and improving the accuracy of the real-control person identification result; and the share right loss of the directional loop of the control party is realized through the effective share right proportion calculation, so that endless loop calculation of the directional loop of the control party is avoided, and the waste of calculation resources is avoided.
Drawings
FIG. 1 is a schematic diagram of an enterprise association network with directed loops in the background of the application;
FIG. 2 is a flow chart of a method for real person identification for directed loops according to an embodiment of the present application;
FIG. 3 is a schematic block diagram of a real person identification device adapted for directed loop according to one embodiment of the present application;
fig. 4 is a schematic block diagram of a computer device according to an embodiment of the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Referring to fig. 2, in an embodiment of the present application, there is provided a method for identifying a real person applicable to a directed loop, where the method includes:
S1: acquiring a target enterprise identifier, and a control party set, a share-holding link set and a job-holding link set corresponding to the target enterprise identifier, wherein the share-holding link set comprises a control party directed loop;
S2: according to the stock-holding link set and the target enterprise identifier, calculating the effective share ratio of each control party in the control party directional loop to obtain an effective share ratio set;
S3: according to the share-holding link set and the effective share ratio set, respectively carrying out real share ratio calculation on each controller in the controller set to obtain a real share ratio set;
s4: and carrying out actual control person identification on the target enterprise identifier according to the tenure link set and the real share right proportion set to obtain an actual control person identification result.
According to the embodiment, a target enterprise identifier and a control party set, a share-holding link set and a tenninal link set corresponding to the target enterprise identifier are firstly obtained, wherein the share-holding link set comprises a control party directed loop, then effective share ratio calculation is carried out on each control party in the control party directed loop according to the share-holding link set and the target enterprise identifier to obtain an effective share ratio set, real share ratio calculation is carried out on each control party in the control party set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set, finally real controller identification is carried out on the target enterprise identifier according to the tenninal link set and the real share ratio set to obtain a real controller identification result, and the share loss of the control party directed loop is realized through the effective share ratio calculation, so that the accuracy of the real share ratio calculation according to the effective share ratio is improved, and the accuracy of the determined real controller identification result is improved; and the share right loss of the directional loop of the control party is realized through the effective share right proportion calculation, so that endless loop calculation of the directional loop of the control party is avoided, and the waste of calculation resources is avoided.
For S1, a target enterprise identifier input by a user and a controller set, a share-holding link set and a job-holding link set corresponding to the target enterprise identifier can be obtained, the target enterprise identifier and the controller set, the share-holding link set and the job-holding link set corresponding to the target enterprise identifier can be obtained from a database, and the target enterprise identifier and the controller set, the share-holding link set and the job-holding link set corresponding to the target enterprise identifier can be obtained from a third party application system.
The target enterprise identifier is an enterprise identifier for identifying a real person. The enterprise identifier may be data that uniquely identifies an enterprise, such as an enterprise name, an enterprise abbreviation, an enterprise ID, etc.
The controller set comprises a plurality of controllers. The controller includes: one or more of natural persons, businesses, institutions. Mechanisms include, but are not limited to: a government agency.
The set of stay links includes: one or more stay links. The persistent link includes one or more nodes, the nodes including: the controller identifies and initiates the share ratio. The nodes in the persistent links are connected in series. The initial share ratio of the ith node in the holding link is the holding ratio of the controller identifier of the ith node in the holding link to the controller identifier of the (i-1) node in the holding link.
The control party directional loop is formed according to the initial share ratio. For example, enterprise A, B, C in FIG. 1 forms one such control-direction loop.
The set of tenninal links is a set of high-level staff that are tenninal to each enterprise and/or each organization in the set of controllers. The set of tenninal links includes: control party identification, high management identification, job title. The controller identification may be data uniquely identifying a controller, such as a controller name, a controller ID, etc. The high-tube identification may be data that uniquely identifies a high-tube employee, such as a high-tube name, a high-tube ID, etc. The job title includes, but is not limited to: board of directors, general manager, legal representative, board of directors, and supervision.
For S2, adopting a share right loss algorithm, and calculating share right loss data for the directional loop of the control direction according to the share-holding link set and the target enterprise identifier; and then, according to the share right loss data and the share-holding link set, calculating the effective share right proportion of each control party in the control party directional loop, and taking the calculated data as the effective share right proportion set.
The effective share ratio set includes: the method comprises the steps of identifying the controllers and the effective share ratio, wherein each controller identifier corresponds to one effective share ratio.
That is, regarding each of the control-side directional loops as a whole, the effective share ratio of each of the control-sides in the same control-side directional loop is the same.
And S3, according to the share-holding link set and the effective share ratio set, carrying out actual share ratio calculation between each controller in the controller set, and taking the calculated data as the actual share ratio set.
The real share ratio set includes: the device comprises an upstream controller identifier, a real share right proportion and a controlled controller identifier, wherein the real share right proportion is a real share right proportion of the upstream controller identifier to the controlled controller identifier. The upstream controller identifier is a controller identifier. The controlled controller identifier is a controlled controller identifier.
S4, carrying out share-holding control proportion calculation on the target enterprise identifier according to the real share right proportion set; performing wilting control proportion calculation on the target enterprise identifier according to the wilting link set; carrying out fusion control proportion calculation according to the strand holding control proportion and the optional control proportion; and taking the control party corresponding to the maximum fusion control proportion as the identification result of the real control person.
And the actual control person identification result is the final actual control person of the target enterprise identification.
In one embodiment, the step of obtaining the target enterprise identifier and the set of controllers, the set of persistent links, and the set of incumbent links corresponding to the target enterprise identifier includes:
s11: acquiring the target enterprise identifier and a control party associated knowledge graph corresponding to the target enterprise identifier, wherein the control party associated knowledge graph comprises the control party directed loop;
S12: and respectively performing controller identification, stock-holding link identification and job-holding link identification on the target enterprise identification according to the controller associated knowledge graph by adopting a depth-first search algorithm to obtain the controller set, the stock-holding link set and the job-holding link set.
