Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A risk gang identification method and device

A risk and gang technology, applied in the field of risk gang identification methods and devices, can solve problems such as disrupting Internet financial security

Active Publication Date: 2019-06-28
ADVANCED NEW TECH CO LTD
View PDF12 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of Internet finance, Internet fraud has gradually emerged. Gangs with security risks such as black industry and black intermediaries control a large number of user accounts through illegal means, and use these user accounts for arbitrage, disrupting Internet financial security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A risk gang identification method and device
  • A risk gang identification method and device
  • A risk gang identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0034] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a risk gang identification method and device. The method comprises the following steps: constructing a risk knowledge graph based on historical behaviors of a trusted user, wherein the risk knowledge graph comprises a non-user node, a trusted user node and a common user node associated with the trusted user; Extracting nodes matched with a risk template and connection edgesbetween the nodes from the risk knowledge map to form a risk map; For each node in the risk map, according to the time parameter of the occurrence time of the incidence relation between the node anda neighbor node and the degree of the neighbor node, carrying out iteration on the label of the node, and after one round of iteration is completed, judging whether a modularity function with time aggregation is converged or not; And when the modularity functions with the time aggregation converge, identifying the nodes with the same tags as the same risk gangs.

Description

technical field [0001] This specification relates to the field of artificial intelligence technology, and in particular to a method and device for identifying risk groups. Background technique [0002] With the rapid development of Internet finance, Internet fraud is gradually on the rise. Gangs with security risks such as black industry and black intermediaries control a large number of user accounts through illegal means, and use these user accounts for arbitrage, disrupting Internet financial security. Contents of the invention [0003] In view of this, this specification provides a method and device for identifying risk groups. [0004] Specifically, this specification is realized through the following technical solutions: [0005] A method for identifying a risk group, comprising: [0006] Construct a risk knowledge graph based on the historical behavior of untrustworthy users. The risk knowledge graph includes: non-user nodes, untrustworthy user nodes, and common u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00G06F16/36
Inventor 王冠楠
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products