WO2021218312A1 - Method and apparatus for constructing service fraud identification database, and computer device - Google Patents

Method and apparatus for constructing service fraud identification database, and computer device Download PDF

Info

Publication number
WO2021218312A1
WO2021218312A1 PCT/CN2021/077419 CN2021077419W WO2021218312A1 WO 2021218312 A1 WO2021218312 A1 WO 2021218312A1 CN 2021077419 W CN2021077419 W CN 2021077419W WO 2021218312 A1 WO2021218312 A1 WO 2021218312A1
Authority
WO
WIPO (PCT)
Prior art keywords
business
information
event information
business fraud
fraud
Prior art date
Application number
PCT/CN2021/077419
Other languages
French (fr)
Chinese (zh)
Inventor
黄丽芝
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021218312A1 publication Critical patent/WO2021218312A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/906Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/907Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Definitions

  • a device for constructing a business fraud identification database includes: an information collection module for collecting business fraud event information; the business fraud event information carries user identification; an information extraction module for acquiring the business fraud The key information identifier of the event information, according to the key information identifier, extracts the corresponding key information from the business fraud event information; the information determination module is used for feature extraction of the key information to obtain the business Characteristic information of fraud event information; a characteristic label determining module for acquiring the characteristic code of the characteristic information, and determining the characteristic label of the business fraud event information according to the characteristic code of the characteristic information; a behavior label determining module for According to the feature tag of the business fraud event information, query the correspondence between the preset feature tag and the business fraud behavior tag, and determine the business fraud behavior tag of the business fraud event information; the database building module is used to determine the business fraud behavior tag of the business fraud event information; The user identification and the business fraud behavior label of the event information construct a business fraud identification database.
  • Fig. 1 is a schematic flowchart of a method for constructing a business fraud identification database in an embodiment.
  • Fig. 2 is a schematic flowchart of the steps of sending a business fraud identification result to a terminal in an embodiment.
  • the server obtains a preset feature information extraction instruction, performs feature extraction on key information according to the preset feature information extraction instruction, and obtains feature information of business fraud event information; wherein, the preset feature information extraction instruction is a kind of Capable of extracting instructions for characteristic information corresponding to key information.
  • the preset feature information extraction instruction is a kind of Capable of extracting instructions for characteristic information corresponding to key information.
  • the server may also input key information into a pre-trained feature extraction network (such as a convolutional neural network), and perform feature extraction on the key information through the pre-trained feature extraction network to obtain feature information of business fraud event information.
  • a pre-trained feature extraction network such as a convolutional neural network
  • the server can also obtain the correspondence between the preset key information and the characteristic information; query the correspondence between the preset key information and the characteristic information, determine the characteristic information corresponding to the key information, and use it as the characteristic information of the business fraud event information;
  • the server pre-builds the correspondence between the key information and characteristic information of the business fraud event information as the correspondence between the preset key information and the characteristic information; queries the preset key information and characteristic information according to the key information of the business fraud event information Correspondence, determine the characteristic information of business fraud event information.
  • Step S104 Obtain the feature code of the feature information, and determine the feature tag of the business fraud event information according to the feature code of the feature information.
  • the server can also obtain the feature information of the preset feature tag, and match the feature information of the business fraud event information with the feature information of the preset feature tag. If the feature information of the event information is successfully matched with the feature information of the preset feature tag, the preset feature tag is identified as the feature tag of the business fraud event information.
  • Step S106 Construct a business fraud identification database according to the user identification and business fraud behavior label of the business fraud event information.
  • the server collects business event information on the network based on big data technology; extracts the information content in the business event information, queries the preset correspondence relationship between the information content and the information type according to the information content, and determines the information type corresponding to the information content , As the information type of the business event information; match the information type of the business event information with the preset information type, if the matching is successful, the business event information is identified as business fraud event information; referring to this method, you can select from multiple The business fraud event information is filtered out from the business event information.
  • the server inputs the feature code of the feature information into the pre-trained feature classification model, and performs a series of neural network processing on the feature code of the feature information through the pre-trained feature classification model, such as convolution, pooling, full connection, etc., to obtain The classification code of the feature information under each preset feature label; normalize the classification code of the feature information under each preset feature label to obtain the classification probability of the feature information under each preset feature label; maximize the classification probability
  • the preset feature tag of is used as the feature tag of business fraud event information.
  • the query result is used to indicate whether a business fraud behavior label corresponding to the user ID is stored in the business fraud identification database.
  • Step S203 Determine the business fraud identification result of the user to be identified according to the query result.
  • the query result is that the business fraud identification database stores a business fraud label corresponding to the user ID, it indicates that the user to be identified is a business fraud user, and there is a business fraud; if the query result is that there is no business fraud identification database with the user Identifies the corresponding business fraud label, indicating that the user to be identified is a normal user and there is no business fraud.
  • the server After confirming that the user to be identified is a business fraud user, the server queries the correspondence between the preset business fraud label and the warning information, determines the warning information corresponding to the business fraud label identified by the user, and recognizes the business fraud The result is sent to the terminal together with the warning information, which is convenient to remind the querying user corresponding to the terminal; for example, the user is a high-risk fraud user, please be careful.
  • Step S301 Collect multiple business event information; identify the information content of the business event information, and determine the information type of the business event information according to the information content; filter out the business event information whose information type matches the preset information type from the multiple business event information , As the business fraud event information, upload the business fraud event information to the blockchain.
  • the business fraud identification database that stores the business fraud identification tags corresponding to multiple user identities can be queried, which can quickly determine whether the user to be identified is a business fraud user, thereby simplifying the business.
  • the fraud identification process saves a lot of time and further improves the efficiency of business fraud identification.
  • FIG. 5 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • the specific computer device may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
  • the processor further implements the following steps when executing the computer program: input the feature code of the feature information into the pre-trained feature classification model to obtain the classification probability of the feature information under each preset feature label;
  • the preset feature tag is used as the feature tag of the business fraud event information.
  • the processor further implements the following steps when executing the computer program: acquiring the early warning information corresponding to the business fraud behavior label; and sending the business fraud identification result and the early warning information to the terminal.
  • the following steps are further implemented: store the business fraud behavior label of the business fraud event information in a preset database according to the user identification of the business fraud event information; and identify the preset database as Business fraud identification database.
  • the following steps are further implemented: if the business fraud identification database is queried and stored in the business fraud identification database, the business fraud behavior tag corresponding to the user identification is confirmed, then the user to be identified is confirmed as a business fraud user.
  • the blockchain referred to in this application is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Computational Linguistics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Library & Information Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present application relates to the technical field of data processing, and can be applied to a smart security protection scenario. Provided is a method for constructing a service fraud identification database. The method comprises: collecting service fraud event information, wherein the service fraud event information carries a user identifier; acquiring a key information identifier of service fraud information, and according to the key information identifier, extracting corresponding key information from the service fraud event information; performing feature extraction on the key information to obtain feature information of the service fraud event information; acquiring a feature code of the feature information, and determining a feature label of the service fraud event information according to the feature code of the feature information; querying the correlation between a preset feature label and a service fraud behavior label, and determining a service fraud behavior label of the service fraud event information; and constructing a service fraud identification database according to the user identifier and the service fraud behavior label. The present method is based on data processing technology, and improves the efficiency of identifying a service fraud behavior.

Description

业务欺诈识别数据库的构建方法、装置和计算机设备Method, device and computer equipment for constructing business fraud identification database
本申请要求于2020年4月27日提交中国专利局、申请号为202010344725.8,发明名称为“业务欺诈识别数据库的构建方法、装置和计算机设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on April 27, 2020, the application number is 202010344725.8, and the invention title is "Method, Apparatus, and Computer Equipment for Building a Business Fraud Recognition Database", the entire content of which is incorporated by reference Incorporated in this application.
技术领域Technical field
本申请涉及数据处理技术领域,特别是涉及一种业务欺诈识别数据库的构建方法、装置、计算机设备和存储介质。This application relates to the field of data processing technology, and in particular to a method, device, computer equipment and storage medium for constructing a business fraud identification database.
背景技术Background technique
随着社会的发展,办理业务(如保险)的人越来越多,业务欺诈行为也随之增多,为了对业务欺诈行为进行识别,可以构建一种用于识别业务欺诈行为的数据库。With the development of society, there are more and more people handling business (such as insurance), and business fraud is also increasing. In order to identify business fraud, a database for identifying business fraud can be constructed.
发明人发现,目前,用于识别业务欺诈行为的数据库的构建方法,一般是通过服务器获取人工收集的大量数据,比如用户的线上资料和线下调查结果等,并对大量数据进行计算分析,以得到用户的业务欺诈行为识别结果,并根据用户的业务欺诈行为识别结果构建用于识别业务欺诈行为的数据库。但是,发明人意识到,服务器的资源有限,若在构建数据库的过程中,针对每个用户,都需要对人工收集的大量数据进行分析识别,会耗费大量时间,从而造成业务欺诈行为的识别效率较低。The inventor found that, currently, the method of constructing a database for identifying business frauds is generally to obtain a large amount of manually collected data through a server, such as users' online information and offline survey results, etc., and perform calculation and analysis on the large amount of data. In order to obtain the user's business fraud identification result, and build a database for identifying business fraud according to the user's business fraud identification result. However, the inventor realizes that the resources of the server are limited. If in the process of constructing the database, it is necessary to analyze and identify a large amount of manually collected data for each user, which will consume a lot of time, resulting in the efficiency of identifying business fraud. Lower.
技术问题technical problem
基于此,有必要针对上述技术问题,提供一种能够提高业务欺诈行为的识别效率的业务欺诈识别数据库的构建方法、装置、计算机设备和存储介质。Based on this, it is necessary to provide a method, device, computer equipment, and storage medium for constructing a business fraud identification database that can improve the efficiency of business fraud identification in response to the above technical problems.
技术解决方案Technical solutions
一种业务欺诈识别数据库的构建方法,所述方法包括:采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。A method for constructing a business fraud identification database, the method comprising: collecting business fraud event information; the business fraud event information carries a user identification; acquiring the key information identifier of the business fraud event information, and according to the key The information identifier extracts the corresponding key information from the business fraud event information; extracts the features of the key information to obtain the feature information of the business fraud event information; obtains the feature code of the feature information, according to the The feature code of the feature information is used to determine the feature tag of the business fraud event information; according to the feature tag of the business fraud event information, the correspondence between the preset feature tag and the business fraud behavior tag is inquired to determine the business fraud event The business fraud behavior label of the information; according to the user identification of the business fraud event information and the business fraud behavior label, a business fraud identification database is constructed.
一种业务欺诈识别数据库的构建装置,所述装置包括:信息采集模块,用于采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;信息提取模块,用于获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;信息确定模块,用于对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;特征标签确定模块,用于获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;行为标签确定模块,用于根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;数据库构建模块,用于根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。A device for constructing a business fraud identification database. The device includes: an information collection module for collecting business fraud event information; the business fraud event information carries user identification; an information extraction module for acquiring the business fraud The key information identifier of the event information, according to the key information identifier, extracts the corresponding key information from the business fraud event information; the information determination module is used for feature extraction of the key information to obtain the business Characteristic information of fraud event information; a characteristic label determining module for acquiring the characteristic code of the characteristic information, and determining the characteristic label of the business fraud event information according to the characteristic code of the characteristic information; a behavior label determining module for According to the feature tag of the business fraud event information, query the correspondence between the preset feature tag and the business fraud behavior tag, and determine the business fraud behavior tag of the business fraud event information; the database building module is used to determine the business fraud behavior tag of the business fraud event information; The user identification and the business fraud behavior label of the event information construct a business fraud identification database.
一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时实现以下步骤:采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。A computer device includes a memory and a processor, the memory stores a computer program, and the processor implements the following steps when executing the computer program: collecting business fraud event information; the business fraud event information carries a user identification Obtain the key information identifier of the business fraud event information, and extract the corresponding key information from the business fraud event information according to the key information identifier; perform feature extraction on the key information to obtain the business The characteristic information of the fraud event information; obtain the characteristic code of the characteristic information, and determine the characteristic label of the business fraud event information according to the characteristic code of the characteristic information; query the preset according to the characteristic label of the business fraud event information The corresponding relationship between the feature label and the business fraud label to determine the business fraud label of the business fraud event information; construct a business fraud identification database according to the user identification of the business fraud event information and the business fraud label .
一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现以下步骤:采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。A computer-readable storage medium, on which a computer program is stored, when the computer program is executed by a processor, the following steps are implemented: collecting business fraud event information; the business fraud event information carries a user identification; acquiring the business The key information identifier of the fraud event information, according to the key information identifier, extract the corresponding key information from the business fraud event information; perform feature extraction on the key information to obtain the feature of the business fraud event information Information; obtain the feature code of the feature information, determine the feature label of the business fraud event information according to the feature code of the feature information; query the preset feature label and business according to the feature label of the business fraud event information Correspondence of the fraudulent behavior label, determine the business fraud behavior label of the business fraud event information; construct a business fraud identification database according to the user identification of the business fraud event information and the business fraud behavior label.
有益效果Beneficial effect
本申请无需对人工收集的大量数据进行分析识别,简化了业务欺诈行为识别流程,进一步提高了业务欺诈行为的识别效率。This application does not need to analyze and identify a large amount of manually collected data, simplifies the business fraud identification process, and further improves the identification efficiency of business fraud.
附图说明Description of the drawings
图1为一个实施例中业务欺诈识别数据库的构建方法的流程示意图。Fig. 1 is a schematic flowchart of a method for constructing a business fraud identification database in an embodiment.
图2为一个实施例中将业务欺诈行为识别结果发送至终端的步骤的流程示意图。Fig. 2 is a schematic flowchart of the steps of sending a business fraud identification result to a terminal in an embodiment.
图3为一个实施例中业务欺诈行为识别方法的流程示意图。Fig. 3 is a schematic flowchart of a method for identifying business fraud in an embodiment.
图4为一个实施例中业务欺诈识别数据库的构建装置的结构框图。Fig. 4 is a structural block diagram of an apparatus for constructing a business fraud identification database in an embodiment.
图5为一个实施例中计算机设备的内部结构图。Fig. 5 is an internal structure diagram of a computer device in an embodiment.
本发明的实施方式Embodiments of the present invention
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solutions, and advantages of this application clearer and clearer, the following further describes the application in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, and are not used to limit the present application.
本申请的技术方案涉及人工智能和/或大数据技术领域,如可应用于智慧安防如信息监控等场景中,以推动智慧城市的建设。可选的,本申请涉及的数据如业务欺诈事件信息、特征标签和/或行为标签等可存储于数据库中,或者可以存储于区块链中,比如通过区块链分布式存储,本申请不做限定。The technical solution of this application relates to the field of artificial intelligence and/or big data technology, and can be applied to scenarios such as smart security such as information monitoring to promote the construction of smart cities. Optionally, the data involved in this application, such as business fraud event information, feature tags, and/or behavior tags, can be stored in a database, or can be stored in a blockchain, such as distributed storage through a blockchain, this application does not Make a limit.
在一个实施例中,如图1所示,提供了一种业务欺诈识别数据库的构建方法,本实施例以该方法应用于服务器进行举例说明,可以理解的是,该方法也可以应用于终端,还可以应用于包括终端和服务器的系统,并通过终端和服务器的交互实现。本实施例中,该方法包括以下步骤。In one embodiment, as shown in FIG. 1, a method for constructing a business fraud identification database is provided. This embodiment uses the method applied to a server for illustration. It is understandable that the method can also be applied to a terminal. It can also be applied to a system including a terminal and a server, and is realized through the interaction between the terminal and the server. In this embodiment, the method includes the following steps.
步骤S101,采集业务欺诈事件信息;业务欺诈事件信息中携带有用户标识。Step S101: Collect business fraud event information; the business fraud event information carries a user identifier.
在本步骤中,业务欺诈事件信息是指存在金融业务欺诈行为的事件信息,比如贷款欺诈事件信息、保险欺诈事件信息等,具体可以是故意出险事件信息、重复投保事件信息、伪造证据事件信息、重复索赔事件信息、保险倒签单事件信息、贷款逾期事件信息等。用户标识是指用于标识业务欺诈事件信息所对应的用户信息,比如姓名、身份证号码等。In this step, the business fraud event information refers to the event information of financial business fraud, such as loan fraud event information, insurance fraud event information, etc., specifically it can be intentional risk event information, repeated insurance coverage event information, forged evidence event information, Repeat claim event information, insurance backlog event information, loan overdue event information, etc. User identification refers to user information that is used to identify business fraud event information, such as name, ID number, etc.
具体地,服务器基于大数据技术,采集网络上的业务事件信息;识别业务事件信息的信息类型,从采集的业务事件信息中,筛选出信息类型与业务欺诈事件信息的信息类型匹配的业务事件信息,作为业务欺诈事件信息;比如筛选出信息类型与保险欺诈事件信息匹配的业务事件信息,作为业务欺诈事件信息;并对业务欺诈事件信息进行识别,得到业务欺诈事件信息对应的用户标识。Specifically, the server collects business event information on the network based on big data technology; identifies the information type of the business event information, and filters out the business event information whose information type matches the information type of the business fraud event information from the collected business event information , As business fraud event information; for example, filter out business event information whose information type matches insurance fraud event information, and use it as business fraud event information; identify the business fraud event information to obtain the user ID corresponding to the business fraud event information.
进一步地,服务器还可以获取预设的数据预处理指令,根据预设的数据预处理指令,对采集的业务欺诈事件信息进行数据预处理,比如数据清洗、数据标准化处理等,得到数据预处理后的业务欺诈事件信息。Further, the server can also obtain preset data preprocessing instructions, and perform data preprocessing on the collected business fraud event information according to the preset data preprocessing instructions, such as data cleaning, data standardization processing, etc., after data preprocessing is obtained Information about business fraud incidents.
步骤S102,获取业务欺诈事件信息的关键信息标识符,根据关键信息标识符,从业务欺诈事件信息中提取出对应的关键信息。Step S102: Obtain the key information identifier of the business fraud event information, and extract the corresponding key information from the business fraud event information according to the key information identifier.
