Fraudulent user identification method, fraudulent user identification device and electronic equipment

A user identification and user technology, applied in data processing applications, instruments, payment systems, etc., to prevent fraud losses, accurately identify, and improve accuracy

Pending Publication Date: 2021-02-09
SHANGHAI QIYUE INFORMATION TECH CO LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, there is still much room for improvem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraudulent user identification method, fraudulent user identification device and electronic equipment
  • Fraudulent user identification method, fraudulent user identification device and electronic equipment
  • Fraudulent user identification method, fraudulent user identification device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Below, will refer to Figure 1 to Figure 3 An embodiment of the fraudulent user identification method of the present invention is described.

[0048] figure 1 It is a flow chart of the fraudulent user identification method of the present invention. Such as figure 1 As shown, a fraudulent user identification method includes the following steps.

[0049] Step S101, acquiring historical user data, historical transaction data and fraud data, and constructing a user fraud network map.

[0050] Step S102, extracting and screening model characteristic variables based on the user fraud network graph.

[0051] In step S103, the user group is segmented according to a preset strategy, and a training data set and a verification data set are established based on the user group segmentation result and the selected model characteristic variables.

[0052] Step S104, establishing multiple segmented transaction fraud assessment models, and using the training data set to train the m...

Embodiment 2

[0114] An apparatus embodiment of the present invention is described below, and the apparatus can be used to execute the method embodiment of the present invention. The details described in the device embodiments of the present invention should be regarded as supplements to the above method embodiments; details not disclosed in the device embodiments of the present invention can be implemented by referring to the above method embodiments.

[0115] refer to Figure 4 , Figure 5 with Image 6 , the present invention also provides a fraudulent user identification device 400, including: a data acquisition module 401 for acquiring historical user data, historical transaction data and fraud data, and constructing a user fraud network map; an extraction and screening module 402, based on the user Fraud network map, extracting and screening model characteristic variables; processing module 403, subdividing user groups according to preset strategies, and establishing training data s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fraudulent user identification method, a fraudulent user identification device and electronic equipment. The method comprises the steps of obtaining historical user data, historical transaction data and fraud data, and constructing a user fraud network graph; based on the user fraud network graph, extracting and screening model characteristic variables; subdividing the user group according to a preset strategy, and establishing a training data set and a verification data set based on a subdivision result of the user group and the screened model characteristic variables; establishing a plurality of segmented transaction fraud evaluation models, and training the transaction fraud evaluation models by using the training data set; obtaining user data and transaction data of a current user, and calculating a fraud evaluation value of the current user by using the corresponding transaction fraud evaluation model; and identifying whether the user is a fraudulent userbased on the fraudulent evaluation value of the user. According to the method, fraudulent clients can be identified more accurately, the fraudulent probability identification accuracy is effectively improved, and the model prediction precision is improved.

Description

technical field [0001] The invention relates to the field of computer information processing, in particular to a fraudulent user identification method, device and electronic equipment. Background technique [0002] Risk control (referred to as risk control) means that risk managers take various measures and methods to eliminate or reduce the various possibilities of risk cases, or risk controllers reduce the losses caused by risk cases. Risk control is generally used in the financial industry, such as risk control for company transactions, business transactions or personal transactions. [0003] In the context of expanding business scale, diversification of fraud methods, and rising labor costs, existing fraud prevention methods tend to refine the anti-fraud management model, and establish intelligent anti-fraud management based on the fraud scoring model, forming a quantitative A business model combining analytical and qualitative analysis is imperative. Furthermore, ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40
CPCG06Q20/4016
Inventor 叶静刘涛
Owner SHANGHAI QIYUE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products