According to the embodiment, a depth-first search algorithm is adopted, and the target enterprise identification is respectively subjected to control party identification, stock-holding link identification and optional link identification according to the control party association knowledge graph, so that a foundation is provided for real control person identification.
For S11, the target enterprise identifier input by the user and the control party associated knowledge spectrum corresponding to the target enterprise identifier may be obtained, the target enterprise identifier and the control party associated knowledge spectrum corresponding to the target enterprise identifier may be obtained from a database, and the target enterprise identifier and the control party associated knowledge spectrum corresponding to the target enterprise identifier may be obtained from a third party application system.
The control party association knowledge graph comprises one or more control party directed loops.
The control party association knowledge graph comprises a plurality of nodes, each node represents 1 control party, and the strand holding direction among the control parties is used as a directed edge. As shown in FIG. 1, A, B, C, D, T are all controllers, and T is also the controller corresponding to the target enterprise identifier.
For S12, a depth-first search algorithm is adopted, a node corresponding to the target enterprise identifier is taken as a starting node, each stay link in the control party associated knowledge graph is searched, and all stay links obtained through identification are taken as the stay link set; a depth-first search algorithm is adopted, a node corresponding to the target enterprise identifier is taken as a starting node, each optional link in the control side association knowledge graph is searched, and all the identified optional links are taken as the optional link set; and taking all the controllers in the controller associated knowledge graph as the set of controllers.
The depth-first search algorithm belongs to a graph algorithm, is a traversal algorithm for graphs and trees, and is abbreviated as DFS (discrete Fourier transform) and is named DEPTH FIRST SEARCH.
In one embodiment, the step of calculating the effective share ratio of each control party in the control party directional loop according to the share-holding link set and the target enterprise identifier to obtain the effective share ratio set includes:
s21: acquiring a holding link from the holding link set as a first holding link;
S22: acquiring a first node counter, a single record table and a double record table, initializing the first node counter to 2, and initializing the single record table and the double record table;
S23: the target enterprise identifier is adopted as a starting node, and a node corresponding to the first node counter is searched from the first stay link to obtain a first searching result;
S24: when the first search result is successful, the controller identifier of the node corresponding to the first node counter is used as a first controller identifier;
s25: acquiring a circulating link record table and an effective share ratio mapping table;
s26: updating the single record table, the twice record table, the circulating link record table and the effective share ratio mapping table according to the first control party identifier to obtain an updating end signal;
S27: adding 1 to the first node counter according to the updating end signal, repeatedly executing the step of searching the node corresponding to the first node counter from the first persistent link by adopting the target enterprise identifier as a starting node, and obtaining a first searching result until the first searching result is failure;
s28: repeating the step of acquiring the holdback link from the holdback link set as a first holdback link until the acquisition of the holdback link in the holdback link set is completed;
s29: and determining the effective share ratio set according to the effective share ratio mapping table.
According to the embodiment, nodes of each share-holding link are traversed through the first node counter, the single record table, the twice record table, the circulating link record table and the effective share ratio mapping table are updated according to the first control party identification, an update end signal is obtained, after all share-holding links are searched, data in the effective share ratio mapping table are used as the effective share ratio set, so that the share loss of a directed loop of the control party is realized through effective share ratio calculation, the accuracy of the real share ratio calculated according to the effective share ratio is improved, and the accuracy of a determined real control person identification result is improved.
And S21, acquiring one holding link from the holding link set, and taking the acquired holding link as a first holding link.
For S22, one node counter is created as the first node counter, and the first node counter is initialized to 2. Thus enabling a search for each persistent link to be performed by first processing the second node of the persistent link.
The method can acquire a single record table and a double record table input by a user, can acquire the single record table and the double record table from a database, and can acquire the single record table and the double record table from a third party application system.
The single record table includes: and (5) identifying a control party.
The twice record table includes: and (5) identifying a control party.
And initializing the single record table and the double record table, namely, making the data of the single record table be empty and making the data of the double record table be empty.
For S23, the target enterprise identifier is adopted as a starting node, and a node corresponding to the first node counter is searched from the first stay link; when the node is successfully acquired, determining that the first search result is successful; and when the node is not successfully acquired, determining that the first search result is failed.
For example, when the first node counter is 2, the target enterprise identifier is used as a start node, and the node corresponding to the first node counter is searched from the first persistent link, that is, the 2 nd node in the first persistent link is searched.
For another example, when the first node counter is 3, the target enterprise identifier is used as a start node, and the node corresponding to the first node counter is searched from the first persistent link, that is, the 3 rd node in the first persistent link is searched.
And for S24, when the first searching result is successful, the target enterprise identifier is adopted as a starting node, and the controller identifier corresponding to the node corresponding to the first node counter is searched from the first persistent link and is used as a first controller identifier.
For S25, the cyclic link record table and the effective share ratio map input by the user may be obtained, or the cyclic link record table and the effective share ratio map may be obtained from the database, or the cyclic link record table and the effective share ratio map may be obtained from the third party application system.
The loop link record table includes: the in-loop controller identifies the set. And the control party identifier set in the loop is recorded, and one control party is provided with all control party identifiers of the directed loop.
The effective share ratio mapping table comprises: the controller identifies and valid share ratio.
And S26, updating the single record table, the twice record table, the circulating link record table and the effective share ratio mapping table according to the first controller identification, and generating the update end signal after the update is ended, so that the share loss of the directed loop of the controller is realized through the calculation of the effective share ratio.
For S26, when the update end signal is received, it means that the node corresponding to the first node counter in the first persistent link has completed the share-right loss calculation, and 1 is added to the first node counter to be used for obtaining the next node in the first persistent link to perform the share-right loss calculation, so steps S23 to S26 are repeatedly executed until the first search result is failure. Wherein the failure of the first search result means that all nodes in the first persistent link have completed the share-right loss calculation.
