Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-fraud model training method, system and anti-fraud method based on transfer learning

A model training and transfer learning technology, applied in the field of computer information, can solve problems such as difficulty in adapting to needs, difficulty in machine learning, ignoring the complexity and diversity of electronic banking systems, and achieve the effect of improving the accuracy of fraud identification

Active Publication Date: 2019-01-18
BEIJING TRUSFORT TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And fraud has developed into a black industry chain with strict organization and clear professional division of labor, which has brought severe challenges to the development of online financial services for banks
[0004] At present, the prevention and control strategies of electronic banking anti-fraud systems in the industry generally use two implementation schemes: one is based on expert rules, and pure expert rules are difficult to meet the needs of current electronic banking anti-fraud systems; Machine learning of the risk characteristics of the whole process and offline analysis of historical data
[0005] The existing machine learning-based method is to directly apply the machine learning anti-fraud model to the current scenario without modification. Although it avoids human subjectivity to a certain extent compared with expert rules, it ignores different business scenarios. Due to the complexity and diversity of the operation process and operation characteristic data of the e-banking business system, direct anti-fraud model training without distinguishing business scenarios will bring difficulties to machine learning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-fraud model training method, system and anti-fraud method based on transfer learning
  • Anti-fraud model training method, system and anti-fraud method based on transfer learning
  • Anti-fraud model training method, system and anti-fraud method based on transfer learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] This embodiment provides an anti-fraud model training method based on migration learning, which can be applied to anti-fraud identification systems in various e-bank business operations for anti-fraud model training, such as for online banking, mobile banking, The anti-fraud identification system in direct banking and / or WeChat banking operations conducts anti-fraud model training.

[0062] Specifically, such as figure 1 As shown, the method of the present embodiment includes the following steps:

[0063] S101: Obtain first characteristic data of an auxiliary business scenario and second characteristic data of a target business scenario.

[0064] Here, the first feature data is auxiliary data similar to the second feature data in service scenarios. The second characteristic data is the characteristic data of the target business scenario that requires anti-fraud analysis. Specifically, for example, when the anti-fraud model training method of the present application i...

Embodiment 2

[0084] Such as Figure 4 Shown is the second embodiment of the anti-fraud model training method described in this application, including the following steps:

[0085] S401: The acquiring module acquires an operation type.

[0086] Here, besides acquiring the first feature data and the second feature data, the acquiring module also acquires the operation type.

[0087] Here, the operation type can include basic operations and business operations;

[0088] The basic operations include registration or login;

[0089] The business operation includes transfer, payment or consumption.

[0090] S402 The first calculation module classifies the first characteristic data and the second characteristic data according to the operation type, and the first calculation module determines the operation type according to the first characteristic data and the second characteristic data of the same operation type The first value of the parameter in the corresponding anti-fraud model.

[0091]...

Embodiment 3

[0102] Such as Figure 5 Shown is a third embodiment of the anti-fraud model training method described in the present application, wherein the data preprocessing process includes the following steps:

[0103] S501: Perform vectorization processing on the first feature data and the second feature data.

[0104] Here, because the form of the original feature data is not standardized, it is not conducive to automatic processing by the computer, and the vectorized representation of the data is to convert the non-standard feature data into a format that is convenient for computer processing; for numerical features, directly use other The corresponding numerical representation corresponds to the feature data that is not numerical representation into a vector composed of 0 and 1.

[0105] S502: Perform data cleaning processing on the vectorized first feature data and the second feature data.

[0106] Here, errors and loss may occur in the process of feature data collection and tran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an anti-fraud model training method, a system and an anti-fraud method based on migration learning in electronic banking, wherein, the anti-fraud model training methodof electronic banking comprises the following steps: acquiring first characteristic data of an auxiliary business scenario and second characteristic data of a target business scenario; Determining afirst value of a parameter in the anti-fraud model based on the first characteristic data and the second characteristic data; Determining a feature probability value based on the first value, the anti-fraud model, and the second feature data; Determining a second value of a parameter in the anti-fraud model based on the second characteristic data and the characteristic probability value, and updating the anti-fraud model using the second value. The present application introduces a migration learning strategy method into an electronic banking anti-fraud system, and simultaneously takes into account the operation characteristic data of a target business scenario and an auxiliary business scenario, so that the fraud identification accuracy of the anti-fraud model is greatly improved.

Description

technical field [0001] The present application relates to the field of computer information technology, in particular to a transfer learning-based anti-fraud model training method, system and anti-fraud method. Background technique [0002] The rapid development of the Internet and the popularity of smart terminals have brought great convenience to people when using e-banking to handle balance inquiries, transfers, shopping payments, and financial management. to the risk of malicious infringement. [0003] Surveys show that cybercrime is increasingly sophisticated and penetrates into different industries, bringing economic losses of up to 445 billion U.S. dollars to the world every year. Moreover, fraud has developed into a black industry chain with strict organization and clear professional division of labor, which has brought severe challenges to banks' development of online financial business. [0004] At present, the prevention and control strategies of electronic bank...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06N20/00G06Q40/02
Inventor 郭豪孙善萍董留阳蔡准孙悦郭晓鹏
Owner BEIJING TRUSFORT TECH CO LTD