在本步骤中,关键信息是指业务欺诈事件信息中的业务信息,比如业务欺诈事件信息为保险欺诈事件信息,那么关键信息为保险欺诈事件信息中的保险业务信息。关键信息标识符用于标识业务欺诈事件信息中的关键信息,是一种能够自动识别业务欺诈事件信息中的关键信息的标识符。In this step, the key information refers to the business information in the business fraud event information. For example, the business fraud event information is insurance fraud event information, and the key information is insurance business information in the insurance fraud event information. The key information identifier is used to identify the key information in the business fraud event information, and is an identifier that can automatically identify the key information in the business fraud event information.
具体地,服务器预先获取业务欺诈事件信息的关键信息标识符,从业务欺诈事件信息中提取出与该关键信息标识符对应的信息,作为业务欺诈事件信息中的关键信息。这样,有利于提取业务欺诈事件信息中的关键信息,避免多余信息干扰,进一步简化了业务欺诈行为识别流程,从而提高了业务欺诈行为的识别效率。Specifically, the server obtains the key information identifier of the business fraud event information in advance, and extracts information corresponding to the key information identifier from the business fraud event information as the key information in the business fraud event information. In this way, it is beneficial to extract the key information in the business fraud event information, avoid unnecessary information interference, and further simplify the business fraud identification process, thereby improving the identification efficiency of business fraud.
步骤S103,对关键信息进行特征提取,得到业务欺诈事件信息的特征信息。Step S103: Perform feature extraction on key information to obtain feature information of business fraud event information.
在本步骤中,特征信息是指业务欺诈事件信息对应的用户的欺诈行为特征信息,不同关键信息,对应的业务欺诈事件信息的特征信息不一样,比如先发生事故,再投保的行为特征信息、让其亲友或其他相关人员冒充就诊的行为特征信息等。In this step, the characteristic information refers to the user's fraud behavior characteristic information corresponding to the business fraud event information. Different key information has different characteristic information corresponding to the business fraud event information. Let their relatives, friends or other relevant personnel pretend to be information on the behavioral characteristics of medical treatment, etc.
具体地,服务器获取预设的特征信息提取指令,根据预设的特征信息提取指令,对关键信息进行特征提取,得到业务欺诈事件信息的特征信息;其中,预设的特征信息提取指令是一种能够提取关键信息对应的特征信息的指令。这样,通过确定业务欺诈事件信息的特征信息,有利于后续根据业务欺诈事件信息的特征信息,确定业务欺诈事件信息的特征标签,进而确定业务欺诈事件信息所对应的用户的业务欺诈行为标签。Specifically, the server obtains a preset feature information extraction instruction, performs feature extraction on key information according to the preset feature information extraction instruction, and obtains feature information of business fraud event information; wherein, the preset feature information extraction instruction is a kind of Capable of extracting instructions for characteristic information corresponding to key information. In this way, by determining the characteristic information of the business fraud event information, it is beneficial to subsequently determine the characteristic label of the business fraud event information based on the characteristic information of the business fraud event information, and then determine the business fraud behavior label of the user corresponding to the business fraud event information.
在一个实施例中,服务器还可以将关键信息输入预先训练的特征提取网络(如卷积神经网络),通过预先训练的特征提取网络对关键信息进行特征提取,得到业务欺诈事件信息的特征信息。In an embodiment, the server may also input key information into a pre-trained feature extraction network (such as a convolutional neural network), and perform feature extraction on the key information through the pre-trained feature extraction network to obtain feature information of business fraud event information.
在一个实施例中,服务器还可以基于信息识别技术,识别关键信息中的特征信息,并将该特征信息作为业务欺诈事件信息的特征信息;便于后续根据业务欺诈事件信息的特征信息,确定业务欺诈事件信息的特征标签。In one embodiment, the server can also identify the characteristic information in the key information based on the information recognition technology, and use the characteristic information as the characteristic information of the business fraud event information; it is convenient to subsequently determine the business fraud based on the characteristic information of the business fraud event information The feature label of the event information.
进一步地,服务器还可以获取预设的关键信息与特征信息的对应关系;查询预设的关键信息与特征信息的对应关系,确定关键信息对应的特征信息,作为业务欺诈事件信息的特征信息;具体地,服务器预先构建业务欺诈事件信息的关键信息与特征信息的对应关系,作为预设的关键信息与特征信息的对应关系;根据业务欺诈事件信息的关键信息查询预设的关键信息与特征信息的对应关系,确定业务欺诈事件信息的特征信息。Further, the server can also obtain the correspondence between the preset key information and the characteristic information; query the correspondence between the preset key information and the characteristic information, determine the characteristic information corresponding to the key information, and use it as the characteristic information of the business fraud event information; The server pre-builds the correspondence between the key information and characteristic information of the business fraud event information as the correspondence between the preset key information and the characteristic information; queries the preset key information and characteristic information according to the key information of the business fraud event information Correspondence, determine the characteristic information of business fraud event information.
步骤S104,获取特征信息的特征编码,根据特征信息的特征编码,确定业务欺诈事件信息的特征标签。Step S104: Obtain the feature code of the feature information, and determine the feature tag of the business fraud event information according to the feature code of the feature information.
在本步骤中,特征信息的特征编码是指经过压缩编码后的用于表示特征信息的低层语义的低维度特征向量,可以通过预先训练的特征嵌入网络模型学习得到。特征标签用于标识业务欺诈事件信息对应的用户的欺诈行为特征信息,比如故意出险、重复投保、伪造证据、重复索赔、保险倒签单、贷款逾期等。In this step, the feature encoding of feature information refers to a low-dimensional feature vector used to represent low-level semantics of feature information after compression encoding, which can be learned through a pre-trained feature embedding network model. The feature tag is used to identify the user's fraudulent behavior feature information corresponding to the business fraud event information, such as deliberate insurance, repeated insurance, forged evidence, repeated claims, insurance backlog, loan overdue, etc.
具体地,服务器获取预设的特征编码指令,根据预设的特征编码指令对特征信息进行编码处理,得到特征信息的特征编码;对特征信息的特征编码进行全连接处理,得到特征信息属于各个预设特征标签的概率,将概率最大的预设特征标签作为业务欺诈事件信息的特征标签。其中,预设的特征编码指令是一种能够对信息进行编码处理的指令。Specifically, the server obtains the preset feature encoding instruction, performs encoding processing on the feature information according to the preset feature encoding instruction, and obtains the feature code of the feature information; performs full connection processing on the feature code of the feature information, and obtains that the feature information belongs to each preset. Set the probability of the feature tag, and use the preset feature tag with the highest probability as the feature tag of the business fraud event information. Among them, the preset feature encoding instruction is an instruction capable of encoding information.
进一步地,在确定业务欺诈事件信息的特征标签的过程中,服务器还可以获取预设特征标签的特征信息,将业务欺诈事件信息的特征信息与预设特征标签的特征信息进行匹配,若业务欺诈事件信息的特征信息与预设特征标签的特征信息匹配成功,则将该预设特征标签识别为业务欺诈事件信息的特征标签。Further, in the process of determining the feature label of the business fraud event information, the server can also obtain the feature information of the preset feature tag, and match the feature information of the business fraud event information with the feature information of the preset feature tag. If the feature information of the event information is successfully matched with the feature information of the preset feature tag, the preset feature tag is identified as the feature tag of the business fraud event information.
举例说明,若业务欺诈事件信息的特征信息与预设特征标签“重复投保”对应的特征信息匹配成功,则将“重复投保”识别为业务欺诈事件信息的特征标签。For example, if the feature information of the business fraud event information matches the feature information corresponding to the preset feature tag "repetitive insurance", then the "duplicate insurance" is identified as the feature tag of the business fraud event information.
步骤S105,根据业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定业务欺诈事件信息的业务欺诈行为标签。Step S105, according to the characteristic label of the business fraud event information, query the correspondence between the preset characteristic label and the business fraud behavior label, and determine the business fraud behavior label of the business fraud event information.
在本步骤中,业务欺诈行为标签用于标识用户的业务欺诈行为,可以是欺诈风险标签、恶意行为标签、信用风险标签、外部名单标签等;不同的特征标签,对应的业务欺诈行为标签不一样;比如倒签单、组团骗贷、扩大损失、未定损起诉等属于欺诈风险标签;恶意购房、恶意购房、无证驾驶等属于恶意行为标签;贷款违约、贷款长期拖欠等属于信用风险标签;公安部危险分子名单、经济案件涉诉人等属于外部名单标签。In this step, the business fraud label is used to identify the user’s business fraud, which can be a fraud risk label, a malicious behavior label, a credit risk label, an external list label, etc.; different feature labels have different corresponding business fraud labels ; For example, inverted bills, group fraudulent loans, expanded losses, and undetermined loss prosecution are fraud risk labels; malicious house purchases, malicious house purchases, driving without a license are malicious behavior labels; loan defaults and long-term loan defaults are credit risk labels; Ministry of Public Security The list of dangerous elements and the persons involved in economic cases belong to external list labels.
具体地,服务器获取预设的特征标签与业务欺诈行为标签的对应关系,根据业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定与该特征标签对应的业务欺诈行为标签,作为业务欺诈事件信息的业务欺诈行为标签。Specifically, the server obtains the correspondence between the preset feature label and the business fraud activity label, and according to the feature label of the business fraud event information, queries the correspondence between the preset feature label and the business fraud activity label, and determines the corresponding relationship with the characteristic label. The business fraud label is used as the business fraud label of the business fraud event information.
进一步地,在根据业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定业务欺诈事件信息的业务欺诈行为标签之前,服务器还可以获取多个特征标签以及各个特征标签所标注的业务欺诈行为标签,根据各个特征标签所标注的业务欺诈行为标签,得到多个特征标签对应的业务欺诈行为标签;根据多个特征标签对应的业务欺诈行为标签,构建特征标签与业务欺诈行为标签的对应关系,作为预设的特征标签与业务欺诈行为标签的对应关系。Further, before querying the correspondence between the preset feature tags and the business fraud behavior tags according to the feature tags of the business fraud event information, and determining the business fraud behavior tags of the business fraud event information, the server may also obtain multiple feature tags and each According to the business fraud labels marked by the feature labels, the business fraud labels corresponding to the multiple feature labels are obtained according to the business fraud labels marked by the feature labels; the feature labels are constructed according to the business fraud labels corresponding to the multiple feature labels. The correspondence relationship between the business fraud behavior labels is used as the correspondence relationship between the preset feature labels and the business fraud behavior labels.
步骤S106,根据业务欺诈事件信息的用户标识和业务欺诈行为标签,构建业务欺诈识别数据库。Step S106: Construct a business fraud identification database according to the user identification and business fraud behavior label of the business fraud event information.
具体地,服务器按照业务欺诈事件信息的用户标识,将业务欺诈行为标签分类存储至业务欺诈识别数据库中,以通过业务欺诈识别数据库存储多个用户标识对应的业务欺诈行为标签,便于根据待识别用户的用户标识查询业务欺诈识别数据库,即可确定业务欺诈识别数据库是否存储有与用户标识对应的业务欺诈行为标签,进而判断待识别用户是否存在业务欺诈行为,简化了业务欺诈行为识别流程,进一步提高了业务欺诈行为的识别效率。Specifically, the server categorizes and stores business fraud labels in the business fraud identification database according to the user identification of the business fraud event information, so as to store business fraud labels corresponding to multiple user identifications in the business fraud identification database, so as to facilitate the identification of users according to By querying the business fraud identification database with the user ID, you can determine whether the business fraud identification database stores the business fraud label corresponding to the user ID, and then determine whether the user to be identified has business fraud, which simplifies the business fraud identification process and further improves Improve the efficiency of business fraud identification.
进一步地,在一定时间之后,比如2个月,服务器重新采集网络上的业务欺诈事件信息,并重新执行上述步骤S102至S105,得到业务欺诈事件信息的业务欺诈行为标签和用户标识,根据业务欺诈事件信息的业务欺诈行为标签和用户标识,更新业务欺诈识别数据库,有利于提高业务欺诈识别数据库存储的用户标识的业务欺诈行为标签的时效性和准确性,进一步提高了后续得到的业务欺诈行为识别结果的准确性。Further, after a certain period of time, such as 2 months, the server re-collects the business fraud event information on the network, and re-executes the above steps S102 to S105 to obtain the business fraud behavior label and user identification of the business fraud event information, according to the business fraud The business fraud label and user ID of the event information, and the update of the business fraud identification database is conducive to improving the timeliness and accuracy of the business fraud label of the user ID stored in the business fraud identification database, and further improves the subsequent business fraud identification The accuracy of the results.
上述业务欺诈识别数据库的构建方法中,通过采集的业务欺诈事件信息中的关键信息,确定业务欺诈事件信息的特征标签,进而确定业务欺诈事件信息的业务欺诈行为标签;根据业务欺诈事件信息的用户标识和业务欺诈行为标签,构建业务欺诈识别数据库;这样,通过构建的业务欺诈识别数据库,可以存储多个用户标识对应的业务欺诈行为标签,便于根据待识别用户的用户标识查询业务欺诈识别数据库,即可确定业务欺诈识别数据库是否存储有与用户标识对应的业务欺诈行为标签,进而判断待识别用户是否存在业务欺诈行为;无需对人工收集的大量数据进行分析识别,简化了业务欺诈行为识别流程,进一步提高了业务欺诈行为的识别效率。本申请方案可以应用在智慧安防如信息监控等场景中,从而推动智慧城市的建设。In the above-mentioned method for constructing a business fraud identification database, the characteristic label of the business fraud event information is determined through the key information in the collected business fraud event information, and then the business fraud behavior label of the business fraud event information is determined; according to the user of the business fraud event information Identify and business fraud identification database to construct a business fraud identification database; in this way, the business fraud identification database constructed can store business fraud identification tags corresponding to multiple user identifications, which is convenient for querying the business fraud identification database based on the user identification of the user to be identified. It can be determined whether the business fraud identification database stores the business fraud label corresponding to the user ID, and then determine whether the user to be identified has business fraud; there is no need to analyze and identify a large amount of manually collected data, which simplifies the business fraud identification process. Further improve the identification efficiency of business fraud. The proposed solution can be applied to scenarios such as smart security, such as information monitoring, so as to promote the construction of smart cities.
在一个实施例中,上述步骤S101,采集业务欺诈事件信息,包括:采集多个业务事件信息;识别业务事件信息的信息内容,根据信息内容确定业务事件信息的信息类型;从多个业务事件信息中筛选出信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息,将业务欺诈事件信息上传至区块链中。In one embodiment, the above step S101, collecting business fraud event information, includes: collecting multiple business event information; identifying the information content of the business event information, and determining the information type of the business event information according to the information content; The business event information whose information type matches the preset information type is screened out, and used as business fraud event information, and the business fraud event information is uploaded to the blockchain.
在本步骤中,预设信息类型用于标识业务欺诈事件信息的信息类型,比如故意出险信息类型、重复投保信息类型、伪造证据信息类型、重复索赔信息类型、保险倒签单信息类型、贷款逾期信息类型等。In this step, the preset information type is used to identify the information type of the business fraud event information, such as the intentional risk information type, the repeated insurance information type, the forged evidence information type, the repeated claim information type, the insurance reversed form information type, and the loan overdue information Type etc.
具体地,服务器基于大数据技术,采集网络上的业务事件信息;提取业务事件信息中的信息内容,根据信息内容查询预设的信息内容与信息类型的对应关系,确定该信息内容对应的信息类型,作为业务事件信息的信息类型;将业务事件信息的信息类型与预设信息类型进行匹配,若匹配成功,则将该业务事件信息识别为业务欺诈事件信息;参照这种方式,可以从多个业务事件信息中筛选出业务欺诈事件信息。Specifically, the server collects business event information on the network based on big data technology; extracts the information content in the business event information, queries the preset correspondence relationship between the information content and the information type according to the information content, and determines the information type corresponding to the information content , As the information type of the business event information; match the information type of the business event information with the preset information type, if the matching is successful, the business event information is identified as business fraud event information; referring to this method, you can select from multiple The business fraud event information is filtered out from the business event information.
在本实施例中,通过采集业务欺诈事件信息,有利于后续对业务欺诈事件信息进行分析,以确定业务欺诈事件信息所对应的用户的业务欺诈行为标签,无需对人工收集的大量数据进行分析识别,从而提高了业务欺诈行为的识别效率。In this embodiment, collecting business fraud event information facilitates subsequent analysis of business fraud event information to determine the user's business fraud behavior label corresponding to the business fraud event information, without the need to analyze and identify a large amount of manually collected data , Thereby improving the efficiency of identifying business fraud.
在一个实施例中,上述步骤S104,根据特征信息的特征编码,确定业务欺诈事件信息的特征标签,包括:将特征信息的特征编码输入预先训练的特征分类模型,得到特征信息在各个预设特征标签下的分类概率;将分类概率最大的预设特征标签,作为业务欺诈事件信息的特征标签。In one embodiment, the above step S104, determining the feature label of the business fraud event information according to the feature code of the feature information, includes: inputting the feature code of the feature information into a pre-trained feature classification model to obtain the feature information in each preset feature The classification probability under the label; the preset feature label with the largest classification probability is used as the feature label of the business fraud event information.
其中,预先训练的特征分类模型是一种能够对特征信息进行分类,以确定特征信息所属的特征标签的神经网络模型。特征信息在各个预设特征标签下的分类概率,是指特征信息分别属于各个预设特征标签的概率。Among them, the pre-trained feature classification model is a neural network model that can classify feature information to determine the feature label to which the feature information belongs. The classification probability of feature information under each preset feature label refers to the probability that the feature information belongs to each preset feature label.
具体地,服务器将特征信息的特征编码输入预先训练的特征分类模型,通过预先训练的特征分类模型对特征信息的特征编码进行一系列神经网络处理,比如卷积、池化、全连接等,得到特征信息在各个预设特征标签下的分类编码;对特征信息在各个预设特征标签下的分类编码进行归一化处理,得到特征信息在各个预设特征标签下的分类概率;将分类概率最大的预设特征标签,作为业务欺诈事件信息的特征标签。Specifically, the server inputs the feature code of the feature information into the pre-trained feature classification model, and performs a series of neural network processing on the feature code of the feature information through the pre-trained feature classification model, such as convolution, pooling, full connection, etc., to obtain The classification code of the feature information under each preset feature label; normalize the classification code of the feature information under each preset feature label to obtain the classification probability of the feature information under each preset feature label; maximize the classification probability The preset feature tag of is used as the feature tag of business fraud event information.
在本实施例中,通过确定业务欺诈事件信息的特征标签,有利于后续根据业务欺诈事件信息的特征标签,确定业务欺诈事件信息的业务欺诈行为标签,进而构建业务欺诈识别数据库。。In this embodiment, by determining the feature label of the business fraud event information, it is beneficial to subsequently determine the business fraud behavior label of the business fraud event information according to the feature label of the business fraud event information, and then construct a business fraud identification database. .
在一个实施例中,上述步骤S106,根据业务欺诈事件信息的用户标识和业务欺诈行为标签,构建业务欺诈识别数据库,包括:将业务欺诈事件信息的业务欺诈行为标签,按照业务欺诈事件信息的用户标识存储至预设数据库中;将预设数据库识别为业务欺诈识别数据库。In one embodiment, the above step S106 is to construct a business fraud identification database based on the user identification of the business fraud event information and the business fraud behavior label, which includes: adding the business fraud behavior label of the business fraud event information to the user according to the business fraud event information The identification is stored in a preset database; the preset database is identified as a business fraud identification database.
在本实施例中,通过业务欺诈识别数据库存储多个用户标识对应的业务欺诈行为标签,便于根据待识别用户的用户标识查询业务欺诈识别数据库,即可确定待识别用户是否存在业务欺诈行为,从而提高了业务欺诈行为的识别效率。In this embodiment, the business fraud identification database stores multiple user identification corresponding business fraud tags, which is convenient for querying the business fraud identification database based on the user identification of the user to be identified, so as to determine whether the user to be identified has business fraud. Improved the efficiency of identifying business fraud.
在一个实施例中,如图2所示,本申请的业务欺诈识别数据库的构建方法还包括将业务欺诈行为识别结果发送至终端的步骤,具体包括如下步骤。In one embodiment, as shown in FIG. 2, the method for constructing a business fraud identification database of the present application further includes the step of sending the business fraud identification result to the terminal, which specifically includes the following steps.
步骤S201,接收终端发送的业务欺诈行为识别请求;业务欺诈行为识别请求中携带有待识别用户的用户标识。Step S201: Receive a service fraud identification request sent by a terminal; the service fraud identification request carries a user ID of the user to be identified.
在本步骤中,业务欺诈行为识别请求用于请求服务器识别待识别用户是否存在业务欺诈行为。In this step, the business fraud identification request is used to request the server to identify whether the user to be identified has business fraud.
具体地,查询用户(比如保险公司的工作人员)登录终端,在终端的查询操作界面上输入待识别用户(比如投保人)的相关用户信息标识;终端识别到查询用户的输入操作,获取待识别用户输入的相关用户信息标识,作为用户标识;根据用户标识,生成业务欺诈行为识别请求,并将该业务欺诈行为识别请求发送至对应的服务器。服务器对接收到的业务欺诈行为识别请求进行解析,得到待识别用户的用户标识。Specifically, an inquiring user (such as a staff member of an insurance company) logs in to the terminal, and inputs the relevant user information identifier of the user to be identified (such as an insurance applicant) on the query operation interface of the terminal; the terminal recognizes the input operation of the inquiring user, and obtains the information to be identified The relevant user information identifier entered by the user is used as the user identifier; according to the user identifier, a business fraud identification request is generated, and the business fraud identification request is sent to the corresponding server. The server parses the received business fraud identification request to obtain the user identification of the user to be identified.
步骤S202,根据用户标识查询业务欺诈识别数据库,得到查询结果。Step S202: Query the service fraud identification database according to the user ID to obtain the query result.
在本步骤中,查询结果用于表示业务欺诈识别数据库中是否存储有用户标识对应的业务欺诈行为标签。In this step, the query result is used to indicate whether a business fraud behavior label corresponding to the user ID is stored in the business fraud identification database.
步骤S203,根据查询结果,确定对待识别用户的业务欺诈行为识别结果。Step S203: Determine the business fraud identification result of the user to be identified according to the query result.
在本步骤中,待识别用户的业务欺诈行为识别结果用于表示待识别用户是否存在业务欺诈行为、待识别用户是否为业务欺诈用户等。In this step, the identification result of the business fraud of the user to be identified is used to indicate whether the user to be identified has business fraud, whether the user to be identified is a business fraud user, and so on.
步骤S204,将业务欺诈行为识别结果发送至终端。Step S204: Send the identification result of business fraud to the terminal.
具体地,服务器将待识别用户的业务欺诈行为识别结果发送至终端,通过终端展示待识别用户的业务欺诈行为识别结果;这样,查询用户可以快速判断待识别用户是否为业务欺诈用户,无需经过线下调查或者进行其他操作。Specifically, the server sends the recognition result of the business fraud of the user to be identified to the terminal, and displays the recognition result of the business fraud of the user to be identified through the terminal; in this way, the querying user can quickly determine whether the user to be identified is a business fraud user without going through the line. Investigate or perform other operations.
在本实施例中,根据终端发送的业务欺诈行为识别请求查询存储有多个用户标识对应的业务欺诈行为标签的业务欺诈识别数据库,可以快速判断待识别用户是否为业务欺诈用户,进一步提高了业务欺诈行为的识别效率。In this embodiment, according to the business fraud identification request sent by the terminal, the business fraud identification database that stores the business fraud identification tags corresponding to multiple user identities can be queried, which can quickly determine whether the user to be identified is a business fraud user, and further improves the business. The efficiency of fraud identification.
在一个实施例中,上述步骤S203,根据查询结果,确定对待识别用户的业务欺诈行为识别结果,包括:若查询到业务欺诈识别数据库中存储有与用户标识对应的业务欺诈行为标签,则确认待识别用户为业务欺诈用户。In one embodiment, the above step S203, determining the business fraud identification result of the user to be identified based on the query result, includes: if the business fraud identification database is queried and stored in the business fraud identification database, the business fraud identification tag corresponding to the user identification is confirmed, Identify the user as a fraudulent user.
具体地,若查询结果为业务欺诈识别数据库中存储有与用户标识对应的业务欺诈行为标签,说明待识别用户为业务欺诈用户,存在业务欺诈行为;若查询结果为业务欺诈识别数据库中没有与用户标识对应的业务欺诈行为标签,说明待识别用户为正常用户,不存在业务欺诈行为。Specifically, if the query result is that the business fraud identification database stores a business fraud label corresponding to the user ID, it indicates that the user to be identified is a business fraud user, and there is a business fraud; if the query result is that there is no business fraud identification database with the user Identifies the corresponding business fraud label, indicating that the user to be identified is a normal user and there is no business fraud.
在本实施例中,根据用户标识查询业务欺诈识别数据库所得到的查询结果,可以快速判断待识别用户是否为业务欺诈用户,进一步提高了业务欺诈行为的识别效率。In this embodiment, the query result obtained by querying the business fraud identification database according to the user ID can quickly determine whether the user to be identified is a business fraud user, which further improves the identification efficiency of business fraud.
在一个实施例中,在确认待识别用户为业务欺诈用户之后,还包括:获取与业务欺诈行为标签对应的预警信息;那么,上述步骤S204,将业务欺诈行为识别结果发送至终端,包括:将业务欺诈行为识别结果和预警信息发送至终端。In one embodiment, after confirming that the user to be identified is a business fraud user, the method further includes: obtaining early warning information corresponding to the business fraud behavior label; then, the above step S204, sending the business fraud behavior identification result to the terminal, includes: The business fraud identification results and early warning information are sent to the terminal.
在本步骤中,不同业务欺诈行为标签,对应的预警信息不一样。In this step, different business fraud labels have different warning information corresponding to them.
具体地,在确认待识别用户为业务欺诈用户之后,服务器查询预设的业务欺诈行为标签与预警信息的对应关系,确定与用户标识的业务欺诈行为标签对应的预警信息,并将业务欺诈行为识别结果和预警信息一起发送至终端,便于提醒终端对应的查询用户;比如,该用户是高风险欺诈用户,请小心注意。Specifically, after confirming that the user to be identified is a business fraud user, the server queries the correspondence between the preset business fraud label and the warning information, determines the warning information corresponding to the business fraud label identified by the user, and recognizes the business fraud The result is sent to the terminal together with the warning information, which is convenient to remind the querying user corresponding to the terminal; for example, the user is a high-risk fraud user, please be careful.
在本实施例中,在确认待识别用户为业务欺诈用户之后,将相应的预警信息发送至终端,有利于及时提醒终端对应的查询用户。In this embodiment, after confirming that the user to be identified is a business fraud user, the corresponding early warning information is sent to the terminal, which is beneficial to promptly reminding the terminal corresponding inquiring user.
在一个实施例中,如图3所示,提供了一种业务欺诈行为识别方法,包括以下步骤。In one embodiment, as shown in FIG. 3, a method for identifying business fraud is provided, which includes the following steps.
步骤S301,采集多个业务事件信息;识别业务事件信息的信息内容,根据信息内容确定业务事件信息的信息类型;从多个业务事件信息中筛选出信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息,将业务欺诈事件信息上传至区块链中。Step S301: Collect multiple business event information; identify the information content of the business event information, and determine the information type of the business event information according to the information content; filter out the business event information whose information type matches the preset information type from the multiple business event information , As the business fraud event information, upload the business fraud event information to the blockchain.
步骤S302,获取业务欺诈事件信息的关键信息标识符,根据关键信息标识符,从业务欺诈事件信息中提取出对应的关键信息。Step S302: Obtain the key information identifier of the business fraud event information, and extract the corresponding key information from the business fraud event information according to the key information identifier.
步骤S303,对关键信息进行特征提取,得到业务欺诈事件信息的特征信息。Step S303: Perform feature extraction on key information to obtain feature information of business fraud event information.
步骤S304,获取特征信息的特征编码,根据特征信息的特征编码,确定业务欺诈事件信息的特征标签。Step S304: Obtain the feature code of the feature information, and determine the feature tag of the business fraud event information according to the feature code of the feature information.
步骤S305,根据业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定业务欺诈事件信息的业务欺诈行为标签。Step S305, according to the feature tag of the business fraud event information, query the correspondence between the preset feature tag and the business fraud behavior tag, and determine the business fraud behavior tag of the business fraud event information.
步骤S306,将业务欺诈事件信息的业务欺诈行为标签,按照业务欺诈事件信息的用户标识存储至预设数据库中;将预设数据库识别为业务欺诈识别数据库。Step S306: Store the business fraud behavior label of the business fraud event information in a preset database according to the user identification of the business fraud event information; identify the preset database as a business fraud identification database.
步骤S307,接收终端发送的业务欺诈行为识别请求;业务欺诈行为识别请求中携带有待识别用户的用户标识。Step S307: Receive the service fraud identification request sent by the terminal; the service fraud identification request carries the user ID of the user to be identified.
步骤S308,根据用户标识查询业务欺诈识别数据库,得到查询结果。Step S308, query the service fraud identification database according to the user ID to obtain the query result.
步骤S309,根据查询结果,确定对待识别用户的业务欺诈行为识别结果,并将业务欺诈行为识别结果发送至终端。Step S309: According to the query result, determine the business fraud identification result of the user to be identified, and send the business fraud identification result to the terminal.
在本实施例中,根据终端发送的业务欺诈行为识别请求查询存储有多个用户标识对应的业务欺诈行为标签的业务欺诈识别数据库,可以快速判断待识别用户是否为业务欺诈用户,从而简化了业务欺诈行为的识别流程,节省了大量时间,进一步提高了业务欺诈行为的识别效率。In this embodiment, according to the business fraud identification request sent by the terminal, the business fraud identification database that stores the business fraud identification tags corresponding to multiple user identities can be queried, which can quickly determine whether the user to be identified is a business fraud user, thereby simplifying the business. The fraud identification process saves a lot of time and further improves the efficiency of business fraud identification.
应该理解的是,虽然图1-3的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图1-3中的至少一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the various steps in the flowcharts of FIGS. 1-3 are displayed in sequence as indicated by the arrows, these steps are not necessarily performed in sequence in the order indicated by the arrows. Unless specifically stated in this article, the execution of these steps is not strictly limited in order, and these steps can be executed in other orders. Moreover, at least some of the steps in Figures 1-3 can include multiple steps or multiple stages. These steps or stages are not necessarily executed at the same time, but can be executed at different times. The execution of these steps or stages The sequence is not necessarily performed sequentially, but may be performed alternately or alternately with other steps or at least a part of the steps or stages in other steps.
在一个实施例中,如图4所示,提供了一种业务欺诈识别数据库的构建装置,包括:信息采集模块410、信息提取模块420、信息确定模块430、特征标签识别模块440、行为标签确定模块450和数据库构建模块460,其中:信息采集模块410,用于采集业务欺诈事件信息;业务欺诈事件信息中携带有用户标识;信息提取模块420,用于获取业务欺诈事件信息中的关键信息标识符,根据关键信息标识符,从业务欺诈事件信息中提取出对应的关键信息;信息确定模块430,用于对关键信息进行特征提取,得到业务欺诈事件信息的特征信息;特征标签确定模块440,用于获取特征信息的特征编码,根据特征信息的特征编码,确定业务欺诈事件信息的特征标签;行为标签确定模块450,用于根据业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定业务欺诈事件信息的业务欺诈行为标签;数据库构建模块460,用于根据业务欺诈事件信息的用户标识和业务欺诈行为标签,构建业务欺诈识别数据库。In one embodiment, as shown in FIG. 4, a device for constructing a business fraud identification database is provided, which includes: an information collection module 410, an information extraction module 420, an information determination module 430, a feature tag identification module 440, and a behavior tag determination The module 450 and the database construction module 460, in which: the information collection module 410 is used to collect business fraud event information; the business fraud event information carries user identification; the information extraction module 420 is used to obtain the key information identification in the business fraud event information According to the key information identifier, the corresponding key information is extracted from the business fraud event information; the information determination module 430 is used for feature extraction of the key information to obtain the feature information of the business fraud event information; the feature label determination module 440, The feature code used to obtain the feature information, and the feature tag of the business fraud event information is determined according to the feature code of the feature information; the behavior tag determination module 450 is used to query the preset feature tag and business based on the feature tag of the business fraud event information Correspondence of fraudulent behavior tags to determine the business fraudulent behavior tags of the business fraud event information; the database construction module 460 is used to construct a business fraud identification database based on the user identification and the business fraudulent behavior tags of the business fraud event information.
在一个实施例中,信息采集模块410还用于采集多个业务事件信息;识别业务事件信息的信息内容,根据信息内容确定业务事件信息的信息类型;从多个业务事件信息中筛选出信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息,将业务欺诈事件信息上传至区块链中。In one embodiment, the information collection module 410 is also used to collect multiple business event information; identify the information content of the business event information, determine the information type of the business event information according to the information content; filter out the information type from the multiple business event information The business event information matching the preset information type is used as the business fraud event information, and the business fraud event information is uploaded to the blockchain.
在一个实施例中,特征标签确定模块440还用于将特征信息的特征编码输入预先训练的特征分类模型,得到特征信息在各个预设特征标签下的分类概率;将分类概率最大的预设特征标签,作为业务欺诈事件信息的特征标签。In one embodiment, the feature label determination module 440 is further configured to input the feature code of the feature information into the pre-trained feature classification model to obtain the classification probability of the feature information under each preset feature label; and set the preset feature with the largest classification probability The label is used as the characteristic label of the business fraud event information.
在一个实施例中,数据库构建模块460还用于将业务欺诈事件信息的业务欺诈行为标签,按照业务欺诈事件信息的用户标识存储至预设数据库中;将预设数据库识别为业务欺诈识别数据库。In one embodiment, the database construction module 460 is further configured to store the business fraud behavior label of the business fraud event information in a preset database according to the user identification of the business fraud event information; and identify the preset database as a business fraud identification database.
在一个实施例中,业务欺诈识别数据库的构建装置还包括结果发送模块,用于接收终端发送的业务欺诈行为识别请求;业务欺诈行为识别请求中携带有待识别用户的用户标识;根据用户标识查询业务欺诈识别数据库,得到查询结果;根据查询结果,确定对待识别用户的业务欺诈行为识别结果;将业务欺诈行为识别结果发送至终端。In one embodiment, the device for constructing a business fraud identification database further includes a result sending module for receiving a business fraud identification request sent by the terminal; the business fraud identification request carries the user identification of the user to be identified; and the business is inquired based on the user identification. The fraud identification database obtains the query result; according to the query result, determines the business fraud identification result of the user to be identified; and sends the business fraud identification result to the terminal.
在一个实施例中,结果发送模块还用于若查询到业务欺诈识别数据库中存储有与用户标识对应的业务欺诈行为标签,则确认待识别用户为业务欺诈用户。In one embodiment, the result sending module is also used for confirming that the user to be identified is a business fraud user if it is queried that the business fraud identification database is stored with a business fraud behavior tag corresponding to the user identification.
在一个实施例中,结果发送模块还用于获取与业务欺诈行为标签对应的预警信息;将业务欺诈行为识别结果和预警信息发送至终端。In one embodiment, the result sending module is also used to obtain the early warning information corresponding to the business fraud behavior label; and send the business fraud identification result and the early warning information to the terminal.
上述各个实施例,业务欺诈识别数据库的构建装置通过采集的业务欺诈事件信息中的关键信息,确定业务欺诈事件信息的特征标签,进而确定业务欺诈事件信息的业务欺诈行为标签;根据业务欺诈事件信息的用户标识和业务欺诈行为标签,构建业务欺诈识别数据库;这样,通过构建的业务欺诈识别数据库,可以存储多个用户标识对应的业务欺诈行为标签,便于根据待识别用户的用户标识查询业务欺诈识别数据库,即可确定业务欺诈识别数据库是否存储有与用户标识对应的业务欺诈行为标签,进而判断待识别用户是否存在业务欺诈行为;无需对人工收集的大量数据进行分析识别,简化了业务欺诈行为识别流程,进一步提高了业务欺诈行为的识别效率。In each of the foregoing embodiments, the device for constructing a business fraud identification database determines the characteristic label of the business fraud event information through the collected key information in the business fraud event information, and then determines the business fraud behavior label of the business fraud event information; according to the business fraud event information To construct a business fraud identification database based on user identifications and business fraud identification tags; in this way, the business fraud identification database constructed can store business fraud identification tags corresponding to multiple user identifications, which is convenient for querying business fraud identification based on the user identification of the user to be identified Database, you can determine whether the business fraud identification database stores business fraud labels corresponding to the user ID, and then determine whether the user to be identified has business fraud; there is no need to analyze and identify a large amount of manually collected data, which simplifies the identification of business fraud The process further improves the identification efficiency of business fraud.
关于业务欺诈识别数据库的构建装置的具体限定可以参见上文中对于业务欺诈识别数据库的构建方法的限定,在此不再赘述。上述业务欺诈识别数据库的构建装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。Regarding the specific limitation of the device for constructing the business fraud identification database, please refer to the above limitation on the method of constructing the business fraud identification database, which will not be repeated here. Each module in the device for constructing a business fraud identification database can be implemented in whole or in part by software, hardware, and a combination thereof. The above-mentioned modules may be embedded in the form of hardware or independent of the processor in the computer equipment, or may be stored in the memory of the computer equipment in the form of software, so that the processor can call and execute the operations corresponding to the above-mentioned modules.
在一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图5所示。该计算机设备包括通过系统总线连接的处理器、存储器和网络接口。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的数据库用于存储业务欺诈事件信息的用户标识、业务欺诈行为标签等数据。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种业务欺诈识别数据库的构建方法。In one embodiment, a computer device is provided. The computer device may be a server, and its internal structure diagram may be as shown in FIG. 5. The computer equipment includes a processor, a memory, and a network interface connected through a system bus. Among them, the processor of the computer device is used to provide calculation and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used to store data such as user identification and business fraud activity tags of business fraud event information. The network interface of the computer device is used to communicate with an external terminal through a network connection. When the computer program is executed by the processor, a method for constructing a business fraud identification database is realized.
本领域技术人员可以理解,图5中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。Those skilled in the art can understand that the structure shown in FIG. 5 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied. The specific computer device may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
在一个实施例中,提供了一种计算机设备,包括存储器和处理器,存储器中存储有计算机程序,该处理器执行计算机程序时实现以下步骤:采集业务欺诈事件信息;业务欺诈事件信息中携带有用户标识;获取业务欺诈事件信息的关键信息标识符,根据关键信息标识符,从业务欺诈事件信息中提取出对应的关键信息;对关键信息进行特征提取,得到业务欺诈事件信息的特征信息;获取特征信息的特征编码,根据特征信息的特征编码,确定业务欺诈事件信息的特征标签;根据业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定业务欺诈事件信息的业务欺诈行为标签;根据业务欺诈事件信息的用户标识和业务欺诈行为标签,构建业务欺诈识别数据库。In one embodiment, a computer device is provided, including a memory and a processor, a computer program is stored in the memory, and the processor implements the following steps when executing the computer program: collecting business fraud event information; business fraud event information carries User ID; obtain the key information identifier of the business fraud event information, and extract the corresponding key information from the business fraud event information according to the key information identifier; perform feature extraction on the key information to obtain the feature information of the business fraud event information; obtain The feature code of the feature information, according to the feature code of the feature information, determine the feature tag of the business fraud event information; according to the feature tag of the business fraud event information, query the correspondence between the preset feature tag and the business fraud behavior tag to determine the business fraud event The business fraud label of the information; according to the user identification of the business fraud event information and the business fraud label, the business fraud identification database is constructed.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:采集多个业务事件信息;识别业务事件信息的信息内容,根据信息内容确定业务事件信息的信息类型;从多个业务事件信息中筛选出信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息,将业务欺诈事件信息上传至区块链中。In one embodiment, the processor further implements the following steps when executing the computer program: collecting multiple business event information; identifying the information content of the business event information, and determining the information type of the business event information according to the information content; The business event information whose information type matches the preset information type is filtered out and used as business fraud event information, and the business fraud event information is uploaded to the blockchain.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:将特征信息的特征编码输入预先训练的特征分类模型,得到特征信息在各个预设特征标签下的分类概率;将分类概率最大的预设特征标签,作为业务欺诈事件信息的特征标签。In one embodiment, the processor further implements the following steps when executing the computer program: input the feature code of the feature information into the pre-trained feature classification model to obtain the classification probability of the feature information under each preset feature label; The preset feature tag is used as the feature tag of the business fraud event information.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:将业务欺诈事件信息的业务欺诈行为标签,按照业务欺诈事件信息的用户标识存储至预设数据库中;将预设数据库识别为业务欺诈识别数据库。In one embodiment, the processor further implements the following steps when executing the computer program: storing the business fraud behavior label of the business fraud event information in a preset database according to the user identification of the business fraud event information; and identifying the preset database as a business Fraud identification database.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:接收终端发送的业务欺诈行为识别请求;业务欺诈行为识别请求中携带有待识别用户的用户标识;根据用户标识查询业务欺诈识别数据库,得到查询结果;根据查询结果,确定对待识别用户的业务欺诈行为识别结果;将业务欺诈行为识别结果发送至终端。In one embodiment, the processor further implements the following steps when executing the computer program: receiving a business fraud identification request sent by the terminal; carrying the user identification of the user to be identified in the business fraud identification request; querying the business fraud identification database based on the user identification, Obtain the query result; determine the business fraud identification result of the user to be identified according to the query result; send the business fraud identification result to the terminal.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:若查询到业务欺诈识别数据库中存储有与用户标识对应的业务欺诈行为标签,则确认待识别用户为业务欺诈用户。In one embodiment, the processor further implements the following steps when executing the computer program: if the service fraud identification database is queried and stored with a service fraud behavior tag corresponding to the user identification, then the user to be identified is confirmed as a service fraud user.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:获取与业务欺诈行为标签对应的预警信息;将业务欺诈行为识别结果和预警信息发送至终端。In one embodiment, the processor further implements the following steps when executing the computer program: acquiring the early warning information corresponding to the business fraud behavior label; and sending the business fraud identification result and the early warning information to the terminal.
上述各个实施例,计算机设备通过处理器上运行的计算机程序,实现了通过构建的业务欺诈识别数据库,存储多个用户标识对应的业务欺诈行为标签的目的,便于根据待识别用户的用户标识查询业务欺诈识别数据库,即可确定业务欺诈识别数据库是否存储有与用户标识对应的业务欺诈行为标签,进而判断待识别用户是否存在业务欺诈行为;无需对人工收集的大量数据进行分析识别,简化了业务欺诈行为识别流程,进一步提高了业务欺诈行为的识别效率。In each of the above-mentioned embodiments, the computer device realizes the purpose of storing business fraud identification tags corresponding to multiple user identifications through the constructed business fraud identification database through the computer program running on the processor, so that it is convenient to query the business based on the user identification of the user to be identified. The fraud identification database can determine whether the business fraud identification database stores the business fraud label corresponding to the user ID, and then determine whether the user to be identified has business fraud; there is no need to analyze and identify a large amount of manually collected data, which simplifies business fraud The behavior identification process further improves the identification efficiency of business fraud.
在一个实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:采集业务欺诈事件信息;业务欺诈事件信息中携带有用户标识;获取业务欺诈事件信息的信息标识符,根据关键信息标识符,从业务欺诈事件信息中提取出对应的关键信息;对关键信息进行特征提取,得到业务欺诈事件信息的特征信息;获取特征信息的特征编码,根据特征信息的特征编码,确定业务欺诈事件信息的特征标签;根据业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定业务欺诈事件信息的业务欺诈行为标签;根据业务欺诈事件信息的用户标识和业务欺诈行为标签,构建业务欺诈识别数据库。In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented: collecting business fraud event information; the business fraud event information carries a user identification; Obtain the information identifier of the business fraud event information, and extract the corresponding key information from the business fraud event information according to the key information identifier; perform feature extraction on the key information to obtain the characteristic information of the business fraud event information; obtain the characteristics of the characteristic information Encoding, according to the feature code of the feature information, determine the feature label of the business fraud event information; according to the feature label of the business fraud event information, query the correspondence between the preset feature label and the business fraud behavior label to determine the business fraud of the business fraud event information Behavior label: Build a business fraud identification database based on the user identification and business fraud behavior label of the business fraud event information.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:采集多个业务事件信息;识别业务事件信息的信息内容,根据信息内容确定业务事件信息的信息类型;从多个业务事件信息中筛选出信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息,将业务欺诈事件信息上传至区块链中。In one embodiment, when the computer program is executed by the processor, the following steps are also implemented: collecting multiple business event information; identifying the information content of the business event information, and determining the information type of the business event information according to the information content; The business event information whose information type matches the preset information type is screened out, and used as business fraud event information, and the business fraud event information is uploaded to the blockchain.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:将特征信息的特征编码输入预先训练的特征分类模型,得到特征信息在各个预设特征标签下的分类概率;将分类概率最大的预设特征标签,作为业务欺诈事件信息的特征标签。In one embodiment, when the computer program is executed by the processor, the following steps are also implemented: input the feature code of the feature information into the pre-trained feature classification model to obtain the classification probability of the feature information under each preset feature label; maximize the classification probability The preset feature tag of is used as the feature tag of business fraud event information.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:将业务欺诈事件信息的业务欺诈行为标签,按照业务欺诈事件信息的用户标识存储至预设数据库中;将预设数据库识别为业务欺诈识别数据库。In one embodiment, when the computer program is executed by the processor, the following steps are further implemented: store the business fraud behavior label of the business fraud event information in a preset database according to the user identification of the business fraud event information; and identify the preset database as Business fraud identification database.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:接收终端发送的业务欺诈行为识别请求;业务欺诈行为识别请求中携带有待识别用户的用户标识;根据用户标识查询业务欺诈识别数据库,得到查询结果;根据查询结果,确定对待识别用户的业务欺诈行为识别结果;将业务欺诈行为识别结果发送至终端。In one embodiment, when the computer program is executed by the processor, the following steps are further implemented: receiving a business fraud identification request sent by the terminal; carrying the user identification of the user to be identified in the business fraud identification request; querying the business fraud identification database based on the user identification , Obtain the query result; determine the business fraud identification result of the user to be identified according to the query result; send the business fraud identification result to the terminal.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:若查询到业务欺诈识别数据库中存储有与用户标识对应的业务欺诈行为标签,则确认待识别用户为业务欺诈用户。In one embodiment, when the computer program is executed by the processor, the following steps are further implemented: if the business fraud identification database is queried and stored in the business fraud identification database, the business fraud behavior tag corresponding to the user identification is confirmed, then the user to be identified is confirmed as a business fraud user.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:获取与业务欺诈行为标签对应的预警信息;将业务欺诈行为识别结果和预警信息发送至终端。In one embodiment, when the computer program is executed by the processor, the following steps are further implemented: obtaining the early warning information corresponding to the business fraud behavior label; and sending the business fraud identification result and the early warning information to the terminal.
可选的,本申请涉及的存储介质如计算机可读存储介质可以是非易失性的,也可以是易失性的。Optionally, the storage medium involved in this application, such as a computer-readable storage medium, may be non-volatile or volatile.
上述各个实施例,计算机可读存储介质通过其存储的计算机程序,实现了通过构建的业务欺诈识别数据库,存储多个用户标识对应的业务欺诈行为标签的目的,便于根据待识别用户的用户标识查询业务欺诈识别数据库,即可确定业务欺诈识别数据库是否存储有与用户标识对应的业务欺诈行为标签,进而判断待识别用户是否存在业务欺诈行为;无需对人工收集的大量数据进行分析识别,简化了业务欺诈行为识别流程,进一步提高了业务欺诈行为的识别效率。In each of the foregoing embodiments, the computer-readable storage medium realizes the purpose of storing business fraud identification tags corresponding to multiple user identifications through the constructed business fraud identification database through the computer program stored therein, so as to facilitate the query based on the user identification of the user to be identified The business fraud identification database can determine whether the business fraud identification database stores the business fraud label corresponding to the user ID, and then determine whether the user to be identified has business fraud; there is no need to analyze and identify the large amount of manually collected data, which simplifies the business The fraud identification process further improves the efficiency of business fraud identification.
本申请所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。The blockchain referred to in this application is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain, essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block. The blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-Only Memory,ROM)、磁带、软盘、闪存或光存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或外部高速缓冲存储器。作为说明而非局限,RAM可以是多种形式,比如静态随机存取存储器(Static Random Access Memory,SRAM)或动态随机存取存储器(Dynamic Random Access Memory,DRAM)等。A person of ordinary skill in the art can understand that all or part of the processes in the above-mentioned embodiment methods can be implemented by instructing relevant hardware through a computer program. The computer program can be stored in a non-volatile computer readable storage medium. When the computer program is executed, it may include the processes of the above-mentioned method embodiments. Wherein, any reference to memory, storage, database or other media used in the embodiments provided in this application may include at least one of non-volatile and volatile memory. Non-volatile memory may include read-only memory (Read-Only Memory, ROM), magnetic tape, floppy disk, flash memory, or optical memory. Volatile memory may include random access memory (Random Access Memory, RAM) or external cache memory. As an illustration and not a limitation, RAM can be in many forms, such as Static Random Access Memory (Static Random Access Memory). Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM) etc.
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above embodiments can be combined arbitrarily. In order to make the description concise, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction in the combination of these technical features, they should be It is considered as the range described in this specification.
以上实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。The above examples only express several implementation manners of the present application, and the description is relatively specific and detailed, but it should not be understood as a limitation on the scope of the invention patent. It should be pointed out that for those of ordinary skill in the art, without departing from the concept of this application, several modifications and improvements can be made, and these all fall within the protection scope of this application. Therefore, the scope of protection of the patent of this application shall be subject to the appended claims.

Claims (20)

  1. 一种业务欺诈识别数据库的构建方法,所述方法包括:A method for constructing a business fraud identification database, the method comprising:
    采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;Collect business fraud event information; the business fraud event information carries a user ID;
    获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;Acquiring the key information identifier of the business fraud event information, and extracting corresponding key information from the business fraud event information according to the key information identifier;
    对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;Perform feature extraction on the key information to obtain feature information of the business fraud event information;
    获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;Acquiring the feature code of the feature information, and determining the feature tag of the business fraud event information according to the feature code of the feature information;
    根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;According to the feature tag of the business fraud event information, query the correspondence between the preset feature tag and the business fraud tag to determine the business fraud tag of the business fraud event information;
    根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。According to the user identification and the business fraud behavior label of the business fraud event information, a business fraud identification database is constructed.
  2. 根据权利要求1所述的方法,其中,所述采集业务欺诈事件信息,包括:The method according to claim 1, wherein said collecting business fraud event information comprises:
    采集多个业务事件信息;Collect multiple business event information;
    识别所述业务事件信息的信息内容,根据所述信息内容确定业务事件信息的信息类型;Identifying the information content of the business event information, and determining the information type of the business event information according to the information content;
    从多个业务事件信息中筛选出所述信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息;Filter out the business event information whose information type matches the preset information type from multiple business event information, and use it as business fraud event information;
    将所述业务欺诈事件信息上传至区块链中。Upload the business fraud event information to the blockchain.
  3. 根据权利要求1所述的方法,其中,所述根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签,包括:The method according to claim 1, wherein said determining the feature tag of the business fraud event information according to the feature code of the feature information comprises:
    将所述特征信息的特征编码输入预先训练的特征分类模型,得到所述特征信息在各个预设特征标签下的分类概率;Input the feature code of the feature information into a pre-trained feature classification model to obtain the classification probability of the feature information under each preset feature label;
    将所述分类概率最大的预设特征标签,作为所述业务欺诈事件信息的特征标签。The preset feature label with the largest classification probability is used as the feature label of the business fraud event information.
  4. 根据权利要求1所述的方法,其中,所述根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库,包括:The method according to claim 1, wherein the constructing a business fraud identification database according to the user identification of the business fraud event information and the business fraud behavior label comprises:
    将所述业务欺诈事件信息的所述业务欺诈行为标签,按照所述业务欺诈事件信息的所述用户标识存储至预设数据库中;Storing the business fraud behavior label of the business fraud event information in a preset database according to the user identification of the business fraud event information;
    将所述预设数据库识别为所述业务欺诈识别数据库。The preset database is identified as the business fraud identification database.
  5. 根据权利要求1至4任一项所述的方法,其中,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises:
    接收终端发送的业务欺诈行为识别请求;所述业务欺诈行为识别请求中携带有待识别用户的用户标识;Receiving a business fraud identification request sent by the terminal; the business fraud identification request carries the user identification of the user to be identified;
    根据所述用户标识查询所述业务欺诈识别数据库,得到查询结果;Query the business fraud identification database according to the user ID to obtain the query result;
    根据所述查询结果,确定对所述待识别用户的业务欺诈行为识别结果;Determine, according to the query result, a business fraud identification result of the user to be identified;
    将所述业务欺诈行为识别结果发送至所述终端。Send the recognition result of the business fraud to the terminal.
  6. 根据权利要求5所述的方法,其中,所述根据所述查询结果,确定对所述待识别用户的业务欺诈行为识别结果,包括:The method according to claim 5, wherein the determining the result of business fraud identification of the user to be identified according to the query result comprises:
    若查询到所述业务欺诈识别数据库中存储有与所述用户标识对应的业务欺诈行为标签,则确认所述待识别用户为业务欺诈用户。If it is found that the business fraud identification database stores a business fraud behavior tag corresponding to the user identification, then it is confirmed that the user to be identified is a business fraud user.
  7. 根据权利要求6所述的方法,其中,在确认所述待识别用户为业务欺诈用户之后,还包括:The method according to claim 6, wherein after confirming that the user to be identified is a business fraud user, the method further comprises:
    获取与所述业务欺诈行为标签对应的预警信息;Obtain the early warning information corresponding to the business fraud behavior label;
    所述将所述业务欺诈行为识别结果发送至所述终端,包括:The sending the identification result of the business fraud behavior to the terminal includes:
    将所述业务欺诈行为识别结果和所述预警信息发送至所述终端。Sending the business fraud identification result and the early warning information to the terminal.
  8. 一种业务欺诈识别数据库的构建装置,其中,所述装置包括:A device for constructing a business fraud identification database, wherein the device includes:
    信息采集模块,用于采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;An information collection module, used to collect business fraud event information; said business fraud event information carries user identification;
    信息提取模块,用于获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;An information extraction module, configured to obtain the key information identifier of the business fraud event information, and extract corresponding key information from the business fraud event information according to the key information identifier;
    信息确定模块,用于对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;The information determining module is used for feature extraction of the key information to obtain the feature information of the business fraud event information;
    特征标签确定模块,用于获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;A characteristic label determination module, configured to obtain the characteristic code of the characteristic information, and determine the characteristic label of the business fraud event information according to the characteristic code of the characteristic information;
    行为标签确定模块,用于根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;The behavior label determination module is configured to query the correspondence between the preset characteristic label and the business fraud behavior label according to the characteristic label of the business fraud event information, and determine the business fraud behavior label of the business fraud event information;
    数据库构建模块,用于根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。The database construction module is used to construct a business fraud identification database according to the user identification of the business fraud event information and the business fraud behavior label.
  9. 一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,其中,所述处理器执行所述计算机程序时实现以下方法:A computer device includes a memory and a processor, the memory stores a computer program, wherein the processor implements the following method when the computer program is executed:
    采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;Collect business fraud event information; the business fraud event information carries a user ID;
    获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;Acquiring the key information identifier of the business fraud event information, and extracting corresponding key information from the business fraud event information according to the key information identifier;
    对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;Perform feature extraction on the key information to obtain feature information of the business fraud event information;
    获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;Acquiring the feature code of the feature information, and determining the feature tag of the business fraud event information according to the feature code of the feature information;
    根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;According to the feature tag of the business fraud event information, query the correspondence between the preset feature tag and the business fraud tag to determine the business fraud tag of the business fraud event information;
    根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。According to the user identification and the business fraud behavior label of the business fraud event information, a business fraud identification database is constructed.
  10. 根据权利要求9所述的计算机设备,其中,执行所述采集业务欺诈事件信息时,包括:The computer device according to claim 9, wherein, when performing the collection of business fraud event information, it comprises:
    采集多个业务事件信息;识别所述业务事件信息的信息内容,根据所述信息内容确定业务事件信息的信息类型;Collect multiple business event information; identify the information content of the business event information, and determine the information type of the business event information according to the information content;
    从多个业务事件信息中筛选出所述信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息;Filter out the business event information whose information type matches the preset information type from multiple business event information, and use it as business fraud event information;
    将所述业务欺诈事件信息上传至区块链中。Upload the business fraud event information to the blockchain.
  11. 根据权利要求9所述的计算机设备,其中,执行所述根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签时,包括:9. The computer device according to claim 9, wherein the execution of the feature encoding based on the feature information to determine the feature tag of the business fraud event information comprises:
    将所述特征信息的特征编码输入预先训练的特征分类模型,得到所述特征信息在各个预设特征标签下的分类概率;Input the feature code of the feature information into a pre-trained feature classification model to obtain the classification probability of the feature information under each preset feature label;
    将所述分类概率最大的预设特征标签,作为所述业务欺诈事件信息的特征标签。The preset feature label with the largest classification probability is used as the feature label of the business fraud event information.
  12. 根据权利要求9至11任一项所述的计算机设备,其中,所述处理器还用于实现:The computer device according to any one of claims 9 to 11, wherein the processor is further configured to implement:
    接收终端发送的业务欺诈行为识别请求;所述业务欺诈行为识别请求中携带有待识别用户的用户标识;Receiving a business fraud identification request sent by the terminal; the business fraud identification request carries the user identification of the user to be identified;
    根据所述用户标识查询所述业务欺诈识别数据库,得到查询结果;Query the business fraud identification database according to the user ID to obtain the query result;
    根据所述查询结果,确定对所述待识别用户的业务欺诈行为识别结果;Determine, according to the query result, a business fraud identification result of the user to be identified;
    将所述业务欺诈行为识别结果发送至所述终端。Send the recognition result of the business fraud to the terminal.
  13. 根据权利要求12所述的计算机设备,其中,执行所述根据所述查询结果,确定对所述待识别用户的业务欺诈行为识别结果时,包括:11. The computer device according to claim 12, wherein the execution of determining the result of business fraud identification of the user to be identified according to the query result comprises:
    若查询到所述业务欺诈识别数据库中存储有与所述用户标识对应的业务欺诈行为标签,则确认所述待识别用户为业务欺诈用户。If it is queried that the business fraud identification database stores a business fraud behavior tag corresponding to the user identification, then it is confirmed that the user to be identified is a business fraud user.
  14. 根据权利要求13所述的计算机设备,其中,在确认所述待识别用户为业务欺诈用户之后,所述处理器还用于实现:获取与所述业务欺诈行为标签对应的预警信息;The computer device according to claim 13, wherein, after confirming that the user to be identified is a business fraud user, the processor is further configured to: obtain early warning information corresponding to the business fraud behavior label;
    执行所述将所述业务欺诈行为识别结果发送至所述终端时,包括:When performing the sending of the recognition result of the business fraud behavior to the terminal, it includes:
    将所述业务欺诈行为识别结果和所述预警信息发送至所述终端。Sending the business fraud identification result and the early warning information to the terminal.
  15. 一种计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现以下方法:A computer-readable storage medium having a computer program stored thereon, wherein the computer program is executed by a processor to implement the following method:
    采集业务欺诈事件信息;所述业务欺诈事件信息中携带有用户标识;Collect business fraud event information; the business fraud event information carries a user ID;
    获取所述业务欺诈事件信息的关键信息标识符,根据所述关键信息标识符,从所述业务欺诈事件信息中提取出对应的关键信息;Acquiring the key information identifier of the business fraud event information, and extracting corresponding key information from the business fraud event information according to the key information identifier;
    对所述关键信息进行特征提取,得到所述业务欺诈事件信息的特征信息;Perform feature extraction on the key information to obtain feature information of the business fraud event information;
    获取所述特征信息的特征编码,根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签;Acquiring the feature code of the feature information, and determining the feature tag of the business fraud event information according to the feature code of the feature information;
    根据所述业务欺诈事件信息的特征标签,查询预设的特征标签与业务欺诈行为标签的对应关系,确定所述业务欺诈事件信息的业务欺诈行为标签;According to the feature tag of the business fraud event information, query the correspondence between the preset feature tag and the business fraud tag to determine the business fraud tag of the business fraud event information;
    根据所述业务欺诈事件信息的所述用户标识和所述业务欺诈行为标签,构建业务欺诈识别数据库。According to the user identification and the business fraud behavior label of the business fraud event information, a business fraud identification database is constructed.
  16. 根据权利要求15所述的计算机可读存储介质,其中,执行所述采集业务欺诈事件信息时,包括:The computer-readable storage medium according to claim 15, wherein, when performing the collection of business fraud event information, it comprises:
    采集多个业务事件信息;识别所述业务事件信息的信息内容,根据所述信息内容确定业务事件信息的信息类型;Collect multiple business event information; identify the information content of the business event information, and determine the information type of the business event information according to the information content;
    从多个业务事件信息中筛选出所述信息类型与预设信息类型匹配的业务事件信息,作为业务欺诈事件信息;Filter out the business event information whose information type matches the preset information type from multiple business event information, and use it as business fraud event information;
    将所述业务欺诈事件信息上传至区块链中。Upload the business fraud event information to the blockchain.
  17. 根据权利要求15所述的计算机可读存储介质,其中,执行所述根据所述特征信息的特征编码,确定所述业务欺诈事件信息的特征标签时,包括:15. The computer-readable storage medium according to claim 15, wherein the execution of the feature encoding according to the feature information to determine the feature tag of the business fraud event information comprises:
    将所述特征信息的特征编码输入预先训练的特征分类模型,得到所述特征信息在各个预设特征标签下的分类概率;Input the feature code of the feature information into a pre-trained feature classification model to obtain the classification probability of the feature information under each preset feature label;
    将所述分类概率最大的预设特征标签,作为所述业务欺诈事件信息的特征标签。The preset feature label with the largest classification probability is used as the feature label of the business fraud event information.
  18. 根据权利要求15至17任一项所述的计算机可读存储介质,其中,所述计算机程序被处理器执行时还用于实现:The computer-readable storage medium according to any one of claims 15 to 17, wherein, when the computer program is executed by a processor, it is also used to implement:
    接收终端发送的业务欺诈行为识别请求;所述业务欺诈行为识别请求中携带有待识别用户的用户标识;Receiving a business fraud identification request sent by the terminal; the business fraud identification request carries the user identification of the user to be identified;
    根据所述用户标识查询所述业务欺诈识别数据库,得到查询结果;Query the business fraud identification database according to the user ID to obtain the query result;
    根据所述查询结果,确定对所述待识别用户的业务欺诈行为识别结果;Determine, according to the query result, a business fraud identification result of the user to be identified;
    将所述业务欺诈行为识别结果发送至所述终端。Send the recognition result of the business fraud to the terminal.
  19. 根据权利要求18所述的计算机可读存储介质,其中,执行所述根据所述查询结果,确定对所述待识别用户的业务欺诈行为识别结果时,包括:18. The computer-readable storage medium according to claim 18, wherein the execution of determining the business fraud identification result of the user to be identified according to the query result comprises:
    若查询到所述业务欺诈识别数据库中存储有与所述用户标识对应的业务欺诈行为标签,则确认所述待识别用户为业务欺诈用户。If it is found that the business fraud identification database stores a business fraud behavior tag corresponding to the user identification, then it is confirmed that the user to be identified is a business fraud user.
  20. 根据权利要求19所述的计算机可读存储介质,其中,在确认所述待识别用户为业务欺诈用户之后,所述计算机程序被处理器执行时还用于实现:获取与所述业务欺诈行为标签对应的预警信息;The computer-readable storage medium according to claim 19, wherein, after confirming that the user to be identified is a business fraud user, when the computer program is executed by the processor, the computer program is further used to implement: obtaining a label related to the business fraud Corresponding warning information;
    执行所述将所述业务欺诈行为识别结果发送至所述终端时,包括:When performing the sending of the recognition result of the business fraud behavior to the terminal, it includes:
    将所述业务欺诈行为识别结果和所述预警信息发送至所述终端。Sending the business fraud identification result and the early warning information to the terminal.
PCT/CN2021/077419 2020-04-27 2021-02-23 Method and apparatus for constructing service fraud identification database, and computer device WO2021218312A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010344725.8A CN111552680A (en) 2020-04-27 2020-04-27 Construction method and device of business fraud identification database and computer equipment
CN202010344725.8 2020-04-27

Publications (1)

Publication Number Publication Date
WO2021218312A1 true WO2021218312A1 (en) 2021-11-04

Family

ID=72004113

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/077419 WO2021218312A1 (en) 2020-04-27 2021-02-23 Method and apparatus for constructing service fraud identification database, and computer device

Country Status (2)

Country Link
CN (1) CN111552680A (en)
WO (1) WO2021218312A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552680A (en) * 2020-04-27 2020-08-18 深圳壹账通智能科技有限公司 Construction method and device of business fraud identification database and computer equipment
FR3118518A1 (en) * 2020-12-28 2022-07-01 Commissariat à l'énergie atomique et aux énergies alternatives Method and system for automated fraud risk detection in a monitored system
CN112435137B (en) * 2020-12-31 2021-05-07 杭银消费金融股份有限公司 Cheating information detection method and system based on community mining
CN112862505A (en) * 2021-03-03 2021-05-28 中国工商银行股份有限公司 Anti-fraud information sharing method and device based on block chain
CN113837885A (en) * 2021-09-27 2021-12-24 上海欣方智能系统有限公司 Construction method of financial anti-fraud service database and financial anti-fraud service system
CN114020795B (en) * 2021-10-14 2022-06-24 深圳华云信息系统有限公司 Business processing method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106033515A (en) * 2015-03-16 2016-10-19 阿里巴巴集团控股有限公司 Method and device for identifying fraud events
CN109300051A (en) * 2018-09-17 2019-02-01 中国平安财产保险股份有限公司 Claims Resolution service processing method, device and computer equipment based on data analysis
CN110389974A (en) * 2019-07-30 2019-10-29 中原银行股份有限公司 Data analysing method and system
US20200020062A1 (en) * 2018-07-12 2020-01-16 Lexisnexis Risk Solutions Inc. Systems and methods for entity network analytics
CN111552680A (en) * 2020-04-27 2020-08-18 深圳壹账通智能科技有限公司 Construction method and device of business fraud identification database and computer equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106033515A (en) * 2015-03-16 2016-10-19 阿里巴巴集团控股有限公司 Method and device for identifying fraud events
US20200020062A1 (en) * 2018-07-12 2020-01-16 Lexisnexis Risk Solutions Inc. Systems and methods for entity network analytics
CN109300051A (en) * 2018-09-17 2019-02-01 中国平安财产保险股份有限公司 Claims Resolution service processing method, device and computer equipment based on data analysis
CN110389974A (en) * 2019-07-30 2019-10-29 中原银行股份有限公司 Data analysing method and system
CN111552680A (en) * 2020-04-27 2020-08-18 深圳壹账通智能科技有限公司 Construction method and device of business fraud identification database and computer equipment

Also Published As

Publication number Publication date
CN111552680A (en) 2020-08-18

Similar Documents

Publication Publication Date Title
WO2021218312A1 (en) Method and apparatus for constructing service fraud identification database, and computer device
CN108428132B (en) Fraud transaction identification method, device, server and storage medium
CN113177660B (en) Driving intention prediction and processing method, device, equipment and storage medium
CN112801805A (en) Medical insurance small card fraud detection method and system based on deep self-supervision neural network
CN110796553A (en) Service request processing method, device, terminal and storage medium
CN114782161A (en) Method, device, storage medium and electronic device for identifying risky users
CN110675252A (en) Risk assessment method and device, electronic equipment and storage medium
CN112488163A (en) Abnormal account identification method and device, computer equipment and storage medium
CN113837075A (en) Business handling method and device based on face recognition, electronic equipment and medium
CN113706172A (en) Complaint resolution method, complaint resolution device, complaint resolution equipment and storage medium based on customer behaviors
CN111582757B (en) Method, device, equipment and computer readable storage medium for analyzing fraud risk
CN113450011A (en) Task allocation method and device
CN108345582B (en) Method and device for identifying social group engaged business
CN113159796A (en) Trade contract verification method and device
CN112487284A (en) Bank customer portrait generation method, equipment, storage medium and device
CN116402625A (en) Customer evaluation method, apparatus, computer device and storage medium
CN116166999A (en) Abnormal transaction data identification method, device, computer equipment and storage medium
CN113780318B (en) Method, device, server and medium for generating prompt information
CN112950222A (en) Resource processing abnormity detection method and device, electronic equipment and storage medium
CN113094595A (en) Object recognition method, device, computer system and readable storage medium
CN113936313B (en) Method, device, equipment and storage medium for detecting out-of-account borrowing of website employee account
CN113688924B (en) Abnormal order detection method, device, equipment and medium
CN113657902A (en) Financial security management method, system and storage medium based on graph database
CN117034173A (en) Data processing method, device, computer equipment and storage medium
CN114553684A (en) Network operation and maintenance method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21797417

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 20/02/2023)

122 Ep: pct application non-entry in european phase

Ref document number: 21797417

Country of ref document: EP

Kind code of ref document: A1