For S28, steps S21 to S28 are repeatedly performed until the acquisition of the persistent links in the persistent link set is completed, so that the share right loss calculation has been completed for all nodes of all the persistent links in the persistent link set.
And for S29, the association data of the controller identification and the effective share ratio in the effective share ratio mapping table is used as the effective share ratio set.
In one embodiment, the step of updating the single record table, the twice record table, the cyclic link record table and the valid share ratio mapping table according to the first controller identifier to obtain an update end signal includes:
s261: judging whether the first control party identifier exists in the single record table or not;
S262: when the first controller identifier does not exist in the single record table, adding the first controller identifier into the single record table;
S263: when the first controller identifier exists in the single record table, judging whether the first controller identifier exists in the twice record table or not;
S264: generating the update end signal when the first controller identifier exists in the twice record table;
S265: when the first control party identifier does not exist in the twice record table, adding the first control party identifier into the single record table, acquiring a control party directed loop from the single record table according to the first control party identifier as a control party directed loop to be analyzed, performing cumulative calculation on initial share ratios corresponding to each control party in the control party directed loop to be analyzed to obtain share loss data, and judging whether the control party directed loop to be analyzed exists in the circulating link record table;
S266: generating the update end signal when the control direction loop to be analyzed exists in the circulating link record table;
s267: when the control direction loop to be analyzed does not exist in the circulating link record table, adding the control direction loop to be analyzed into the circulating link record table, and judging whether the first control party identifier exists in the effective share ratio mapping table;
S268: when the first control party identifier exists in the effective share ratio mapping table, searching from the effective share ratio mapping table according to the first control party identifier to obtain a stored share ratio, subtracting the share loss data from the stored share ratio to obtain a share ratio after first loss, and replacing the stored share ratio in the effective share ratio mapping table by the share ratio after first loss to generate the update ending signal;
S269: when the first controller identifier does not exist in the effective share ratio mapping table, subtracting the share loss data from 1 to obtain a share ratio after second loss, and adding the share ratio after second loss into the effective share ratio mapping table to generate the updating end signal.
In the embodiment, the control direction directional loop is identified through the single record table, the twice record table, the circulation link record table and the effective share ratio mapping table, and the share loss calculation is carried out on each control direction directional loop obtained through identification, so that the accuracy of the real share ratio calculated according to the effective share ratio is improved, and the accuracy of the determined real control person identification result is improved.
For S262, when the first controller identification does not exist in the one-time record table, it means that the first controller identification has not been found in the first persistent link, and thus the first controller identification is added to the end of the one-time record table.
For S263, when the first controller identifier exists in the one-time record table, it means that the first controller identifier has been found in the first persistent link, and it is determined whether the first controller identifier exists in the two-time record table, for determining whether the first controller identifier has been found twice in the first persistent link.
For S264, when the first controller identifier exists in the twice record table, it means that the first controller identifier has been found twice in the first persistent link, and at this time, the share loss calculation of the directed loop of the controller corresponding to the first controller identifier in the first persistent link has been completed, so that updating of the cyclic link record table and the valid share ratio map table is not required, and thus the update end signal is generated.
For S265, when the first controller identifier does not exist in the twice-record table, it means that the first controller identifier is not searched twice in the first persistent link, and because the first controller identifier exists in the once-record table, it means that the search for the first controller identifier in the first persistent link is a second time, so that the first controller identifier is added to the twice-record table, and the first controller identifier is added to the end of the once-record table. And taking out all the controller identifiers from the first controller identifier to the first controller identifier from the single record table to obtain the to-be-analyzed directed loop.
And judging whether the control party directed loop to be analyzed exists in the circulating link record table, namely judging whether a control party identification set in the loop exists in the circulating link record table and is the same as the control party directed loop to be analyzed.
For example, as shown in fig. 1, the directional loop of the to-be-analyzed control party includes an enterprise A, B, C, an initial share ratio of enterprise a to enterprise C is 100%, an initial share ratio of enterprise C to enterprise B is 90%, an initial share ratio of enterprise B to enterprise a is 100%, and the three initial share ratios are multiplied to obtain share loss data of 90% (i.e., 100% ×90% ×100%), so as to determine whether the directional loop of the to-be-analyzed control party exists in the circulation link record table.
For S266, when the same intra-loop control party identifier set as the control party directed loop to be analyzed exists in the loop link record table, this means that the share-right loss calculation has been performed on the same control party directed loop, so that the update end signal is directly generated without re-calculation.
For S267, when the set of intra-loop controller identifiers that are the same as the directed loop of the to-be-analyzed controller does not exist in the circulation link record table, this means that the equity loss calculation is not performed, and the directed loop of the to-be-analyzed controller needs to be performed with respect to the equity loss calculation, so that the directed loop of the to-be-analyzed controller is added to the circulation link record table, and therefore, it is determined whether the first controller identifier exists in the effective equity proportion map table, so as to perform the equity loss calculation with respect to the directed loop of the to-be-analyzed controller corresponding to the first controller identifier.
For S268, when the first controller identifier exists in the effective share ratio mapping table, this means that the first controller identifier has already performed share loss in the directional loop of other controllers, so that the first controller identifier is searched from the effective share ratio mapping table, and the effective share ratio corresponding to the controller identifier searched in the effective share ratio mapping table is used as the stored share ratio.
Subtracting the stored share right proportion from the share right loss data, and taking the subtracted data as the share right proportion after the first loss; and replacing the effective share ratio (namely the stored share ratio) corresponding to the first controller identifier in the effective share ratio mapping table by adopting the share ratio after the first loss, and generating the updating end signal after the replacement is ended.
For S269, when the first controller identifier does not exist in the effective share ratio mapping table, it means that the first controller identifier does not perform share loss calculation on other directional loops, and it is necessary to perform first share loss calculation on the first controller identifier, so that 1 minus the share loss data is used as the share ratio after the second loss, the first controller identifier and the share ratio after the second loss are used as associated data to be added to the effective share ratio mapping table, and the addition is completed to generate the update end signal.
