Fraudulent user identification method, fraudulent user identification device and electronic equipment
A user identification and user technology, applied in data processing applications, instruments, payment systems, etc., to prevent fraud losses, accurately identify, and improve accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] Below, will refer to Figure 1 to Figure 3 An embodiment of the fraudulent user identification method of the present invention is described.
[0048] figure 1 It is a flow chart of the fraudulent user identification method of the present invention. Such as figure 1 As shown, a fraudulent user identification method includes the following steps.
[0049] Step S101, acquiring historical user data, historical transaction data and fraud data, and constructing a user fraud network map.
[0050] Step S102, extracting and screening model characteristic variables based on the user fraud network graph.
[0051] In step S103, the user group is segmented according to a preset strategy, and a training data set and a verification data set are established based on the user group segmentation result and the selected model characteristic variables.
[0052] Step S104, establishing multiple segmented transaction fraud assessment models, and using the training data set to train the m...
Embodiment 2
[0114] An apparatus embodiment of the present invention is described below, and the apparatus can be used to execute the method embodiment of the present invention. The details described in the device embodiments of the present invention should be regarded as supplements to the above method embodiments; details not disclosed in the device embodiments of the present invention can be implemented by referring to the above method embodiments.
[0115] refer to Figure 4 , Figure 5 with Image 6 , the present invention also provides a fraudulent user identification device 400, including: a data acquisition module 401 for acquiring historical user data, historical transaction data and fraud data, and constructing a user fraud network map; an extraction and screening module 402, based on the user Fraud network map, extracting and screening model characteristic variables; processing module 403, subdividing user groups according to preset strategies, and establishing training data s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com