CN111383097B - Method and device for mining personal suspected account - Google Patents

Method and device for mining personal suspected account Download PDF

Info

Publication number
CN111383097B
CN111383097B CN202010213279.7A CN202010213279A CN111383097B CN 111383097 B CN111383097 B CN 111383097B CN 202010213279 A CN202010213279 A CN 202010213279A CN 111383097 B CN111383097 B CN 111383097B
Authority
CN
China
Prior art keywords
account
target object
entity
personal
suspected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010213279.7A
Other languages
Chinese (zh)
Other versions
CN111383097A (en
Inventor
陈青山
许国良
唐雪婷
林舒杨
章晖
刘冰冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202010213279.7A priority Critical patent/CN111383097B/en
Publication of CN111383097A publication Critical patent/CN111383097A/en
Application granted granted Critical
Publication of CN111383097B publication Critical patent/CN111383097B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Animal Behavior & Ethology (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Technology Law (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method and a device for mining a suspected account of a person, and relates to the technical field of computers. One embodiment of the method comprises the following steps: acquiring an entity object associated with a target object from an interpersonal relationship knowledge graph; acquiring a first account of a target object and an entity object; searching a second account with data interaction with the first account from the account interaction data, and acquiring an object identifier of the second account; and if the object identification of the second account is matched with the identification of the target object, taking the second account as a personal suspected account of the target object. According to the embodiment, the suspected personal account can be mined based on the interpersonal relationship knowledge graph and the account interaction data, so that account fusion, asset management and asset security can be more effectively carried out on the person; meanwhile, the problem that the computing resources are difficult to meet the computing demands due to huge user data and account interaction data is solved.

