WO2019165670A1 - Illegal pyramid scheme organization monitoring method and apparatus, computer device and storage medium - Google Patents

Illegal pyramid scheme organization monitoring method and apparatus, computer device and storage medium Download PDF

Info

Publication number
WO2019165670A1
WO2019165670A1 PCT/CN2018/081514 CN2018081514W WO2019165670A1 WO 2019165670 A1 WO2019165670 A1 WO 2019165670A1 CN 2018081514 W CN2018081514 W CN 2018081514W WO 2019165670 A1 WO2019165670 A1 WO 2019165670A1
Authority
WO
WIPO (PCT)
Prior art keywords
suspicious
information
transaction
pyramid
pyramid scheme
Prior art date
Application number
PCT/CN2018/081514
Other languages
French (fr)
Chinese (zh)
Inventor
邱海燕
谭志荣
魏尧东
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019165670A1 publication Critical patent/WO2019165670A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the present application belongs to the field of communication technologies, and in particular, to a method, a device, a computer device and a storage medium for monitoring an illegal pyramid scheme.
  • the new MLM model relies on network means to attract a large number of netizens and students to become victims by pulling people and developing offline lines, causing tragedies and seriously disrupting the economic order.
  • it is impossible to generate suspicious case reports in real time to pay attention to and monitor suspicious objects which led to the disappearance of these pyramid schemes when the Ministry of Public Security vigorously cracked down, and revived after the limelight.
  • the post-exposure full-return pyramid scheme, the Luomai Technology MLM organization, and the Futianxia MLM organization their financial transactions in the public account have been in an active period. It can be seen that the existing technology has insufficient monitoring of illegal pyramid schemes, the monitoring effect is not timely, and the illegal pyramid schemes are prone to respet.
  • the embodiment of the present application provides a method, a device, a computer device, and a storage medium for monitoring an illegal pyramid scheme, so as to solve the problem that the prior art has insufficient monitoring power on the illegal pyramid scheme organization and the monitoring effect is not timely.
  • an embodiment of the present application provides a method for monitoring an illegal pyramid scheme, where the monitoring method includes:
  • the suspicious pyramid scheme is monitored according to the suspicious case list.
  • the constructing the feature information base according to the key information of the illegal pyramid scheme organization includes:
  • the body information of the illegal pyramid selling organization Acquiring the body information of the illegal pyramid selling organization, and constructing a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information;
  • the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule.
  • the obtaining the transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining the suspicious entity and the corresponding suspicious transaction flow information include:
  • the generating a suspicious pyramid scheme according to the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list includes:
  • Attribute information, account information, transaction information, and the suspicious case number of the suspicious pyramid scheme are associated and stored in the suspicious case table.
  • monitoring the suspicious pyramid scheme according to the suspicious case list includes:
  • the suspicious pyramid scheme For each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is a confirmed illegal pyramid scheme, the transaction frequency and transaction amount of the suspicious pyramid scheme for the public account or the private account are counted;
  • the reporting operation is performed.
  • the embodiment of the present application provides a monitoring device for an illegal pyramid scheme, and the monitoring device includes:
  • a building module for constructing a feature information base based on key information of an illegal pyramid scheme organization
  • a matching module configured to acquire transaction flow information to be monitored, and match the transaction flow information with the feature information database to obtain suspicious entities and corresponding suspicious transaction flow information
  • a generating module configured to generate a suspicious pyramid scheme according to the suspicious entity and its corresponding suspicious transaction flow information, and record the suspicious pyramid scheme into the suspicious case list;
  • a monitoring module configured to monitor the suspicious pyramid scheme according to the suspicious case list.
  • the building module includes:
  • a first building unit configured to acquire body information of the illegal pyramid selling organization, and construct a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information thereof;
  • a second building unit configured to acquire a fund transaction characteristic of the illegal pyramid selling organization, and construct a second feature information table based on the fund transaction characteristic, where the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule thereof .
  • the matching module includes:
  • An obtaining unit configured to obtain transaction flow information to be monitored
  • a first matching unit configured to match the transaction flow information with the first feature information table, obtain body information related to an illegal pyramid scheme in the transaction flow information, and transaction flow of the body information within a specified time period information;
  • a second matching unit configured to match the transaction flow information of the subject information in the specified time period and the second feature information table, and obtain the subject information that meets the suspicious transaction rule and the corresponding transaction flow information as suspicious The subject and its corresponding suspicious transaction flow information.
  • an embodiment of the present application provides a computer device, including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the processor executing the computer The following steps are implemented when the instructions are readable:
  • the suspicious pyramid scheme is monitored according to the suspicious case list.
  • the embodiment of the present application provides one or more non-volatile readable storage media storing computer readable instructions, when the computer readable instructions are executed by one or more processors, such that the one Or multiple processors perform the following steps:
  • the suspicious pyramid scheme is monitored according to the suspicious case list.
  • FIG. 1 is a first implementation flowchart of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application
  • FIG. 2 is a second implementation flowchart of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application
  • FIG. 3 is a third implementation flowchart of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application
  • FIG. 4 is a fourth implementation flowchart of a method for monitoring an illegal pyramid scheme according to an embodiment of the present application
  • FIG. 5 is a structural diagram of a monitoring device of an illegal pyramid scheme provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a computer device according to an embodiment of the present application.
  • FIG. 1 shows a first implementation flow of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application.
  • the monitoring method of the illegal pyramid selling organization provided by the embodiment of the present application is applied to a computer device.
  • the monitoring method of the illegal pyramid selling organization includes:
  • step S101 a feature information base is constructed based on key information of the illegal pyramid scheme.
  • the illegal pyramid scheme organization is an organization that uses the means of network marketing to defraud the victim to develop the offline line, pull the head, pay the membership fee, the entry fee, and the qualification fee to achieve the purpose of illegal financing.
  • the network marketing means include, but is not limited to, means such as low investment, high return, consumption rebate, merchant settlement, shopping pension, electronic currency trading, and original stock investment through platforms, shopping websites, and the like.
  • the embodiment of the present application extracts key information of an illegal pyramid scheme from an illegal pyramid scheme that has been exposed by the Ministry of Public Security, and then constructs a feature information base based on the key information.
  • the identified information database records the confirmed illegal pyramid selling organization and its corresponding iconic features, and is used for mining the suspicious subject and the suspicious transaction flow information in the transaction flow information to be monitored, that is, determining the transaction flow information to be monitored. Whether or not the iconic features are included to identify whether it is a suspicious pyramid scheme or not, and to monitor illegal pyramid schemes.
  • the key information of the illegal pyramid scheme organization includes, but is not limited to, the main characteristics of the organization and the characteristics of the fund transaction.
  • step S102 the transaction flow information to be monitored is acquired, and the transaction flow information is matched with the characteristic information database to obtain the suspicious entity and the corresponding suspicious transaction flow information.
  • the transaction flow information to be monitored is obtained from the bank, and then the transaction flow information is matched with the iconic features in the pre-built feature information database to determine whether the transaction flow information is all Or partially covering the key information of the confirmed illegal pyramid scheme organization, for example, the counterparty in the transaction flow information to be monitored is the confirmed illegal pyramid scheme organization, the customer itself is the leader or backbone of the existing pyramid scheme organization, and the transaction funds are concentrated. Import and so on. If the transaction flow information completely or partially covers the key information in the feature information base, the transaction flow information is used as the suspicious entity and its corresponding suspicious transaction flow information.
  • the suspicious subject refers to a set of members of a suspicious illegal pyramid scheme, and is a general concept.
  • step S103 a suspicious pyramid scheme is generated according to the suspicious entity and its corresponding suspicious transaction flow information, and the suspicious pyramid scheme is recorded in the suspicious case list.
  • the suspicious case table is used to record the suspicious pyramid schemes and their detailed information hit by the matching feature information base.
  • the embodiment of the present application further sets a suspicious case number for the suspicious subject and its corresponding suspicious transaction flow information, and then stores the suspect case number in order to facilitate the Suspicious pyramid schemes are queried and managed.
  • step S104 the suspicious pyramid scheme is monitored according to the suspicious case list.
  • the embodiment of the present application continuously pays attention to and analyzes in the follow-up, and performs the reporting operation when the suspicious degree reaches the preset level, including reporting to the People's Bank or reporting to the public security system, which is beneficial to each supervision.
  • the department promptly and effectively cracked down on illegal pyramid schemes and maintained market economic order.
  • the embodiment of the present application mines suspicious pyramid schemes by matching the feature information database and records them in real time, realizing real-time supervision of illegal pyramid schemes, facilitating rapid identification of suspicious pyramid schemes and launching prevention and control measures, and preventing illegal pyramid schemes.
  • the phenomenon of resurgence of organizations has solved the problem of insufficient monitoring of illegal pyramid schemes in the prior art and poor timeliness of monitoring effects.
  • the second implementation process of the monitoring method of the illegal pyramid selling organization provided by the embodiment of the present application is proposed.
  • FIG. 2 is a schematic diagram of a second implementation process of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application.
  • the constructing the feature information base according to the key information of the illegal pyramid scheme according to step S101 includes:
  • step 1011 the subject information of the illegal pyramid scheme is obtained, and the first feature information table is constructed based on the subject information, where the first feature information table includes an illegal pyramid scheme organization name and corresponding body information.
  • the key information of the illegal pyramid scheme organization includes but is not limited to the main characteristics of the organization and the characteristics of the fund transaction.
  • the embodiment of the present application constructs a first feature information table for recording the existing MLM organization and the subject information corresponding thereto.
  • the subject information includes, but is not limited to, public customer information, private customer information, legal representative information, partner information, agent information, and counterparty customer information of the illegal pyramid scheme.
  • illegal pyramid schemes in order to attract attention and defraud trust, illegal pyramid schemes often pretend to be companies, organizations, or institutions, and the accounts used to collect money are mostly the public accounts of these companies, organizations, or institutions.
  • the legal representative's accounts are mostly opened in different places, or accounts that have not been activated for a long time, there are sudden and frequent transactions, 3 to 6 months of account cancellation, large funds transfer, daily balance clearing, cross-border transfer or The characteristics of cross-border cash withdrawal.
  • the embodiment of the present application records the public customer information, the legal representative's customer information, and the associated partner and agent information of the company, organization, and organization involved in the MLM organization that has been exposed by the Ministry of Public Security into the first feature information table.
  • step S1012 the capital transaction characteristics of the illegal pyramid scheme organization are acquired, and a second feature information table is constructed based on the fund transaction characteristics, and the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule.
  • the embodiment of the present application constructs a second feature information table for recording the marketing keyword and the suspicious transaction rule corresponding thereto.
  • the pyramid selling keywords refer to the category attributes of illegal pyramid schemes, such as national policy categories, shopping wealth management, original stock investment, and pension.
  • the suspicious transaction rule refers to a representative transaction law extracted from the bank transactions of existing illegal pyramid schemes, such as bank remittance, transfer, deposit, withdrawal, and the like.
  • the source of funds flowing into the public account is dispersed, and the counterparty is mostly a private client.
  • the same counterparty has a small change in the amount of the previous transaction and a large amount of subsequent transactions. Most of this trend occurs within one to three months; after a large transaction, the counterparty does not follow the rare or less Trading, but from the public account, irregularly receive small profits from interest, income, rewards, dividends, etc.
  • the suspicious transaction rules from which illegal pyramid schemes can be obtained include, but are not limited to, a large number of foreigners in the same place in a certain period open a private account in the bank; in a certain period, there is considerable funds to be remitted from the local bank to the same account in the field by a foreigner; Foreigners have large foreign funds remitted in local bank private accounts.
  • the embodiment of the present application takes such a representative transaction rule as a suspicious transaction rule, and divides the affiliated marketing keyword according to the attribute information of the illegal pyramid scheme, associates the pyramid selling keyword with the corresponding suspicious transaction rule, and enters the first Two feature information tables.
  • the embodiment of the present application constructs a feature information table, and uses the feature information table to record the confirmed illegal pyramid selling organization and its corresponding iconic features, and is used for mining the suspicious subject and the suspicious transaction flow information in the transaction flow information to be monitored. It facilitates the management and update of mining rules, which is conducive to improving the efficiency and accuracy of suspicious pyramid schemes.
  • FIG. 3 it is a schematic diagram of a third implementation process of the monitoring method of the illegal pyramid scheme organized by the embodiment of the present application.
  • Obtaining the transaction flow information to be monitored, and matching the transaction flow information with the characteristic information database to obtain the suspicious entity and the corresponding suspicious transaction flow information including:
  • step S1021 transaction flow information to be monitored is acquired.
  • the transaction flow information to be monitored includes, but is not limited to, account information of the two parties to the transaction, a remittance transaction record, a transfer transaction record, and a transaction transaction record of the transaction party.
  • Each transaction record includes, but is not limited to, transaction time, trading floor, transaction amount, cross-city or cross-border transactions, duration.
  • step S1022 the transaction flow information is matched with the first feature information table, and the body information related to the illegal pyramid scheme in the transaction flow information and the transaction flow information of the body information in the specified time period are acquired.
  • the feature information database includes a first feature information table and a second feature information table.
  • the first feature information table includes an illegal pyramid scheme organization name and corresponding body information.
  • the embodiment of the present application first matches the transaction flow information to be monitored with the first feature information table, and captures the transaction flow information from the existing illegal pyramid organization.
  • Subject information such as transaction subject information, counterparty information.
  • the transaction flow trajectory of the subject within a specified time period is counted, for example, the transfer amount, the transfer amount, and the number of transferred opponents in a specified short period, such as 3 days, 5 days, and 10 days, The number of transferred areas, the number of overseas withdrawals, the number of transferred to the opponents, the number of transferred areas, the non-counter transfer, the transfer amount, the local currency transfer, the transfer amount, and the account balance.
  • step S1023 the transaction flow information of the subject information in the specified time period and the second feature information table are matched, and the subject information that meets the suspicious transaction rule and the corresponding transaction flow information are obtained as the suspicious subject and Its corresponding suspicious transaction flow information.
  • the transaction flow track is further matched with the second feature information table in the feature information database to determine the transaction flow. Whether the trajectory violates the suspicious transaction rule, and the suspicious transaction flow information is captured from the transaction flow trajectory.
  • the embodiment of the present application can effectively filter out non-suspect transaction flow information, and specifically select the transaction behavior of the illegal pyramid marketing organization head; and set the second feature information table to filter the presence
  • the illegal trading of the heads of illegal pyramid schemes is conducive to monitoring the resurgence of illegal pyramid schemes and monitoring illegal pyramid schemes that appear in new ways.
  • the method may further include: acquiring, according to the suspicious transaction trajectory that is violated, a corresponding marketing keyword from the second feature information table, to further capture a new type of MLM that is not exposed by the public security department.
  • step S103 generates a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and records the suspicious pyramid scheme into the suspicious case list, including:
  • step S1031 the attribute information, the account information, and the transaction information of the suspicious subject are obtained from the suspicious subject and the corresponding suspicious flow information, and the suspicious subject corresponding to the suspicious case number of the specified time period is configured to generate Suspicious pyramid schemes.
  • the attribute information of the suspicious subject includes, but is not limited to, the name, nationality, document type, ID number, occupation, education, address information, and contact information of the public/private customer, the legal representative, the agent, and the like. It is used to judge whether the customer has had a pyramid scheme.
  • the account information of the suspicious entity includes but is not limited to the public/private account opening institution, the account balance, the account type, the account opening time, the account closing time, and the last trading time.
  • the transaction information of the suspicious subject includes but is not limited to the transaction date, the transaction account, the agent information, the place where the transaction occurs, the transaction method, the fund collection and payment mark, the currency symbol, the transaction amount, the use, and the counterparty information.
  • the capital inflow and outflow characteristics of the entity may be further determined to generate a suspicious feature.
  • capital inflows from MLM organizations For example: capital inflows from MLM organizations, capital inflows from major stakeholders, and so on.
  • the suspicious case number of the suspicious subject within the specified time period is configured to generate a suspicious pyramid scheme to facilitate the production operation.
  • the specified time period should be understood as a certain time range in which the transaction occurs, that is, the specified time period described in step S1022, which defines the coverage of the suspicious pyramid scheme; the suspicious subject exceeding the specified time period and Suspicious flow information belongs to another suspicious pyramid scheme, corresponding to another suspicious case number.
  • step S1032 the attribute information, the account information, the transaction information, and the suspicious case number of the suspicious pyramid scheme are associated and stored in the suspicious case table.
  • the attribute information, the account information and the transaction information of the suspicious subject are associated with the suspicious case number, and are stored in the suspicious case list, and are stored in the case, so as to facilitate the inquiry and management of the suspicious pyramid scheme.
  • the embodiment of the present application mines suspicious pyramid schemes by matching the feature information table and records them in real time, realizing real-time supervision of illegal pyramid schemes, facilitating rapid identification of suspicious pyramid schemes and launching prevention and control measures, and preventing illegal pyramid schemes.
  • the phenomenon of resurgence of organizations has solved the problem of insufficient monitoring of illegal pyramid schemes in the prior art and poor timeliness of monitoring effects.
  • the fourth implementation process of the monitoring method of the illegal pyramid selling organization provided by the embodiment of the present application is proposed.
  • FIG. 4 it is a schematic diagram of a fourth implementation process of the monitoring method of the illegal pyramid scheme organized by the embodiment of the present application.
  • the monitoring of the suspicious pyramid scheme according to the suspicious case table described in step S104 includes:
  • step S1041 for each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is an confirmed illegal pyramid scheme, the transaction frequency of the suspicious pyramid scheme for the public account or the private account is counted. And the transaction amount.
  • the embodiment of the present application preferably monitors a public account or a private account of a suspicious pyramid scheme that has been confirmed as an illegal pyramid scheme, and calculates a transaction frequency and a total transaction amount in the specified time period, and the transaction frequency passes the number of transactions. Said.
  • step S1042 if the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, the reporting operation is performed.
  • the first threshold and the second threshold are preset in the embodiment of the present application.
  • the first threshold is used to measure the frequency of transactions of the public account and/or the private account of the suspicious pyramid scheme, and if the transaction frequency of the public account and/or the private account is greater than or equal to the first threshold, Indicates the limit of reaching frequent transactions.
  • the second threshold is used to measure the degree of the transaction amount of the suspicious pyramid scheme for the public account and/or the private account, and if the transaction amount for the public account and/or the private account is greater than or equal to the second threshold, it indicates that the huge amount is reached.
  • the limits of the transaction The embodiment of the present application combines the transaction frequency and the transaction amount to determine whether the suspicious pyramid scheme has a respet sign.
  • the transaction frequency and the first threshold are compared, the transaction amount and the second threshold are compared. If, and only if the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, determining that the suspicious pyramid scheme has a resurgence sign and performing a reporting operation.
  • the reporting operation includes reporting to the People's Bank or reporting to the public security system, thereby facilitating the timely and effective suppression of illegal pyramid schemes by various regulatory authorities, maintaining the market economic order, and thus improving the monitoring, monitoring effect and timeliness of suspicious pyramid schemes.
  • the size of the serial number of each step does not mean the order of execution order, and the order of execution of each step should be determined by its function and internal logic, and should not constitute any implementation process of the embodiment of the present application. limited.
  • FIG. 5 is a structural diagram showing the structure of the monitoring apparatus of the illegal pyramid scheme provided by the embodiment of the present application. For the convenience of description, only the parts related to the embodiment of the present application are shown.
  • the monitoring device of the illegal pyramid scheme is used to implement the monitoring method of the illegal pyramid scheme described in the foregoing embodiment of FIG. 1, FIG. 2, FIG. 3, or FIG. 4, which may be built in a computer device.
  • the monitoring device of the illegal pyramid scheme includes:
  • the building module 51 is configured to construct a feature information base according to key information of the illegal pyramid scheme organization
  • the matching module 52 is configured to acquire transaction flow information to be monitored, match the transaction flow information with the feature information database, and obtain suspicious entities and corresponding suspicious transaction flow information;
  • the generating module 53 is configured to generate a suspicious pyramid scheme according to the suspicious entity and its corresponding suspicious transaction flow information, and record the suspicious pyramid scheme into the suspicious case list;
  • the monitoring module 54 is configured to monitor the suspicious pyramid scheme according to the suspicious case list.
  • the building module 51 includes:
  • a first constructing unit 511 configured to acquire body information of the illegal pyramid selling organization, and construct a first feature information table according to the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information thereof;
  • a second constructing unit 512 configured to acquire a fund transaction characteristic of the illegal pyramid selling organization, and construct a second feature information table according to the fund transaction feature, where the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction thereof rule.
  • the matching module 52 includes:
  • the obtaining unit 521 is configured to obtain transaction flow information to be monitored
  • the first matching unit 522 is configured to match the transaction flow information with the first feature information table, obtain the subject information related to the illegal pyramid scheme in the transaction flow information, and the transaction of the subject information within a specified time period. Flowing water information;
  • the second matching unit 523 is configured to match the transaction flow information of the subject information in the specified time period and the second feature information table, and obtain the subject information that meets the suspicious transaction rule and the corresponding transaction flow information, as Suspicious subject and its corresponding suspicious transaction flow information.
  • the generating module 53 includes:
  • a generating unit 531 configured to acquire attribute information, account information, and transaction information of the suspicious subject from the suspicious subject and the corresponding suspicious water information, and configure the suspicious subject to correspond to the suspicious case number of the specified time period, Generate suspicious pyramid schemes;
  • the associating unit 532 is configured to associate and store attribute information, account information, transaction information, and the suspicious case number of the suspicious pyramid scheme in the suspicious case table.
  • the monitoring module 54 includes:
  • the statistical unit 541 is configured to: for each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is a confirmed illegal pyramid scheme, the transaction of the suspicious pyramid scheme is recorded on a public account or a private account. Frequency and transaction amount;
  • the reporting unit 542 is configured to perform a reporting operation if the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold.
  • each module/unit in the embodiment of the present application may be used to implement all the technical solutions in the foregoing method embodiments, and the specific working process may refer to the corresponding process in the foregoing method embodiments, and details are not described herein again. .
  • the present embodiment provides one or more non-volatile readable storage media having computer readable instructions stored thereon, the one or more non-readable readable storage media storing computer readable instructions, the computer readable instructions being When one or more processors are executed, one or more processors are caused to perform the monitoring method of the illegal pyramid scheme in the embodiment 1. To avoid repetition, details are not described herein again.
  • the computer readable instructions are executed by the processor, the functions of the modules/units in the monitoring device of the illegal pyramid scheme in Embodiment 2 are implemented. To avoid repetition, details are not described herein again.
  • the one or more non-volatile readable storage media storing computer readable instructions may comprise any entity or device capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a mobile Hard disk, disk, optical disk, computer memory, read-only memory (ROM), random access memory (RAM), electrical carrier signals, and telecommunication signals.
  • FIG. 6 is a schematic diagram of a computer device according to an embodiment of the present application.
  • the computer device 6 of this embodiment includes a processor 60, a memory 61, and computer readable instructions 62 stored in the memory 61 and executable on the processor 60.
  • the processor 60 executes the computer readable instructions 62 to implement the steps of the method for monitoring the illegal pyramid scheme in the first embodiment, such as steps S101 to S104 shown in FIG. 1, and step S1011 described in the embodiment of FIG. Step S1012, steps S1021 to S1023, steps S1031 to S1032, and step S1041 to step S1042 described in the embodiment of FIG. 4 are performed in the embodiment of FIG. 3, or the processor 60 executes the computer readable
  • the functions of the modules/units in the monitoring device of the illegal pyramid scheme described in the above embodiment 2 are realized, for example, the functions of the modules 51 to 54 shown in FIG.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present application is applicable to the technical field of communications, and provides an illegal pyramid scheme organization monitoring method. Said monitoring method comprising: constructing a characteristic information base according to key information of an illegal pyramid scheme organization; acquiring transaction record information to be monitored, and matching the transaction record information with the characteristic information base, so as to acquire a suspicious entity and suspicious transaction record information corresponding thereto; generating a suspicious pyramid scheme case according to the suspicious entity and the corresponding suspicious transaction record information, and entering the suspicious pyramid scheme case into a suspicious case table; and monitoring the suspicious pyramid scheme case according to the suspicious case table. The present application enables real-time monitoring of illegal pyramid scheme organizations, being beneficial to preventing the reorganization of illegal pyramid scheme organizations, solving the problems in the prior art of insufficient monitoring of illegal pyramid scheme organizations and unsatisfactory monitoring implementation effect, and the monitoring being not performed in a timely manner.

Description

非法传销组织的监测方法、装置、计算机设备及存储介质Monitoring method, device, computer equipment and storage medium of illegal pyramid scheme
本申请以2018年02月27日提交的申请号为201810161840.4,名称为“非法传销组织的监测方法、装置、计算机设备及存储介质”的中国发明专利申请为基础,并要求其优先权。This application is based on the Chinese invention patent application filed on February 27, 2018, with the application number 20110161840.4, entitled "Monitoring method, device, computer equipment and storage medium for illegal pyramid schemes", and requires priority.
技术领域Technical field
本申请属于通信技术领域,尤其涉及一种非法传销组织的监测方法、装置、计算机设备及存储介质。The present application belongs to the field of communication technologies, and in particular, to a method, a device, a computer device and a storage medium for monitoring an illegal pyramid scheme.
背景技术Background technique
随着互联网和电子商务技术的飞速发展,新型传销模型借助网络手段,通过拉人头、发展下线的方式,致使大量网民和学生成为受害者,酿成惨剧,严重扰乱了经济秩序。进一步地,由于现阶段的银行缺乏有效地监测手段,不能实时地生成可疑案例报告以关注、监测可疑对象,从而导致这些传销组织在公安部大力打击的时候销声匿迹,在风头过后又死灰复燃。比如曝光后的全返通传销骗局、罗麦科技传销组织、福天下传销组织,其对公账户的资金交易仍一直处于活跃期。可见,现有技术对非法传销组织的监控力度不足,监控效果及时效性欠佳,非法传销组织容易死灰复燃。With the rapid development of the Internet and e-commerce technology, the new MLM model relies on network means to attract a large number of netizens and students to become victims by pulling people and developing offline lines, causing tragedies and seriously disrupting the economic order. Further, due to the lack of effective monitoring methods at the current stage of the bank, it is impossible to generate suspicious case reports in real time to pay attention to and monitor suspicious objects, which led to the disappearance of these pyramid schemes when the Ministry of Public Security vigorously cracked down, and revived after the limelight. For example, the post-exposure full-return pyramid scheme, the Luomai Technology MLM organization, and the Futianxia MLM organization, their financial transactions in the public account have been in an active period. It can be seen that the existing technology has insufficient monitoring of illegal pyramid schemes, the monitoring effect is not timely, and the illegal pyramid schemes are prone to resurgence.
发明内容Summary of the invention
本申请实施例提供了一种非法传销组织的监测方法、装置、计算机设备及存储介质,以解决现有技术对非法传销组织的监控力度不足、监控效果及时效性欠佳问题。The embodiment of the present application provides a method, a device, a computer device, and a storage medium for monitoring an illegal pyramid scheme, so as to solve the problem that the prior art has insufficient monitoring power on the illegal pyramid scheme organization and the monitoring effect is not timely.
第一方面,本申请实施例提供了一种非法传销组织的监测方法,所述监测方法包括:In a first aspect, an embodiment of the present application provides a method for monitoring an illegal pyramid scheme, where the monitoring method includes:
根据非法传销组织的关键信息构建特征信息库;Construct a feature information base based on key information of the illegal pyramid scheme;
获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;Obtaining transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining suspicious entities and corresponding suspicious transaction flow information;
根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;Generating a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list;
根据所述可疑案件表对所述可疑传销案例进行监测。The suspicious pyramid scheme is monitored according to the suspicious case list.
进一步地,所述根据非法传销组织的关键信息构建特征信息库包括:Further, the constructing the feature information base according to the key information of the illegal pyramid scheme organization includes:
获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息;Acquiring the body information of the illegal pyramid selling organization, and constructing a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information;
获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。Acquiring the capital transaction characteristics of the illegal pyramid selling organization, constructing a second feature information table based on the characteristics of the fund transaction, wherein the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule.
进一步地,所述获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息包括:Further, the obtaining the transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining the suspicious entity and the corresponding suspicious transaction flow information include:
获取待监测的交易流水信息;Obtaining transaction flow information to be monitored;
匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息;Matching the transaction flow information with the first feature information table, acquiring subject information related to the illegal pyramid scheme in the transaction flow information, and transaction flow information of the subject information within a specified time period;
匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流水信息。Matching the transaction flow information of the subject information in the specified time period and the second feature information table, acquiring the subject information that meets the suspicious transaction rule and the corresponding transaction flow information, as the suspicious subject and the corresponding suspicious transaction thereof Flowing water information.
进一步地,所述根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中包括:Further, the generating a suspicious pyramid scheme according to the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list includes:
从所述可疑主体及其对应的可疑流水信息中获取可疑主体的属性信息、账户信息、交易信息,并配置所述可疑主体对应指定时间段的可疑案例编号,以生成可疑传销案例;Obtaining attribute information, account information, and transaction information of the suspicious subject from the suspicious subject and the corresponding suspicious flow information, and configuring the suspicious subject corresponding to the suspicious case number of the specified time period to generate a suspicious pyramid scheme;
在可疑案件表中关联并存储所述可疑传销案例的属性信息、账户信息、交易信息与所述可疑案例编号。Attribute information, account information, transaction information, and the suspicious case number of the suspicious pyramid scheme are associated and stored in the suspicious case table.
进一步地,所述根据所述可疑案件表对所述可疑传销案例进行监测包括:Further, the monitoring the suspicious pyramid scheme according to the suspicious case list includes:
针对所述可疑案件表中的每一个可疑传销案例,若所述可疑传销案例为已确认的非法传销组织,统计所述可疑传销案例的对公账户或对私账户的交易频率及交易金额;For each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is a confirmed illegal pyramid scheme, the transaction frequency and transaction amount of the suspicious pyramid scheme for the public account or the private account are counted;
若所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,执行上报操作。If the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, the reporting operation is performed.
第二方面,本申请实施例提供了一种非法传销组织的监测装置,所述监测装置包括:In a second aspect, the embodiment of the present application provides a monitoring device for an illegal pyramid scheme, and the monitoring device includes:
构建模块,用于根据非法传销组织的关键信息构建特征信息库;a building module for constructing a feature information base based on key information of an illegal pyramid scheme organization;
匹配模块,用于获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;a matching module, configured to acquire transaction flow information to be monitored, and match the transaction flow information with the feature information database to obtain suspicious entities and corresponding suspicious transaction flow information;
生成模块,用于根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;a generating module, configured to generate a suspicious pyramid scheme according to the suspicious entity and its corresponding suspicious transaction flow information, and record the suspicious pyramid scheme into the suspicious case list;
监测模块,用于根据所述可疑案件表对所述可疑传销案例进行监测。And a monitoring module, configured to monitor the suspicious pyramid scheme according to the suspicious case list.
进一步地,所述构建模块包括:Further, the building module includes:
第一构建单元,用于获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息;a first building unit, configured to acquire body information of the illegal pyramid selling organization, and construct a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information thereof;
第二构建单元,用于获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。a second building unit, configured to acquire a fund transaction characteristic of the illegal pyramid selling organization, and construct a second feature information table based on the fund transaction characteristic, where the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule thereof .
进一步地,所述匹配模块包括:Further, the matching module includes:
获取单元,用于获取待监测的交易流水信息;An obtaining unit, configured to obtain transaction flow information to be monitored;
第一匹配单元,用于匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息;a first matching unit, configured to match the transaction flow information with the first feature information table, obtain body information related to an illegal pyramid scheme in the transaction flow information, and transaction flow of the body information within a specified time period information;
第二匹配单元,用于匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流水信息。a second matching unit, configured to match the transaction flow information of the subject information in the specified time period and the second feature information table, and obtain the subject information that meets the suspicious transaction rule and the corresponding transaction flow information as suspicious The subject and its corresponding suspicious transaction flow information.
第三方面,本申请实施例提供了一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:In a third aspect, an embodiment of the present application provides a computer device, including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the processor executing the computer The following steps are implemented when the instructions are readable:
根据非法传销组织的关键信息构建特征信息库;Construct a feature information base based on key information of the illegal pyramid scheme;
获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;Obtaining transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining suspicious entities and corresponding suspicious transaction flow information;
根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;Generating a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list;
根据所述可疑案件表对所述可疑传销案例进行监测。The suspicious pyramid scheme is monitored according to the suspicious case list.
第四方面,本申请实施例提供了一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:In a fourth aspect, the embodiment of the present application provides one or more non-volatile readable storage media storing computer readable instructions, when the computer readable instructions are executed by one or more processors, such that the one Or multiple processors perform the following steps:
根据非法传销组织的关键信息构建特征信息库;Construct a feature information base based on key information of the illegal pyramid scheme;
获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;Obtaining transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining suspicious entities and corresponding suspicious transaction flow information;
根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;Generating a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list;
根据所述可疑案件表对所述可疑传销案例进行监测。The suspicious pyramid scheme is monitored according to the suspicious case list.
本申请的一个或多个实施例的细节在下面的附图及描述中提出。本申请的其他特征和优点将从说明书、附图以及权利要求书变得明显。Details of one or more embodiments of the present application are set forth in the accompanying drawings and description below. Other features and advantages of the present invention will be apparent from the description, drawings and claims.
附图说明DRAWINGS
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the present application. Other drawings may also be obtained from those of ordinary skill in the art based on these drawings without the inventive labor.
图1是本申请实施例提供的非法传销组织的监测方法的第一实现流程图;1 is a first implementation flowchart of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application;
图2是本申请实施例提供的非法传销组织的监测方法的第二实现流程图;2 is a second implementation flowchart of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application;
图3是本申请实施例提供的非法传销组织的监测方法的第三实现流程图;3 is a third implementation flowchart of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application;
图4是本申请实施例提供的非法传销组织的监测方法的第四实现流程图;4 is a fourth implementation flowchart of a method for monitoring an illegal pyramid scheme according to an embodiment of the present application;
图5是本申请实施例提供的非法传销组织的监测装置的组成结构图;5 is a structural diagram of a monitoring device of an illegal pyramid scheme provided by an embodiment of the present application;
图6是本申请实施例提供的计算机设备的示意图。FIG. 6 is a schematic diagram of a computer device according to an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application are clearly and completely described in the following with reference to the drawings in the embodiments of the present application. It is obvious that the described embodiments are a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.
图1示出了本申请实施例提供的非法传销组织的监测方法的第一实现流程。本申请实施例提供的所述非法传销组织的监测方法应用于计算机设备。参阅图1,所述非法传销组织的监测方法包括:FIG. 1 shows a first implementation flow of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application. The monitoring method of the illegal pyramid selling organization provided by the embodiment of the present application is applied to a computer device. Referring to FIG. 1, the monitoring method of the illegal pyramid selling organization includes:
在步骤S101中,根据非法传销组织的关键信息构建特征信息库。In step S101, a feature information base is constructed based on key information of the illegal pyramid scheme.
在本申请实施例中,所述非法传销组织为借助网络传销手段,骗取受害者发展下线、拉人头、缴纳入会费、入门费、资格费以达到非法融资目的的组织。所述网络传销手段包括但不限于通过平台、购物网站等以低投入高回报、消费返利、商户入驻、购物养老、电子币买卖、原始股投资等手段。In the embodiment of the present application, the illegal pyramid scheme organization is an organization that uses the means of network marketing to defraud the victim to develop the offline line, pull the head, pay the membership fee, the entry fee, and the qualification fee to achieve the purpose of illegal financing. The network marketing means include, but is not limited to, means such as low investment, high return, consumption rebate, merchant settlement, shopping pension, electronic currency trading, and original stock investment through platforms, shopping websites, and the like.
本申请实施例从公安部已曝光的非法传销组织中抽取出非法传销组织的关键信息,然后基于所述关键信息构建特征信息库。所述特征信息库中记录了已确认的非法传销组织及其对应的标志性特征,用于挖掘待监测的交易流水信息中的可疑主体及可疑交易流水信息,即判断待监测的交易流水信息中是否包括所述标志性特征,从而识别出是否为可疑传销对象,实现对非法传销组织的监测。可选地,所述非法传销组织的关键信息包括但不限于组织的主体 特点和资金交易特点。The embodiment of the present application extracts key information of an illegal pyramid scheme from an illegal pyramid scheme that has been exposed by the Ministry of Public Security, and then constructs a feature information base based on the key information. The identified information database records the confirmed illegal pyramid selling organization and its corresponding iconic features, and is used for mining the suspicious subject and the suspicious transaction flow information in the transaction flow information to be monitored, that is, determining the transaction flow information to be monitored. Whether or not the iconic features are included to identify whether it is a suspicious pyramid scheme or not, and to monitor illegal pyramid schemes. Optionally, the key information of the illegal pyramid scheme organization includes, but is not limited to, the main characteristics of the organization and the characteristics of the fund transaction.
在步骤S102中,获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息。In step S102, the transaction flow information to be monitored is acquired, and the transaction flow information is matched with the characteristic information database to obtain the suspicious entity and the corresponding suspicious transaction flow information.
在进行非法传销组织的监测时,从银行获取待监测的交易流水信息,然后将所述交易流水信息与预先构建的特征信息库中的标志性特点进行匹配,以判断所述交易流水信息是否全部或者部分覆盖了已确认的非法传销组织的关键信息,比如所述待监测的交易流水信息中的交易对手为已确认的非法传销组织、客户本身为现有传销组织的头目或骨干、交易资金集中汇入等。若交易流水信息全部或者部分覆盖所述特征信息库中的关键信息,则将所述交易流水信息作为可疑主体及其对应的可疑交易流水信息。In the monitoring of the illegal pyramid scheme organization, the transaction flow information to be monitored is obtained from the bank, and then the transaction flow information is matched with the iconic features in the pre-built feature information database to determine whether the transaction flow information is all Or partially covering the key information of the confirmed illegal pyramid scheme organization, for example, the counterparty in the transaction flow information to be monitored is the confirmed illegal pyramid scheme organization, the customer itself is the leader or backbone of the existing pyramid scheme organization, and the transaction funds are concentrated. Import and so on. If the transaction flow information completely or partially covers the key information in the feature information base, the transaction flow information is used as the suspicious entity and its corresponding suspicious transaction flow information.
应当理解,所述可疑主体是指可疑的非法传销组织的成员集,是一个总的概念。It should be understood that the suspicious subject refers to a set of members of a suspicious illegal pyramid scheme, and is a general concept.
在步骤S103中,根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中。In step S103, a suspicious pyramid scheme is generated according to the suspicious entity and its corresponding suspicious transaction flow information, and the suspicious pyramid scheme is recorded in the suspicious case list.
在这里,所述可疑案件表用于记录通过匹配特征信息库命中的可疑传销案例及其详细信息。对于步骤S102得到的可疑主体及其对应的可疑交易流水信息,本申请实施例进一步为所述可疑主体及其对应的可疑交易流水信息设置可疑案例编号,然后将其入库在案,以便于对可疑传销案例进行查询、管理。Here, the suspicious case table is used to record the suspicious pyramid schemes and their detailed information hit by the matching feature information base. For the suspicious entity obtained in step S102 and the corresponding suspicious transaction flow information, the embodiment of the present application further sets a suspicious case number for the suspicious subject and its corresponding suspicious transaction flow information, and then stores the suspect case number in order to facilitate the Suspicious pyramid schemes are queried and managed.
在步骤S104中,根据所述可疑案件表对所述可疑传销案例进行监测。In step S104, the suspicious pyramid scheme is monitored according to the suspicious case list.
对于所述可疑案件表中的可疑传销案例,本申请实施例在后续持续关注、分析,并在可疑程度达到预设级别时,执行上报操作,包括上报人民银行或者上报公安系统,有利于各监管部门及时、有效地打击非法传销,维护市场经济秩序。For the suspicious pyramid scheme in the suspicious case list, the embodiment of the present application continuously pays attention to and analyzes in the follow-up, and performs the reporting operation when the suspicious degree reaches the preset level, including reporting to the People's Bank or reporting to the public security system, which is beneficial to each supervision. The department promptly and effectively cracked down on illegal pyramid schemes and maintained market economic order.
综上所述,本申请实施例通过匹配特征信息库挖掘可疑传销案例并记录在案,实现了对非法传销组织的实时监督,有利于快速识别可疑传销案例并展开防控措施,以及防范非法传销组织死灰复燃的现象,解决了现有技术对非法传销组织的监控力度不足、监控效果及时效性欠佳问题。In summary, the embodiment of the present application mines suspicious pyramid schemes by matching the feature information database and records them in real time, realizing real-time supervision of illegal pyramid schemes, facilitating rapid identification of suspicious pyramid schemes and launching prevention and control measures, and preventing illegal pyramid schemes. The phenomenon of resurgence of organizations has solved the problem of insufficient monitoring of illegal pyramid schemes in the prior art and poor timeliness of monitoring effects.
进一步地,基于图1提供的非法传销组织的监测方法的第一实现流程的基础上,提出本申请实施例提供的非法传销组织的监测方法的第二实现流程。Further, based on the first implementation process of the monitoring method of the illegal pyramid selling organization provided in FIG. 1 , the second implementation process of the monitoring method of the illegal pyramid selling organization provided by the embodiment of the present application is proposed.
如图2所示,是本申请实施例提供的非法传销组织的监测方法的第二实现流程示意图。步骤S101所述的根据非法传销组织的关键信息构建特征信息库包括:FIG. 2 is a schematic diagram of a second implementation process of a method for monitoring an illegal pyramid scheme provided by an embodiment of the present application. The constructing the feature information base according to the key information of the illegal pyramid scheme according to step S101 includes:
在步骤是1011中,获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息。In step 1011, the subject information of the illegal pyramid scheme is obtained, and the first feature information table is constructed based on the subject information, where the first feature information table includes an illegal pyramid scheme organization name and corresponding body information.
如前所述,所述非法传销组织的关键信息包括但不限于组织的主体特点和资金交易特点。鉴于此,对于组织的主体特点,本申请实施例构建第一特征信息表,用以记录现有的传销组织及与其对应的主体信息。所述主体信息包括但不限于非法传销组织的对公客户信息、对私客户信息、法定代表人信息、合作伙伴信息、代办人信息、交易对手的客户信息。As mentioned above, the key information of the illegal pyramid scheme organization includes but is not limited to the main characteristics of the organization and the characteristics of the fund transaction. In view of this, for the main features of the organization, the embodiment of the present application constructs a first feature information table for recording the existing MLM organization and the subject information corresponding thereto. The subject information includes, but is not limited to, public customer information, private customer information, legal representative information, partner information, agent information, and counterparty customer information of the illegal pyramid scheme.
示例性地,为了引起注意和骗取信任,非法传销组织通常伪装为公司、组织或机构,用于敛财的账户多为这些公司、组织或机构的对公账户。而法定代表人的账户多为异地新开,或者长时间未启用的账户,存在突发频繁交易、3至6个月销户、大额资金集中转入、余额每日清空、跨境转账或者跨境取现的特点。本申请实施例将公安部已曝光的传销组织涉及的公司、组织、机构的对公客户信息、法定代表人的客户信息以及关联的合作伙伴、代办人信息录入所述第一特征信息表中。Illustratively, in order to attract attention and defraud trust, illegal pyramid schemes often pretend to be companies, organizations, or institutions, and the accounts used to collect money are mostly the public accounts of these companies, organizations, or institutions. The legal representative's accounts are mostly opened in different places, or accounts that have not been activated for a long time, there are sudden and frequent transactions, 3 to 6 months of account cancellation, large funds transfer, daily balance clearing, cross-border transfer or The characteristics of cross-border cash withdrawal. The embodiment of the present application records the public customer information, the legal representative's customer information, and the associated partner and agent information of the company, organization, and organization involved in the MLM organization that has been exposed by the Ministry of Public Security into the first feature information table.
在步骤S1012中,获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。In step S1012, the capital transaction characteristics of the illegal pyramid scheme organization are acquired, and a second feature information table is constructed based on the fund transaction characteristics, and the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule.
对于资金交易特点,本申请实施例构建第二特征信息表,用以记录传销关键词及与其对应的可疑交易规则。所述传销关键词是指非法传销组织的类别属性,比如国家政策类、购物理财类、原始股投资类、养老类等。所述可疑交易规则是指从现有的非法传销组织的银行汇款、转账、存款、提现等资金交易方式抽取出来的具有代表性的交易规律。For the characteristics of the fund transaction, the embodiment of the present application constructs a second feature information table for recording the marketing keyword and the suspicious transaction rule corresponding thereto. The pyramid selling keywords refer to the category attributes of illegal pyramid schemes, such as national policy categories, shopping wealth management, original stock investment, and pension. The suspicious transaction rule refers to a representative transaction law extracted from the bank transactions of existing illegal pyramid schemes, such as bank remittance, transfer, deposit, withdrawal, and the like.
示例性地,在非法传销组织的资金交易流水中,流入对公账户的资金来源分散,交易对手大多为对私客户。且同一交易对手存在前期交易金额小、后续交易金额大的变化趋势,这种变化趋势多数发生在1至3个月内;在经过大额交易之后,该交易对手后续不再或少有地进行交易,而是从对公账户中不定期地收到以利息、收益、奖励、分红等方式发放的小额收益。从中可以得到非法传销组织的可疑交易规则包括但不限于:某时期内有大量同地方的外地人在银行开设私人账户;某时期有相当资金经外地人从本地银行汇入外地同一账户;某时期外地人在本地银行私人账户有较大外地资金汇入。本申请实施例将诸如此类具有代表性的交易规则作为可疑交易规则,并根据非法传销组织的属性信息划分所属的传销关键词,关联所述传销关键词和对应的可疑交易规则,并录入所述第二特征信息表中。Illustratively, in the flow of funds in an illegal pyramid scheme organization, the source of funds flowing into the public account is dispersed, and the counterparty is mostly a private client. And the same counterparty has a small change in the amount of the previous transaction and a large amount of subsequent transactions. Most of this trend occurs within one to three months; after a large transaction, the counterparty does not follow the rare or less Trading, but from the public account, irregularly receive small profits from interest, income, rewards, dividends, etc. The suspicious transaction rules from which illegal pyramid schemes can be obtained include, but are not limited to, a large number of foreigners in the same place in a certain period open a private account in the bank; in a certain period, there is considerable funds to be remitted from the local bank to the same account in the field by a foreigner; Foreigners have large foreign funds remitted in local bank private accounts. The embodiment of the present application takes such a representative transaction rule as a suspicious transaction rule, and divides the affiliated marketing keyword according to the attribute information of the illegal pyramid scheme, associates the pyramid selling keyword with the corresponding suspicious transaction rule, and enters the first Two feature information tables.
本申请实施例通过构建特征信息表,使用所述特征信息表记录已确认的非法传销组织及其对应的标志性特点,用于挖掘待监测的交易流水信息中的可疑主体及可疑交易流水信息,方便了对挖掘规则的管理及更新,有利于提高可疑传销案例识别的效率及准确度。The embodiment of the present application constructs a feature information table, and uses the feature information table to record the confirmed illegal pyramid selling organization and its corresponding iconic features, and is used for mining the suspicious subject and the suspicious transaction flow information in the transaction flow information to be monitored. It facilitates the management and update of mining rules, which is conducive to improving the efficiency and accuracy of suspicious pyramid schemes.
进一步地,基于图2提供的非法传销组织的监测方法的实现流程的基础上,提出本申请实施例提供的非法传销组织的监测方法的第三实现流程。Further, based on the implementation process of the monitoring method of the illegal pyramid selling organization provided in FIG. 2, the third implementation process of the monitoring method of the illegal pyramid selling organization provided by the embodiment of the present application is proposed.
如图3所示,是本申请实施例提供的非法传销组织的监测方法的第三实现流程示意图。步骤S102所述的获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息包括:As shown in FIG. 3, it is a schematic diagram of a third implementation process of the monitoring method of the illegal pyramid scheme organized by the embodiment of the present application. Obtaining the transaction flow information to be monitored, and matching the transaction flow information with the characteristic information database to obtain the suspicious entity and the corresponding suspicious transaction flow information including:
在步骤S1021中,获取待监测的交易流水信息。In step S1021, transaction flow information to be monitored is acquired.
可选地,所述待监测的交易流水信息包括但不限于交易双方的账户信息、汇款交易记录、转账交易记录、交易单方的存取款交易记录。每一交易记录又包括但不限于交易时间、交易场所、交易金额、是否跨城或跨境交易、持续时间。Optionally, the transaction flow information to be monitored includes, but is not limited to, account information of the two parties to the transaction, a remittance transaction record, a transfer transaction record, and a transaction transaction record of the transaction party. Each transaction record includes, but is not limited to, transaction time, trading floor, transaction amount, cross-city or cross-border transactions, duration.
在步骤S1022中,匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息。In step S1022, the transaction flow information is matched with the first feature information table, and the body information related to the illegal pyramid scheme in the transaction flow information and the transaction flow information of the body information in the specified time period are acquired.
如前所述,所述特征信息库中包括第一特征信息表和第二特征信息表。所述第一特征信息表中包括非法传销组织名称及其对应的主体信息。在匹配特征信息库时,本申请实施例首先将所述待监测的交易流水信息与所述第一特征信息表进行匹配,从所述交易流水信息中抓取出与现有的非法传销组织相关的主体信息,比如交易主体信息、交易对手信息。然后基于所述交易流水信息统计所述主体在指定时间段内的交易流水轨迹,比如在3天、5天、10天等指定短期内的转出金额、转入金额、转出对手个数、转出地区个数、境外取现次数、转入对手个数、转入地区个数、非柜面转入、转出金额、本币转入、转出金额、账户上日余额。As described above, the feature information database includes a first feature information table and a second feature information table. The first feature information table includes an illegal pyramid scheme organization name and corresponding body information. When matching the feature information database, the embodiment of the present application first matches the transaction flow information to be monitored with the first feature information table, and captures the transaction flow information from the existing illegal pyramid organization. Subject information, such as transaction subject information, counterparty information. Then, based on the transaction flow information, the transaction flow trajectory of the subject within a specified time period is counted, for example, the transfer amount, the transfer amount, and the number of transferred opponents in a specified short period, such as 3 days, 5 days, and 10 days, The number of transferred areas, the number of overseas withdrawals, the number of transferred to the opponents, the number of transferred areas, the non-counter transfer, the transfer amount, the local currency transfer, the transfer amount, and the account balance.
在步骤S1023中,匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流水信息。In step S1023, the transaction flow information of the subject information in the specified time period and the second feature information table are matched, and the subject information that meets the suspicious transaction rule and the corresponding transaction flow information are obtained as the suspicious subject and Its corresponding suspicious transaction flow information.
在通过步骤S1022得到与现有传销组织相关的主体在指定短期内的交易流水轨迹后,进一步将所述交易流水轨迹与特征信息库中的第二特征信息表进行匹配,以判断所述交易流水轨迹是否触犯所述可疑交易规则,从所述交易流水轨迹中抓取可疑交易流水信息。After obtaining the transaction flow track of the subject related to the existing MLM organization in the specified short-term by step S1022, the transaction flow track is further matched with the second feature information table in the feature information database to determine the transaction flow. Whether the trajectory violates the suspicious transaction rule, and the suspicious transaction flow information is captured from the transaction flow trajectory.
本申请实施例通过设置第一特征信息表,能够有效地过滤掉非疑似的交易流水信息,针对性地筛选出现有非法传销组织头目的交易行为;通过设置第二特征信息表,能够筛选出现有非法传销组织头目的非法交易行为,有利于监测非法传销组织是否死灰复燃,以及监测以新面目出现的非法传销组织。By setting the first feature information table, the embodiment of the present application can effectively filter out non-suspect transaction flow information, and specifically select the transaction behavior of the illegal pyramid marketing organization head; and set the second feature information table to filter the presence The illegal trading of the heads of illegal pyramid schemes is conducive to monitoring the resurgence of illegal pyramid schemes and monitoring illegal pyramid schemes that appear in new ways.
可选地,所述方法还可以包括,根据所触犯的可疑交易轨迹,从所述第二特征信息表中获取对应的传销关键词,以进一步抓取未被公安部曝光的传销新类型。Optionally, the method may further include: acquiring, according to the suspicious transaction trajectory that is violated, a corresponding marketing keyword from the second feature information table, to further capture a new type of MLM that is not exposed by the public security department.
进一步地,所述步骤S103根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中包括:Further, the step S103 generates a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and records the suspicious pyramid scheme into the suspicious case list, including:
在步骤S1031中,从所述可疑主体及其对应的可疑流水信息中获取可疑主体的属性信 息、账户信息、交易信息,并配置所述可疑主体对应所述指定时间段的可疑案例编号,以生成可疑传销案例。In step S1031, the attribute information, the account information, and the transaction information of the suspicious subject are obtained from the suspicious subject and the corresponding suspicious flow information, and the suspicious subject corresponding to the suspicious case number of the specified time period is configured to generate Suspicious pyramid schemes.
在这里,所述可疑主体的属性信息,包括但不限于对公/对私客户、法定代表人、代办人等的姓名、国籍、证件类型、证件号码、职业、学历、住址信息、联系方式,用于判断所述客户是否有过传销行为。所述可疑主体的账户信息包括但不限于对公/对私账户开户机构、账户余额、账户类型、开户时间、销户时间、上笔交易时间。所述可疑主体的交易信息包括但不限于交易日期、交易账户、代办人信息、交易发生地、交易方式、资金收付标志、货币符、交易金额、用途、交易对手信息。Here, the attribute information of the suspicious subject includes, but is not limited to, the name, nationality, document type, ID number, occupation, education, address information, and contact information of the public/private customer, the legal representative, the agent, and the like. It is used to judge whether the customer has had a pyramid scheme. The account information of the suspicious entity includes but is not limited to the public/private account opening institution, the account balance, the account type, the account opening time, the account closing time, and the last trading time. The transaction information of the suspicious subject includes but is not limited to the transaction date, the transaction account, the agent information, the place where the transaction occurs, the transaction method, the fund collection and payment mark, the currency symbol, the transaction amount, the use, and the counterparty information.
可选地,在其他实施例中,还可以进一步判断该主体的资金流入流出特点,生成可疑特征。比如:传销组织资金流入、传销主要干系人资金流入等。Optionally, in other embodiments, the capital inflow and outflow characteristics of the entity may be further determined to generate a suspicious feature. For example: capital inflows from MLM organizations, capital inflows from major stakeholders, and so on.
在得到可疑主体的属性信息、账户信息、流水信息后,配置所述可疑主体在所述指定时间段内的可疑案例编号,生成可疑传销案例,以便于生产作业。在这里,所述指定时间段应当理解为交易发生的一定时间范围内,即步骤S1022中所述的指定时间段,其限定了可疑传销案例的覆盖范围;超出所述指定时间段的可疑主体及可疑流水信息,则属于另一个可疑传销案例,对应另一个可疑案例编号。After obtaining the attribute information, the account information, and the flow information of the suspicious subject, the suspicious case number of the suspicious subject within the specified time period is configured to generate a suspicious pyramid scheme to facilitate the production operation. Here, the specified time period should be understood as a certain time range in which the transaction occurs, that is, the specified time period described in step S1022, which defines the coverage of the suspicious pyramid scheme; the suspicious subject exceeding the specified time period and Suspicious flow information belongs to another suspicious pyramid scheme, corresponding to another suspicious case number.
在步骤S1032中,在可疑案件表中关联并存储所述可疑传销案例的属性信息、账户信息、交易信息与所述可疑案例编号。In step S1032, the attribute information, the account information, the transaction information, and the suspicious case number of the suspicious pyramid scheme are associated and stored in the suspicious case table.
将所述可疑主体的属性信息、账户信息及交易信息与所述可疑案例编号关联,并存储于可疑案件表中,将其入库在案,以便于对可疑传销案例进行查询、管理。The attribute information, the account information and the transaction information of the suspicious subject are associated with the suspicious case number, and are stored in the suspicious case list, and are stored in the case, so as to facilitate the inquiry and management of the suspicious pyramid scheme.
综上所述,本申请实施例通过匹配特征信息表挖掘可疑传销案例并记录在案,实现了对非法传销组织的实时监督,有利于快速识别可疑传销案例并展开防控措施,以及防范非法传销组织死灰复燃的现象,解决了现有技术对非法传销组织的监控力度不足、监控效果及时效性欠佳问题。In summary, the embodiment of the present application mines suspicious pyramid schemes by matching the feature information table and records them in real time, realizing real-time supervision of illegal pyramid schemes, facilitating rapid identification of suspicious pyramid schemes and launching prevention and control measures, and preventing illegal pyramid schemes. The phenomenon of resurgence of organizations has solved the problem of insufficient monitoring of illegal pyramid schemes in the prior art and poor timeliness of monitoring effects.
进一步地,基于图1、图2或图3提供的非法传销组织的监测方法的实现流程的基础上,提出本申请实施例提供的非法传销组织的监测方法的第四实现流程。Further, based on the implementation process of the monitoring method of the illegal pyramid selling organization provided in FIG. 1 , FIG. 2 or FIG. 3 , the fourth implementation process of the monitoring method of the illegal pyramid selling organization provided by the embodiment of the present application is proposed.
如图4所示,是本申请实施例提供的非法传销组织的监测方法的第四实现流程示意图。在本申请实施例中,步骤S104所述的根据所述可疑案件表对所述可疑传销案例进行监测包括:As shown in FIG. 4, it is a schematic diagram of a fourth implementation process of the monitoring method of the illegal pyramid scheme organized by the embodiment of the present application. In the embodiment of the present application, the monitoring of the suspicious pyramid scheme according to the suspicious case table described in step S104 includes:
在步骤S1041中,针对所述可疑案件表中的每一个可疑传销案例,若所述可疑传销案例为已确认的非法传销组织,统计所述可疑传销案例的对公账户或对私账户的交易频率及交易 金额。In step S1041, for each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is an confirmed illegal pyramid scheme, the transaction frequency of the suspicious pyramid scheme for the public account or the private account is counted. And the transaction amount.
本申请实施例优选对已确认是非法传销组织的可疑传销案例的对公账户或对私账户进行监控,计算其在所述指定时间段内的交易频率以及交易总额,所述交易频率通过交易次数表示。The embodiment of the present application preferably monitors a public account or a private account of a suspicious pyramid scheme that has been confirmed as an illegal pyramid scheme, and calculates a transaction frequency and a total transaction amount in the specified time period, and the transaction frequency passes the number of transactions. Said.
在步骤S1042中,若所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,执行上报操作。In step S1042, if the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, the reporting operation is performed.
