Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A fraudulent data identification method and device

An identification method and identification device technology, applied in the field of data processing, can solve problems such as intensified social conflicts, difficult human resource screening, and high correct estimation rate, so as to reduce the scope and cost, improve identification accuracy and recall rate, and make accurate judgments Effect

Active Publication Date: 2018-02-02
PING AN TECH (SHENZHEN) CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, it is necessary to analyze and identify the fraudulent data in some fraudulent behaviors that are prone to occur. For example, there are some malicious or illegal card swiping and reimbursement behaviors in the social insurance and medical reimbursement system. The existence of these behaviors will waste medical resources and intensify social conflicts.
For tens of thousands of medical bills to be reimbursed, it is difficult to screen one by one with limited human resources
Moreover, these data are unbalanced data, that is, fraudulent transaction data is relatively rare, and the common single model used for fraud data mining and prediction today only uses the maximum accuracy rate as the judgment standard, and the ratio of fraudulent transaction data to normal transaction data is very high. When it is rare, the normal single model has a high correct estimation rate for the data set that needs to be judged fraudulent, which makes it difficult to identify and display the fraudulent transaction data in the data set, which makes the recognition accuracy and recall rate of the fraudulent transaction data biased by the model. Low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fraudulent data identification method and device
  • A fraudulent data identification method and device
  • A fraudulent data identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0051] The invention provides a method for identifying fraudulent data.

[0052] refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the method for identifying fraudulent data in the present invention.

[0053] In the first embodiment, the method for identifying fraudulent data includes:

[0054] Step S10, using a preset continuous model training method to train the preset training data set to establish a continuous anti-fraud model;

[0055] In this embodiment, firstly, the preset continuous model training method is adopted, combined with data analysis theories such as decision tree and random forest, and data analysis tools such as R and SAS, to train the preset training data set to establish a continuous anti-fraud Model. For example, the preset training data set can be divided ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a fraudulent data identification method comprising the steps of training a preset training data set by using a preset successive type model training mode to build a successive type anti-fraud model; training to-be-tested data by using the successive type anti-fraud model to identify fraudulent data in the to-be-tested data. The invention also provides a fraudulent data identification device. Based on the characteristic that fraudulent data in to-be-tested data are non-balanced data, the successive type anti-fraud model is used for analyze and identify fraudulent data inthe to-be-tested data; compared with a common single model, the successive type anti-fraud model can improve the identification accuracy and recall rate of fraudulent data, more accurately judge fraudcases and reduce the range and cost of manual checking.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a method and device for identifying fraudulent data. Background technique [0002] At present, it is necessary to analyze and identify the fraudulent data in some fraudulent behaviors that are prone to occur. For example, there are some malicious or illegal card swiping and reimbursement behaviors in the social insurance and medical reimbursement system. The existence of these behaviors will waste medical resources and intensify social conflicts. . For tens of thousands of medical bills to be reimbursed, it is difficult to screen them one by one with limited human resources. Moreover, these data are unbalanced data, that is, fraudulent transaction data is relatively rare, and the common single model used for fraud data mining and prediction today only uses the maximum accuracy rate as the judgment standard, and the ratio of fraudulent transaction data to normal transacti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06Q50/22G06Q40/00
CPCG06Q20/401G06Q40/125G06Q50/22
Inventor 莫涛徐亮肖京
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products