Description

Method and device for mining personal suspected account
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and apparatus for mining a suspected account of a person.
Background
With the rapid development of economy, the economic interaction activities among people are continuously increased, dishonest phenomena occur during the citizen interaction due to the imperfect market economy and the legal dislike, the phenomena of evading liabilities through means such as transfer, hiding, property destroying and the like are frequent, social contradiction is a diversified rising trend, the integrity of the asset is maintained, and the asset loss is prevented, so that the method becomes an important subject in the present day.
While banks are an important force for structural reform on the financial supply side, the bank faces great challenges in maintaining the integrity of assets and preventing the loss of the assets in application scenarios.
In the process of implementing the present invention, the inventor finds that at least the following problems exist in the prior art:
when maintaining the integrity of the assets and preventing the loss of the assets, the bank needs to perform association management on all accounts owned by the person, and how to mine all accounts owned by the person is a problem to be solved in the present day.
Disclosure of Invention
In view of the above, the embodiments of the present invention provide a method and an apparatus for mining a suspected account of a person, which can mine a suspected account of a person based on an interpersonal relationship knowledge graph and account interaction data, so as to perform account fusion, asset management and asset security on the person more effectively; meanwhile, the problem that the computing resources are difficult to meet the computing demands due to huge user data and account interaction data is solved.
To achieve the above object, according to one aspect of the embodiments of the present invention, there is provided a method of mining a suspected account of a person.
A method of mining a suspected account of a person, comprising: acquiring an entity object associated with a target object from an interpersonal relationship knowledge graph; acquiring a first account of the target object and the entity object; searching a second account with data interaction with the first account from account interaction data, and acquiring an object identification of the second account; and if the object identification of the second account is matched with the identification of the target object, taking the second account as a personal suspected account of the target object.
Optionally, the construction process of the interpersonal relationship knowledge graph includes: extracting entities from user data; collecting attribute information of each entity according to the extracted entities; extracting the association relation between the entities according to the attribute information of the entities; and constructing an interpersonal relationship knowledge graph according to the association relationship between the entities.
Optionally, the entity of extraction includes both enterprise and natural person types.
Optionally, the association between the entities includes a guaranty, a parent child, a sibling, and a spouse.
Optionally, the entity object is an entity within two degrees of the knowledge graph expansion based on the interpersonal relationship.
Optionally, the method further comprises: and constructing a personal account knowledge graph based on the personal relationship knowledge graph and a first account and a second account corresponding to each object in the personal relationship knowledge graph.
Optionally, if the second account corresponding to the target object includes a plurality of identical accounts, only one of the identical accounts is reserved, and only the associated path with the shortest path is reserved in the personal account knowledge graph.
According to another aspect of the embodiment of the invention, a device for mining a suspected account of a person is provided.
An apparatus for mining a suspected account of a person, comprising: the entity object acquisition module is used for acquiring entity objects associated with the target objects from the interpersonal relationship knowledge graph; the first account acquisition module is used for acquiring a first account of the target object and the entity object; the second account searching module is used for searching a second account with data interaction with the first account from account interaction data and acquiring an object identifier of the second account; and the object identification matching module is used for taking the second account as a personal suspected account of the target object if the object identification of the second account is matched with the identification of the target object.
According to yet another aspect of an embodiment of the present invention, an electronic device for mining a personal suspicious account is provided.
An electronic device for mining a suspected account of a person, comprising: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors are enabled to realize the method for mining the suspected account of the person provided by the embodiment of the invention.
According to yet another aspect of an embodiment of the present invention, a computer-readable medium is provided.
A computer readable medium having stored thereon a computer program which when executed by a processor implements a method of mining a personal suspicious account provided by an embodiment of the present invention.
One embodiment of the above invention has the following advantages or benefits: acquiring an entity object associated with a target object from an interpersonal relationship knowledge graph; acquiring a first account of a target object and an entity object; searching a second account with data interaction with the first account from the account interaction data, and acquiring an object identifier of the second account; if the object identification of the second account is matched with the identification of the target object, the second account is used as the personal suspected account of the target object, so that the personal suspected account is mined based on the interpersonal relationship knowledge graph and the account interaction data, and more effective account fusion, asset management and asset security can be carried out on the person; meanwhile, the problem that the computing resources are difficult to meet the computing demands due to huge user data and account interaction data is solved.
Further effects of the above-described non-conventional alternatives are described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of the main steps of a method of mining a suspected account of a person according to an embodiment of the invention;
FIG. 2 is a schematic diagram of a mining process for a personal suspected account in accordance with one embodiment of the invention;
FIG. 3 is a schematic diagram of the main modules of an apparatus for mining a suspected account of a person according to an embodiment of the invention;
FIG. 4 is an exemplary system architecture diagram in which embodiments of the present invention may be applied;
