Alarm information verification method and device, equipment and storage medium

A technology of alarm information and verification methods, applied in the computer field, can solve problems such as increasing the system false alarm rate, increasing the workload of manual review and judgment, and reducing the efficiency of system screening

Pending Publication Date: 2022-05-27
CHINA CONSTRUCTION BANK
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While reducing the risk of system leakage, fuzzy matching will inevitably increase the false alarm rate of...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm information verification method and device, equipment and storage medium
  • Alarm information verification method and device, equipment and storage medium
  • Alarm information verification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0051] Financial institutions need to carry out list monitoring on customers and transactions, so that when a transaction is detected that may involve a preset control list, it can take corresponding control measures for the transaction.

[0052] In order to prevent the risk of system leakage and effectively identify aliases and name changes in the list, the common practice in the industry is to perform fuzzy matching on customers and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an alarm information verification method and device, equipment and a storage medium, and the method comprises the steps: constructing a plurality of verification models through employing historical alarm information and a corresponding verification result, and obtaining to-be-verified alarm information; searching a target verification model by utilizing the characteristic indexes of the to-be-verified alarm information; the target verification model refers to a verification model of which the model index is matched with the feature index of the to-be-verified alarm information; if the target verification model is searched, matching the transaction context of the field value of the to-be-verified alarm information with the model features of the target verification model; and if the transaction context of the field value of the to-be-verified alarm information is successfully matched with the model feature of the target verification model, determining the model output of the target verification model as a verification result of the to-be-verified alarm information. According to the method, the verification model is efficiently constructed through intelligent learning of the historical alarm information, the historical verification information is accurately and effectively applied to verification of the newly added alarm information, and the manual verification workload is reduced.

Description

technical field [0001] The present invention relates to the technical field of computers, and in particular, to a method, device, device and storage medium for verifying alarm information. Background technique [0002] Financial institutions need to carry out list monitoring on customers and transactions, so that when a transaction is detected that may involve a preset control list, it can take corresponding control measures for the transaction. [0003] In order to prevent the risk of system leakage and effectively identify aliases and name changes in the list, the common method of monitoring the list is to fuzzy match the transaction message of a transaction with the above list, and trigger an alarm when the similarity with the list reaches a certain level. And generate corresponding alarm information, and then manually review and determine the alarm information. While reducing the risk of system omission, fuzzy matching will inevitably increase the false alarm rate of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40
CPCG06Q20/4016
Inventor 陈云董震叶小强
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products