Fraud identification method and device, equipment and computer readable storage medium

A recognition method and knowledge technology, applied in the field of knowledge graphs, can solve problems such as unsatisfactory results and inability to accurately identify financial fraud

Pending Publication Date: 2019-10-01
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the continuous evolution and development of time, the mode of financial fraud is no longer limited to the individual behavior mode. At present, more and more financial frauds are c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud identification method and device, equipment and computer readable storage medium
  • Fraud identification method and device, equipment and computer readable storage medium
  • Fraud identification method and device, equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0031] The flow charts shown in the drawings are just illustrations, and do not necessarily include all contents and operations / steps, nor must they be performed in the order described. For example, some operations / steps can be decomposed, combined or partly combined, so the actual order of execution may be changed according to the actual situation.

[0032] Embodiments of the present application provide a fraud identification method, device, computer equipment, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fraud identification method and device, equipment and a computer readable storage medium. The fraud identification method comprises the steps: obtaining a social relation knowledge graph of a target user from a graph database according to a fraud identification request when the fraud identification request is monitored; performing community discovery on the social relationknowledge graph to obtain each community containing the target user; obtaining attribute data of each community from the social relation knowledge graph, and obtaining risk information of each community member in each community from the attribute data; and according to the risk information of each community member in each community, judging whether a fraudulent community exists in each communitycontaining the target user or not. According to the fraud identification method, the fraud community can be quickly and accurately mined through the knowledge graph, and the financial fraud recognition efficiency and accuracy are greatly improved.

Description

technical field [0001] The present application relates to the technical field of knowledge graphs, and in particular to a fraud identification method, device, equipment, and computer-readable storage medium. Background technique [0002] In the field of Internet finance, risk prevention and control is mainly achieved by verifying the authenticity of the user information provided by the user when applying for a loan, that is, through the identification and verification of the individual characteristics of the user to identify whether the user applying for the loan has a risk of fraud . With the continuous evolution and development of time, the mode of financial fraud is no longer limited to the individual behavior mode. At present, more and more financial frauds are carried out through organized groups, and the results of fraud identification for users based on individual characteristics are not ideal. , unable to accurately identify financial fraud. [0003] In order to so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/36G06Q40/02
CPCG06F16/367G06Q40/03
Inventor 代心灵
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products