fig. 5 is a schematic diagram of a computer system suitable for use in implementing an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present invention are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Banks are becoming a significant strength in the structural reform of the financial supply side, deepening understanding and application of financial technology, and enhancing strategic deployment in the financial technology. Currently, the deep fusion of emerging technologies and financial industries, represented by big data, cloud computing, artificial intelligence, blockchain, etc., is pushing the traditional financial industry to walk into the fast lane of the transformation development. Along with the development of big data and artificial intelligence technology, the knowledge graph can help to understand the big data through semantic links, and the insight on the big data is obtained. Potential information is mined from the network by building a customer relationship network.
According to the invention, aiming at the personal suspected account holding mining scene, the algorithm of the personal suspected account holding mining is researched, and the in-line accounts and the out-of-line accounts which are suspected to be held by the person are mined, so that more effective asset management and asset security can be carried out on the person. The invention provides a method for mining a suspected account holding relation based on fund flowing and interpersonal relation, which is used for mining suspected account holding on the basis of fund flowing and interpersonal relation and is used for account fusion, asset management and asset security.
In the description of the embodiments of the present invention, terms appearing are explained as follows:
in-line account: a personal account in the current bank;
an off-line account: personal accounts of other banks than the current bank;
fund running water: funds of the in-line account and the out-line account are recorded in a coming-going mode;
interpersonal relationship: spouse, child parents, siblings, and entities within two degrees of a guaranteed relationship. Wherein, the entities within two degrees refer to all entities contained in one layer and two layers of the entity by expanding the relationship between people;
personal suspicious account: and the account is a peer-to-peer account with which the customer or friends of the customer have funds to and from, wherein the friends are entities within two degrees in the interpersonal relationship knowledge graph.
Fig. 1 is a schematic diagram of the main steps of a method of mining a suspected account of a person according to an embodiment of the invention. As shown in fig. 1, the method for mining a suspected account of a person according to the embodiment of the present invention mainly includes the following steps S101 to S104.
Step S101: acquiring an entity object associated with a target object from an interpersonal relationship knowledge graph;
step S102: acquiring a first account of a target object and an entity object;
step S103: searching a second account with data interaction with the first account from the account interaction data, and acquiring an object identifier of the second account;
step S104: and if the object identification of the second account is matched with the identification of the target object, taking the second account as a personal suspected account of the target object.
By combining the embodiment of the invention, the target object is the person who is to dig the suspected account; the identification of the target object is the identification information such as the personal name, the identity card number and the like of the target object; the entity object is a person with an association relation with the target object; the first account refers to an in-line account of a bank main body for mining a personal suspected account; the second account refers to an off-line account of the bank body mining the personal suspected account; the account interaction data is transaction flow data for all bank accounts.
According to the steps S101 to S104, the method can realize the mining of the personal suspected account based on the interpersonal relationship knowledge graph and the account interaction data, so that the account fusion, the asset management and the asset security can be more effectively carried out on the person; meanwhile, the data integration and association processing are carried out based on the interpersonal relationship knowledge graph, and the problem that computing resources are difficult to meet computing requirements due to huge user data and account interaction data is solved.
In the embodiment of the invention, the suspected account held by the person is mined based on the fund flowing water and the interpersonal relationship, the construction of the interpersonal relationship knowledge graph is the basis of subsequent application, and for the graph construction, the basic graph centering on the client is gradually formed from entity extraction, attribute extraction and relationship extraction, so that 4 basic interpersonal relationships including enterprises, personal entities, parents, children, siblings, spouse, guarantee and the like are formed.
Specifically, the construction process of the interpersonal relationship knowledge graph mainly comprises the following steps:
extracting entities from user data;
collecting attribute information of each entity according to the extracted entities;
extracting the association relation between the entities according to the attribute information of the entities;
and constructing an interpersonal relationship knowledge graph according to the association relationship between the entities.
The construction of the interpersonal relationship knowledge graph is based on the premise that data needs to be extracted from different data sources. Data sources come mainly from two sources: one is the business's own data, which is generated during banking and management activities, typically contained in database tables in the enterprise information system and stored in a structured manner; the other is the data disclosed and captured on the network, and the data comprises semi-structured or unstructured data besides the common structuring.
In order to comprehensively reflect the interpersonal relationship knowledge graph centered on the client, the invention constructs the relationship graph between the clients comprising the full-scale pair public client and the full-scale pair private client, wherein the relationship graph comprises the clients and other clients. In the invention, the information such as basic information, association relation information, asset liability information, transaction behavior information, risk rating information and the like of public customers and related natural persons in banks are integrated, but not limited to, and the asset liability of outsourcing business enterprises and related natural persons, credit and other financial institutions are integrated.
First, entity extraction is performed from user data. The entity extracted includes both enterprise and natural person types. And two types of entities, namely enterprises and natural people, are formed by extracting and identifying from the bank client information and the business enterprise data. The method comprises the steps of extracting a public client entity and a private client entity from bank client information; and extracting the business entity, legal persons, high-level management and other natural person entities related to the business from the business enterprise data.
And secondly, collecting attribute information of each entity according to the extracted entities. According to the identified entity, collecting attribute information of the entity, such as information of business registration information, enterprise scale, operating condition, loan deposit balance and the like of enterprises, age, sex and the like of individuals, and extracting the attribute information to describe the entity.
Then, the association relation between the entities is extracted according to the attribute information of the entities. And extracting the association relation between the entities according to the existing identified entities. The extraction of the association relationship between the entities mainly aims at the direct relationship, including guaranty, parent-child, brother sister and spouse. Such relationships can be intuitively analyzed from existing data sources, for example, if a guarantor exists between clients, wherein the client a is a guarantor of the client B, then the guarantor relationship exists between the clients A, B, and the relationship extraction mode is to directly obtain the relationship. The specific definitions of these relationships are shown in table 1 below.
TABLE 1
And finally, constructing an interpersonal relationship knowledge graph according to the entity and the association relationship between the entities.
After the interpersonal relationship knowledge graph is constructed, the entity object associated with the target object can be obtained according to the interpersonal relationship knowledge graph, wherein the entity object is an entity within two degrees of expansion based on the interpersonal relationship knowledge graph.
The invention defines a suspected account of a customer as a peer-to-peer account with which the customer or the customer's friend has funds to and from. Wherein a friend is defined as an entity within two degrees of the customer's spouse, child parent, sibling, guaranty relationship, etc., as determined based on the interpersonal relationship knowledge map. The two-degree entity is the entity corresponding to the node of the two sections of associated paths away from a certain fixed starting point in the knowledge graph.
In the embodiment of the invention, taking the name of the target object as the target object identifier as an example, the steps of mining the personal suspected account are as follows:
1. finding an entity object (i.e., friend) associated with the target object;
2. a suspected account match comprising:
1) Finding an in-line account of the target object and the associated entity object;
2) Finding out the out-of-line accounts with the in-line accounts through the fund flowing;
3) Matching the name of the external account with the name of the target object, if the matching is successful, the external account is a suspected account of the target object, and reserving an association path between the external account and the target object;
3. and merging mining results, wherein if the target object mines a plurality of identical out-of-line accounts, only one of the identical out-of-line accounts is reserved, and meanwhile, the shortest association path is reserved so as to construct a personal account knowledge graph according to the interpersonal relationship knowledge graph and the in-line accounts and out-of-line accounts corresponding to each object in the interpersonal relationship knowledge graph.
FIG. 2 is a schematic diagram of a mining process for a personal suspicious account according to one embodiment of the present invention. In this embodiment, as shown in fig. 2, the process of mining a suspected account of a person is shown, and as such, may also be considered part of a knowledge graph of a constructed person account. In fig. 2, a character string consisting of letters and numbers beginning with I represents an in-line account, and a character string consisting of letters and numbers beginning with O represents an out-of-line account.
As shown in fig. 2, the mining analysis process for the personal suspected account is as follows:
1) The holding in-line accounts I001 and I002 have funds to and from the out-of-line account O001 (i.e.: data interaction), the relationship between the E and the B is that the name of the holder of the off-line account O001 is the same as that of the B, so the off-line account O001 is a suspected account of the B;
2) The in-line account I002 held by the pentane has funds to and from the out-of-line account O002, the pentane and the butane have a common neighbor B, and the name of the holder of the out-of-line account O002 is the same as that of the butane, so the out-of-line account O002 is a suspected account of the butane;
3) The in-line account I003 held by the second party has funds to and from the out-of-line account O003, and the name of the holder of the out-of-line account O003 is the same as that of the second party, so the out-of-line account O003 is a suspected account of the second party;
4) The in-line account I003 held by the second has fund exchange with the out-of-line account O004, the first and the second are in spouse relationship, and the name of the holder of the out-of-line account O004 is the same as that of the first, so the out-of-line account O004 is a suspected account of the first.
Fig. 3 is a schematic diagram of main modules of an apparatus for mining a suspected account of a person according to an embodiment of the present invention. As shown in fig. 3, an apparatus 300 for mining a suspected account of a person according to an embodiment of the present invention mainly includes an entity object obtaining module 301, a first account obtaining module 302, a second account searching module 303, and an object identifier matching module 304.
The entity object obtaining module 301 is configured to obtain an entity object associated with the target object from the interpersonal relationship knowledge graph;
a first account obtaining module 302, configured to obtain a first account of the target object and the entity object;
the second account searching module 303 is configured to search a second account having data interaction with the first account from account interaction data, and obtain an object identifier of the second account;
the object identifier matching module 304 is configured to, if the object identifier of the second account matches the identifier of the target object, use the second account as a personal suspected account of the target object.
In one embodiment of the present invention, the construction process of the interpersonal relationship knowledge graph mainly includes the following steps:
extracting entities from user data;
collecting attribute information of each entity according to the extracted entities;
extracting the association relation between the entities according to the attribute information of the entities;
and constructing an interpersonal relationship knowledge graph according to the association relationship between the entities.
According to one embodiment of the invention, the entity extracted may mainly include both enterprise and natural person types.
According to another embodiment of the present invention, the association between entities mainly includes guaranty, parent, sibling and spouse.
According to yet another embodiment of the present invention, the entity object is an entity within two degrees of knowledge graph expansion based on interpersonal relationships.
According to yet another embodiment of the present invention, the apparatus 300 for mining a suspected account of a person may further include an account profile construction module for:
and constructing a personal account knowledge graph based on the personal relationship knowledge graph and a first account and a second account corresponding to each object in the personal relationship knowledge graph.
According to still another embodiment of the present invention, if the second account corresponding to the target object includes a plurality of identical accounts, only one of the plurality of identical accounts is reserved, and only the associated path with the shortest path is reserved in the personal account knowledge graph.
According to the technical scheme of the embodiment of the invention, the entity object associated with the target object is obtained from the interpersonal relationship knowledge graph; acquiring a first account of a target object and an entity object; searching a second account with data interaction with the first account from the account interaction data, and acquiring an object identifier of the second account; if the object identification of the second account is matched with the identification of the target object, the second account is used as the personal suspected account of the target object, so that the personal suspected account is mined based on the interpersonal relationship knowledge graph and the account interaction data, and more effective account fusion, asset management and asset security can be carried out on the person; meanwhile, the problem that the computing resources are difficult to meet the computing demands due to huge user data and account interaction data is solved.
Fig. 4 illustrates an exemplary system architecture 400 of a method of mining a personal suspicious account or an apparatus for mining a personal suspicious account to which embodiments of the present invention may be applied.
As shown in fig. 4, the system architecture 400 may include terminal devices 401, 402, 403, a network 404, and a server 405. The network 404 is used as a medium to provide communication links between the terminal devices 401, 402, 403 and the server 405. The network 404 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
A user may interact with the server 405 via the network 404 using the terminal devices 401, 402, 403 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 401, 402, 403.
The terminal devices 401, 402, 403 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 405 may be a server providing various services, such as a background management server (by way of example only) providing support for shopping-type websites browsed by users using the terminal devices 401, 402, 403. The background management server may analyze and process the received data such as the product information query request, and feedback the processing result (e.g., the target push information, the product information—only an example) to the terminal device.
It should be noted that, the method for mining a suspected account of a person provided in the embodiment of the present invention is generally executed by the server 405, and accordingly, the device for mining a suspected account of a person is generally disposed in the server 405.
It should be understood that the number of terminal devices, networks and servers in fig. 4 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 5, there is illustrated a schematic diagram of a computer system 500 suitable for use in implementing a terminal device or server in accordance with an embodiment of the present invention. The terminal device or server shown in fig. 5 is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present invention.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU) 501, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the system of the present invention are performed when the computer program is executed by a Central Processing Unit (CPU) 501.
The computer readable medium shown in the present invention may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules involved in the embodiments of the present invention may be implemented in software or in hardware. The described units or modules may also be provided in a processor, for example, as: the processor comprises an entity object acquisition module, a first account acquisition module, a second account searching module and an object identification matching module. The names of these units or modules do not in some cases limit the units or modules themselves, and for example, the entity object obtaining module may also be described as "a module for obtaining an entity object associated with a target object from an interpersonal relationship knowledge graph".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be present alone without being fitted into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to include: acquiring an entity object associated with a target object from an interpersonal relationship knowledge graph; acquiring a first account of the target object and the entity object; searching a second account with data interaction with the first account from account interaction data, and acquiring an object identification of the second account; and if the object identification of the second account is matched with the identification of the target object, taking the second account as a personal suspected account of the target object.
According to the technical scheme of the embodiment of the invention, the entity object associated with the target object is obtained from the interpersonal relationship knowledge graph; acquiring a first account of a target object and an entity object; searching a second account with data interaction with the first account from the account interaction data, and acquiring an object identifier of the second account; if the object identification of the second account is matched with the identification of the target object, the second account is used as the personal suspected account of the target object, so that the personal suspected account is mined based on the interpersonal relationship knowledge graph and the account interaction data, and more effective account fusion, asset management and asset security can be carried out on the person; meanwhile, the problem that the computing resources are difficult to meet the computing demands due to huge user data and account interaction data is solved.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives can occur depending upon design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (7)

1. A method of mining a suspected account of a person, comprising:
acquiring an entity object associated with a target object from an interpersonal relationship knowledge graph, wherein the target object is an individual for mining an individual suspected account, and the entity object is an individual with an association relationship with the target object;
acquiring a first account of the target object and the entity object, wherein the first account is an intra-line account of a bank main body for mining a personal suspected account, and the intra-line account is a personal account in a current bank;
searching a second account with data interaction with the first account from account interaction data, and acquiring an object identification of the second account, wherein the second account is an off-line account of a bank main body for mining a personal suspected account, and the off-line account is a personal account of other banks except the current bank;
and if the object identification of the second account is matched with the identification of the target object, taking the second account as a personal suspected account of the target object, wherein the personal suspected account is an off-line account of the target object with funds to and from the target object or an entity object associated with the target object, the entity object associated with the target object is an entity within two degrees associated with the target object in an inter-personal relationship knowledge graph, the entity within two degrees is all entities which are contained in one layer and two layers of a certain entity through an inter-personal relationship, the entity comprises two types of enterprises and natural persons, and the association relationship among the entities comprises guarantee, parents, siblings and spouse.
2. The method according to claim 1, wherein the process of constructing the interpersonal relationship knowledge graph comprises:
extracting entities from user data;
collecting attribute information of each entity according to the extracted entities;
extracting the association relation between the entities according to the attribute information of the entities;
and constructing an interpersonal relationship knowledge graph according to the association relationship between the entities.
3. The method as recited in claim 1, further comprising:
and constructing a personal account knowledge graph based on the personal relationship knowledge graph and a first account and a second account corresponding to each entity object in the personal relationship knowledge graph.
4. A method according to claim 3, wherein if the second account corresponding to the target object includes a plurality of identical accounts, only one of the plurality of identical accounts is reserved, and only the associated path with the shortest path is reserved in the personal account knowledge graph.
5. An apparatus for mining a suspected account of a person, comprising:
the entity object acquisition module is used for acquiring an entity object associated with a target object from the interpersonal relationship knowledge graph, wherein the target object is an individual for mining an individual suspected account, and the entity object is an individual with an association relationship with the target object;
the first account acquisition module is used for acquiring a first account of the target object and the entity object, wherein the first account is an intra-line account of a bank main body for mining a personal suspected account, and the intra-line account is a personal account in a current bank;
the second account searching module is used for searching a second account with data interaction with the first account from account interaction data, and acquiring an object identifier of the second account, wherein the second account is an off-line account of a bank main body for mining a personal suspected account, and the off-line account is a personal account of other banks except the current bank;
the object identification matching module is configured to, if the object identification of the second account matches the identification of the target object, take the second account as a personal suspected account of the target object, where the personal suspected account is an alien account of the target object having funds to and from the target object or an entity object associated with the target object, where the entity object associated with the target object is an entity within two degrees of relationship knowledge graph associated with the target object, where the entity within two degrees is an entity of which a certain entity develops all entities contained in one layer and two layers through an interpersonal relationship, the entities include both enterprise and natural people, and an association relationship between the entities includes guarantee, parent and child, sibling and spouse.
6. An electronic device for mining a suspected account of a person, comprising:
one or more processors;
storage means for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-4.
7. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any of claims 1-4.
CN202010213279.7A 2020-03-24 2020-03-24 Method and device for mining personal suspected account Active CN111383097B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010213279.7A CN111383097B (en) 2020-03-24 2020-03-24 Method and device for mining personal suspected account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010213279.7A CN111383097B (en) 2020-03-24 2020-03-24 Method and device for mining personal suspected account

Publications (2)

Publication Number Publication Date
CN111383097A CN111383097A (en) 2020-07-07
CN111383097B true CN111383097B (en) 2023-08-29

Family

ID=71217348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010213279.7A Active CN111383097B (en) 2020-03-24 2020-03-24 Method and device for mining personal suspected account

Country Status (1)

Country Link
CN (1) CN111383097B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859922B (en) * 2020-07-31 2023-12-01 上海银行股份有限公司 Application method of entity relation extraction technology in bank wind control
CN112966099B (en) * 2021-02-26 2024-06-25 北京金堤征信服务有限公司 Relationship graph display method and device and computer readable storage medium
CN113763183A (en) * 2021-08-01 2021-12-07 北京开科唯识技术股份有限公司 Information processing method and system and electronic equipment
CN117034094B (en) * 2023-10-10 2024-03-12 连连银通电子支付有限公司 Account type prediction method and account type prediction device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107862530A (en) * 2016-09-19 2018-03-30 阿里巴巴集团控股有限公司 Establish the method and device of user's interpersonal relationships information
CN109191281A (en) * 2018-08-21 2019-01-11 重庆富民银行股份有限公司 A kind of group's fraud identifying system of knowledge based map
CN109347787A (en) * 2018-08-15 2019-02-15 阿里巴巴集团控股有限公司 A kind of recognition methods of identity information and device
CN110033279A (en) * 2019-04-04 2019-07-19 银清科技(北京)有限公司 The suspicious account trading confirmation method and device of knowledge based graphical spectrum technology
CN110414987A (en) * 2019-07-18 2019-11-05 中国工商银行股份有限公司 Recognition methods, device and the computer system of account aggregation
CN110647522A (en) * 2019-09-06 2020-01-03 中国建设银行股份有限公司 Data mining method, device and system
CN110750654A (en) * 2019-10-28 2020-02-04 中国建设银行股份有限公司 Knowledge graph acquisition method, device, equipment and medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130060680A1 (en) * 2011-09-06 2013-03-07 Rawllin International Inc. Funds management systems and methods
US20180129940A1 (en) * 2016-11-08 2018-05-10 Facebook, Inc. Systems and methods for similar account determination

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107862530A (en) * 2016-09-19 2018-03-30 阿里巴巴集团控股有限公司 Establish the method and device of user's interpersonal relationships information
CN109347787A (en) * 2018-08-15 2019-02-15 阿里巴巴集团控股有限公司 A kind of recognition methods of identity information and device
CN109191281A (en) * 2018-08-21 2019-01-11 重庆富民银行股份有限公司 A kind of group's fraud identifying system of knowledge based map
CN110033279A (en) * 2019-04-04 2019-07-19 银清科技(北京)有限公司 The suspicious account trading confirmation method and device of knowledge based graphical spectrum technology
CN110414987A (en) * 2019-07-18 2019-11-05 中国工商银行股份有限公司 Recognition methods, device and the computer system of account aggregation
CN110647522A (en) * 2019-09-06 2020-01-03 中国建设银行股份有限公司 Data mining method, device and system
CN110750654A (en) * 2019-10-28 2020-02-04 中国建设银行股份有限公司 Knowledge graph acquisition method, device, equipment and medium

Also Published As

Publication number Publication date
CN111383097A (en) 2020-07-07

Similar Documents

Publication Publication Date Title
CN111383097B (en) Method and device for mining personal suspected account
CN113169980B (en) Transaction account data maintenance system and method using blockchain
US10783545B2 (en) Reward point redemption for cryptocurrency
US11321349B2 (en) Deployment of object code
US20190164157A1 (en) Transaction authorization process using blockchain
US10489436B2 (en) Interoperable social services
Xu et al. Integrated collaborative filtering recommendation in social cyber-physical systems
CN111046237B (en) User behavior data processing method and device, electronic equipment and readable medium
US20170093651A1 (en) Channel accessible single function micro service data collection process for light analytics
US10037194B2 (en) Systems and methods for visual data management
CN111400504A (en) Method and device for identifying enterprise key people
US9344518B2 (en) Facilitation of social interactions
CN111382279A (en) Order examination method and device
Garg et al. Analysis and visualization of Twitter data using k-means clustering
Khan et al. [Retracted] Revolutionizing E‐Commerce Using Blockchain Technology and Implementing Smart Contract
Daradkeh The influence of sentiment orientation in open innovation communities: empirical evidence from a business analytics community
US20190188578A1 (en) Automatic discovery of data required by a rule engine
CN111414490A (en) Method and device for determining lost connection restoration information, electronic equipment and storage medium
CN108256078B (en) Information acquisition method and device
CN111191050B (en) Knowledge graph ontology model construction method and device
CN108365949A (en) Client's system of real name approaches to IM, apparatus and system
Viji et al. A journey on privacy protection strategies in big data
CN110737820B (en) Method and apparatus for generating event information
US20170193528A1 (en) Systems and Methods for the Storage and Analysis of Vendor Information
Liao et al. Rough set approach toward data modelling and user knowledge for extracting insights

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220921

Address after: 25 Financial Street, Xicheng District, Beijing 100033

Applicant after: CHINA CONSTRUCTION BANK Corp.

Address before: 25 Financial Street, Xicheng District, Beijing 100033

Applicant before: CHINA CONSTRUCTION BANK Corp.

Applicant before: Jianxin Financial Science and Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant