CN114116799A - Abnormal transaction loop identification method, device, terminal and storage medium - Google Patents

Abnormal transaction loop identification method, device, terminal and storage medium Download PDF

Info

Publication number
CN114116799A
CN114116799A CN202111397176.1A CN202111397176A CN114116799A CN 114116799 A CN114116799 A CN 114116799A CN 202111397176 A CN202111397176 A CN 202111397176A CN 114116799 A CN114116799 A CN 114116799A
Authority
CN
China
Prior art keywords
transaction
enterprise
nodes
loop
loops
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111397176.1A
Other languages
Chinese (zh)
Inventor
杨为琛
张平印
伺彦伟
张国超
马军肖
周江涛
魏荣祁
马玉杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Aisino Co ltd
Original Assignee
Hebei Aisino Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Aisino Co ltd filed Critical Hebei Aisino Co ltd
Priority to CN202111397176.1A priority Critical patent/CN114116799A/en
Publication of CN114116799A publication Critical patent/CN114116799A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/11Complex mathematical operations for solving equations, e.g. nonlinear equations, general mathematical optimization problems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention provides a method, a device, a terminal and a storage medium for identifying an abnormal transaction loop. The method comprises the following steps: acquiring an enterprise transaction network; the enterprise transaction network takes each enterprise as a node, and takes the transaction relationship among the enterprises as the connection relationship among the nodes; calculating the PR value of each node, and screening the nodes of the enterprise transaction network according to the PR value of each node to obtain the enterprise transaction network after the nodes are screened; traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened; and identifying abnormal transaction loops of each transaction loop based on preset transaction screening conditions. According to the invention, the special service enterprises in the enterprise transaction network can be deleted through the PR value of each node in the enterprise transaction network, so that the enterprise transaction network is simplified, and the efficiency of identifying abnormal transaction loops can be improved.

Description

Abnormal transaction loop identification method, device, terminal and storage medium
Technical Field
The invention relates to the technical field of tax risk management, in particular to an identification method, device, terminal and storage medium of an abnormal transaction loop.
Background
At present, enterprises can generate transaction relations with other enterprises in the production and operation processes, and countries can use value-added value generated in the transaction processes of commodities as tax-counting basis value-added tax. Based on the design principle of the value-added tax, the value-added tax special invoice usually does not form a closed loop. Therefore, the value-added tax invoice, once formed into a closed loop, indicates that the taxpayer of the value-added tax invoice may have the behavior of issuing false invoice. In order to identify the behavior of issuing false invoices, the existing identification method is to judge whether the closed loop is abnormal or not based on the commodity detail information corresponding to the value-added tax chain.
However, the transaction data is various, the transaction relationship is complex, the task of identifying abnormal transaction loops is large, and the efficiency is low.
Disclosure of Invention
The invention provides a method, a device, a terminal and a storage medium for identifying an abnormal transaction loop, which aim to solve the problem of improving the identification efficiency of the abnormal transaction loop.
In a first aspect, the present invention provides a method for identifying an abnormal transaction loop, including:
acquiring an enterprise transaction network; the enterprise transaction network takes each enterprise as a node, and takes the transaction relationship among the enterprises as the connection relationship among the nodes;
calculating the PR value of each node, and screening the nodes of the enterprise transaction network according to the PR value of each node to obtain the enterprise transaction network after the nodes are screened;
traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened;
and identifying abnormal transaction loops of each transaction loop based on preset transaction screening conditions.
In one possible implementation, calculating the PR value of each node includes:
calculating the PR value of each node based on a preset PR value calculation formula; the PR value is calculated by the formula:
Figure BDA0003370322590000021
wherein, PR (A)i) Represents node AiPR value of (A), PR (A)j) Represents node AjPR value of (A)j) Represents node AjD represents a preset attenuation factor, and N represents the number of nodes.
In one possible implementation, screening nodes of the enterprise transaction network according to the PR value of each node includes:
and sequencing the PR values from large to small, and deleting the nodes corresponding to part of the PR values according to a preset proportion.
In one possible implementation, traversing the enterprise transaction network after the screening node to obtain a plurality of transaction loops in the enterprise transaction network after the screening node includes:
and traversing the enterprise transaction network after the nodes are screened based on a depth-first query algorithm to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened.
In a possible implementation manner, before the identification of the abnormal transaction loop is performed on each transaction loop based on the preset transaction screening condition, the method further includes:
and removing invalid paths of the transaction loops based on the traversal path lengths corresponding to the transaction loops.
In a possible implementation manner, the identifying, based on a preset transaction screening condition, an abnormal transaction loop for each transaction loop includes:
obtaining a transaction amount of a first transaction loop; the first transaction loop is any transaction loop;
calculating a variation coefficient of the first transaction loop based on the transaction amount and a preset variation coefficient calculation formula; the coefficient of variation is calculated as:
Figure BDA0003370322590000022
and if the coefficient of variation of the first trading loop is lower than a preset threshold, determining that the first trading loop is an abnormal trading loop.
In a possible implementation manner, the identifying, based on a preset transaction screening condition, an abnormal transaction loop for each transaction loop includes:
acquiring a transaction commodity in a first transaction loop; the first transaction loop is any transaction loop;
and if all the transaction commodities are the same, judging that the first transaction loop is an abnormal transaction loop.
In a second aspect, the present invention provides an apparatus for identifying an abnormal transaction loop, comprising:
the acquisition module is used for acquiring an enterprise transaction network; the enterprise transaction network takes enterprises as nodes and takes transaction relations among the enterprises as connection relations among the nodes;
the screening module is used for calculating the PR value of each node, screening the nodes of the enterprise transaction network according to the PR value of each node, and obtaining the enterprise transaction network after screening the nodes;
the traversal module is used for traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened;
and the judging module is used for identifying abnormal transaction loops of all transaction loops based on preset transaction screening conditions.
In a third aspect, the present invention provides a terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method as shown in the first aspect or any possible implementation manner of the first aspect when executing the computer program.
In a fourth aspect, the present invention provides a computer-readable storage medium, in which a computer program is stored, which, when executed by a processor, implements the steps of the method as set forth in the first aspect or any one of the possible implementations of the first aspect.
The invention provides a method, a device, a terminal and a storage medium for identifying an abnormal transaction loop, wherein the method comprises the following steps: acquiring an enterprise transaction network; the enterprise transaction network takes each enterprise as a node, and takes the transaction relationship among the enterprises as the connection relationship among the nodes; calculating the PR value of each node, and screening the nodes of the enterprise transaction network according to the PR value of each node to obtain the enterprise transaction network after the nodes are screened; traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened; and identifying abnormal transaction loops of each transaction loop based on preset transaction screening conditions. According to the invention, the special service enterprises in the enterprise transaction network can be deleted through the PR value of each node in the enterprise transaction network, so that the enterprise transaction network is simplified, and the efficiency of identifying abnormal transaction loops can be improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow chart of an implementation of a method for identifying anomalous transaction loops provided by an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an abnormal transaction loop recognition apparatus provided in an embodiment of the present invention;
fig. 3 is a schematic diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following description is made by way of specific embodiments with reference to the accompanying drawings.
Referring to fig. 1, it shows a flowchart of an implementation of the method for identifying an abnormal transaction loop provided by the embodiment of the present invention, which is detailed as follows:
step 101, acquiring an enterprise transaction network; the enterprise transaction network takes each enterprise as a node, and takes the transaction relationship among the enterprises as the connection relationship among the nodes.
In this embodiment, the enterprise transaction network may be a directed graph constructed based on enterprise ticket flow information, where nodes in the graph represent enterprises participating in transaction, and the node information includes an enterprise operating range, an enterprise scale, an enterprise abnormal code, and the like; the edges in the graph represent the transaction relationships of the enterprises, and the edge information includes the transaction commodities and transaction amounts between the enterprises.
And 102, calculating the PR value of each node, and screening the nodes of the enterprise transaction network according to the PR value of each node to obtain the enterprise transaction network after the nodes are screened.
In this embodiment, since a plurality of special service enterprises such as banks, insurance, gas stations, and operators exist in the normal transaction network, and these enterprises occupy core positions in the network due to their own properties, but transactions between each enterprise and these special service enterprises belong to normal transactions, it is necessary to eliminate a closed transaction loop generated by participation of these special service enterprises in transactions, thereby reducing the workload of determining an abnormal transaction loop and improving the determination efficiency.
The PR value is proposed by a PageRank algorithm, and the PR value of a node can represent the importance of the node in the network. Enterprise AiHas a PR value of PR (A) as PR (A)i) Enterprise AiThe number of purchasing aggregation enterprises, i.e. the number of linked-in nodes, is marked as I (A)i) If the number of sales aggregation enterprises of the enterprise Aj, i.e., the number of linked-out nodes, is denoted as n (Aj), the basic idea of the PageRank algorithm can be expressed by the following formula:
Figure BDA0003370322590000051
it can be seen from the formula that the PR value of each enterprise is equally distributed to its respective linked enterprises according to the ticket flow, and if the goods of a certain enterprise are purchased by more enterprises, the enterprise can obtain a higher PR value, and the importance in the trading network is higher. Therefore, the importance degree of a certain enterprise in the transaction network can be judged based on the PR value of the enterprise, so that whether the enterprise belongs to a special service enterprise or not can be judged.
Step 103, traversing the enterprise transaction network after the node is screened to obtain a plurality of transaction loops in the enterprise transaction network after the node is screened.
In this embodiment, the transaction loops in the transaction network are determined first, and then whether each transaction loop is abnormal or not is identified, so that the efficiency of identifying abnormal transaction loops can be improved.
And 104, identifying abnormal transaction loops for each transaction loop based on preset transaction screening conditions.
In this embodiment, the transaction screening condition may be determined based on the abnormal transaction type to be identified, for determining whether there is a feature corresponding to the abnormal transaction type in each transaction loop. For example, where it is desired to identify whether there are recurring invoices, spurious transactions in the transaction loop, the transaction screening criteria may be set to approximate transaction amounts for portions of the transaction loop.
In some embodiments, calculating the PR value for each node comprises:
calculating the PR value of each node based on a preset PR value calculation formula; the PR value is calculated by the formula:
Figure BDA0003370322590000061
wherein, PR (A)i) Represents node AiPR value of (A), PR (A)j) Represents node AjPR value of (A)j) Represents node AjD represents a preset attenuation factor, and N represents the number of nodes.
In this embodiment, there may be nodes with zero number of out-link nodes or zero number of in-link nodes, and in order to avoid that PR values of these nodes cannot be calculated, an attenuation factor is introduced in this embodiment. The attenuation factor is also called damping coefficient, and the attenuation factor d represents the node AjIs assigned to node AiProbability of, node AjThe remaining PR value of (d) is evenly distributed to all businesses. In this embodiment, the value of d may be specifically 0.85.
In some embodiments, screening nodes of the enterprise trading network according to the PR value of each node comprises:
and sequencing the PR values from large to small, and deleting the nodes corresponding to part of the PR values according to a preset proportion.
In this embodiment, the special service enterprise is characterized by a large number of transactions and a large number of enterprises having transaction relationships, so that it can be known that the PR value of the node corresponding to the special service enterprise is higher than those of other enterprises, and therefore, the PR values of the nodes can be sorted from large to small, the node corresponding to the larger PR value is deleted, and the screening of the nodes is completed. Specifically, the nodes corresponding to the PR values of the first 20% or the preset number may be deleted. Or carrying out cluster analysis on each PR value, and deleting the node corresponding to the PR value in the cluster with the maximum value.
In some embodiments, traversing the post-screening node enterprise transaction network to obtain a plurality of transaction loops in the post-screening node enterprise transaction network comprises:
and traversing the enterprise transaction network after the nodes are screened based on a depth-first query algorithm to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened.
In this embodiment, the idea of the depth-first query algorithm is to traverse the nodes along the depth of the tree or graph, searching for branches as deep as possible. When all edges of node V have been explored, the search will go back to the starting node of the edge where node V was found. This process continues until all nodes reachable from the source node have been discovered. If there are no more undiscovered nodes, then one is selected as the source node and the process is repeated, with the entire process repeating until all nodes have been accessed.
In some embodiments, before identifying abnormal transaction loops for each transaction loop based on preset transaction screening conditions, the method further comprises:
and removing invalid paths of the transaction loops based on the traversal path lengths corresponding to the transaction loops.
In this embodiment, the number of the inner edges of a transaction loop is referred to as the traversal path length of the transaction loop, and since false transactions generally do not exist in an excessively long transaction chain, if the traversal path length of a certain transaction loop is greater than the preset length N, the probability of false transactions existing in the transaction loop is low, and the transaction loop can be removed by a pruning method, so that the invalid mining time is reduced. The preset length N may be determined based on historical data.
In some embodiments, identifying abnormal transaction loops for each transaction loop based on the preset transaction screening condition comprises:
obtaining a transaction amount of a first transaction loop; the first transaction loop is any transaction loop;
calculating a variation coefficient of the first transaction loop based on the transaction amount and a preset variation coefficient calculation formula; the coefficient of variation is calculated as:
Figure BDA0003370322590000071
and if the coefficient of variation of the first trading loop is lower than a preset threshold, determining that the first trading loop is an abnormal trading loop.
In this embodiment, the variation coefficient may represent a change of the amount between the transaction steps in the first transaction loop. If all enterprises in the first transaction loop are false invoices and the value-added tax invoices issued by all the enterprises are similar money, the standard deviation of the transaction money in the first transaction loop is very small, and the coefficient of variation of the corresponding first transaction loop is also very small, so that whether the first transaction loop is an abnormal transaction loop or not can be judged based on the coefficient of variation. The threshold in this embodiment may be set based on actual needs.
In some embodiments, identifying abnormal transaction loops for each transaction loop based on the preset transaction screening condition comprises:
acquiring a transaction commodity in a first transaction loop; the first transaction loop is any transaction loop;
and if all the transaction commodities are the same, judging that the first transaction loop is an abnormal transaction loop.
In this embodiment, if the transaction commodities in the first transaction loop are the same, it indicates that the commodities return to the enterprise for initial sale after being circularly transacted in the first transaction loop, and the principle of enterprise operation is not met, so that it can be determined that the transaction in the first transaction loop is a false transaction.
In addition, whether the first transaction loop is an abnormal transaction loop can be further determined based on the enterprise information in the first transaction loop, for example, if an abnormal or risky enterprise marked by a tax bureau exists in the first transaction loop, the probability of false transaction of the enterprise is also high.
The method for identifying the abnormal transaction loop provided by the embodiment of the invention comprises the following steps: acquiring an enterprise transaction network; the enterprise transaction network takes each enterprise as a node, and takes the transaction relationship among the enterprises as the connection relationship among the nodes; calculating the PR value of each node, and screening the nodes of the enterprise transaction network according to the PR value of each node to obtain the enterprise transaction network after the nodes are screened; traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened; and identifying abnormal transaction loops of each transaction loop based on preset transaction screening conditions. According to the invention, the special service enterprises in the enterprise transaction network can be deleted through the PR value of each node in the enterprise transaction network, so that the enterprise transaction network is simplified, and the efficiency of identifying abnormal transaction loops can be improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
The following are embodiments of the apparatus of the invention, reference being made to the corresponding method embodiments described above for details which are not described in detail therein.
Fig. 2 is a schematic structural diagram of an abnormal transaction loop recognition apparatus provided in an embodiment of the present invention, and for convenience of description, only the parts related to the embodiment of the present invention are shown, and the details are as follows:
as shown in fig. 2, the abnormal transaction loop recognition device 2 includes:
an obtaining module 21, configured to obtain an enterprise transaction network; the enterprise transaction network takes enterprises as nodes and takes transaction relations among the enterprises as connection relations among the nodes;
the screening module 22 is configured to calculate PR values of the nodes, and screen the nodes of the enterprise transaction network according to the PR values of the nodes to obtain the enterprise transaction network after the nodes are screened;
the traversing module 23 is configured to traverse the enterprise transaction network after the node is screened, so as to obtain a plurality of transaction loops in the enterprise transaction network after the node is screened;
and the judging module 24 is configured to identify an abnormal transaction loop for each transaction loop based on a preset transaction screening condition.
In some embodiments, screening module 22 is specifically configured to:
calculating the PR value of each node based on a preset PR value calculation formula; the PR value is calculated by the formula:
Figure BDA0003370322590000091
wherein, PR (A)i) Represents node AiPR value of (A), PR (A)j) Represents node AjPR value of (A)j) Represents node AjD represents a preset attenuation factor, and N represents the number of nodes.
In some embodiments, screening module 22 is specifically configured to:
and sequencing the PR values from large to small, and deleting the nodes corresponding to part of the PR values according to a preset proportion.
In some embodiments, traversal module 23 is specifically configured to:
and traversing the enterprise transaction network after the nodes are screened based on a depth-first query algorithm to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened.
In some embodiments, traversal module 23 is further configured to:
and removing invalid paths of the transaction loops based on the traversal path lengths corresponding to the transaction loops.
In some embodiments, the determining module 24 is specifically configured to:
obtaining a transaction amount of a first transaction loop; the first transaction loop is any transaction loop;
calculating a variation coefficient of the first transaction loop based on the transaction amount and a preset variation coefficient calculation formula; the coefficient of variation is calculated as:
Figure BDA0003370322590000101
and if the coefficient of variation of the first trading loop is lower than a preset threshold, determining that the first trading loop is an abnormal trading loop.
In some embodiments, the determining module 24 is specifically configured to:
acquiring a transaction commodity in a first transaction loop; the first transaction loop is any transaction loop;
and if all the transaction commodities are the same, judging that the first transaction loop is an abnormal transaction loop.
The device for identifying the abnormal transaction loop provided by the embodiment of the invention comprises: the acquisition module is used for acquiring an enterprise transaction network; the enterprise transaction network takes enterprises as nodes and takes transaction relations among the enterprises as connection relations among the nodes; the screening module is used for calculating the PR value of each node, screening the nodes of the enterprise transaction network according to the PR value of each node, and obtaining the enterprise transaction network after screening the nodes; the traversal module is used for traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened; and the judging module is used for identifying abnormal transaction loops of all transaction loops based on preset transaction screening conditions. According to the invention, the special service enterprises in the enterprise transaction network can be deleted through the PR value of each node in the enterprise transaction network, so that the enterprise transaction network is simplified, and the efficiency of identifying abnormal transaction loops can be improved.
Fig. 3 is a schematic diagram of a terminal according to an embodiment of the present invention. As shown in fig. 3, the terminal 3 of this embodiment includes: a processor 30, a memory 31 and a computer program 32 stored in said memory 31 and executable on said processor 30. The processor 30, when executing the computer program 32, implements the steps in the above-described embodiments of the method for identifying abnormal transaction loops, such as the steps 101 to 104 shown in fig. 1. Alternatively, the processor 30 implements the functions of the modules in the above device embodiments, for example, the functions of the modules 21 to 24 shown in fig. 2, when executing the computer program 32.
Illustratively, the computer program 32 may be partitioned into one or more modules that are stored in the memory 31 and executed by the processor 30 to implement the present invention. The one or more modules may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 32 in the terminal 3. For example, the computer program 32 may be divided into the modules 21 to 24 shown in fig. 2.
The terminal 3 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal 3 may include, but is not limited to, a processor 30, a memory 31. It will be appreciated by those skilled in the art that fig. 3 is only an example of a terminal 3 and does not constitute a limitation of the terminal 3 and may comprise more or less components than those shown, or some components may be combined, or different components, e.g. the terminal may further comprise input output devices, network access devices, buses, etc.
The Processor 30 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 31 may be an internal storage unit of the terminal 3, such as a hard disk or a memory of the terminal 3. The memory 31 may also be an external storage device of the terminal 3, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) and the like provided on the terminal 3. Further, the memory 31 may also include both an internal storage unit and an external storage device of the terminal 3. The memory 31 is used for storing the computer program and other programs and data required by the terminal. The memory 31 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal and method may be implemented in other ways. For example, the above-described apparatus/terminal embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated module, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method according to the above embodiments may be implemented by a computer program, which may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the steps of the above embodiments of the method for identifying abnormal transaction loops may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method for identifying anomalous transaction loops, comprising:
acquiring an enterprise transaction network; the enterprise transaction network takes each enterprise as a node, and takes the transaction relationship among the enterprises as the connection relationship among the nodes;
calculating PR values of all the nodes, and screening the nodes of the enterprise transaction network according to the PR values of all the nodes to obtain the enterprise transaction network after the nodes are screened;
traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened;
and identifying abnormal transaction loops of each transaction loop based on preset transaction screening conditions.
2. The method of claim 1, wherein said calculating the PR value for each node comprises:
calculating the PR value of each node based on a preset PR value calculation formula; the PR value calculation formula is as follows:
Figure FDA0003370322580000011
wherein, PR (A)i) Represents node AiPR value of (A), PR (A)j) Represents node AjPR value of (A)j) Represents node AjD represents a preset attenuation factor, and N represents the number of nodes.
3. The method of claim 1, wherein the screening the nodes of the enterprise transaction network according to the PR value of each node comprises:
and sequencing the PR values from large to small, and deleting the nodes corresponding to part of the PR values according to a preset proportion.
4. The method for identifying abnormal transaction loops according to claim 1, wherein traversing the enterprise transaction network after the screening node to obtain the plurality of transaction loops in the enterprise transaction network after the screening node comprises:
and traversing the enterprise transaction network after the nodes are screened based on a depth-first query algorithm to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened.
5. The method for identifying abnormal transaction loops according to claim 1, wherein before the identifying abnormal transaction loops for each transaction loop based on the preset transaction screening condition, the method further comprises:
and removing invalid paths of the transaction loops based on the traversal path lengths corresponding to the transaction loops.
6. The method for identifying abnormal transaction loops according to any one of claims 1 to 5, wherein the identifying abnormal transaction loops for each transaction loop based on the preset transaction screening condition comprises:
obtaining a transaction amount of a first transaction loop; the first transaction loop is any transaction loop;
calculating the variation coefficient of the first transaction loop based on the transaction amount and a preset variation coefficient calculation formula; the coefficient of variation calculation formula is:
Figure FDA0003370322580000021
and if the coefficient of variation of the first trading loop is lower than a preset threshold, judging that the first trading loop is an abnormal trading loop.
7. The method for identifying abnormal transaction loops according to any one of claims 1 to 5, wherein the identifying abnormal transaction loops for each transaction loop based on the preset transaction screening condition comprises:
acquiring a transaction commodity in a first transaction loop; the first transaction loop is any transaction loop;
and if all the transaction commodities are the same, judging that the first transaction loop is an abnormal transaction loop.
8. An apparatus for identifying anomalous transaction loops, comprising:
the acquisition module is used for acquiring an enterprise transaction network; the enterprise transaction network takes enterprises as nodes and takes transaction relations among the enterprises as connection relations among the nodes;
the screening module is used for calculating the PR value of each node, screening the nodes of the enterprise transaction network according to the PR value of each node, and obtaining the enterprise transaction network after screening the nodes;
the traversal module is used for traversing the enterprise transaction network after the nodes are screened to obtain a plurality of transaction loops in the enterprise transaction network after the nodes are screened;
and the judging module is used for identifying abnormal transaction loops of all transaction loops based on preset transaction screening conditions.
9. A terminal comprising a memory, a processor and a computer program stored in said memory and executable on said processor, characterized in that said processor, when executing said computer program, carries out the steps of the method for identification of abnormal transaction loops according to any of the preceding claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for identifying abnormal transaction loops according to any one of claims 1 to 7 above.
CN202111397176.1A 2021-11-23 2021-11-23 Abnormal transaction loop identification method, device, terminal and storage medium Pending CN114116799A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111397176.1A CN114116799A (en) 2021-11-23 2021-11-23 Abnormal transaction loop identification method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111397176.1A CN114116799A (en) 2021-11-23 2021-11-23 Abnormal transaction loop identification method, device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN114116799A true CN114116799A (en) 2022-03-01

Family

ID=80440471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111397176.1A Pending CN114116799A (en) 2021-11-23 2021-11-23 Abnormal transaction loop identification method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN114116799A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115293861A (en) * 2022-10-09 2022-11-04 连连银通电子支付有限公司 Commodity identification method and device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115293861A (en) * 2022-10-09 2022-11-04 连连银通电子支付有限公司 Commodity identification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108376364B (en) Payment system account checking method and device and terminal device
CN107784063B (en) Algorithm generation method and terminal equipment
US10579589B2 (en) Data filtering
CN110428139A (en) The information forecasting method and device propagated based on label
CN111090780A (en) Method and device for determining suspicious transaction information, storage medium and electronic equipment
CN114461644A (en) Data acquisition method and device, electronic equipment and storage medium
CN114116799A (en) Abnormal transaction loop identification method, device, terminal and storage medium
CN114118816A (en) Risk assessment method, device and equipment and computer storage medium
CN109947797B (en) Data inspection device and method
CN110096505B (en) Data storage method, system, equipment and storage medium
US10509809B1 (en) Constructing ground truth when classifying data
CN110659981A (en) Enterprise dependency relationship identification method and device and electronic equipment
CN110765100B (en) Label generation method and device, computer readable storage medium and server
US9058285B2 (en) Method and system for forensic data analysis in fraud detection employing a digital pattern more prevalent than Benford's Law
CN112613762A (en) Knowledge graph-based group rating method and device and electronic equipment
CN114117052A (en) Method and device for classifying business data reports
CN108537654B (en) Rendering method and device of customer relationship network graph, terminal equipment and medium
CN112598507A (en) Excessive credit granting risk prediction system and method based on knowledge graph
CN112488708A (en) Block chain account relevance query method and false transaction screening method
CN116109114B (en) Normalized government service data processing method and system
CN116012123B (en) Wind control rule engine method and system based on Rete algorithm
CN112182071B (en) Data association relation mining method and device, electronic equipment and storage medium
CN115168727B (en) User habit mining method and device and electronic equipment
CN113240472B (en) Financial product recommendation method, electronic equipment and storage medium
CN114840510A (en) Method, apparatus, device, medium, and program product for verifying data quality

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination