Specific embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out all other embodiments obtained under the premise of creative work, shall fall in the protection scope of this application.
In one or more embodiments of this specification, execution logic relation picture as shown in Figure 1 may be employed.Fig. 1
In at least may include:Lender server, borrowed money account have associated related account with borrowed money account.Wherein:
Lender, it is machine that bank, financial platform, financial web site etc. can provide a user loan transaction that can be generally thought
Structure.In certain embodiments, the lender can also be the website for providing ideal money and related loan transaction or platform.
Lender server shown in Fig. 1, specifically can be used the server architecture of distribution/concentrating type, here and be not especially limited.
For ease of description, in herein below, will be simply referred to as:Server.In practical applications, lender can be based on loaning bill user's
Request, to loaning bill, user makes loans, that is, lender is transferred to corresponding amount into the borrowed money account of loaning bill user by its server
Fund.
Borrowed money account, it is believed that be that loaning bill user is account used in loaning bill.Specifically, which can borrow
Money user in advance lender registration account or other bank accounts, here and without specifically limiting.
In practical applications, after loaning bill user has borrowed or lent money the fund of corresponding amount from lender, it will usually use this
, such as:Shopping pays, transfers accounts, refunding, buying in stocks etc., and in other words, the fund in borrowed money account can be transferred to other accounts
In.So, it is foregoing that there is associated related account with borrowed money account, it also can be understood from the account flowed into after being shifted by fund
Family.
Explanation is needed exist for, for above-mentioned any account, transfer of the fund between account may be embodied in account
The variation of family remaining sum numerical value, specifically, if fund (being assumed to be 300 yuan) is transferred to account B from account A, then, account A
Remaining sum reduction numerical value for 300, and the increased numerical value of the remaining sum of account B institute is 300.
Therefore, in this specification embodiment, server can the change based on the remaining sum numerical value of borrowed money account and related account
Change, with reference to/the data such as transaction record of transferring accounts, realize the monitoring and tracking to fund.Furthermore, it is possible to by identifying foregoing related account
The mode at family determines whether related account is adventure account, illegal account or regular account, and then determines that loaning bill user is
No illegal or malicious exploitation fund, it is further provided the Risk Results estimated.
On the basis of above-mentioned framework as shown in Figure 1, below by be specifically described in this specification embodiment based on interconnection
The risk monitoring and control method of net credit.
As shown in Fig. 2, the method may include following steps:
Step S201:Obtain the data of making loans generated after being made loans for borrowed money account.
In this specification embodiment, loaning bill user can borrow money to lender, and correspondingly, lender will by its server
The fund of amount is specified to be transferred into the borrowed money account of loaning bill user.In the process, server would generally make loans behaviour for this
Make, generate data of making loans, at least may include in the data of making loans:Loan account information, amount of making loans information are (in general, volume of making loans
Degree is equal to loaning bill amount), temporal information of making loans, borrowed money account information etc..
Step S203:The collecting account that monitoring fund is transferred to from borrowed money account.
After loaning bill user obtains fund, it will usually using the fund, as previously mentioned, loaning bill user may be by account of borrowing money
Fund in family is transferred in the account of other users.In this process, fund may be used for illegal objective by loaning bill user
Or carry out malicious exploitation.Therefore in this specification embodiment, server will monitor account (that is, the account of collecting money that fund is transferred to
Family).
Such as:Fund is transferred to certain account B from borrowed money account A, then account B is regarded as actual collecting account.Example again
Such as:Fund is transferred to account C from borrowed money account A, is transferred to account D through account C, then is transferred to account E by account D, then, it should
Account C, D and E are regarded as collecting account.
It should be noted that after the fund in borrowed money account is transferred out of the borrowed money account by loaning bill user, which may
It can be shifted between different accounts, in the process, transfer of the fund between different accounts can be seen as a kind of path,
That is, fund transfer path.The account that fund transfer path is lived through is regarded as collecting account.
Step S205:Identify the incidence relation between the type and account of the collecting account.
In this specification embodiment, the type of collecting account can be identified through a variety of ways, such as:Pass through account name
With reference to keyword of transferring accounts, the type of collecting account is identified;Alternatively, by the identification model pre-established, collecting account is identified
Gathering pattern, and then determine the type of the collecting account.The identification of collecting account type will be described in detail in subsequent content,
Here do not repeat excessively first.
In a kind of possible embodiment, server can be directed to the type of the collecting account identified, can assign phase
The type identification answered, so as to generate mark data.
It is to be understood that the incidence relation between account, can include the relation between borrowed money account and each collecting account,
It may include the relation between each collecting account.
Incidence relation in this step between account can characterize the incidence relation between account-holder, which closes
System may include:Same people (same people), relatives, colleague, classmate, friend etc..Here it is not especially limited.
Step S207:According to the incidence relation between the data of making loans, the type of collecting account and account, generation is directed to
Fund estimates Risk Results.
In this specification embodiment, with reference to the incidence relation between data of making loans, its type of collecting account and account,
The purposes of loaning bill fund can be estimated.In a simple examples:It is assumed that borrowed money account A transfers accounts to collecting account B, account of collecting money
Family B transfers accounts again to collecting account C, if the holder for identifying collecting account B is loaning bill user, and collecting account C is
Lottery industry banker account, then, which can be used to gamble.
In another simple examples:Can by data such as time interval of transferring accounts, number of transferring accounts, amounts of transferring accounts, with reference to
The type of collecting account identifies the abnormal reflux of fund.
Obviously, server can be generated with this and estimate Risk Results for fund.
Based on foregoing teachings, after lending priority loaning bill user makes loans, server can be directed to turn of fund in borrowed money account
It moves path to be monitored, the incidence relation between the type and account of the collecting account being transferred to by identifying fund,
It can determine the purposes of fund, and then, risk can be carried out for the use of fund estimate accordingly.
The above are the main process of this specification embodiment risk monitoring method, lender therein can be non-banking
Third party's financial platform, the financial platform in addition to being capable of providing loan transaction, can towards a large number of users provide it is all kinds of
Financial service, such as:The services such as deposit, transfer accounts, paying.Under the premise of herein, the fund in borrowed money account is transferred to by loaning bill user
The process of other accounts, the transfer services that third party's financial platform may be used to be provided, and, collecting account falls within this
The account of third party's financial platform, then, server can be monitored the transfer of fund.
Based on this, in this specification embodiment, the collecting account that fund is transferred to from borrowed money account is monitored, specifically may be used
For:The direct collecting account and indirect collecting account that the fund is transferred to by the borrowed money account by monitoring, will it is described directly
Collecting account and indirect collecting account are connect, is determined as collecting account.As precedent, borrowed money account A transfers accounts to collecting account B, that
, collecting account B is then direct collecting account, and if collecting account B transfers accounts to collecting account C, then, the gathering account
Family C is then indirect collecting account.
It is to be noted that in actual application scenarios, multiple collecting accounts are may relate in fund transfer path,
And the fund carried out in fund transfer path between some accounts shifts and transferring accounts for above-mentioned third party's financial platform is not used
Service, then, this will cause server to be difficult to that fund transfer path is recognized accurately.
For example, it is assumed that a complete fund transfer path is:
Financial platform → Wu × → king × → Lee × → lottery industry banker account
Specifically, financial platform is as lender, on October 20th, 2017 to loaning bill user Wu × borrowed money account
Make loans 200,000 yuan, on the same day, Wu × by 200,000 yuan of fund in its borrowed money account be transferred to king × account, on October 21st, 2017 king
× by 190,000 yuan in its account be given to Lee ×, finally from Lee × to certain 190,000 yuan of lottery industry banker account transfer.
And it is assumed that in above-mentioned fund transfer path, king × to Lee × process transferred accounts, and above-mentioned financial platform is not used
The transfer services provided.So, in the case, for server, the volume of making loans in data of being made loans according to basis
It spends, the parameters such as time of making loans combine other alarm modes.
In other words, in the case, server can determine indirect collecting account in the following manner, i.e. described in monitoring
Indirect collecting account, specifically may include:Determine that the fund is transferred to the fund transfer letter that the direct collecting account is generated
Breath, amount is transferred accounts in monitoring and the time meets each account of the fund transinformation, by each account be determined as it is described indirectly
Collecting account.
It certainly, can also (transfer amounts account for the amount of money of making loans by configuring the ratio of transferring accounts for indirect collecting account
Ratio), amount of transferring accounts lower limit (only monitoring transfer accounts the how many above funds flow direction of amount), time interval of transferring accounts (only make loans by monitoring
How many days interior fund flows to situation afterwards), the modes such as the fund flow direction monitoring number of plies (track multiple layer credit fund flow direction) carry out
It monitors and determines.Here and it is not especially limited.
However, fund also still cannot effectively may be identified based on the result that the above process is monitored as shown in Figure 3a
Fund transfer path.
For this purpose, in this specification embodiment, social networks network data is introduced, is known by the social networks network data
Do not go out the association between the user corresponding to each collecting account.
Specifically, server can be transferred accounts according to history record, network and facility information, address list, based on location-based service
Data such as (Location Based Service, LBS) are identified belonging to collecting account involved in fund transfer path
User between incidence relation.
It is, of course, understood that in this specification embodiment, server can be based on corresponding algorithm or model,
And based on above-mentioned data, social networks network data is obtained, is just no longer excessively illustrated here.
Wherein, the network and facility information, it may include:Wireless fidelity network wifi information, end used by a user
Media access control (Media Access Control, MAC) address of end equipment, International Mobile Equipment Identity code
(International Mobile Equipment Identity, IMEI), Internet protocol address (Internet
Protocol Address, IP) etc. information.
Based on aforesaid way, social networks network data can be generated.So, shifted for the fund in aforementioned exemplary
For path, the fund carried out for the account that financial platform is wherein not used shifts, and can pass through the social networks network number
According to determining the incidence relation between these account owning users, and further improve fund transfer path.
With reference to above-mentioned example, in a kind of example, server can according to king × history transfer accounts record, count king × more
The secondary user to entitled " Lee × " transfers accounts, in the remark information that it is repeatedly transferred accounts, indicated Lee × phone number.
In Fig. 3 a, according to Lee × to the transfer information of lottery industry banker account, the identical phone number of Lee × remarks is determined, therefore can be with
Determine king × history transfer accounts record in Lee ×, with Lee in Fig. 3 a × be same people.
In another example, server can obtain king ×, Lee × in history using corresponding financial service when used
The information such as MAC Address, the IP address of terminal device, and determine that IP address used in two people is identical, then, two people of characterization deposit
In certain incidence relation.Further, if in the transfer procedure shown in Fig. 3 a, monitoring server is to lottery industry banker account
The MAC Address of terminal device of the MAC Address for the terminal device that family is transferred accounts with getting Lee × use in history is identical, then can be true
Make artificial Lee that transfers accounts to lottery industry banker account ×.
With reference to the monitoring recognition result in above-mentioned two example, and Wu × be given to king × fund amount and Lee × be given to
The amount of lottery industry banker account is close, then, server can estimate king × transferred accounts at certain moment to Lee × using fund,
Therefore for server, fund transfer path as shown in Figure 3b can be determined.
Certainly, in practical applications, it can also determine what fund was transferred to by other social networks network datas
Different collecting accounts, just no longer excessively repeat here.
Fund transfer path with reference to shown in Fig. 3 b, financial platform to Wu × greater probability of making loans be illegally used,
Therefore corresponding Risk Results can be generated, to prompt this fund that there may be risks.
It should be noted that for the above method in this specification embodiment, for collecting account type really
It is fixed, different modes may be employed.It is specifically described with reference to Fig. 4.
1st, the behavior based on collecting account
In this mode, the type of collecting account is determined by monitoring the gathering of collecting account/transfer accounts behavior.In one kind
In embodiment, server can monitor the receipts such as the number for the fund that a certain collecting account is collected in set period of time, amount
Money behavior.Certainly, in other embodiments, server can also monitor the money that the collecting account is produced in set period of time
Item number, amount etc. produce behavior.
Obviously, if some account, in a short time the fund for receiving one/multiple accounts is concentrated to be transferred to, then, it should
Account is that small-sized finance company's account, lottery industry account, securities broker company's account or lottery ticket, the possibility of fund sales account compare
Greatly, risk class is also higher.
2nd, the incidence relation based on collecting account
In this mode, server can will have height based on the type belonging to the account predefined out with the account
Other accounts of incidence relation are also determined as the type.Such as:Certain account is lottery industry banker account, then has high incidence relation with it
Account be lottery industry banker account probability it is higher.
3rd, based on keyword
In this mode, the class of collecting account by the keyword in account name keyword and transfer information, can be determined
Type.Specifically, for name on account keyword, the passes such as little Dai companies, securities broker company, real estate development corporation are passed through
Keyword matches account title, so as to confirm Account Type.For transfer information keyword, by such as refunding, interest, head
The keyword paid, occurred in the remarks of transferring accounts such as house money confirms collecting account type for types such as Wang Dai mechanisms, house markets.
4th, based on the site information crawled
In this mode, can the excessive risks websites such as gambling, financial mutual assistance, P2P be crawled by web crawlers technology,
The Business Name of these websites is associated out, corresponding collecting account is associated out further according to Business Name.
It is understood that above-mentioned listed mode is only to determine the possibility mode of collecting account type, actually should
In, it is also possible to which, using other manner, manually verification etc., should not form the restriction to the application here.
On the basis of the above, the risk monitoring and control method in this specification embodiment can also be applied to monitoring pin
The personnel of selling collect the scene of user's service charge.Specifically:
As shown in fig. 5, it is assumed that grandson sales force * * provide a loan to bank recommended user king * *, it is assumed that bank was in 2017 years
May 21 provided 500,000 yuan of personal loans to user king * *, and by social networks network data, server determines the parent of king * *
Friendly account is on May 22nd, 2017, i.e., less than 1 day time after loan origination, 50,000 yuan of kith and kin's account Hu * * accounts for arriving grandson * * of transferring accounts
On family, so as to generate corresponding Risk Results, bank, which is based on the Risk Results, can take corresponding measure, such as:Manually arranged
It looks into.
Several embodiments of the risk monitoring and control method based on internet credit provided above for the application, based on same
Thinking, present invention also provides the embodiment of the risk monitoring and control device based on internet credit, as shown in fig. 6, being provided in data
Square side, the risk monitoring and control device based on internet credit include:
Acquisition module 601 obtains the data of making loans generated after being made loans for borrowed money account;
Monitoring modular 602, the collecting account that monitoring fund is transferred to from borrowed money account;
Identification module 603 identifies the incidence relation between the type and account of the collecting account;
Risk estimates module 604, according to the incidence relation between the data of making loans, the type of collecting account and account,
Generation estimates Risk Results for fund.
Further, the monitoring modular 602 monitors the direct gathering for being transferred to the fund by the borrowed money account
Account and indirect collecting account by the direct collecting account and indirect collecting account, are determined as collecting account.
The monitoring modular 602 determines that the fund is transferred to the fund transfer letter that the direct collecting account is generated
Breath, amount is transferred accounts in monitoring and the time meets each account of the fund transinformation, by each account be determined as it is described indirectly
Collecting account.
The identification module 603, passes through the type of collecting account described in the account Activity recognition of the collecting account;
Wherein, the account behavior includes at least:The number for the fund collected in set period of time, amount, Huo,
The number of the fund produced in set period of time, amount.
The identification module 603 by the incidence relation between the fixed account of type, identifies the collecting account
Type.
The identification module 603, account name keyword and remarks keyword of transferring accounts by the collecting account identify institute
State the type of collecting account.
The identification module 603 based on the site information obtained in advance for appointed website, identifies the collecting account
Type.
The identification module 603 according to the social networks network data previously generated, identifies the borrowed money account, directly
Incidence relation between collecting account and indirect collecting account.
The risk estimates module 604, is closed according to the association between the data of making loans, collecting account type and account
System determines the purposes of the fund, and Risk Results are estimated for the fund according to purposes generation.
Correspondingly, in this specification embodiment, a kind of risk monitoring and control equipment based on internet credit is also provided, including:
Processor, memory, wherein:
The memory stores the risk monitoring and control program based on internet credit;
The processor calls the risk monitoring and control program based on internet credit stored in memory, and performs:
Obtain the data of making loans generated after being made loans for borrowed money account;
The collecting account that monitoring fund is transferred to from borrowed money account;
Identify the incidence relation between the type and account of the collecting account;
According to the incidence relation between the data of making loans, the type of collecting account and account, generation is pre- for fund
Estimate Risk Results.
In the 1990s, can clearly be distinguished for the improvement of a technology be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Improved method flow nearly all by being programmed into hardware circuit to obtain corresponding hardware circuit by designer.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without chip maker is asked to design and make
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be performed by (micro-) processor can
Read medium, logic gate, switch, application-specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller include but not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with
Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained in the form of logic gate, switch, application-specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. to come in fact
Existing identical function.Therefore this controller is considered a kind of hardware component, and various to being used to implement for including in it
The device of function can also be considered as the structure in hardware component.Or even, the device for being used to implement various functions can be regarded
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by having the function of certain product.A kind of typical realization equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented
The function of each unit is realized can in the same or multiple software and or hardware during application.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the present invention
Apply the form of example.Moreover, the computer for wherein including computer usable program code in one or more can be used in the present invention
The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or
The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only memory (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.It defines, calculates according to herein
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of elements are not only including those elements, but also wrap
Include other elements that are not explicitly listed or further include for this process, method, commodity or equipment it is intrinsic will
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described
Also there are other identical elements in the process of element, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or the embodiment in terms of combining software and hardware can be used in the application
Form.It is deposited moreover, the application can be used to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes performing particular transaction or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environment, by
Affairs are performed and connected remote processing devices by communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Point just to refer each other, and the highlights of each of the examples are difference from other examples.It is real especially for system
For applying example, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
The foregoing is merely embodiments herein, are not limited to the application.For those skilled in the art
For, the application can have various modifications and variations.All any modifications made within spirit herein and principle are equal
Replace, improve etc., it should be included within the scope of claims hereof.