In one embodiment, the step of calculating the real share ratio of each of the controllers in the set of controllers according to the set of stay links and the set of effective share ratios to obtain the set of real share ratios includes:
s31: acquiring a holding link from the holding link set as a second holding link;
s32: acquiring a second node counter, and initializing the second node counter to 2;
s33: acquiring a target node counter, and initializing the target node counter to 1;
s34: the target enterprise identifier is adopted as a starting node, and a node corresponding to the second node counter is searched from the second stay link to obtain a second searching result;
S35: when the second searching result is successful, the controller identifier of the node corresponding to the second node counter is used as a second controller identifier, the target enterprise identifier is used as a starting node, the node corresponding to the target node counter is searched from the second stock-holding link, the controller identifier of the node corresponding to the target node counter is used as a third controller identifier, a real stock right proportion mapping table is obtained, and the third controller identifier is searched in the effective stock right proportion set to obtain an effective stock right proportion searching result;
S36: when the effective share ratio searching result is successful, taking the effective share ratio corresponding to the effective share ratio searching result as a target effective share ratio, dividing the initial share ratio corresponding to the second controller identifier by the target effective share ratio to obtain an adjusted share ratio, and taking the second controller identifier, the third controller identifier and the adjusted share ratio as associated data to update the real share ratio mapping table;
S37: when the searching result of the effective share ratio is failure, updating the real share ratio mapping table according to the initial share ratio corresponding to the third controller identifier, the third controller identifier and the second controller identifier;
S38: adding 1 to the second node counter and the target node counter, repeatedly executing the step of searching the node corresponding to the second node counter from the second persistent link by adopting the target enterprise identifier as a starting node, and obtaining a second searching result until the second searching result is failure;
S39: when the second search result is failure, repeating the step of acquiring the holding link from the holding link set as a second holding link until the acquisition of the holding link in the holding link set is completed;
S310: and determining the real share ratio set according to the real share ratio mapping table.
The embodiment realizes that the effective share ratio set is adopted to respectively calculate the real share ratio of each control party in the control party set, thereby avoiding endless loop calculation of the directed loop of the control party and avoiding wasting calculation resources.
And S31, acquiring one holding link from the holding link set, and taking the acquired holding link as a second holding link.
For S32, a node counter is created as the second node counter, and the second node counter is initialized to 2, so that the second node of each persistent link may be processed first when searching for the persistent link is implemented.
For S33, a node counter is created as a target node counter, and the target node counter is initialized to 1, so that a node corresponding to the second node counter can be searched for when searching for each persistent link is implemented.
For S34, the target enterprise identifier is adopted as a starting node, and a node corresponding to the second node counter is searched from the second stay link; when the node is successfully acquired, determining that the second search result is successful; and when the node is not successfully acquired, determining that the second search result is failed.
For S35, when the second search result is successful, first, the controller identifier of the node corresponding to the second node counter is used as a second controller identifier, so as to be used for performing real share ratio calculation; and then adopting the target enterprise identifier as a starting node, and taking the controller identifier of the node corresponding to the target node counter in the second persistent link as a third controller identifier.
The real share right proportion mapping table input by the user can be obtained, the real share right proportion mapping table can be obtained from the database, and the real share right proportion mapping table can be obtained from the third party application system.
The real share ratio mapping table comprises: upstream controller identification, real share ratio and controlled controller identification.
And searching the third control party identifier in the effective share ratio set, and determining that the effective share ratio searching result is successful when the searching is successful, or determining that the effective share ratio searching result is failed.
For S36, when the result of searching the effective share ratio is successful, it means that the third controller identifier is calculated by the share loss, so that the effective share ratio corresponding to the controller identifier searched in the effective share ratio set by the third controller identifier is used as the target effective share ratio; dividing the initial share ratio corresponding to the second controller identifier by the target effective share ratio to obtain the adjusted share ratio; and updating the real share ratio mapping table by taking the second controller identifier, the third controller identifier and the adjusted share ratio as associated data, namely updating the second controller identifier to the upstream controller identifier of the real share ratio mapping table, updating the third controller identifier to the controlled controller identifier of the real share ratio mapping table, and updating the real share ratio of the real share ratio mapping table according to the adjusted share ratio.
For S37, when the result of the effective share ratio lookup is failure, it means that the third controller identifier is not calculated by the share loss, so that the real share ratio mapping table is updated according to the initial share ratios corresponding to the third controller identifier, the third controller identifier and the second controller identifier, that is, the second controller identifier is updated to the upstream controller identifier of the real share ratio mapping table, the third controller identifier is updated to the controlled controller identifier of the real share ratio mapping table, and the initial share ratio corresponding to the second controller identifier is updated to the real share ratio of the real share ratio mapping table.
For S38, the second node counter and the target node counter are both incremented by 1 for the calculation of the true share ratio of the next node in the second persistent link, and steps S34 to S38 are repeatedly executed until the second search result is a failure, where the failure of the second search result means that all nodes in the second persistent link have completed the calculation of the true share ratio.
For S39, when the second search result is failure, repeating steps S31 to S39 until the acquisition of the persistent links in the persistent link set is completed, so that the calculation of the real share ratio is completed for all nodes of all the persistent links in the persistent link set.
And for S310, the associated data of the upstream controller identification, the real share ratio and the controlled controller identification in the real share ratio mapping table is used as the real share ratio set.
In one embodiment, the step of performing real person identification on the target enterprise identifier according to the tenure link set and the real share ratio set to obtain a real person identification result includes:
S41: carrying out a stock holding control proportion calculation on the target enterprise identifier according to the real stock right proportion set by adopting a stock holding proportion transition algorithm to obtain a first control proportion set;
s42: acquiring a tenure and a control proportion dictionary;
S43: performing job control proportion calculation on the target enterprise identifier according to the job link set by adopting the job and control proportion dictionary to obtain a second control proportion set;
S44: and carrying out actual control person identification on the target enterprise identifier according to the first control proportion set and the second control proportion set to obtain an actual control person identification result.
The embodiment realizes that the control proportion calculation of the holding strand is firstly carried out by adopting the holding strand transition algorithm, then the control proportion calculation of the holding strand is carried out by adopting the holding job and the control proportion dictionary, and finally the actual control person identification is carried out according to the control proportion calculation result of the holding strand and the control proportion calculation result of the holding job, thereby improving the accuracy of the determined actual control person identification result.
For S41, the first set of control proportions includes: the control party identification and the share holding control proportion are the share holding control proportion of the control party identification to the target enterprise identification.
The stock holding ratio transition algorithm refers to that the maximum stakeholder inherits the stock holding control ratio of the controlled controller to other controllers as the stock holding control ratio. It will be appreciated that the non-maximum stakeholder needs to multiply the share control ratio of the controlled party to the other party by its true share ratio. For example, if the enterprise F1 is a non-maximum stockholder of the enterprise F2, the enterprise F3 is a maximum stockholder of the enterprise E2, the true share ratio of the enterprise F1 to the enterprise F2 is 40%, the true share ratio of the enterprise F3 to the enterprise F2 is 60%, the true share ratio of the enterprise F2 to the target enterprise identity is 30%, the share control ratio of the enterprise F2 to the target enterprise identity is 30% (i.e., no share ratio transition is performed), the share control ratio of the enterprise F3 to the target enterprise identity is 30% (i.e., the share control ratio of the enterprise F2 to the target enterprise identity is inherited by the enterprise F3), and the share control ratio of the enterprise F1 to the target enterprise identity is 12% (i.e., the true share ratio of the enterprise F1 is 40% and the share control ratio of the enterprise F2 is 30% are multiplied), which is not particularly limited.
For example, if the enterprise F1 is a non-maximum stockholder of the enterprise F2, the enterprise F3 is a maximum stockholder of the enterprise E2, the true share ratio of the enterprise F1 to the enterprise F2 is 40%, the true share ratio of the enterprise F3 to the enterprise F2 is 60%, the true share ratio of the enterprise F2 to the target enterprise identity is 30%, the maximum share ratio of the enterprise F2 to the target enterprise identity is 100% (i.e., make a transition of the share ratio), the share ratio of the enterprise F3 to the target enterprise identity is 100% (i.e., the enterprise F3 inherits the share ratio of the enterprise F2 to the target enterprise identity), and the share ratio of the enterprise F1 to the target enterprise identity is 40% (i.e., the true share ratio of the enterprise F1 is multiplied by 100% of the share ratio of the enterprise F2), which is not specifically limited.
And carrying out control proportion calculation on the target enterprise identifier according to the real stock right proportion set by adopting a stock holding proportion transition algorithm, and taking the calculated control proportion as a first control proportion set.
For S42, the job and control proportion dictionary input by the user may be obtained, the job and control proportion dictionary may be obtained from a database, and the job and control proportion dictionary may be obtained from a third party application system.
The tenure and control proportion dictionary comprises: job title and optional control ratio.
For S43, adopting the wilful job and control proportion dictionary to perform wilful job control proportion assignment on each high management mark in the wilful job link set to obtain the updated wilful job link set; and performing job control proportion calculation on each high management identifier in the job link set according to the updated job link set to obtain the second control proportion set.
The second set of control ratios includes: the system comprises a high management identifier, a controller identifier and a job control proportion, wherein the job control proportion is obtained by converting a natural person corresponding to the high management identifier in the job of the controller identifier.
For S44, according to the first control proportion set and the second control proportion set, carrying out fusion control proportion calculation on the target enterprise identifier to obtain a third control proportion set; and determining the real control person identification result according to the third control proportion set.
The third set of control ratios includes: and the fusion control proportion is the control proportion of the control party identifier to the target enterprise identifier.
In one embodiment, the step of performing the real control person identification on the target enterprise identifier according to the first control proportion set and the second control proportion set to obtain the real control person identification result includes:
S441: performing fusion control proportion calculation according to the first control proportion set and the second control proportion set to obtain a third control proportion set;
s442: finding out the maximum fusion control proportion from the third control proportion set to obtain a target control proportion;
S443: and taking the control party corresponding to the target control proportion as the identification result of the real control person.
In the embodiment, the control proportion calculation is first fused, and then the control party corresponding to the maximum value of the fused control proportion is used as the actual control person identification result, so that the accuracy of the determined actual control person identification result is improved.
In S441, a weighted sum calculation is performed according to the first control proportion set and the second control proportion set, and a control proportion obtained by the weighted sum calculation is taken as a third control proportion set.
For example, if the share-holding control ratio of the enterprise C to the target enterprise identifier T is 20%, the upper tube G3 is the board length of the enterprise C, and the job-holding control ratio corresponding to the board length is 70%, the fusion control ratio of the upper tube G3 to the target enterprise identifier T is 14% (i.e., the share-holding control ratio is 20% ×job-holding control ratio is 70%), which is not limited specifically herein.
For S442, a maximum fusion control ratio is found out from the third control ratio set, and the found maximum fusion control ratio is taken as a target control ratio.
And S443, taking the controller corresponding to the target control proportion as the identification result of the real control person, thereby obtaining the final real control person of the target enterprise identifier.
Referring to fig. 3, the application further provides a real control person identification device suitable for the directed loop, which comprises:
The data acquisition module 100 is configured to acquire a target enterprise identifier and a control party set, a share-holding link set and a tenure link set corresponding to the target enterprise identifier, where the share-holding link set includes a control party directed loop;
The effective share ratio set determining module 200 is configured to perform effective share ratio calculation on each control party in the control party directional loop according to the share-holding link set and the target enterprise identifier, so as to obtain an effective share ratio set;
The real share ratio set determining module 300 is configured to respectively perform real share ratio calculation on each of the controllers in the controller set according to the share-holding link set and the effective share ratio set, so as to obtain a real share ratio set;
and the real control person identification result determining module 400 is configured to perform real control person identification on the target enterprise identifier according to the tenure link set and the real share ratio set, so as to obtain a real control person identification result.
According to the embodiment, a target enterprise identifier and a control party set, a share-holding link set and a tenninal link set corresponding to the target enterprise identifier are firstly obtained, wherein the share-holding link set comprises a control party directed loop, then effective share ratio calculation is carried out on each control party in the control party directed loop according to the share-holding link set and the target enterprise identifier to obtain an effective share ratio set, real share ratio calculation is carried out on each control party in the control party set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set, finally real controller identification is carried out on the target enterprise identifier according to the tenninal link set and the real share ratio set to obtain a real controller identification result, and the share loss of the control party directed loop is realized through the effective share ratio calculation, so that the accuracy of the real share ratio calculation according to the effective share ratio is improved, and the accuracy of the determined real controller identification result is improved; and the share right loss of the directional loop of the control party is realized through the effective share right proportion calculation, so that endless loop calculation of the directional loop of the control party is avoided, and the waste of calculation resources is avoided.
Referring to fig. 4, in an embodiment of the present application, there is further provided a computer device, which may be a server, and the internal structure of the computer device may be as shown in fig. 4. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer equipment is used for storing data such as a real control person identification method applicable to the directed loop. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of real person identification for a directed loop. The method for identifying the real control person applicable to the directed loop comprises the following steps: acquiring a target enterprise identifier, and a control party set, a share-holding link set and a job-holding link set corresponding to the target enterprise identifier, wherein the share-holding link set comprises a control party directed loop; according to the stock-holding link set and the target enterprise identifier, calculating the effective share ratio of each control party in the control party directional loop to obtain an effective share ratio set; according to the share-holding link set and the effective share ratio set, respectively carrying out real share ratio calculation on each controller in the controller set to obtain a real share ratio set; and carrying out actual control person identification on the target enterprise identifier according to the tenure link set and the real share right proportion set to obtain an actual control person identification result.
According to the embodiment, a target enterprise identifier and a control party set, a share-holding link set and a tenninal link set corresponding to the target enterprise identifier are firstly obtained, wherein the share-holding link set comprises a control party directed loop, then effective share ratio calculation is carried out on each control party in the control party directed loop according to the share-holding link set and the target enterprise identifier to obtain an effective share ratio set, real share ratio calculation is carried out on each control party in the control party set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set, finally real controller identification is carried out on the target enterprise identifier according to the tenninal link set and the real share ratio set to obtain a real controller identification result, and the share loss of the control party directed loop is realized through the effective share ratio calculation, so that the accuracy of the real share ratio calculation according to the effective share ratio is improved, and the accuracy of the determined real controller identification result is improved; and the share right loss of the directional loop of the control party is realized through the effective share right proportion calculation, so that endless loop calculation of the directional loop of the control party is avoided, and the waste of calculation resources is avoided.
An embodiment of the present application further provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements a method for real person identification for directed loops, comprising the steps of: acquiring a target enterprise identifier, and a control party set, a share-holding link set and a job-holding link set corresponding to the target enterprise identifier, wherein the share-holding link set comprises a control party directed loop; according to the stock-holding link set and the target enterprise identifier, calculating the effective share ratio of each control party in the control party directional loop to obtain an effective share ratio set; according to the share-holding link set and the effective share ratio set, respectively carrying out real share ratio calculation on each controller in the controller set to obtain a real share ratio set; and carrying out actual control person identification on the target enterprise identifier according to the tenure link set and the real share right proportion set to obtain an actual control person identification result.
According to the executed real-control person identification method suitable for the directed loop, a target enterprise identifier and a control party set, a share holding link set and an optional link set corresponding to the target enterprise identifier are firstly obtained, wherein the share holding link set comprises the directed loop of the control party, then effective share ratio calculation is carried out on each control party in the directed loop of the control party according to the share holding link set and the target enterprise identifier, an effective share ratio set is obtained, real share ratio calculation is carried out on each control party in the control party set according to the share holding link set and the effective share ratio set, a real share ratio set is obtained, finally real-control person identification is carried out on the target enterprise identifier according to the optional link set and the real share ratio set, a real-control person identification result is obtained, the share loss of the directed loop of the control party is realized through the effective share ratio calculation, the accuracy of the real share ratio calculated according to the effective share ratio is improved, and the accuracy of the determined real-control person identification result is improved; and the share right loss of the directional loop of the control party is realized through the effective share right proportion calculation, so that endless loop calculation of the directional loop of the control party is avoided, and the waste of calculation resources is avoided.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present application and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the application, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application or directly or indirectly applied to other related technical fields are included in the scope of the application.

Claims (8)

1. A method for real person identification for a directed loop, the method comprising:
Acquiring a target enterprise identifier, and a control party set, a share-holding link set and a job-holding link set corresponding to the target enterprise identifier, wherein the share-holding link set comprises a control party directed loop;
according to the stock-holding link set and the target enterprise identifier, calculating the effective share ratio of each control party in the control party directional loop to obtain an effective share ratio set;
According to the share-holding link set and the effective share ratio set, respectively carrying out real share ratio calculation on each controller in the controller set to obtain a real share ratio set;
According to the tenure link set and the real share right proportion set, carrying out actual control person identification on the target enterprise identifier to obtain an actual control person identification result;
And according to the stock-holding link set and the target enterprise identifier, calculating the effective share right proportion of each control party in the control party directional loop to obtain an effective share right proportion set, wherein the method comprises the following steps of:
Acquiring a holding link from the holding link set as a first holding link;
acquiring a first node counter, a single record table and a double record table, initializing the first node counter to 2, and initializing the single record table and the double record table;
the target enterprise identifier is adopted as a starting node, and a node corresponding to the first node counter is searched from the first stay link to obtain a first searching result;
when the first search result is successful, the controller identifier of the node corresponding to the first node counter is used as a first controller identifier;
Acquiring a circulating link record table and an effective share ratio mapping table;
updating the single record table, the twice record table, the circulating link record table and the effective share ratio mapping table according to the first control party identifier to obtain an updating end signal;
Adding 1 to the first node counter according to the updating end signal, repeatedly executing the step of searching the node corresponding to the first node counter from the first persistent link by adopting the target enterprise identifier as a starting node, and obtaining a first searching result until the first searching result is failure;
Repeating the step of acquiring the holdback link from the holdback link set as a first holdback link until the acquisition of the holdback link in the holdback link set is completed;
determining the effective share ratio set according to the effective share ratio mapping table;
And performing real control person identification on the target enterprise identifier according to the optional link set and the real share right proportion set to obtain a real control person identification result, wherein the method comprises the following steps of:
carrying out a stock holding control proportion calculation on the target enterprise identifier according to the real stock right proportion set by adopting a stock holding proportion transition algorithm to obtain a first control proportion set;
Acquiring a tenure and a control proportion dictionary;
performing job control proportion calculation on the target enterprise identifier according to the job link set by adopting the job and control proportion dictionary to obtain a second control proportion set;
And carrying out actual control person identification on the target enterprise identifier according to the first control proportion set and the second control proportion set to obtain an actual control person identification result.
2. The method for identifying a real person applicable to a directed loop according to claim 1, wherein the step of obtaining a set of controllers, a set of persistent links, and a set of incumbent links corresponding to a target enterprise identifier comprises:
Acquiring the target enterprise identifier and a control party associated knowledge graph corresponding to the target enterprise identifier, wherein the control party associated knowledge graph comprises the control party directed loop;
And respectively performing controller identification, stock-holding link identification and job-holding link identification on the target enterprise identification according to the controller associated knowledge graph by adopting a depth-first search algorithm to obtain the controller set, the stock-holding link set and the job-holding link set.
3. The method for identifying a real person applicable to a directed loop according to claim 1, wherein the step of updating the single record table, the twice record table, the loop link record table and the valid share ratio map table according to the first controller identifier to obtain an update end signal includes:
judging whether the first control party identifier exists in the single record table or not;
when the first controller identifier does not exist in the single record table, adding the first controller identifier into the single record table;
When the first controller identifier exists in the single record table, judging whether the first controller identifier exists in the twice record table or not;
Generating the update end signal when the first controller identifier exists in the twice record table;
When the first control party identifier does not exist in the twice record table, adding the first control party identifier into the single record table, acquiring a control party directed loop from the single record table according to the first control party identifier as a control party directed loop to be analyzed, performing cumulative calculation on initial share ratios corresponding to each control party in the control party directed loop to be analyzed to obtain share loss data, and judging whether the control party directed loop to be analyzed exists in the circulating link record table;
Generating the update end signal when the control direction loop to be analyzed exists in the circulating link record table;
When the control direction loop to be analyzed does not exist in the circulating link record table, adding the control direction loop to be analyzed into the circulating link record table, and judging whether the first control party identifier exists in the effective share ratio mapping table;
When the first control party identifier exists in the effective share ratio mapping table, searching from the effective share ratio mapping table according to the first control party identifier to obtain a stored share ratio, subtracting the share loss data from the stored share ratio to obtain a share ratio after first loss, and replacing the stored share ratio in the effective share ratio mapping table by the share ratio after first loss to generate the update ending signal;
When the first controller identifier does not exist in the effective share ratio mapping table, subtracting the share loss data from 1 to obtain a share ratio after second loss, and adding the share ratio after second loss into the effective share ratio mapping table to generate the updating end signal.
4. The method for identifying a real person applicable to a directed loop according to claim 1, wherein the step of respectively performing a real share ratio calculation on each of the controllers in the controller set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set includes:
Acquiring a holding link from the holding link set as a second holding link;
Acquiring a second node counter, and initializing the second node counter to 2;
acquiring a target node counter, and initializing the target node counter to 1;
the target enterprise identifier is adopted as a starting node, and a node corresponding to the second node counter is searched from the second stay link to obtain a second searching result;
When the second searching result is successful, the controller identifier of the node corresponding to the second node counter is used as a second controller identifier, the target enterprise identifier is used as a starting node, the node corresponding to the target node counter is searched from the second stock-holding link, the controller identifier of the node corresponding to the target node counter is used as a third controller identifier, a real stock right proportion mapping table is obtained, and the third controller identifier is searched in the effective stock right proportion set to obtain an effective stock right proportion searching result;
When the effective share ratio searching result is successful, taking the effective share ratio corresponding to the effective share ratio searching result as a target effective share ratio, dividing the initial share ratio corresponding to the second controller identifier by the target effective share ratio to obtain an adjusted share ratio, and taking the second controller identifier, the third controller identifier and the adjusted share ratio as associated data to update the real share ratio mapping table;
When the searching result of the effective share ratio is failure, updating the real share ratio mapping table according to the initial share ratio corresponding to the third controller identifier, the third controller identifier and the second controller identifier;
Adding 1 to the second node counter and the target node counter, repeatedly executing the step of searching the node corresponding to the second node counter from the second persistent link by adopting the target enterprise identifier as a starting node, and obtaining a second searching result until the second searching result is failure;
When the second search result is failure, repeating the step of acquiring the holding link from the holding link set as a second holding link until the acquisition of the holding link in the holding link set is completed;
and determining the real share ratio set according to the real share ratio mapping table.
5. The method for identifying a real person applicable to a directed loop according to claim 1, wherein the step of identifying a real person of the target enterprise identifier according to the first control proportion set and the second control proportion set to obtain the real person identification result includes:
performing fusion control proportion calculation according to the first control proportion set and the second control proportion set to obtain a third control proportion set;
Finding out the maximum fusion control proportion from the third control proportion set to obtain a target control proportion;
And taking the control party corresponding to the target control proportion as the identification result of the real control person.
6. A real person identification device adapted for use in a directed loop for implementing the method of any of claims 1-5, the device comprising:
the system comprises a data acquisition module, a control party acquisition module and a control party management module, wherein the data acquisition module is used for acquiring a target enterprise identifier, a control party set, a share-holding link set and a tenure link set corresponding to the target enterprise identifier, and the share-holding link set comprises a control party directed loop;
The effective share ratio set determining module is used for calculating the effective share ratio of each control party in the control party directional loop according to the share-holding link set and the target enterprise identifier to obtain an effective share ratio set;
The real share ratio set determining module is used for respectively carrying out real share ratio calculation on each controller in the controller set according to the share-holding link set and the effective share ratio set to obtain a real share ratio set;
And the real control person identification result determining module is used for carrying out real control person identification on the target enterprise identification according to the tenure link set and the real share right proportion set to obtain a real control person identification result.
7. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 5 when the computer program is executed.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 5.
CN202110908874.7A 2021-08-09 2021-08-09 Real control person identification method, device, equipment and medium suitable for directed loop Active CN113641878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110908874.7A CN113641878B (en) 2021-08-09 2021-08-09 Real control person identification method, device, equipment and medium suitable for directed loop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110908874.7A CN113641878B (en) 2021-08-09 2021-08-09 Real control person identification method, device, equipment and medium suitable for directed loop

Publications (2)

Publication Number Publication Date
CN113641878A CN113641878A (en) 2021-11-12
CN113641878B true CN113641878B (en) 2024-05-28

Family

ID=78420203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110908874.7A Active CN113641878B (en) 2021-08-09 2021-08-09 Real control person identification method, device, equipment and medium suitable for directed loop

Country Status (1)

Country Link
CN (1) CN113641878B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115170271B (en) * 2022-09-09 2023-05-12 中证数智科技(深圳)有限公司 Clustering method, device, equipment and storage medium for risk associated enterprises

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002544A (en) * 2018-07-25 2018-12-14 北京金堤科技有限公司 A kind of data processing method, device and computer-readable medium
CN110826976A (en) * 2019-09-18 2020-02-21 上海生腾数据科技有限公司 Enterprise actual controller operation system and method
CN110909986A (en) * 2019-11-04 2020-03-24 苏宁金融科技(南京)有限公司 Suspected actual controller risk identification method and system based on knowledge graph
CN112232754A (en) * 2020-09-14 2021-01-15 苏宁金融科技(南京)有限公司 Enterprise data mining method, device and equipment
CN112364178A (en) * 2020-11-08 2021-02-12 杭州有数金融信息服务有限公司 Method for identifying invisible real control people of enterprise based on enterprise associated knowledge graph
CN112634056A (en) * 2020-12-17 2021-04-09 企查查科技有限公司 Method, equipment and storage medium for rapidly calculating and updating enterprise share right structure

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020156638A1 (en) * 2001-02-16 2002-10-24 Guedri Mark G. Process for identifying shareholders of privately owned businesses who have acquired a threshold new wealth resultant from the sale of that private business

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002544A (en) * 2018-07-25 2018-12-14 北京金堤科技有限公司 A kind of data processing method, device and computer-readable medium
CN110826976A (en) * 2019-09-18 2020-02-21 上海生腾数据科技有限公司 Enterprise actual controller operation system and method
CN110909986A (en) * 2019-11-04 2020-03-24 苏宁金融科技(南京)有限公司 Suspected actual controller risk identification method and system based on knowledge graph
CN112232754A (en) * 2020-09-14 2021-01-15 苏宁金融科技(南京)有限公司 Enterprise data mining method, device and equipment
CN112364178A (en) * 2020-11-08 2021-02-12 杭州有数金融信息服务有限公司 Method for identifying invisible real control people of enterprise based on enterprise associated knowledge graph
CN112634056A (en) * 2020-12-17 2021-04-09 企查查科技有限公司 Method, equipment and storage medium for rapidly calculating and updating enterprise share right structure

Also Published As

Publication number Publication date
CN113641878A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
CN109784654B (en) Task generation method, device, computer equipment and storage medium
CN113641878B (en) Real control person identification method, device, equipment and medium suitable for directed loop
CN109033139B (en) Client information query method, device, computer equipment and storage medium
CN112256318B (en) Construction method and equipment for dependent product
CN112488712A (en) Safety identification method and safety identification system based on block chain big data
CN109102245B (en) Processing method, system and device for approval process
CN110880091A (en) Micro-service flow processing method and device
CN113641879B (en) Control object identification method, device, equipment and medium suitable for parallel link
CN110188081B (en) Log data storage method and device based on cassandra database and computer equipment
CN110688400A (en) Data processing method, data processing device, computer equipment and storage medium
CN116523661A (en) Claim settlement method, device, equipment and storage medium based on artificial intelligence
CN116342256A (en) Wind control strategy testing method and device, computer equipment and storage medium
CN111339373B (en) Atlas feature extraction method, atlas feature extraction system, computer equipment and storage medium
CN115170271A (en) Clustering method, device, equipment and storage medium for risk associated enterprises
CN113886262A (en) Software automation test method and device, computer equipment and storage medium
US6816866B2 (en) Method of changing a parameter of an operating system of a computer system
CN113038283A (en) Video recommendation method and device and storage medium
KR102560298B1 (en) Natural language processing management system and method for chat-bot service
CN113515493B (en) Log association method and device
CN114004583B (en) Component information processing method, device, computer equipment and storage medium
CN114782758B (en) Image processing model training method, system, computer device and storage medium
Heydari Convergence analysis of policy iteration
CN113722295A (en) Data processing method and device
CN117709874A (en) Method, device, computer equipment and storage medium for dynamically generating approval process
CN113505807A (en) Training method, device and system for security check equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant