CN117011026A - Associated risk identification method, device, equipment, storage medium and program product - Google Patents

Associated risk identification method, device, equipment, storage medium and program product Download PDF

Info

Publication number
CN117011026A
CN117011026A CN202310996417.7A CN202310996417A CN117011026A CN 117011026 A CN117011026 A CN 117011026A CN 202310996417 A CN202310996417 A CN 202310996417A CN 117011026 A CN117011026 A CN 117011026A
Authority
CN
China
Prior art keywords
transaction
account
risk
unique identifier
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310996417.7A
Other languages
Chinese (zh)
Inventor
吴俊坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202310996417.7A priority Critical patent/CN117011026A/en
Publication of CN117011026A publication Critical patent/CN117011026A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application discloses a method, a device, equipment, a storage medium and a program product for identifying associated risks. The application relates to the technical field of big data. Comprising the following steps: acquiring a first transaction running water of a first object account and/or a second transaction running water of a second object account in a set period; extracting a risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow; and generating associated risk alarm information according to the risk transaction record. According to the identification method of the associated risk, provided by the embodiment of the application, the risk transaction record between the first object account and the second object account is extracted based on the first transaction flow of the first object account and/or the second transaction flow of the second object account in the set period, so that the associated risk early warning information is generated, and the associated risk between the financial practitioner and the interested party can be accurately identified, so that the financial risk is reduced, and the financial security is improved.

Description

Associated risk identification method, device, equipment, storage medium and program product
Technical Field
The embodiment of the application relates to the technical field of data processing, in particular to a method, a device, equipment, a storage medium and a program product for identifying associated risks.
Background
The laws and regulations of behavior established by banking financial institutions require that staff adhere to laws and regulations and to the law of a parallel operation. However, some practitioners still conduct illegal funds exchange with interested parties through the account controlled by the principal or the principal, and financial risks are brought to the financial industry. Based on the above phenomena, it is important to identify the associated risk between the financial staff and the stakeholder for prevention and control and risk association.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment, a storage medium and a program product for identifying association risks, which can accurately identify the association risks between financial staff and stakeholders, thereby reducing financial risks and improving financial security.
In a first aspect, an embodiment of the present application provides a method for identifying an association risk, including:
acquiring a first transaction running water of a first object account and/or a second transaction running water of a second object account in a set period; wherein the first transaction sequence and the second transaction sequence each comprise an online transaction sequence and an offline transaction sequence;
extracting a risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow;
and generating associated risk alarm information according to the risk transaction record.
In a second aspect, an embodiment of the present application further provides an apparatus for identifying an associated risk, including:
the transaction flow acquisition module is used for acquiring a first transaction flow of the first object account and/or a second transaction flow of the second object account in a set period; wherein the first transaction sequence and the second transaction sequence each comprise an online transaction sequence and an offline transaction sequence;
the risk transaction record extraction module is used for extracting a risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow;
and the associated risk alarm information generation module is used for generating associated risk alarm information according to the risk transaction record.
In a third aspect, an embodiment of the present application further provides an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements a method for identifying an associated risk according to the embodiment of the present application when the processor executes the program.
In a fourth aspect, embodiments of the present application further provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method for identifying associated risk as described in embodiments of the present application.
In a fifth aspect, embodiments of the present application further provide a computer program product comprising a computer program which, when executed by a processor, implements a method of identifying associated risk according to any of the embodiments of the present application.
The embodiment of the application discloses a method, a device, equipment, a storage medium and a program product for identifying associated risks, wherein the method, the device, the equipment, the storage medium and the program product are used for acquiring a first transaction running water of a first object account and/or a second transaction running water of a second object account within a set period; wherein the first transaction sequence and the second transaction sequence both comprise an online transaction sequence and an offline transaction sequence; extracting a risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow; and generating associated risk alarm information according to the risk transaction record. According to the identification method of the associated risk, provided by the embodiment of the application, the risk transaction record between the first object account and the second object account is extracted based on the first transaction flow of the first object account and/or the second transaction flow of the second object account in the set period, so that the associated risk early warning information is generated, and the associated risk between the financial practitioner and the interested party can be accurately identified, so that the financial risk is reduced, and the financial security is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for identifying associated risks according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an apparatus for identifying associated risks according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present application are shown in the drawings.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance. The technical scheme of the application obtains, stores, uses, processes and the like the data, which all meet the relevant regulations of national laws and regulations.
Fig. 1 is a flowchart of a method for identifying an associated risk, where the method is applicable to identifying an associated risk between objects, and the method may be performed by an associated risk identifying device, where the device may be implemented in software and/or hardware, and optionally, implemented by an electronic device, where the electronic device may be a mobile terminal, a PC side, a server, or the like. As shown in fig. 1, the method specifically includes the following steps:
s110, acquiring a first transaction flow of the first object account and/or a second transaction flow of the second object account in a set period.
The first transaction flow and the second transaction flow comprise an online transaction flow and an offline transaction flow. The set period may be a period between a certain time from history and the current time, for example: the time period of the last year, the last half year, or the last 3 months, etc., is not limited herein as to the duration of the set time period. The first object may be a financial industry practitioner, for example: the staff of the bank. The second object may be an enterprise or a person having an association with an enterprise in which the first object is located, for example: the second object may be a provider of the bank.
The first object account may include a first object personal account and a first object managed account. The first object personal account may be understood as a personal account of the first object, and the account managed by the first object may be understood as an enterprise account in which the first object has authority to operate. The second object account may include a second object enterprise account, a second object personal account, a second object associated personal account, and a second object associated enterprise account. The second object enterprise account may be all enterprise accounts of the second object in the bank, the second object personal account may be understood as a personal account of an employee of the enterprise corresponding to the second object, the second object associated personal account may be understood as a personal account of other enterprise employees having an association with the second object, and the second object associated enterprise account may be understood as other enterprise accounts having an association with the second object. In this embodiment, the accounts involved include an in-line account and other line accounts.
Wherein, online transaction flowing water can be understood as flowing water formed by online transactions; the off-line transaction stream may also be referred to as a banknote transaction stream, i.e., a stream formed by completing transactions in the form of banknotes. Transaction pipelining is accomplished by a plurality of transaction records, including both revenue and expense.
S120, a risk transaction record between the first object account and the second object account is extracted according to the first transaction flow and/or the second transaction flow.
The risk transaction record may be understood as an abnormal transaction performed between the first object and the second object. For online transactions, a risk transaction record between a first object account and a second object account is extracted according to online transaction flow in a first transaction flow. For off-line transactions, a risk transaction record between a first subject account and a second subject account is extracted according to the off-line transaction flow of the first transaction flow and the off-line transaction flow in the second transaction flow.
Optionally, for the online transaction flowing, the risk transaction record manner of extracting the first object account and the second object account according to the first transaction flowing and/or the second transaction flowing may be: extracting lending marks of all transaction records in a first transaction flow; screening candidate transaction records according to the lending mark; and filtering the normal transaction category in the candidate transaction records to obtain a risk transaction record.
The borrowing and lending mark is used for identifying the borrower and the lender, namely the borrower and the lender in the transaction record can be known according to the borrowing and lending mark. The normal transaction categories may include: payouts, rentals, deposits, investment redemption, insurance business, and financial products.
Specifically, the way to screen out candidate transaction records according to the lending mark may be: and screening transaction records with the lending mark as the first object account and the lending mark as the second object account as candidate transaction records.
Wherein the lender being a first object account and the borrower being a second object account indicating that the first object has conducted a transfer transaction to the second object. In this embodiment, transaction records with the lender as the first target account and the borrower as the second target account in the online transaction flow of the first transaction flow are screened out and used as candidate transaction records.
In this embodiment, after candidate transaction records are screened out, transaction records belonging to normal transaction categories such as payroll, house renting, deposit, investment redemption, insurance business, financial products and the like are filtered out, and the remaining candidate transaction records are risk transaction records.
Optionally, for the offline transaction flow, the manner of extracting the risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow may be: extracting a first transaction unique identifier related to a first transaction flow; extracting a second transaction unique identifier related to a second transaction flow; and extracting a risk transaction record between the first object account and the second object account according to the first transaction unique identifier and the second transaction unique identifier.
Wherein, since the off-line transaction flow may also be referred to as banknote transaction flow, the first transaction unique identifier and the second transaction unique identifier may be crown word numbers on the banknote. The extracting the first transaction unique identifier related to the first transaction flowing may be: the crown numbers of the paper money related to each off-line transaction record in the first transaction flow are extracted. The extracting the second transaction unique identifier related to the second transaction flowing may be: and extracting the crown word number of the paper currency related to each off-line transaction record in the second transaction flow.
In this embodiment, the method for extracting the risk transaction record between the first object account and the second object account according to the first transaction unique identifier and the second transaction unique identifier may be: extracting transaction records of which the first transaction unique identification and the second transaction unique identification meet the following conditions, and determining the transaction records as risk transaction records: the transaction record corresponding to the first transaction unique identifier is a deposit transaction, and the transaction record corresponding to the second transaction unique identifier is a withdrawal transaction; the transaction time of the first transaction unique identifier is later than the transaction time of the second transaction unique identifier; the interval between the transaction time of the first transaction unique identifier and the transaction time of the second transaction unique identifier is smaller than the set duration; the same number of first transaction unique identifiers as the second transaction unique identifiers exceeds a set threshold.
The set duration may be set arbitrarily, for example: any value of 7-15 days. The set threshold may be set, for example: any value between 10 and 50. The transaction record corresponding to the first transaction unique identifier is a deposit transaction, the transaction record corresponding to the second transaction unique identifier is a withdrawal transaction, and the transaction time of the first transaction unique identifier is later than the transaction time of the second transaction unique identifier can be understood as follows: the second object first extracts the banknote from the second object account and then deposits the extracted banknote into the first object account. The transaction time of the first transaction unique identifier and the transaction time of the second transaction unique identifier being less than the set duration can be understood as: the time interval between the first object firstly extracting the paper money from the second object account and the second object firstly storing the extracted paper money into the first object account is smaller than the set time length. The same number of first transaction unique identifiers as second transaction unique identifiers exceeding a set threshold may be understood as: the number of the crown numbers of the paper money deposited in the first object account is the same as the number of the crown numbers of the paper money extracted in the second object account and exceeds the set number. For example, assuming that the set duration is set to 7 days, the threshold is set to 20, and if the number of crown words of the banknote first extracted from the second object account exceeds 20 by the same amount as the crown word number of the banknote later stored as the first object account at 7 days, the transaction record corresponding to the first transaction unique identifier and the second transaction unique identifier is the risk transaction record.
S130, generating associated risk warning information according to the risk transaction record.
In this embodiment, after the risk transaction record is obtained, information such as first object information, transaction time, transaction amount and the like in the risk transaction record is extracted, associated risk warning information is generated based on the information such as the first object information, the transaction time, the transaction amount and the like, and the associated risk warning information is sent to the target user, so that the target is used for checking the associated risk warning information.
Optionally, before acquiring the first transaction flowing of the first object account and/or the second transaction flowing of the second object account within the set period, the method further comprises the following steps: acquiring historical transaction running water of a second object enterprise account; determining a second object personal account, a second object associated personal account, and a second object associated business account based on the historical transaction arrangement; and storing the second object enterprise account, the second object personal account, the second object associated personal account and the second object associated enterprise account into a database.
The historical transaction flow may be understood as the transaction flow of the second object enterprise account in the set historical period. And determining personal accounts of staff of the enterprise corresponding to the second object, personal accounts of other enterprise staff having an association relationship with the second object and other enterprise accounts having an association relationship with the second object according to historical transaction running of the second object in all enterprise accounts of the bank, so as to obtain the second object personal account, the second object associated personal account and the second object associated enterprise account. And finally, storing the second object enterprise account, the second object personal account, the second object associated personal account and the second object associated enterprise account into a database so as to facilitate the identification of the associated risk in the embodiment.
According to the technical scheme, a first transaction running water of a first object account and/or a second transaction running water of a second object account in a set period of time are obtained; wherein the first transaction sequence and the second transaction sequence both comprise an online transaction sequence and an offline transaction sequence; extracting a risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow; and generating associated risk alarm information according to the risk transaction record. According to the identification method of the associated risk, provided by the embodiment of the application, the risk transaction record between the first object account and the second object account is extracted based on the first transaction flow of the first object account and/or the second transaction flow of the second object account in the set period, so that the associated risk early warning information is generated, and the associated risk between the financial practitioner and the interested party can be accurately identified, so that the financial risk is reduced, and the financial security is improved.
Fig. 2 is a schematic structural diagram of an apparatus for identifying associated risk according to an embodiment of the present application, where, as shown in fig. 2, the apparatus includes:
a transaction flow acquisition module 210, configured to acquire a first transaction flow of a first object account and/or a second transaction flow of a second object account within a set period; wherein the first transaction sequence and the second transaction sequence each comprise an online transaction sequence and an offline transaction sequence;
a risk transaction record extraction module 220, configured to extract a risk transaction record between the first object account and the second object account according to the first transaction flowing and/or the second transaction flowing;
the associated risk alert information generating module 230 is configured to generate associated risk alert information according to the risk transaction record.
Optionally, for online transaction pipelining, the risk transaction record extraction module 220 is further configured to:
extracting lending marks of transaction records in the first line transaction flow;
screening candidate transaction records according to the lending mark;
and filtering the normal transaction category in the candidate transaction records to obtain a risk transaction record.
Optionally, the risk transaction record extraction module 220 is further configured to:
and screening transaction records with the lending mark as the lender serving as the first object account and the lender serving as the second object account as candidate transaction records.
Optionally, the normal transaction category includes: payouts, rentals, deposits, investment redemption, insurance business, and financial products.
Optionally, for offline transaction pipelining, the risk transaction record extraction module 220 is further configured to:
extracting a first transaction unique identifier related to the first transaction flow;
extracting a second transaction unique identifier related to the second transaction flow;
and extracting a risk transaction record between the first object account and the second object account according to the first transaction unique identifier and the second transaction unique identifier.
Optionally, the risk transaction record extraction module 220 is further configured to:
extracting transaction records of which the first transaction unique identifier and the second transaction unique identifier meet the following conditions, and determining the transaction records as risk transaction records: the transaction record corresponding to the first transaction unique identifier is a deposit transaction, and the transaction record corresponding to the second transaction unique identifier is a withdrawal transaction; the transaction time of the first transaction unique identifier is later than the transaction time of the second transaction unique identifier; the interval between the transaction time of the first transaction unique identifier and the transaction time of the second transaction unique identifier is smaller than a set duration; the same number of the first transaction unique identifiers as the second transaction unique identifiers exceeds a set threshold.
Optionally, the second object account includes: the method comprises a second object enterprise account, a second object personal account, a second object associated personal account and a second object associated enterprise account.
Optionally, the method further comprises: a second object account storage module for:
acquiring historical transaction flowing water of the second object enterprise account;
determining a second object personal account, a second object associated personal account, and a second object associated enterprise account based on the historical transaction flow;
and storing the second object enterprise account, the second object personal account, the second object associated personal account and the second object associated enterprise account into a database.
Optionally, the first object account includes a first object personal account and a first object managed account; the enterprise corresponding to the first object has an association relationship with the second object.
The device can execute the method provided by all the embodiments of the application, and has the corresponding functional modules and beneficial effects of executing the method. Technical details not described in detail in this embodiment can be found in the methods provided in all the foregoing embodiments of the application.
Fig. 3 shows a schematic diagram of the structure of an electronic device 10 that may be used to implement an embodiment of the application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 3, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as the associated risk identification method.
In some embodiments, the method of identifying associated risk may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the above-described associated risk identification method may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the associated risk identification method in any other suitable way (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present application may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present application, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
Embodiments of the present application also provide a computer program product comprising a computer program which, when executed by a processor, implements a method of identifying associated risk as provided by any of the embodiments of the present application.
Computer program product in the implementation, the computer program code for carrying out operations of the present application may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the application, which is set forth in the following claims.

Claims (15)

1. A method for identifying associated risk, comprising:
acquiring a first transaction running water of a first object account and/or a second transaction running water of a second object account in a set period; wherein the first transaction sequence and the second transaction sequence each comprise an online transaction sequence and an offline transaction sequence;
extracting a risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow;
and generating associated risk alarm information according to the risk transaction record.
2. The method of claim 1, wherein for an online transaction sequence, extracting a risk transaction record between the first object account and the second object account according to the first transaction sequence and/or the second transaction sequence comprises:
extracting lending marks of all transaction records in a first transaction flow;
screening candidate transaction records according to the lending mark;
and filtering the normal transaction category in the candidate transaction records to obtain a risk transaction record.
3. The method of claim 2 wherein screening candidate transaction records based on the lending indicia comprises:
and screening transaction records with the lending mark as the first object account and the lending mark as the second object account as candidate transaction records.
4. The method of claim 2, wherein the normal transaction category comprises: payouts, rentals, deposits, investment redemption, insurance business, and financial products.
5. The method of claim 1, wherein for an offline transaction pipeline, extracting a risk transaction record between the first object account and the second object account according to the first transaction pipeline and/or the second transaction pipeline comprises:
extracting a first transaction unique identifier related to the first transaction flow;
extracting a second transaction unique identifier related to the second transaction flow;
and extracting a risk transaction record between the first object account and the second object account according to the first transaction unique identifier and the second transaction unique identifier.
6. The method of claim 5, wherein extracting a risk transaction record between the first object account and the second object account based on the first transaction unique identification and the second transaction unique identification comprises:
extracting transaction records of which the first transaction unique identifier and the second transaction unique identifier meet the following conditions, and determining the transaction records as risk transaction records: the transaction record corresponding to the first transaction unique identifier is a deposit transaction, and the transaction record corresponding to the second transaction unique identifier is a withdrawal transaction; the transaction time of the first transaction unique identifier is later than the transaction time of the second transaction unique identifier; the interval between the transaction time of the first transaction unique identifier and the transaction time of the second transaction unique identifier is smaller than a set duration; the same number of the first transaction unique identifiers as the second transaction unique identifiers exceeds a set threshold.
7. The method of claim 1, wherein the second object account comprises: the method comprises a second object enterprise account, a second object personal account, a second object associated personal account and a second object associated enterprise account.
8. The method of claim 7, wherein prior to obtaining the first transaction flowing for the first object account and/or the second transaction flowing for the second object account over the set period of time, further comprising:
acquiring historical transaction flowing water of the second object enterprise account;
determining a second object personal account, a second object associated personal account, and a second object associated enterprise account based on the historical transaction flow;
and storing the second object enterprise account, the second object personal account, the second object associated personal account and the second object associated enterprise account into a database.
9. The method of claim 1, wherein the first object account comprises a first object personal account and a first object managed account; the enterprise corresponding to the first object has an association relationship with the second object.
10. An apparatus for identifying associated risk, comprising:
the transaction flow acquisition module is used for acquiring a first transaction flow of the first object account and/or a second transaction flow of the second object account in a set period; wherein the first transaction sequence and the second transaction sequence each comprise an online transaction sequence and an offline transaction sequence;
the risk transaction record extraction module is used for extracting a risk transaction record between the first object account and the second object account according to the first transaction flow and/or the second transaction flow;
and the associated risk alarm information generation module is used for generating associated risk alarm information according to the risk transaction record.
11. The apparatus of claim 10, wherein for online transaction pipelining, the risk transaction record extraction module is further to:
extracting lending marks of transaction records in the first line transaction flow;
screening candidate transaction records according to the lending mark;
and filtering the normal transaction category in the candidate transaction records to obtain a risk transaction record.
12. The apparatus of claim 11, wherein the risk transaction record extraction module is further configured to:
and screening transaction records with the lending mark as the lender serving as the first object account and the lender serving as the second object account as candidate transaction records.
13. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, wherein the processor implements the associated risk identification method according to any of claims 1-9 when executing the computer program.
14. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements a method of identifying associated risk according to any of claims 1-9.
15. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the associated risk identification method according to any of claims 1-9.
CN202310996417.7A 2023-08-08 2023-08-08 Associated risk identification method, device, equipment, storage medium and program product Pending CN117011026A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310996417.7A CN117011026A (en) 2023-08-08 2023-08-08 Associated risk identification method, device, equipment, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310996417.7A CN117011026A (en) 2023-08-08 2023-08-08 Associated risk identification method, device, equipment, storage medium and program product

Publications (1)

Publication Number Publication Date
CN117011026A true CN117011026A (en) 2023-11-07

Family

ID=88574159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310996417.7A Pending CN117011026A (en) 2023-08-08 2023-08-08 Associated risk identification method, device, equipment, storage medium and program product

Country Status (1)

Country Link
CN (1) CN117011026A (en)

Similar Documents

Publication Publication Date Title
CN110852878B (en) Credibility determination method, device, equipment and storage medium
US20200250675A1 (en) Fraud Detection Based on Community Change Analysis Using a Machine Learning Model
EP3391319A1 (en) Analysis of transaction information using graphs
WO2020177478A1 (en) Credit-based qualification information auditing method, apparatus and device
CN113989019A (en) Method, device, equipment and storage medium for identifying risks
CN114997975A (en) Abnormal enterprise identification method, device, equipment, medium and product
WO2022136692A1 (en) Method for calculating at least one score representative of a probable activity breakage of a merchant, system, apparatus and corresponding computer program
CN111552733B (en) Operation dynamic analysis system and method based on big data
WO2021202222A1 (en) Systems and methods for message tracking using real-time normalized scoring
CN116071152A (en) Data processing method and device, electronic equipment and storage medium
CN117011026A (en) Associated risk identification method, device, equipment, storage medium and program product
CN114066624A (en) Blacklist associated map mining method and system based on graph calculation
KR100791970B1 (en) System and method for detecting accident in banking
CN113362154A (en) Post-credit early warning method and device based on inline data and external data
CN111915430A (en) Vehicle loan risk identification method and device based on vehicle frame number
CN115330532B (en) Block chain processing method, device, equipment and storage medium based on account model
CN112767138B (en) International balance reporting data missing report detection method and system
CN115017875B (en) Enterprise information processing method, device, system, equipment and medium
CN115797033A (en) Capital supervision method and device, electronic equipment and storage medium
CN117437033A (en) Early warning method, early warning device, early warning equipment and readable storage medium
CN117557373A (en) Method, device, equipment, storage medium and program product for processing business of the same industry
CN110717823B (en) Credit overdue risk identification method and system
US20220138712A1 (en) Methods and Systems For Rendering Early Access To Paychecks
CN116719847A (en) Service data checking method, device, equipment and storage medium
CN116595234A (en) Data screening method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination