CN115082211A - Transaction monitoring method and device, electronic equipment and storage medium - Google Patents

Transaction monitoring method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115082211A
CN115082211A CN202210743316.4A CN202210743316A CN115082211A CN 115082211 A CN115082211 A CN 115082211A CN 202210743316 A CN202210743316 A CN 202210743316A CN 115082211 A CN115082211 A CN 115082211A
Authority
CN
China
Prior art keywords
monitoring
transaction
data
target
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210743316.4A
Other languages
Chinese (zh)
Inventor
王建军
李建涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202210743316.4A priority Critical patent/CN115082211A/en
Publication of CN115082211A publication Critical patent/CN115082211A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a transaction monitoring method, a transaction monitoring device, electronic equipment and a storage medium, wherein the method comprises the following steps: screening target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; generating an initial monitoring task corresponding to the target transaction service and second evaluation information of the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information of the initial monitoring rule; determining a target monitoring task from the initial monitoring tasks, and displaying the target monitoring task on a graphical user interface; responding to the verification operation aiming at the target monitoring task, and generating a verification result of the target monitoring task; so as to adjust the target monitoring task according to the verification result and complete the monitoring. The method and the device can find the risks in the transaction service to be detected and timely make response processing, reduce the labor force of service personnel and improve the efficiency of transaction monitoring.

Description

Transaction monitoring method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of transaction monitoring technologies, and in particular, to a transaction monitoring method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development of mobile internet and social economy, the number of transactions among people is increasing, especially transactions performed in banks. Banking transactions involve personal material information and personal property information, the importance of which is self-evident.
In order to prevent risks, avoid and reduce errors, protect the benefits of customers, improve service quality and facilitate operation of the valuables, data generated in bank transactions need to be supervised. At present, the extracted data is supervised manually one by one to find out risks in the transaction process. With the rapid development of bank operation business, the number of operating transaction systems and business categories is increasing, the number of people required to be invested is also increasing, and the requirements for supervisors are also improved. The risk identification of the supervisor depends heavily on the specialty and responsibility of the supervisor, and the requirement of the existing bank system for transaction monitoring cannot be met by a manual supervision mode.
Disclosure of Invention
In view of this, an object of the present application is to provide a transaction monitoring method, apparatus, electronic device and storage medium, which can find risks in a transaction service to be detected, and timely perform response processing, thereby reducing labor force of service personnel and improving efficiency of transaction monitoring.
In a first aspect, an embodiment of the present application provides a transaction monitoring method, where a graphical user interface is provided by a terminal device, and the method includes:
screening target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service meets the initial monitoring rule;
generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information corresponding to the initial monitoring rule;
according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task, and displaying the target monitoring task on the graphical user interface;
responding to the verification operation aiming at the target monitoring task, and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to finish monitoring.
In some technical solutions of the present application, the transaction data to be tested is obtained by the following method:
acquiring original transaction data generated in the process of each transaction service to be tested; the original transaction data comprises original transaction stream data and the original transaction image data;
performing a first processing operation on the original transaction flow data to obtain processed initial transaction flow data;
performing second processing operation on the original transaction image data to obtain processed initial transaction image data;
and taking the initial transaction running data and the initial transaction image data as transaction data to be tested.
In some technical solutions of the present application, the initial monitoring rule is generated by:
generating first rule attribute information according to historical transaction services and historical transaction data of the historical transaction services;
and generating the initial monitoring rule according to the first rule attribute information and preset second rule attribute information.
In some technical solutions of the present application, the first evaluation information corresponding to the initial monitoring rule is generated by:
monitoring preset test transaction data by using the initial monitoring rule to obtain a test monitoring result after the test transaction data are processed;
and generating first evaluation information corresponding to the initial monitoring rule by evaluating the test monitoring result and verification transaction data corresponding to the test transaction data.
In some embodiments of the present application, the method further includes:
according to the verification result aiming at the target monitoring task, determining the monitoring effect data of the initial monitoring rule on the target monitoring task;
and generating third rule attribute information according to the monitoring effect data, and generating a new monitoring rule based on the third rule attribute information.
In some technical solutions of the present application, the target transaction service is determined by the following method:
and comparing the transaction data to be tested with the initial monitoring rule, and if any one of the transaction data to be tested meets the initial monitoring rule, taking the transaction service to be tested which generates the transaction data to be tested as a target transaction service.
In some technical solutions of the present application, the target monitoring task includes: first monitoring data and second monitoring data, the first monitoring data being different from the second monitoring data;
the displaying of the target monitoring task on the graphical user interface includes:
displaying the first monitoring data in a first-level display mode on the graphical user interface; and presenting the second monitoring data in a second-level presentation manner; the first level display mode is higher than the second level display mode.
In a second aspect, an embodiment of the present application provides a transaction monitoring device, including:
the screening module is used for screening target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service meets the initial monitoring rule;
the first generation module is used for generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information corresponding to the initial monitoring rule;
the display module is used for determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, and displaying the target monitoring task on the graphical user interface;
the second generation module is used for responding to the verification operation aiming at the target monitoring task and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to finish monitoring.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of the above-mentioned transaction monitoring method when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the above-mentioned transaction monitoring method.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
the method comprises the steps of screening out target transaction services from transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service meets the initial monitoring rule; generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information corresponding to the initial monitoring rule; according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task, and displaying the target monitoring task on the graphical user interface; responding to the verification operation aiming at the target monitoring task, and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to complete monitoring. The method and the device can find the risks in the transaction service to be detected and timely make response processing, reduce the labor force of service personnel and improve the efficiency of transaction monitoring.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic flow chart illustrating a transaction monitoring method according to an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating generation of transaction data to be tested according to an embodiment of the present disclosure;
FIG. 3 illustrates a schematic diagram of a transaction monitoring device provided by an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for illustrative and descriptive purposes only and are not used to limit the scope of protection of the present application. Additionally, it should be understood that the schematic drawings are not necessarily drawn to scale. The flowcharts used in this application illustrate operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be performed out of order, and steps without logical context may be performed in reverse order or simultaneously. One skilled in the art, under the guidance of this application, may add one or more other operations to, or remove one or more operations from, the flowchart.
In addition, the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that in the embodiments of the present application, the term "comprising" is used to indicate the presence of the features stated hereinafter, but does not exclude the addition of further features.
With the rapid development of the mobile internet and the social economy, the number of transactions among people is increasing, especially transactions performed at banks. Banking transactions involve personal material information and personal property information, the importance of which is self-evident.
In order to prevent risks, avoid and reduce errors, protect the benefits of customers, improve service quality and facilitate operation of the valuables, data generated in bank transactions need to be supervised. At present, the extracted data is supervised manually one by one to find out risks in the transaction process. With the rapid development of bank operation business, the number of operating transaction systems and business categories is increasing, the number of people required to be invested is also increasing, and the requirements for supervisors are also improved. The risk identification of the supervisor depends heavily on the specialty and the responsibility of the supervisor, and the requirement of the existing banking system for transaction monitoring cannot be met by a manual supervision mode.
The embodiment of the application provides a transaction monitoring method and device, electronic equipment and a storage medium, and is described by the embodiment below.
Fig. 1 is a schematic flow chart illustrating a transaction monitoring method provided in an embodiment of the present application, wherein the method provides a graphical user interface through a terminal device, and includes steps S101-S104; specifically, the method comprises the following steps:
s101, screening target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service meets the initial monitoring rule;
s102, generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information corresponding to the initial monitoring rule;
s103, according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task, and displaying the target monitoring task on the graphical user interface;
s104, responding to the verification operation aiming at the target monitoring task, and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to finish monitoring.
The method and the device can find the risks in the transaction service to be detected and timely make response processing, reduce the labor force of service personnel and improve the efficiency of transaction monitoring.
Some embodiments of the present application are described in detail below. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
S101, screening out target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service satisfies the initial monitoring rule.
At present, a bank system generates a plurality of transaction services every day, and some transaction services may have risks aiming at the generated transaction services, so that the transaction services generated by the bank system need to be monitored so as to reduce errors and protect the benefits of customers.
The transaction service to be tested in the application represents the service which is generated by the bank system and needs to be monitored, and in practical application, the transaction service to be tested generally refers to each transaction service generated by the bank system. When the bank system carries out each transaction service to be tested, the transaction service to be tested generates transaction data to be tested. The transaction data to be tested represents all relevant data in the transaction business process to be tested.
In order to improve the processing efficiency, the transaction data to be tested in the application is obtained by processing the original transaction data, that is, the application does not directly use the original transaction data directly generated in the transaction data to be tested, but uses the original transaction data after processing. For example, the transaction service to be tested is a transfer service from a customer a to a customer B, and the original transaction data generated in the transaction service to be tested includes: customer a, customer a's account number a, transfer amount, bank operator C, transfer time, customer B's account number B, transfer credentials, etc.
As shown in fig. 2, the transaction data to be tested in the present application is obtained by the following steps:
s201, acquiring original transaction data generated in each transaction business process to be tested; the original transaction data comprises original transaction stream data and the original transaction image data;
s202, performing a first processing operation on the original transaction running water data to obtain processed initial transaction running water data;
s203, performing second processing operation on the original transaction image data to obtain processed initial transaction image data;
s204, taking the initial transaction flow data and the initial transaction image data as transaction data to be tested.
Aiming at the transaction service to be tested, the original transaction data generated by the transaction service to be tested is obtained based on the OGG technology and the MQ technology. And after the original transaction data of the transaction service to be tested is obtained, processing the original transaction data, and converting the original transaction data into the transaction data to be tested for subsequent use. The original transaction data in the application comprises original transaction flow data and original transaction image data generated by the transaction service to be tested. In practice, the raw transaction flow data is typically structured text data. For the original transaction data which is already a structure tree, the application cleans and arranges the original transaction data, and takes the cleaned and arranged original transaction data as the initial transaction flow data. The original transaction image data in the application represents related image data generated by a transaction service to be tested, such as ticket surface elements of account number, account, amount, serial number and the like. The second processing operation is performed on the original transaction image information. The second processing operation includes classification, and conversion. The classification herein refers to classifying the original transaction image data into different types according to the face elements of the original transaction image data. And for the original transaction image data, if some original transaction image data have abnormity, marking the original transaction image data with the abnormity according to the abnormity level. And selecting high-level abnormal original transaction image data for repairing, and then using the high-level abnormal original transaction image data, wherein the low-level abnormal original transaction image data is directly used or discarded according to actual requirements. The above-described sorting and classifying operations may be performed simultaneously or sequentially. After the classification and the classification are carried out, format conversion is carried out on the original transaction image data after the classification and the classification, and the original transaction image data are converted into initial transaction image data in a preset format. For example, the unstructured raw transaction image data is converted into formatted original transaction image data. After the steps are carried out, the initial transaction flow data and the initial transaction image data are obtained as the transaction data to be tested.
Aiming at the transaction services to be tested, the application needs to screen out the target transaction services with risks from the transaction services to be tested. When determining whether the transaction service to be tested has risks, the method sets an initial monitoring rule, and screens the transaction service to be tested according to the initial monitoring rule. The number of initial monitoring rules in the present application includes one or more. And comparing the transaction data to be tested with the initial monitoring rule, and if any one of the transaction data to be tested meets the initial monitoring rule, taking the transaction service to be tested which generates the transaction data to be tested as a target transaction service. That is to say, the transaction data to be tested in the present application includes multiple kinds (individual) of data, and whether the data meets the initial monitoring rule is determined by comparing each data in the transaction data to be tested with the initial monitoring rule corresponding to the data. If any data in the transaction data to be tested meets the initial monitoring rule, the transaction service to be tested which generates the transaction data to be tested is abnormal. And taking the transaction service to be tested with the abnormality as a target transaction service. For example, the transaction data a to be tested of the transaction service a to be tested includes: customer A, transfer one hundred thousand; the transaction data B to be tested of the transaction service B to be tested comprises: customer B, account transfer twenty thousand; if the initial monitoring rule is that the transfer accounts are not more than fifteen thousand, the transaction service A to be tested is selected as the target transaction service by screening the transaction service A to be tested and the transaction service B to be tested.
The initial monitoring rule in the present application is generated by:
generating first rule attribute information according to historical transaction services and historical transaction data of the historical transaction services;
and generating the initial monitoring rule according to the first rule attribute information and preset second rule attribute information.
The method and the device determine the initial monitoring rule according to the historical transaction service of the bank system and the historical transaction data generated by the historical transaction service. Specifically, the historical transaction business of the bank system and the historical transaction data generated by each historical transaction business are analyzed to determine the characteristic information of the historical transaction business with risks, and first rule attribute information is generated according to the characteristic information. For example, the risk probability of the historical transaction service with the transaction amount larger than one million is very high, the application takes the transaction amount of one million as the characteristic information, and the generated first rule attribute information is that the transaction amount is smaller than one million. In order to enable the generated initial monitoring rule to better accord with the initial monitoring rule of actual work, second rule attribute information is further set. The second rule attribute information may be determined according to business experience of the worker, or may be determined in other manners. After the second rule attribute information is determined, the first rule attribute information and the second rule attribute information are comprehensively considered, and the initial monitoring rule is generated. For example, if the first rule attribute information indicates that the amount of money is less than one million and the second rule attribute information indicates that the amount of money is less than ninety-one hundred thousand, the generated initial monitoring rule indicates that the amount of money is less than ninety-five thousand.
S102, generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information corresponding to the initial monitoring rule.
After the initial monitoring rule in the present application is generated, the present application further needs to evaluate the initial monitoring rule to generate first evaluation information of the initial monitoring rule. In evaluating the initial monitoring rules, the application uses the test transaction data to evaluate the initial monitoring rules. The test transaction data are set according to manual experience, verification transaction data are correspondingly set in the test transaction data, and whether risks exist in all data in the verification transaction data is known. The verification transaction data and the test transaction data are correspondingly arranged, and the verification transaction data is used for verifying the monitoring result of the test transaction data. The test transaction data are monitored by using the generated initial monitoring rule, and a monitoring result of the initial monitoring rule on the test transaction data is obtained. The monitoring result comprises data which meet the initial monitoring rule and data which do not meet the initial monitoring rule in the test transaction data, namely after the test transaction data are monitored through the initial monitoring rule, the initial monitoring rule can distinguish each data in the test transaction data, and the data with risks and the data without risks are determined. Then, the known risk data and risk-free data in the verification transaction data are compared with the risk data and risk-free data obtained by monitoring the initial monitoring rule, and the monitoring effect of the initial monitoring rule is determined. That is, the present application needs to verify the initial monitoring rule and determine the hit effect (screening risk efficiency) of the initial monitoring rule. And evaluating the initial monitoring rule based on the monitoring effect of the initial monitoring rule to generate first evaluation information of the initial monitoring rule. The first evaluation information here includes information indicating evaluation efficiency such as an evaluation score. For example, the hit rate of the initial monitoring rule a is eighty percent, and the first evaluation information of the generated initial monitoring rule a is eighty. The hit rate of the initial monitoring rule B is seventy percent, and the first evaluation information of the generated initial monitoring rule B is seventy.
The transaction data to be detected in the application comprises a plurality of data, the initial monitoring rule comprises a plurality of rules, and when the initial monitoring rule is used for monitoring the transaction data to be detected, the condition that the plurality of data in the transaction data to be detected respectively meet different rules in the initial monitoring rule exists. When generating the initial monitoring task, the rules that are satisfied by the data in the target transaction data need to be considered. All target transaction data of each target transaction service are converted into an initial monitoring task, and second evaluation information of the initial monitoring task is obtained by integrating rules met by all data in the target transaction data. Here, the integration includes means of aggregation, averaging, variance, and the like. The second evaluation information here characterizes how high the risk is involved in the monitoring task.
For example, the target transaction data of the target transaction service includes: the system comprises an account, amount and an operator, wherein the account accords with an account monitoring rule, the amount accords with an amount monitoring rule, and the operator does not accord with the operator monitoring rule. The method and the device take monitoring of three kinds of data of the target transaction service as an initial monitoring task. After the initial monitoring task is determined, the initial monitoring task needs to be evaluated. When the initial monitoring task is evaluated, the initial monitoring rule met by each target transaction data in the monitoring task is mainly considered. For example, if the first evaluation information corresponding to the account monitoring rule is sixty minutes and the first evaluation information corresponding to the amount evaluation rule is seventy minutes, the second evaluation information of the initial monitoring task can be obtained as one hundred and thirty minutes.
S103, according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task, and displaying the target monitoring task on the graphical user interface.
In order to improve the accuracy and avoid errors of the screened initial monitoring tasks, the initial monitoring tasks need to be screened after the initial monitoring tasks are obtained, and the target monitoring tasks with higher risks are screened from the initial monitoring tasks.
When the initial monitoring tasks are screened, the task evaluation requirements are set, the initial monitoring tasks which can meet the task evaluation requirements are considered to have higher possibility of risks, and the initial monitoring tasks which can meet the task evaluation requirements are used as target monitoring tasks. The task evaluation requirement here is set based on the second evaluation information of the initial monitoring task, for example, if the second evaluation information guarantees a score, the task evaluation requirement is set as a requirement for the score. The task evaluation requirement is set according to business experience, and for an initial monitoring task which does not meet the task evaluation requirement, the initial monitoring task is considered to meet the initial monitoring rule, but the initial monitoring task has no risk or the risk does not meet the standard to be processed. The application does not process the part of the initial monitoring tasks which do not meet the task evaluation requirement.
After the target monitoring task is obtained, the display is required to be performed on a graphical user interface so as to perform subsequent operation. In the application, the target transaction data of the target transaction service includes data meeting the initial monitoring rule and data not meeting the initial monitoring rule, and the data (first monitoring data) meeting the initial monitoring rule and the data (second monitoring data) not meeting the initial monitoring rule also exist in the initial monitoring task (target monitoring task) generated based on the target transaction. When the target monitoring task is displayed, in order to facilitate subsequent operations, the first monitoring data and the second monitoring data are displayed in different modes. Specifically, the first monitoring data is displayed on the graphical user interface in a first-level display mode; and presenting the second monitoring data in a second-level presentation manner; the first level display mode is higher than the second level display mode. For example, the first level display mode is a red font display mode, the second level display mode is a black font display mode, and the red font is easier to see than the black font; the first monitoring data is displayed through a red font, and the second monitoring data is displayed through a black font.
S104, responding to the verification operation aiming at the target monitoring task, and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to finish monitoring.
In addition to displaying the first monitoring data and the second monitoring data, a verification area is arranged beside (at a preset position) the first monitoring data and the second monitoring data on the graphical supervisor interface. The verification area is used for a supervisor to carry out verification operation on the correctness of the target monitoring task. The supervisor judges the correctness of the first monitoring data of the target verification data and then carries out verification operation in the verification area. The verification operation is to perform correctness marking in the verification area. For example, if the first monitored data is correctly monitored, a check number is printed on the verification area corresponding to the first monitored data, and if the first monitored data is incorrectly monitored, an error symbol is printed on the verification area corresponding to the first monitored data, and the supervisor judges the correctness of the second monitored data and then performs verification operation on the verification area. If the second monitoring data is risk data (namely, the risk data can be monitored through the initial monitoring rule), the risk data identification is standardized in the verification area, and if the second monitoring data is risk-free data (namely, the data is monitored correctly through the initial monitoring rule), the standardization is not carried out in the verification area corresponding to the second monitoring data.
After the correctness of the target monitoring task is verified by the supervisor, if the target monitoring task really has an abnormality, the target monitoring task with the abnormality needs to be subjected to source tracing and correction. The method further comprises the step of generating information to be corrected of the initial monitoring task according to each initial monitoring rule met by the target transaction data when the initial monitoring task is generated. The information to be corrected here characterizes the manner of correction for satisfying the initial monitoring rules. Because the initial monitoring tasks have the information to be corrected, the target monitoring tasks selected from the initial monitoring tasks also have the information to be corrected. And according to the verification result, when the target monitoring task is determined to be abnormal indeed, correcting the target monitoring task according to the information to be corrected of the target monitoring task so as to avoid property loss brought by the target monitoring task. And finishing the transaction monitoring after the abnormal target monitoring task is corrected. After the target monitoring task is verified by the supervisor, if the target monitoring task is true and not abnormal, the transaction monitoring is finished.
Through the mode, the abnormal transaction service can be monitored, in order to further improve the monitoring accuracy, the initial monitoring rule is dynamically adjusted, and the method further comprises the following steps:
according to the verification result aiming at the target monitoring task, determining the monitoring effect data of the initial monitoring rule on the target monitoring task;
and generating third rule attribute information according to the monitoring effect data, and generating a new monitoring rule based on the third rule attribute information.
After the verification result of the target monitoring task is obtained, the verification result comprises the verification identification of the initial monitoring rule by the supervisor, and the monitoring effect data of the initial monitoring rule is determined according to the verification identification in the verification result. If the verification mark indicates that the monitoring result of the initial monitoring rule is correct, the monitoring effect of the initial monitoring rule is better. If the result of the monitoring of the initial monitoring rule is wrong when the identification identifier is verified, the monitoring effect of the initial monitoring rule is not good. And generating third rule attribute data according to the monitoring effect of each data in each target monitoring task. After the third rule attribute data is obtained, a new monitoring rule is generated. The new monitoring rules are stored in a rule pool (repository) along with the initial monitoring rules for subsequent transaction monitoring use. By the method, the monitoring rule in the application can be continuously optimized, so that the accuracy of subsequent monitoring is better.
Fig. 3 is a schematic structural diagram illustrating a transaction monitoring device according to an embodiment of the present application, where the transaction monitoring device includes:
the screening module is used for screening target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service meets the initial monitoring rule;
the first generation module is used for generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and first evaluation information corresponding to the initial monitoring rule;
the display module is used for determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, and displaying the target monitoring task on the graphical user interface;
the second generation module is used for responding to the verification operation aiming at the target monitoring task and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to finish monitoring.
The transaction data to be tested is obtained through the following method:
acquiring original transaction data generated in the process of each transaction service to be tested; the original transaction data comprises original transaction stream data and the original transaction image data;
performing a first processing operation on the original transaction flow data to obtain processed initial transaction flow data;
performing second processing operation on the original transaction image data to obtain processed initial transaction image data;
and taking the initial transaction flow data and the initial transaction image data as transaction data to be tested.
The initial monitoring rule is generated by the following method:
generating first rule attribute information according to historical transaction services and historical transaction data of the historical transaction services;
and generating the initial monitoring rule according to the first rule attribute information and preset second rule attribute information.
The first evaluation information corresponding to the initial monitoring rule is generated by the following method:
monitoring preset test transaction data by using the initial monitoring rule to obtain a test monitoring result after the test transaction data is processed;
and generating first evaluation information corresponding to the initial monitoring rule by evaluating the test monitoring result and verification transaction data corresponding to the test transaction data.
The device further comprises: the third generation module is used for determining monitoring effect data of the initial monitoring rule on the target monitoring task according to a verification result aiming at the target monitoring task;
and generating third rule attribute information according to the monitoring effect data, and generating a new monitoring rule based on the third rule attribute information.
The target transaction service is determined by:
and comparing the transaction data to be detected with the initial monitoring rule, and if any one transaction data to be detected meets the initial monitoring rule, taking the transaction service to be detected which generates the transaction data to be detected as a target transaction service.
The target monitoring task comprises the following steps: first monitoring data and second monitoring data, the first monitoring data being different from the second monitoring data;
the displaying of the target monitoring task on the graphical user interface includes:
displaying the first monitoring data in a first-level display mode on the graphical user interface; and presenting the second monitoring data in a second-level presentation manner; the first level display mode is higher than the second level display mode.
As shown in fig. 4, an embodiment of the present application provides an electronic device for executing the transaction monitoring method in the present application, where the electronic device includes a memory, a processor, a bus, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the transaction monitoring method.
In particular, the memory and the processor may be general-purpose memory and processor, which are not limited in particular, and the transaction monitoring method described above can be performed when the processor runs a computer program stored in the memory.
Corresponding to the transaction monitoring method in the present application, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, performs the steps of the transaction monitoring method described above.
In particular, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, etc., on which a computer program can be executed to perform the above-described transaction monitoring method when executed.
In the embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other ways. The above-described system embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and there may be other divisions in actual implementation, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of systems or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used to illustrate the technical solutions of the present application, but not to limit the technical solutions, and the scope of the present application is not limited to the above-mentioned embodiments, although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A transaction monitoring method, wherein a graphical user interface is provided by a terminal device, the method comprising:
screening target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service meets the initial monitoring rule;
generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information corresponding to the initial monitoring rule;
according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task, and displaying the target monitoring task on the graphical user interface;
responding to the verification operation aiming at the target monitoring task, and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to finish monitoring.
2. The method of claim 1, wherein the transaction data under test is obtained by:
acquiring original transaction data generated in the process of each transaction service to be tested; the original transaction data comprises original transaction flow data and original transaction image data;
performing a first processing operation on the original transaction flow data to obtain processed initial transaction flow data;
performing second processing operation on the original transaction image data to obtain processed initial transaction image data;
and taking the initial transaction running data and the initial transaction image data as transaction data to be tested.
3. The method of claim 1, wherein the initial monitoring rule is generated by:
generating first rule attribute information according to historical transaction services and historical transaction data of the historical transaction services;
and generating the initial monitoring rule according to the first rule attribute information and preset second rule attribute information.
4. The method of claim 1, wherein the first evaluation information corresponding to the initial monitoring rule is generated by:
monitoring preset test transaction data by using the initial monitoring rule to obtain a test monitoring result after the test transaction data are processed;
and generating first evaluation information corresponding to the initial monitoring rule by evaluating the test monitoring result and verification transaction data corresponding to the test transaction data.
5. The method of claim 1, further comprising:
according to the verification result aiming at the target monitoring task, determining the monitoring effect data of the initial monitoring rule on the target monitoring task;
and generating third rule attribute information according to the monitoring effect data, and generating a new monitoring rule based on the third rule attribute information.
6. The method of claim 1, wherein the target transaction service is determined by:
and comparing the transaction data to be tested with the initial monitoring rule, and if any one of the transaction data to be tested meets the initial monitoring rule, taking the transaction service to be tested which generates the transaction data to be tested as a target transaction service.
7. The method of claim 1, wherein the goal monitoring task comprises: first monitoring data and second monitoring data, the first monitoring data being different from the second monitoring data;
the displaying of the target monitoring task on the graphical user interface includes:
displaying the first monitoring data in a first-level display mode on the graphical user interface; and presenting the second monitoring data in a second-level presentation manner; the first level display mode is higher than the second level display mode.
8. A transaction monitoring device, the device comprising:
the screening module is used for screening target transaction services from the transaction services to be tested according to transaction data to be tested generated in the transaction service to be tested and a preset initial monitoring rule; target transaction data of the target transaction service meets the initial monitoring rule;
the first generation module is used for generating an initial monitoring task corresponding to the target transaction service and second evaluation information corresponding to the initial monitoring task according to each initial monitoring rule met by the target transaction data and the first evaluation information corresponding to the initial monitoring rule;
the display module is used for determining a target monitoring task of which the second evaluation information meets the task evaluation requirement from the initial monitoring task according to second evaluation information corresponding to the initial monitoring task and a preset task evaluation requirement, and displaying the target monitoring task on a graphical user interface;
the second generation module is used for responding to the verification operation aiming at the target monitoring task and generating a verification result of the target monitoring task; and adjusting the target monitoring task according to the verification result to finish monitoring.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when the electronic device is operating, the machine-readable instructions when executed by the processor performing the steps of the transaction monitoring method according to any one of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a computer program for performing, when executed by a processor, the steps of the transaction monitoring method according to any one of claims 1 to 7.
CN202210743316.4A 2022-06-27 2022-06-27 Transaction monitoring method and device, electronic equipment and storage medium Pending CN115082211A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210743316.4A CN115082211A (en) 2022-06-27 2022-06-27 Transaction monitoring method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210743316.4A CN115082211A (en) 2022-06-27 2022-06-27 Transaction monitoring method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115082211A true CN115082211A (en) 2022-09-20

Family

ID=83255609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210743316.4A Pending CN115082211A (en) 2022-06-27 2022-06-27 Transaction monitoring method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115082211A (en)

Similar Documents

Publication Publication Date Title
JP6528147B2 (en) Accounting data entry support system, method and program
EP3391319A1 (en) Analysis of transaction information using graphs
CN109711955B (en) Poor evaluation early warning method and system based on current order and blacklist base establishment method
CN112258303B (en) Surrounding string mark early warning analysis method and device, electronic equipment and storage medium
US20200210459A1 (en) Method and apparatus for classifying samples
CN112529575B (en) Risk early warning method, equipment, storage medium and device
CN110796553A (en) Service request processing method, device, terminal and storage medium
CN111275338A (en) Method, device, equipment and storage medium for judging enterprise fraud behaviors
CN111858942A (en) Text extraction method and device, storage medium and electronic equipment
CN107862599B (en) Bank risk data processing method and device, computer equipment and storage medium
CN113918583A (en) Method and device for determining risk level of audit node in business document
CN111815435A (en) Visualization method, device, equipment and storage medium for group risk characteristics
Ciprian-Costel Arguments on using computer-assisted audit techniques (Caat) and business intelligence to improve the work of the financial auditor
CN115082211A (en) Transaction monitoring method and device, electronic equipment and storage medium
CN113139191B (en) Statistical method for bug disposal repair priority
CN110570301B (en) Risk identification method, device, equipment and medium
TWM567418U (en) Bank internal risk assessment and automatic output audit scheduling system
CN114679557A (en) Recorded data quality inspection method, recorded data quality inspection device, recorded data quality inspection equipment, recording medium and program product
CN110827144B (en) Application risk evaluation method and application risk evaluation device for user and electronic equipment
JP2024016300A (en) Analysis program, analysis device, and analysis method
CN113298182A (en) Early warning method, device and equipment based on certificate image
CN113177840A (en) Client risk identification method and device
CN112767117A (en) Method and device for evaluating enterprise status in group
JP4991086B2 (en) Information processing system, information processing program, and information processing method
KR102485095B1 (en) Apparatus for financial diagnosis and control method of thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination