Unlock instant, AI-driven research and patent intelligence for your innovation.

Suspicious user identification method and device, computer equipment and storage medium

A user, suspicious technology, applied in the field of anti-money laundering, can solve problems such as consuming computing resources

Pending Publication Date: 2020-04-07
SHENZHEN ZHUIYI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the large number of recognition rules, it is very resource-intensive to use all the recognition rules for recognition every time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious user identification method and device, computer equipment and storage medium
  • Suspicious user identification method and device, computer equipment and storage medium
  • Suspicious user identification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0065] The suspicious user identification method provided by this application can be applied to such as figure 1 shown in the application environment. The application environment includes a terminal 101 and a server 102 , wherein the terminal 101 communicates with the server 102 through a network, and sends transaction data to the server 102 . The terminal 101 can be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the server 102 can be realized by an independent server or a server clust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a suspicious user identification method and device, computer equipment and a storage medium. The method comprises the steps of obtaining transaction data and a transaction identification mode of a to-be-identified user; wherein the transaction identification mode is used for indicating a current identification task to adopt all identification rules or part of identification rules in a pre-established identification rule base; when determining that the current recognition task adopts a partial recognition rule, determining a target recognition parameter of the current recognition task; wherein the target identification parameter is a second identification parameter which is pre-stored in a configuration file and is different from a first identification parameter ina historical identification task; generating an identification rule of the current identification task according to the target identification parameter; according to the identification rule of the current identification task and the transaction data of the to-be-identified user, identifying a suspicious user; wherein the suspicious user is a user with money laundering suspicion. Through the embodiment of the invention, the calculation amount can be reduced, and the calculation resources are saved.

Description

technical field [0001] The present application relates to the technical field of anti-money laundering, in particular to a suspicious user identification method, device, computer equipment and storage medium. Background technique [0002] Money laundering (Money Laundering) refers to the use of various means to cover up and conceal the source and nature of illegal gains and the proceeds generated to make them legal in form. Money laundering is a serious social hazard. It not only damages the security of the financial system and the reputation of financial institutions, but also is extremely destructive to the normal economic order and social stability. Therefore, it is necessary to identify money laundering activities, that is, to carry out anti-money laundering, so as to achieve the purpose of preventing criminal activities. [0003] At present, the anti-money laundering technology on the market usually pre-sets identification rules for a large number of suspicious transac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/382
Inventor 侯皓龄林仕锋
Owner SHENZHEN ZHUIYI TECH CO LTD