Fraud recognition method and fraud recognition device

A transaction and node technology, applied in the network field, can solve problems such as identification of fraudulent behavior, and achieve the effect of accurate mining and accelerated convergence

Active Publication Date: 2018-02-23
ADVANCED NEW TECH CO LTD
View PDF11 Cites 68 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are still some frauds that cannot be identified through the transaction model, and this part of the hidden undiscovered frauds can be called

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud recognition method and fraud recognition device
  • Fraud recognition method and fraud recognition device
  • Fraud recognition method and fraud recognition device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to enable those skilled in the art to better understand the technical solutions in one or more embodiments of this specification, the following will combine the drawings in one or more embodiments of this specification to compare The technical solution is described clearly and completely. Obviously, the described embodiments are only a part of the embodiments, rather than all the embodiments. Based on one or more embodiments of this specification, all other embodiments obtained by a person of ordinary skill in the art without creative work shall fall within the protection scope of the present disclosure.

[0033] For fraud cases in the financial sector, some will be reported by the victim. For example, after the fraudster defrauds the victim to transfer money to him, the victim can report the fraudster, including the account of the fraudster who made the transfer. However, there are also many fraud cases that have not been unearthed because the victim did not repo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a fraud recognition method and a fraud recognition device. The method comprises steps: a transaction data sample set is acquired, wherein each piece of transaction data in the sample set at least comprises fund flow information, transaction party correlation information and transaction data fraud risk attributes; a fraud spreading relation graph is built according to the sample set, wherein each node in the fraud spreading relation graph is built according to the transaction party correlation information, and the directed edge between the nodes is builtaccording to the fund flow information and the transaction party correlation information; an initial node value is assigned to each node in the fraud spreading relation graph; according to a PageRankiterative updating algorithm, the node value of each node is subjected to iterative updating until iterative convergence to obtain a final node value; and if the final node value is higher than a preset threshold, the corresponding node is determined to be a fraud person node, and the transaction data correlated to the fraud person node are fraud risk data.

Description

Technical field [0001] The present disclosure relates to the field of network technology, and in particular to a fraud identification method and device. Background technique [0002] The financial sector has high requirements for transaction risk control, and it is necessary to ensure the safety of capital transactions. In actual applications, there may be some frauds. For example, fraudsters trick many ordinary consumers into transferring money to them, but they do not return corresponding returns to these consumers in order to make profits. In order to identify the above-mentioned fraudulent behaviors, identify high-risk fraudsters, and take measures to avoid consumer loss as much as possible, transaction models can be used to identify fraudsters. For example, a certain payment account is characterized as a fraudster account. Fund transactions conducted in the fraudster's account are classified as risky transactions. [0003] However, there will still be some frauds that canno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40
CPCG06Q20/4016
Inventor 朱逢豪肖凯王维强
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products