本申请实施例预先设置第一阈值和第二阈值。其中,所述第一阈值用于衡量可疑传销案例的对公账户和/或对私账户的交易频繁程度,若对公账户和/或对私账户的的交易频率大于或等于第一阈值时,表示达到频繁交易的限度。所述第二阈值用于衡量可疑传销案例的对公账户和/或对私账户的交易数额程度,若对公账户和/或对私账户的交易金额大于或等于第二阈值时,表示达到巨额交易的限度。本申请实施例结合所述交易频率和交易金额来确定所述可疑传销案例是否有死灰复燃的迹象。在通过步骤S1041得到所述对公账户和/或对私账户的的交易频率及交易金额后,比对所述交易频率和第一阈值、比对所述交易金额和第二阈值。当且仅当所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,确定所述可疑传销案例有死灰复燃的迹象,执行上报操作。所述上报操作包括上报人民银行或者上报公安系统,从而有利于各监管部门及时、有效的打击非法传销,维护市场经济秩序,进而提升了对可疑传销案例的监控力度及监控效果、时效性。The first threshold and the second threshold are preset in the embodiment of the present application. The first threshold is used to measure the frequency of transactions of the public account and/or the private account of the suspicious pyramid scheme, and if the transaction frequency of the public account and/or the private account is greater than or equal to the first threshold, Indicates the limit of reaching frequent transactions. The second threshold is used to measure the degree of the transaction amount of the suspicious pyramid scheme for the public account and/or the private account, and if the transaction amount for the public account and/or the private account is greater than or equal to the second threshold, it indicates that the huge amount is reached. The limits of the transaction. The embodiment of the present application combines the transaction frequency and the transaction amount to determine whether the suspicious pyramid scheme has a resurgence sign. After obtaining the transaction frequency and the transaction amount of the public account and/or the private account through step S1041, the transaction frequency and the first threshold are compared, the transaction amount and the second threshold are compared. If, and only if the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, determining that the suspicious pyramid scheme has a resurgence sign and performing a reporting operation. The reporting operation includes reporting to the People's Bank or reporting to the public security system, thereby facilitating the timely and effective suppression of illegal pyramid schemes by various regulatory authorities, maintaining the market economic order, and thus improving the monitoring, monitoring effect and timeliness of suspicious pyramid schemes.
应理解,在上述实施例中,各步骤的序号的大小并不意味着执行顺序的先后,各步骤的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that, in the foregoing embodiments, the size of the serial number of each step does not mean the order of execution order, and the order of execution of each step should be determined by its function and internal logic, and should not constitute any implementation process of the embodiment of the present application. limited.
实施例2Example 2
图5示出了本申请实施例提供的非法传销组织的监测装置的组成结构图,为了便于说明,仅示出了与本申请实施例相关的部分。FIG. 5 is a structural diagram showing the structure of the monitoring apparatus of the illegal pyramid scheme provided by the embodiment of the present application. For the convenience of description, only the parts related to the embodiment of the present application are shown.
在本申请实施例中,所述非法传销组织的监测装置用于实现上述图1、图2、图3、或图4实施例中所述的非法传销组织的监测方法,可以是内置于计算机设备的软件单元、硬件单元或者软硬件结合的单元。In the embodiment of the present application, the monitoring device of the illegal pyramid scheme is used to implement the monitoring method of the illegal pyramid scheme described in the foregoing embodiment of FIG. 1, FIG. 2, FIG. 3, or FIG. 4, which may be built in a computer device. Software unit, hardware unit or unit combining software and hardware.
参阅图5,所述非法传销组织的监测装置包括:Referring to FIG. 5, the monitoring device of the illegal pyramid scheme includes:
构建模块51,用于根据非法传销组织的关键信息构建特征信息库;The building module 51 is configured to construct a feature information base according to key information of the illegal pyramid scheme organization;
匹配模块52,用于获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;The matching module 52 is configured to acquire transaction flow information to be monitored, match the transaction flow information with the feature information database, and obtain suspicious entities and corresponding suspicious transaction flow information;
生成模块53,用于根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;The generating module 53 is configured to generate a suspicious pyramid scheme according to the suspicious entity and its corresponding suspicious transaction flow information, and record the suspicious pyramid scheme into the suspicious case list;
监测模块54,用于根据所述可疑案件表对所述可疑传销案例进行监测。The monitoring module 54 is configured to monitor the suspicious pyramid scheme according to the suspicious case list.
可选地,所述构建模块51包括:Optionally, the building module 51 includes:
第一构建单元511,用于获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息;a first constructing unit 511, configured to acquire body information of the illegal pyramid selling organization, and construct a first feature information table according to the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information thereof;
第二构建单元512,用于获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。a second constructing unit 512, configured to acquire a fund transaction characteristic of the illegal pyramid selling organization, and construct a second feature information table according to the fund transaction feature, where the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction thereof rule.
可选地,所述匹配模块52包括:Optionally, the matching module 52 includes:
获取单元521,用于获取待监测的交易流水信息;The obtaining unit 521 is configured to obtain transaction flow information to be monitored;
第一匹配单元522,用于匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息;The first matching unit 522 is configured to match the transaction flow information with the first feature information table, obtain the subject information related to the illegal pyramid scheme in the transaction flow information, and the transaction of the subject information within a specified time period. Flowing water information;
第二匹配单元523,用于匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流水信息。The second matching unit 523 is configured to match the transaction flow information of the subject information in the specified time period and the second feature information table, and obtain the subject information that meets the suspicious transaction rule and the corresponding transaction flow information, as Suspicious subject and its corresponding suspicious transaction flow information.
可选地,所述生成模块53包括:Optionally, the generating module 53 includes:
生成单元531,用于从所述可疑主体及其对应的可疑流水信息中获取可疑主体的属性信息、账户信息、交易信息,并配置所述可疑主体对应所述指定时间段的可疑案例编号,以生成可疑传销案例;a generating unit 531, configured to acquire attribute information, account information, and transaction information of the suspicious subject from the suspicious subject and the corresponding suspicious water information, and configure the suspicious subject to correspond to the suspicious case number of the specified time period, Generate suspicious pyramid schemes;
关联单元532,用于在可疑案件表中关联并存储所述可疑传销案例的属性信息、账户信息、交易信息与所述可疑案例编号。The associating unit 532 is configured to associate and store attribute information, account information, transaction information, and the suspicious case number of the suspicious pyramid scheme in the suspicious case table.
可选地,所述监测模块54包括:Optionally, the monitoring module 54 includes:
统计单元541,用于针对所述可疑案件表中的每一个可疑传销案例,若所述可疑传销案例为已确认的非法传销组织,统计所述可疑传销案例的对公账户或对私账户的交易频率及交易金额;The statistical unit 541 is configured to: for each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is a confirmed illegal pyramid scheme, the transaction of the suspicious pyramid scheme is recorded on a public account or a private account. Frequency and transaction amount;
上报单元542,用于若所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,执行上报操作。The reporting unit 542 is configured to perform a reporting operation if the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold.
需要说明的是,本申请实施例中的各模块/单元可以用于实现上述方法实施例中的全部技术方案,其具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。It should be noted that each module/unit in the embodiment of the present application may be used to implement all the technical solutions in the foregoing method embodiments, and the specific working process may refer to the corresponding process in the foregoing method embodiments, and details are not described herein again. .
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the parts that are not detailed or described in a certain embodiment can be referred to the related descriptions of other embodiments.
实施例3Example 3
本实施例提供一个或多个存储有计算机可读指令的非易失性可读存储介质,该一个或多个存储有计算机可读指令的非易失性可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行实施例1中非法传销组织的监测方法,为避免重复,这里不再赘述。或者,该计算机可读指令被处理器执行时实现实施例2中非法传销组织的监测装置中各模块/单元的功能,为避免重复,这里不再赘述。The present embodiment provides one or more non-volatile readable storage media having computer readable instructions stored thereon, the one or more non-readable readable storage media storing computer readable instructions, the computer readable instructions being When one or more processors are executed, one or more processors are caused to perform the monitoring method of the illegal pyramid scheme in the embodiment 1. To avoid repetition, details are not described herein again. Alternatively, when the computer readable instructions are executed by the processor, the functions of the modules/units in the monitoring device of the illegal pyramid scheme in Embodiment 2 are implemented. To avoid repetition, details are not described herein again.
可以理解地,所述一个或多个存储有计算机可读指令的非易失性可读存储介质可以包括:能够携带所述计算机可读指令代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号和电信信号等。It will be understood that the one or more non-volatile readable storage media storing computer readable instructions may comprise any entity or device capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a mobile Hard disk, disk, optical disk, computer memory, read-only memory (ROM), random access memory (RAM), electrical carrier signals, and telecommunication signals.
实施例4Example 4
图6是本申请实施例提供的一种计算机设备的示意图。如图6所示,该实施例的计算机设备6包括:处理器60、存储器61以及存储在所述存储器61中并可在所述处理器60上运行的计算机可读指令62。所述处理器60执行所述计算机可读指令62时实现上述实施例1中非法传销组织的监测方法的步骤,例如图1所示的步骤S101至S104,图2实施例中所述的步骤S1011至步骤S1012,图3实施例中所述的步骤S1021至S1023、步骤S1031至步骤S1032以及图4实施例中所述的步骤S1041至步骤S1042,或者,所述处理器60执行所述计算机可读指令62时实现上述实施例2中所述的非法传销组织的监测装置中的各模块/单元的功能,例如图5所示模块51至54的功能。FIG. 6 is a schematic diagram of a computer device according to an embodiment of the present application. As shown in FIG. 6, the computer device 6 of this embodiment includes a processor 60, a memory 61, and computer readable instructions 62 stored in the memory 61 and executable on the processor 60. The processor 60 executes the computer readable instructions 62 to implement the steps of the method for monitoring the illegal pyramid scheme in the first embodiment, such as steps S101 to S104 shown in FIG. 1, and step S1011 described in the embodiment of FIG. Step S1012, steps S1021 to S1023, steps S1031 to S1032, and step S1041 to step S1042 described in the embodiment of FIG. 4 are performed in the embodiment of FIG. 3, or the processor 60 executes the computer readable At the time of instruction 62, the functions of the modules/units in the monitoring device of the illegal pyramid scheme described in the above embodiment 2 are realized, for example, the functions of the modules 51 to 54 shown in FIG.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。It will be apparent to those skilled in the art that, for convenience and brevity of description, only the division of each functional unit and module described above is exemplified. In practical applications, the above functions may be assigned to different functional units as needed. The module is completed by dividing the internal structure of the device into different functional units or modules to perform all or part of the functions described above.
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请 的保护范围之内。The above-mentioned embodiments are only used to explain the technical solutions of the present application, and are not limited thereto; although the present application has been described in detail with reference to the foregoing embodiments, those skilled in the art should understand that they can still implement the foregoing embodiments. The technical solutions described in the examples are modified or equivalently replaced with some of the technical features; and the modifications or substitutions do not deviate from the spirit and scope of the technical solutions of the embodiments of the present application, and should be included in Within the scope of protection of this application.

Claims (20)

  1. 一种非法传销组织的监测方法,其特征在于,所述监测方法包括:A method for monitoring an illegal pyramid scheme, characterized in that the monitoring method comprises:
    根据非法传销组织的关键信息构建特征信息库;Construct a feature information base based on key information of the illegal pyramid scheme;
    获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;Obtaining transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining suspicious entities and corresponding suspicious transaction flow information;
    根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;Generating a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list;
    根据所述可疑案件表对所述可疑传销案例进行监测。The suspicious pyramid scheme is monitored according to the suspicious case list.
  2. 如权利要求1所述的非法传销组织的监测方法,其特征在于,所述根据非法传销组织的关键信息构建特征信息库包括:The method for monitoring an illegal pyramid scheme according to claim 1, wherein the constructing the feature information base according to the key information of the illegal pyramid scheme comprises:
    获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息;Acquiring the body information of the illegal pyramid selling organization, and constructing a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information;
    获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。Acquiring the capital transaction characteristics of the illegal pyramid selling organization, constructing a second feature information table based on the characteristics of the fund transaction, wherein the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule.
  3. 如权利要求2所述的非法传销组织的监测方法,其特征在于,所述获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息包括:The method for monitoring an illegal pyramid scheme according to claim 2, wherein the obtaining the transaction flow information to be monitored, matching the transaction flow information with the feature information database, and obtaining the suspicious subject and its corresponding Suspicious transaction flow information includes:
    获取待监测的交易流水信息;Obtaining transaction flow information to be monitored;
    匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息;Matching the transaction flow information with the first feature information table, acquiring subject information related to the illegal pyramid scheme in the transaction flow information, and transaction flow information of the subject information within a specified time period;
    匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流水信息。Matching the transaction flow information of the subject information in the specified time period and the second feature information table, acquiring the subject information that meets the suspicious transaction rule and the corresponding transaction flow information, as the suspicious subject and the corresponding suspicious transaction thereof Flowing water information.
  4. 如权利要求1至3任一项所述的非法传销组织的监测方法,其特征在于,所述根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中包括:The method for monitoring an illegal pyramid scheme according to any one of claims 1 to 3, wherein the suspicious pyramid scheme is generated according to the suspicious subject and its corresponding suspicious transaction flow information, and the suspicious pyramid scheme is The list of suspicious cases included:
    从所述可疑主体及其对应的可疑流水信息中获取可疑主体的属性信息、账户信息、交易信息,并配置所述可疑主体对应指定时间段的可疑案例编号,以生成可疑传销案例;Obtaining attribute information, account information, and transaction information of the suspicious subject from the suspicious subject and the corresponding suspicious flow information, and configuring the suspicious subject corresponding to the suspicious case number of the specified time period to generate a suspicious pyramid scheme;
    在可疑案件表中关联并存储所述可疑传销案例的属性信息、账户信息、交易信息与所述可疑案例编号。Attribute information, account information, transaction information, and the suspicious case number of the suspicious pyramid scheme are associated and stored in the suspicious case table.
  5. 如权利要求1至3任一项所述的非法传销组织的监测方法,其特征在于,所述根据所述可疑案件表对所述可疑传销案例进行监测包括:The method for monitoring an illegal pyramid scheme according to any one of claims 1 to 3, wherein the monitoring of the suspicious pyramid scheme according to the suspicious case list comprises:
    针对所述可疑案件表中的每一个可疑传销案例,若所述可疑传销案例为已确认的非法传销组织,统计所述可疑传销案例的对公账户或对私账户的交易频率及交易金额;For each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is a confirmed illegal pyramid scheme, the transaction frequency and transaction amount of the suspicious pyramid scheme for the public account or the private account are counted;
    若所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,执行上报操作。If the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, the reporting operation is performed.
  6. 一种非法传销组织的监测装置,其特征在于,所述监测装置包括:A monitoring device for an illegal pyramid scheme, characterized in that the monitoring device comprises:
    构建模块,用于根据非法传销组织的关键信息构建特征信息库;a building module for constructing a feature information base based on key information of an illegal pyramid scheme organization;
    匹配模块,用于获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;a matching module, configured to acquire transaction flow information to be monitored, and match the transaction flow information with the feature information database to obtain suspicious entities and corresponding suspicious transaction flow information;
    生成模块,用于根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;a generating module, configured to generate a suspicious pyramid scheme according to the suspicious entity and its corresponding suspicious transaction flow information, and record the suspicious pyramid scheme into the suspicious case list;
    监测模块,用于根据所述可疑案件表对所述可疑传销案例进行监测。And a monitoring module, configured to monitor the suspicious pyramid scheme according to the suspicious case list.
  7. 如权利要求6所述的非法传销组织的监测装置,其特征在于,所述构建模块包括:The monitoring device of the illegal pyramid scheme according to claim 6, wherein the building module comprises:
    第一构建单元,用于获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息;a first building unit, configured to acquire body information of the illegal pyramid selling organization, and construct a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information thereof;
    第二构建单元,用于获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。a second building unit, configured to acquire a fund transaction characteristic of the illegal pyramid selling organization, and construct a second feature information table based on the fund transaction characteristic, where the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule thereof .
  8. 如权利要求7所述的非法传销组织的监测装置,其特征在于,所述匹配模块包括:The monitoring device of the illegal pyramid scheme according to claim 7, wherein the matching module comprises:
    获取单元,用于获取待监测的交易流水信息;An obtaining unit, configured to obtain transaction flow information to be monitored;
    第一匹配单元,用于匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息;a first matching unit, configured to match the transaction flow information with the first feature information table, obtain body information related to an illegal pyramid scheme in the transaction flow information, and transaction flow of the body information within a specified time period information;
    第二匹配单元,用于匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流水信息。a second matching unit, configured to match the transaction flow information of the subject information in the specified time period and the second feature information table, and obtain the subject information that meets the suspicious transaction rule and the corresponding transaction flow information as suspicious The subject and its corresponding suspicious transaction flow information.
  9. 如权利要求6至8任一项所述的非法传销组织的监测装置,其特征在于,所述生成模块包括:The monitoring device of the illegal pyramid scheme according to any one of claims 6 to 8, wherein the generating module comprises:
    生成单元,用于从所述可疑主体及其对应的可疑流水信息中获取可疑主体的属性信息、账户信息、交易信息,并配置所述可疑主体对应指定时间段的可疑案例编号,以生成可疑传销案例;a generating unit, configured to obtain attribute information, account information, and transaction information of the suspicious subject from the suspicious subject and the corresponding suspicious water information, and configure the suspicious subject corresponding to the suspicious case number of the specified time period to generate a suspicious pyramid scheme Case
    关联单元,用于在可疑案件表中关联并存储所述可疑传销案例的属性信息、账户信息、 交易信息与所述可疑案例编号。And an association unit, configured to associate and store the attribute information, the account information, the transaction information, and the suspicious case number of the suspicious pyramid scheme in the suspicious case table.
  10. 如权利要求6至8任一项所述的非法传销组织的监测装置,其特征在于,所述监测模块包括:The monitoring device of the illegal pyramid scheme according to any one of claims 6 to 8, wherein the monitoring module comprises:
    统计单元,用于针对所述可疑案件表中的每一个可疑传销案例,若所述可疑传销案例为已确认的非法传销组织,统计所述可疑传销案例的对公账户或对私账户的交易频率及交易金额;a statistical unit, configured to: for each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is an confirmed illegal pyramid scheme, the transaction frequency of the suspicious pyramid scheme for the public account or the private account is counted And the transaction amount;
    上报单元,用于若所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,执行上报操作。The reporting unit is configured to perform a reporting operation if the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold.
  11. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:A computer device comprising a memory, a processor, and computer readable instructions stored in the memory and operative on the processor, wherein the processor executes the computer readable instructions as follows step:
    根据非法传销组织的关键信息构建特征信息库;Construct a feature information base based on key information of the illegal pyramid scheme;
    获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;Obtaining transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining suspicious entities and corresponding suspicious transaction flow information;
    根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;Generating a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list;
    根据所述可疑案件表对所述可疑传销案例进行监测。The suspicious pyramid scheme is monitored according to the suspicious case list.
  12. 如权利要求11所述的计算机设备,其特征在于,所述根据非法传销组织的关键信息构建特征信息库包括:The computer device according to claim 11, wherein the constructing the feature information database according to the key information of the illegal pyramid scheme comprises:
    获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息;Acquiring the body information of the illegal pyramid selling organization, and constructing a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information;
    获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。Acquiring the capital transaction characteristics of the illegal pyramid selling organization, constructing a second feature information table based on the characteristics of the fund transaction, wherein the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule.
  13. 如权利要求12所述的计算机设备,其特征在于,所述获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息包括:The computer device according to claim 12, wherein the acquiring the transaction flow information to be monitored, matching the transaction flow information with the feature information database, and obtaining the suspicious entity and the corresponding suspicious transaction flow information include:
    获取待监测的交易流水信息;Obtaining transaction flow information to be monitored;
    匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息;Matching the transaction flow information with the first feature information table, acquiring subject information related to the illegal pyramid scheme in the transaction flow information, and transaction flow information of the subject information within a specified time period;
    匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流 水信息。Matching the transaction flow information of the subject information in the specified time period and the second feature information table, acquiring the subject information that meets the suspicious transaction rule and the corresponding transaction flow information, as the suspicious subject and the corresponding suspicious transaction thereof Flowing water information.
  14. 如权利要求11至13任一项所述的计算机设备,其特征在于,所述根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中包括:The computer device according to any one of claims 11 to 13, wherein the suspicious pyramid scheme is generated according to the suspicious entity and its corresponding suspicious transaction flow information, and the suspicious pyramid scheme is entered into the suspicious case list. Includes:
    从所述可疑主体及其对应的可疑流水信息中获取可疑主体的属性信息、账户信息、交易信息,并配置所述可疑主体对应指定时间段的可疑案例编号,以生成可疑传销案例;Obtaining attribute information, account information, and transaction information of the suspicious subject from the suspicious subject and the corresponding suspicious flow information, and configuring the suspicious subject corresponding to the suspicious case number of the specified time period to generate a suspicious pyramid scheme;
    在可疑案件表中关联并存储所述可疑传销案例的属性信息、账户信息、交易信息与所述可疑案例编号。Attribute information, account information, transaction information, and the suspicious case number of the suspicious pyramid scheme are associated and stored in the suspicious case table.
  15. 如权利要求11至13任一项所述的计算机设备,其特征在于,所述根据所述可疑案件表对所述可疑传销案例进行监测包括:The computer device according to any one of claims 11 to 13, wherein the monitoring of the suspicious pyramid scheme according to the suspicious case list comprises:
    针对所述可疑案件表中的每一个可疑传销案例,若所述可疑传销案例为已确认的非法传销组织,统计所述可疑传销案例的对公账户或对私账户的交易频率及交易金额;For each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is a confirmed illegal pyramid scheme, the transaction frequency and transaction amount of the suspicious pyramid scheme for the public account or the private account are counted;
    若所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,执行上报操作。If the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, the reporting operation is performed.
  16. 一个或多个存储有计算机可读指令的非易失性可读存储介质,其特征在于,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:One or more non-transitory readable storage mediums storing computer readable instructions, wherein when the computer readable instructions are executed by one or more processors, cause the one or more processors to execute The following steps:
    根据非法传销组织的关键信息构建特征信息库;Construct a feature information base based on key information of the illegal pyramid scheme;
    获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息;Obtaining transaction flow information to be monitored, matching the transaction flow information with the characteristic information database, and obtaining suspicious entities and corresponding suspicious transaction flow information;
    根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中;Generating a suspicious pyramid scheme based on the suspicious entity and its corresponding suspicious transaction flow information, and recording the suspicious pyramid scheme into the suspicious case list;
    根据所述可疑案件表对所述可疑传销案例进行监测。The suspicious pyramid scheme is monitored according to the suspicious case list.
  17. 如权利要求16所述的非易失性可读存储介质,其特征在于,所述根据非法传销组织的关键信息构建特征信息库包括:The non-volatile readable storage medium according to claim 16, wherein the constructing the feature information base according to the key information of the illegal pyramid scheme comprises:
    获取所述非法传销组织的主体信息,基于所述主体信息构建第一特征信息表,所述第一特征信息表中包括非法传销组织名称及其对应的主体信息;Acquiring the body information of the illegal pyramid selling organization, and constructing a first feature information table based on the body information, where the first feature information table includes an illegal pyramid selling organization name and corresponding body information;
    获取所述非法传销组织的资金交易特点,基于所述资金交易特点构建第二特征信息表,所述第二特征信息表中包括传销关键词及其对应的可疑交易规则。Acquiring the capital transaction characteristics of the illegal pyramid selling organization, constructing a second feature information table based on the characteristics of the fund transaction, wherein the second feature information table includes a pyramid selling keyword and a corresponding suspicious transaction rule.
  18. 如权利要求17所述的非易失性可读存储介质,其特征在于,所述获取待监测的交易流水信息,将所述交易流水信息和所述特征信息库进行匹配,获取可疑主体及其对应的可疑交易流水信息包括:The non-volatile readable storage medium according to claim 17, wherein the obtaining transaction flow information to be monitored, matching the transaction flow information with the feature information library, and obtaining a suspicious entity and The corresponding suspicious transaction flow information includes:
    获取待监测的交易流水信息;Obtaining transaction flow information to be monitored;
    匹配所述交易流水信息与所述第一特征信息表,获取所述交易流水信息中与非法传销组织相关的主体信息以及所述主体信息在指定时间段内的交易流水信息;Matching the transaction flow information with the first feature information table, acquiring subject information related to the illegal pyramid scheme in the transaction flow information, and transaction flow information of the subject information within a specified time period;
    匹配所述主体信息在指定时间段内的交易流水信息与所述第二特征信息表,获取符合所述可疑交易规则的主体信息及其对应的交易流水信息,作为可疑主体及其对应的可疑交易流水信息。Matching the transaction flow information of the subject information in the specified time period and the second feature information table, acquiring the subject information that meets the suspicious transaction rule and the corresponding transaction flow information, as the suspicious subject and the corresponding suspicious transaction thereof Flowing water information.
  19. 如权利要求16至18任一项所述的非易失性可读存储介质,其特征在于,所述根据所述可疑主体及其对应的可疑交易流水信息生成可疑传销案例,并将所述可疑传销案例录入可疑案件表中包括:The non-volatile readable storage medium according to any one of claims 16 to 18, wherein said generating a suspicious pyramid scheme based on said suspicious subject and its corresponding suspicious transaction flow information, and said suspicious The MLM case entry into the suspicious case list includes:
    从所述可疑主体及其对应的可疑流水信息中获取可疑主体的属性信息、账户信息、交易信息,并配置所述可疑主体对应指定时间段的可疑案例编号,以生成可疑传销案例;Obtaining attribute information, account information, and transaction information of the suspicious subject from the suspicious subject and the corresponding suspicious flow information, and configuring the suspicious subject corresponding to the suspicious case number of the specified time period to generate a suspicious pyramid scheme;
    在可疑案件表中关联并存储所述可疑传销案例的属性信息、账户信息、交易信息与所述可疑案例编号。Attribute information, account information, transaction information, and the suspicious case number of the suspicious pyramid scheme are associated and stored in the suspicious case table.
  20. 如权利要求16至18任一项所述的非易失性可读存储介质,其特征在于,所述根据所述可疑案件表对所述可疑传销案例进行监测包括:The non-volatile readable storage medium according to any one of claims 16 to 18, wherein the monitoring of the suspicious pyramid scheme according to the suspicious case list comprises:
    针对所述可疑案件表中的每一个可疑传销案例,若所述可疑传销案例为已确认的非法传销组织,统计所述可疑传销案例的对公账户或对私账户的交易频率及交易金额;For each suspicious pyramid scheme in the suspicious case list, if the suspicious pyramid scheme is a confirmed illegal pyramid scheme, the transaction frequency and transaction amount of the suspicious pyramid scheme for the public account or the private account are counted;
    若所述交易频率大于或等于第一阈值且交易金额大于或等于第二阈值时,执行上报操作。If the transaction frequency is greater than or equal to the first threshold and the transaction amount is greater than or equal to the second threshold, the reporting operation is performed.
PCT/CN2018/081514 2018-02-27 2018-04-02 Illegal pyramid scheme organization monitoring method and apparatus, computer device and storage medium WO2019165670A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810161840.4 2018-02-27
CN201810161840.4A CN108446979A (en) 2018-02-27 2018-02-27 Monitoring method, device, computer equipment and the storage medium of pyramid schemes tissue

Publications (1)

Publication Number Publication Date
WO2019165670A1 true WO2019165670A1 (en) 2019-09-06

Family

ID=63192520

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/081514 WO2019165670A1 (en) 2018-02-27 2018-04-02 Illegal pyramid scheme organization monitoring method and apparatus, computer device and storage medium

Country Status (2)

Country Link
CN (1) CN108446979A (en)
WO (1) WO2019165670A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321582B (en) * 2019-03-22 2023-05-26 贵阳博烁科技有限公司 Method and device for analyzing marketing activity

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714479A (en) * 2012-10-09 2014-04-09 四川欧润特软件科技有限公司 Intelligent centralized monitor method and system for bank personal business fraudulent conducts
CN104867055A (en) * 2015-06-16 2015-08-26 咸宁市公安局 Financial network doubtable money tracking and identifying method
CN106547838A (en) * 2016-10-14 2017-03-29 北京银丰新融科技开发有限公司 Method based on the suspicious funds transaction of fund network monitor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714479A (en) * 2012-10-09 2014-04-09 四川欧润特软件科技有限公司 Intelligent centralized monitor method and system for bank personal business fraudulent conducts
CN104867055A (en) * 2015-06-16 2015-08-26 咸宁市公安局 Financial network doubtable money tracking and identifying method
CN106547838A (en) * 2016-10-14 2017-03-29 北京银丰新融科技开发有限公司 Method based on the suspicious funds transaction of fund network monitor

Also Published As

Publication number Publication date
CN108446979A (en) 2018-08-24

Similar Documents

Publication Publication Date Title
Canhoto Leveraging machine learning in the global fight against money laundering and terrorism financing: An affordances perspective
Harrell et al. Victims of identity theft, 2012
Moore et al. Revisiting the risks of bitcoin currency exchange closure
Ali The regulatory and supervision framework of Microfinance in Kenya
KR20180060044A (en) Security System for Cloud Computing Service
KR20180060005A (en) Security System for Cloud Computing Service
CN109598425A (en) The method, device and equipment that a kind of pair of risk subjects are managed
Morris et al. A new approach to regulating private equity
Sp et al. Study Of Literature Financial Technology, Blockchain And Islamic Finance
Kaur et al. Fin Tech Companies in India: A Study of Growth Analysis
Muslih et al. Financial technology: digital legal challenges and Indonesia's economic prospects after Covid-19 outbreak
OKO Electronic fraud and financial performance of quoted commercial banks in Nigeria
WO2019165670A1 (en) Illegal pyramid scheme organization monitoring method and apparatus, computer device and storage medium
CN115879548B (en) Knowledge graph construction method and system for customer identity recognition
Zhang et al. Plus Token and investor searching behaviour–A cryptocurrency Ponzi scheme
Davis et al. Estimating JP Morgan Chase's profits from the Madoff deposits
Kikan et al. Predictive analytics adoption by banking and financial services: The future perspective
Bandyopadhyay Quantifying soft information, mortgage market efficiency & asset pricing implications
Somanchi et al. Impact of security events and fraudulent transactions on customer loyalty: A field study
Hidajat Pandemic, Lender Risk and Borrower Bargaining Power
Vousinas The critical role of internal audit in addressing bank fraud: A conceptual framework and critical review of the literature with future extensions
Jones Fraud risk management and corporate performance of Deposit Money Banks (DMBs) in Nigeria
US20240037463A1 (en) Decentralized Dynamic Policy Learning and Implementation System
Telang et al. Security, Fraudulent transactions and Customer Loyalty: A Field Study
Saragih et al. EFFORTS TO COMBAT MONEY LAUNDERING (RESEARCH STUDY OF MEDAN POLRESTABES)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18907958

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 02/12/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18907958

Country of ref document: EP

Kind code of ref document: A1