CN113095805A - Object recognition method, device, computer system and readable storage medium - Google Patents

Object recognition method, device, computer system and readable storage medium Download PDF

Info

Publication number
CN113095805A
CN113095805A CN202110380121.3A CN202110380121A CN113095805A CN 113095805 A CN113095805 A CN 113095805A CN 202110380121 A CN202110380121 A CN 202110380121A CN 113095805 A CN113095805 A CN 113095805A
Authority
CN
China
Prior art keywords
identified
information
attribute information
processing
recognized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110380121.3A
Other languages
Chinese (zh)
Inventor
陈志泉
何珍珍
麦子锋
黄星瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110380121.3A priority Critical patent/CN113095805A/en
Publication of CN113095805A publication Critical patent/CN113095805A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/044Recurrent networks, e.g. Hopfield networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/049Temporal neural networks, e.g. delay elements, oscillating neurons or pulsed inputs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • Molecular Biology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Computer Security & Cryptography (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present disclosure provides an object recognition method, which can be used in the technical field of artificial intelligence or other fields. Wherein, the method comprises the following steps: receiving a request for identifying an object, wherein the request carries attribute information of the object to be identified; acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified; processing historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; and determining the identification result of the object to be identified based on the attribute information of the object to be identified and the behavior sequence of the object to be identified, wherein the identification result comprises risk or no risk. The present disclosure also provides an object recognition apparatus, a computer system, a readable storage medium, and a computer program product.

Description

Object recognition method, device, computer system and readable storage medium
Technical Field
The present disclosure relates to the field of artificial intelligence technology or other fields, and more particularly, to an object recognition method, apparatus, computer system, readable storage medium, and computer program product.
Background
With the rise of internet technology and the influence of new policies, a large number of new market subjects and new customer groups are promoted. Meanwhile, the new market main body and the new client group have increased demands for convenient account opening.
In implementing the disclosed concept, the inventors found that there are at least the following problems in the related art: the full-time investigation business volume of the user is increased, the manual investigation efficiency is low, and hysteresis exists.
Disclosure of Invention
In view of the above, the present disclosure provides an object recognition method, an object recognition apparatus, a computer system, a readable storage medium, and a computer program product.
One aspect of the present disclosure provides an object recognition method, including:
an object recognition method, comprising:
receiving a request for identifying an object, wherein the request carries attribute information of the object to be identified;
acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified;
processing historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; and
and determining the identification result of the object to be identified based on the attribute information of the object to be identified and the behavior sequence of the object to be identified, wherein the identification result comprises risk or no risk.
According to the embodiment of the disclosure, processing the historical transaction behavior information of the object to be recognized to obtain the behavior sequence of the object to be recognized comprises:
processing historical transaction behavior information of an object to be identified by using a knowledge graph algorithm to generate a transaction graph associated with the object to be identified;
and extracting information in the transaction map by using a random walk mode to obtain a behavior sequence of the object to be identified.
According to the embodiment of the present disclosure, wherein determining the recognition result of the object to be recognized based on the attribute information of the object to be recognized and the behavior sequence of the object to be recognized comprises:
preprocessing attribute information of an object to be identified to obtain first processing information;
performing characteristic extraction on the behavior sequence of the object to be recognized to obtain second processing information;
inputting the first processing information and the second processing information into a logistic regression model, and outputting the prediction probability of the object to be recognized;
and determining the recognition result of the object to be recognized based on the prediction probability of the object to be recognized.
According to the embodiment of the disclosure, the feature extraction is performed on the behavior sequence of the object to be recognized, and the obtaining of the second processing information includes:
carrying out one-hot coding processing on the behavior sequence of the object to be recognized to generate a coding result corresponding to the behavior sequence;
and performing feature extraction on the encoding result to obtain second processing information.
According to an embodiment of the present disclosure, the extracting the feature of the encoding result to obtain the second processing information includes:
and inputting the coding result into the deep long-term and short-term memory neural network to obtain second processing information.
According to the embodiment of the present disclosure, before the attribute information of the object to be recognized is preprocessed to obtain the first processing information, the method further includes:
judging the attribute information of the object to be identified, and determining whether the attribute information comprises characteristic unicity information;
under the condition that the attribute information of the object to be identified comprises the characteristic unicity information, filtering the characteristic unicity information so as to preprocess the residual information except the characteristic unicity information in the attribute information;
and preprocessing the attribute information under the condition that the attribute information of the object to be identified does not comprise feature unicity.
According to an embodiment of the present disclosure, preprocessing attribute information of an object to be recognized to obtain first processing information includes:
classifying the attribute information of the object to be identified according to a preset rule to obtain preliminary preprocessing information;
and carrying out discretization processing on the preliminary preprocessing information to obtain first processing information.
Yet another aspect of the present disclosure provides an object recognition apparatus including:
the device comprises a receiving module, a judging module and a judging module, wherein the receiving module is used for receiving a request for identifying an object, and the request carries attribute information of the object to be identified;
the acquisition module is used for acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified;
the processing module is used for processing the historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; and
the determining module is used for determining the recognition result of the object to be recognized based on the attribute information of the object to be recognized and the behavior sequence of the object to be recognized, wherein the recognition result comprises risks or no risks.
Yet another aspect of the present disclosure provides a computer system comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the object recognition method described above.
Yet another aspect of the present disclosure provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement the object recognition method described above.
Yet another aspect of the present disclosure provides a computer program product comprising a computer program comprising computer executable instructions for implementing the object recognition method described above when executed.
According to the embodiment of the disclosure, the method comprises the steps of receiving a request for identifying an object, wherein the request carries attribute information of the object to be identified; acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified; processing historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; determining an identification result of the object to be identified based on the attribute information of the object to be identified and the behavior sequence of the object to be identified, wherein the identification result comprises a risky or risk-free technical means, and the automatic identification and risk estimation are realized by using the attribute information and the behavior sequence of the object to be identified as judgment references; therefore, the technical problem of low processing efficiency caused by investigation of full-time personnel in the prior art is at least partially solved, and the technical effect of efficient and rapid risk estimation is achieved.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments of the present disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an exemplary system architecture to which the object recognition methods and apparatus of the present disclosure may be applied;
FIG. 2 schematically illustrates a flow chart of an object recognition method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of an object recognition method according to another embodiment of the present disclosure;
figure 4 schematically illustrates a transaction map associated with an object to be identified according to an embodiment of the disclosure;
FIG. 5 schematically illustrates a flow chart of an application object recognition method according to another embodiment of the present disclosure;
fig. 6 schematically shows a block diagram of an object recognition arrangement according to an embodiment of the present disclosure; and
FIG. 7 schematically illustrates a block diagram of a computer system suitable for implementing an object recognition method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
The embodiment of the disclosure provides an object identification method. The method comprises the following steps: receiving a request for identifying an object, wherein the request carries attribute information of the object to be identified; acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified; processing historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; and determining the identification result of the object to be identified based on the attribute information of the object to be identified and the behavior sequence of the object to be identified, wherein the identification result comprises risk or no risk.
Fig. 1 schematically illustrates an exemplary system architecture 100 to which the object recognition methods and apparatus may be applied, according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired and/or wireless communication links, and so forth.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as a shopping-like application, a web browser application, a search-like application, an instant messaging tool, a mailbox client, and/or social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the object identification method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the object recognition apparatus provided by the embodiments of the present disclosure may be generally disposed in the server 105. The object identification method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the object recognition apparatus provided in the embodiments of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Alternatively, the object identification method provided by the embodiment of the present disclosure may also be executed by the terminal device 101, 102, or 103, or may also be executed by another terminal device different from the terminal device 101, 102, or 103. Accordingly, the object recognition apparatus provided in the embodiments of the present disclosure may also be disposed in the terminal device 101, 102, or 103, or in another terminal device different from the terminal device 101, 102, or 103.
For example, the logistic regression model may be originally stored in any of the terminal devices 101, 102, or 103 (e.g., but not limited to terminal device 101), or stored on an external storage device and may be imported into terminal device 101. Then, the terminal device 101 may send the logistic regression model to other terminal devices, servers, or server clusters, and execute the object identification method provided by the embodiment of the present disclosure by the other servers or server clusters receiving the attribute information of the object to be identified.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
It should be noted that the object identification method, the object identification device, the computer system, the computer readable storage medium, and the computer program product of the present disclosure may be used in the technical field of artificial intelligence, and may also be used in any fields other than the technical field of artificial intelligence.
Fig. 2 schematically shows a flow chart of an object recognition method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S240.
In operation S210, a request for identifying an object is received, where the request carries attribute information of the object to be identified.
According to the embodiment of the disclosure, the object identification method in the embodiment of the disclosure can be applied to financial institutions such as banks, and when facing new market subjects and new customer groups, new policies require to strengthen account opening qualification and bank subject responsibility, so due diligence becomes an important task. On the one hand, however, in order to meet the regulatory requirements, the manual checking is more and more time-consuming, the data is incomplete, and the telecommunication fraud cases are layered endlessly, so that the difficulty of manual due diligence is more and more, and the workload is more and more, which gradually becomes a flow bottleneck.
According to the embodiment of the disclosure, by using the object identification method of the embodiment of the disclosure, the data required by the current due diligence process can be compared automatically in the due diligence process, manual checking is omitted, and the approval efficiency is improved.
According to the embodiment of the present disclosure, the object to be recognized may be a person, but is not limited thereto and may also be an enterprise client. Any object which is used for making an account with a bank can be automatically identified by adopting an object identification method.
According to the embodiment of the present disclosure, the attribute information of the object to be recognized may include basic information of the object to be recognized.
According to the embodiment of the present disclosure, the basic information of the customer may include the sex, age, city, occupation, academic calendar, credit investigation and punishment of the customer, etc. The method can also comprise the identity of the client in the enterprise, the share right of the client in the enterprise, the area occupied by the enterprise, credit investigation of the enterprise, the number of the enterprise, the property of the enterprise, the enterprise asset, the enterprise creation time and the like.
In operation S220, historical transaction behavior information of the object to be recognized is acquired based on the attribute information of the object to be recognized.
According to an embodiment of the present disclosure, the historical transaction behavior information of the object to be identified may include historical behavior information of customer interactions with the product. For example, the historical behavior information of the customer interacting with the product may include behavior information of clicking on a list of mobile banking products, purchasing the product and the like within 1 year of the customer. But not limited to this, the transaction behavior of the client or the enterprise to which the client belongs may also be the transaction behavior in the last 15 days, that is, the transaction time, amount, loan direction, transaction area, transaction channel, and transaction opponent information of each client or the enterprise to which the client belongs are counted.
In operation S230, the historical transaction behavior information of the object to be recognized is processed, and a behavior sequence of the object to be recognized is obtained.
In operation S240, an identification result of the object to be identified is determined based on the attribute information of the object to be identified and the behavior sequence of the object to be identified, wherein the identification result includes at risk or no risk.
According to an embodiment of the present disclosure, the risk in the identification result is a risk with a fraudulent purpose or intent. While risk-free is risk-free with a normal purpose.
According to the embodiment of the disclosure, based on the attribute information and the behavior sequence of the object to be identified, the basic information, the historical transaction behavior and the operation of the customer are utilized to simulate manual due diligence investigation, the investigation information is complete and sufficient, and in combination with reality, the speed of identifying risk persons with different fraud behaviors is high, the accuracy is high, and the risk is reduced.
The method shown in fig. 2 is further described with reference to fig. 3-5 in conjunction with specific embodiments.
Fig. 3 schematically shows a flow chart of an object recognition method according to another embodiment of the present disclosure.
As shown in fig. 3, determining the recognition result of the object to be recognized based on the attribute information of the object to be recognized and the behavior sequence of the object to be recognized includes operations S310 to S340.
In operation S310, the attribute information of the object to be recognized is preprocessed, so as to obtain first processing information.
According to the embodiment of the disclosure, the attribute information of the object to be recognized comprises various features, and has diversity and complexity, so that the attribute information of the object to be recognized is preprocessed, and the attribute information is favorably input into a logistic regression model for prediction processing.
In operation S320, feature extraction is performed on the behavior sequence of the object to be recognized to obtain second processing information.
According to the embodiment of the disclosure, the characteristic extraction is carried out on the behavior sequence of the object to be recognized, which is beneficial to further screening and refining data and is more beneficial to improving the recognition precision of subsequent logistic regression model processing.
In operation S330, the first and second processing information are input into a logistic regression model, and a prediction probability of the object to be recognized is output.
In operation S340, a recognition result of the object to be recognized is determined based on the predicted probability of the object to be recognized.
According to the embodiment of the disclosure, a prediction threshold value can be preset, after the prediction probability of the object to be recognized is obtained, the prediction threshold value is compared with the prediction probability, and the recognition result of the object to be recognized is determined through the comparison result. For example, in the case where the prediction probability is greater than or equal to the prediction threshold, the object to be identified is declared to be a risky object; and in the case that the prediction probability is smaller than the prediction threshold value, the object to be identified is an object without risk.
According to the embodiment of the present disclosure, the prediction threshold may be designed to be 0.9 or 0.8, but is not limited thereto, and may be specifically adjusted according to the actual situation.
According to the embodiment of the disclosure, the object identification method combines the attribute information and the behavior sequence of the object to be identified and combines the characteristics in various aspects for consideration, so that the data integrity is high; in addition, the prediction is carried out by using a logistic regression model, so that the recognition precision is high.
According to the embodiment of the disclosure, processing the historical transaction behavior information of the object to be recognized to obtain the behavior sequence of the object to be recognized may include the following operations.
Processing historical transaction behavior information of an object to be identified by using a knowledge graph algorithm to generate a transaction graph associated with the object to be identified; and extracting information in the transaction map by using a random walk mode to obtain a behavior sequence of the object to be identified.
Fig. 4 schematically illustrates a transaction map associated with an object to be identified according to an embodiment of the disclosure.
As shown in fig. 4, there are historical transaction behavior records of the client a, the client B, the client C, the client D, the client E and the client F in transaction, each client or its affiliated enterprise may be represented by the node a, the node B, the node C, the node D, the node E and the node F, a client-to-client connection line is taken according to the transaction direction, a transaction loan direction is taken as a connection line direction (for example, arrows in the figure indicate directions), connection line attributes include behavior types and transaction amounts, and finally a relationship graph with a behavior sequence of an object to be identified, that is, a transaction graph, is formed.
According to the embodiment of the disclosure, the knowledge graph algorithm is used for generating the transaction graph associated with the object to be identified, the relationship network among the clients can be analyzed, and mining and identification of telecommunication fraud gangs in ganged-up operation are facilitated.
According to the embodiment of the disclosure, after the construction of the transaction map is completed, the information in the transaction map can be extracted by selecting a random walk mode with moderate time complexity, so as to obtain the behavior sequence of the object to be identified.
According to the embodiment of the disclosure, firstly, each client or the enterprise to which the client belongs is taken as a starting point, and a random walk mode is adopted to regenerate the behavior sequence. Namely, each client or the enterprise to which the client belongs is taken as a starting point Vi, the node jump probability connected with the client is calculated, the node Vj with the highest probability is selected for jumping, and the jump probability randomly wandering away from the node Vj is continuously calculated.
The wandering is stopped when one or more of the following conditions are achieved.
For example, the transaction interval is equal to 15 days up to date; jumping to the starting point (no adjacent node); the number of jumping-nodes exceeds 50.
And when the walking is finished, all nodes and edges from the starting point to the end point are used as a behavior sequence of the object to be identified.
According to embodiments of the present disclosure, the node hop probability may be calculated according to equation one.
Figure BDA0003011483670000111
Wherein, Mij is the transaction amount from the node vi to the node vj; n + (vi) is node vi, so the set of nodes connected by the edges (lending direction is lending) is given; eij is the set of all connected edges of node i and node j, and epsilon is the set of all connected edges of node j.
According to the embodiment of the disclosure, the feature extraction is performed on the behavior sequence of the object to be recognized, and the obtaining of the second processing information may include the following operations.
According to the embodiment of the disclosure, the behavior sequence of the object to be recognized is subjected to one-hot encoding processing, and an encoding result corresponding to the behavior sequence is generated; and performing feature extraction on the coding result to obtain second processing information.
According to the embodiment of the disclosure, one-hot-only encoding processing is performed on the behavior sequence of the object to be recognized, N states can be encoded by using an N-bit state register, each state has an independent register bit, and only one of the states is valid at any time.
For example, there are 3 clients U1-U3, and the action sequence of the transaction is:
Figure BDA0003011483670000112
the transaction client, amount and transaction type are all only three types, each code has 3 bits, each bit represents a type:
U1:100;U2:010;U3:001。
thus, after unique hot encoding:
U1:{[010,100,100]};
U2:{[001,001,010]};
U3:{[100,010,001]}。
according to an alternative embodiment of the present disclosure, after the one-hot encoding, the behavior sequence of each customer is converted into a dense vector by word2dev algorithm. Thereby reducing the existence of a large amount of unnecessary data 0 in the behavior sequence after the one-hot coding. Thereby avoiding unnecessary burden on subsequent calculations.
According to an optional embodiment of the present disclosure, the performing feature extraction on the encoding result to obtain the second processing information may include an operation of inputting the encoding result to the deep long-short term memory neural network to obtain the second processing information.
According to the embodiment of the disclosure, the deep long-short term memory neural network comprises one layer of LSTM network as a further feature extraction layer, and then comprises two layers of LSTM deep networks.
According to the embodiment of the disclosure, after the deep long-short term memory neural network is constructed, a historical client can be used as a training sample to train the network and the model in the object recognition method, and the node parameters in the two-layer LSTM deep network in the trained deep long-short term memory neural network are used as third processing information.
According to the embodiment of the disclosure, when the logistic regression model is trained, the first processing information and the second processing information obtained by processing the attribute information and the behavior sequence can be trained by combining with the third processing information, so that the obtained final logistic regression model has high identification precision.
According to an embodiment of the present disclosure, preprocessing the attribute information of the object to be recognized to obtain the first processing information may include the following operations.
Classifying the attribute information of the object to be identified according to a preset rule to obtain preliminary preprocessing information; and carrying out discretization processing on the preliminary preprocessing information to obtain first processing information.
According to embodiments of the present disclosure, there may be multiple records per customer, and this raw data cannot be used directly for model identification. The data needs to be processed and integrated.
According to the embodiment of the disclosure, the preset rule may be classification according to different data types, classification processing may be performed on the attribute information, and classification may be performed according to data type discrete, continuous, text and time sequence types, so as to obtain preliminary preprocessing information.
According to the embodiment of the disclosure, the preliminary preprocessing information can be discretized into the continuous value according to the actual business meaning of the data, for example, the income amount of the customer per month is discretized according to 0-5000, 5000-. The time series data is converted into discrete or continuous values that can be used for calculations.
According to the embodiment of the disclosure, the first processing information is obtained by preprocessing the attribute information of the object to be recognized, and the original data can be integrated and processed so as to be used as an input value and input to a subsequent logistic regression model for risk prediction.
According to the optional embodiment of the disclosure, before the attribute information of the object to be recognized is classified according to the preset rule, the attribute information format of the object to be recognized can be processed uniformly, for example, data in the attribute information has the problems of empty key field, abnormal numerical value, data format, single value and the like, and therefore data cleaning is required. For example, adjusting data with inconsistent data formats and cleaning records with null key fields such as abnormal values, client numbers, enterprise numbers and the like.
According to an optional embodiment of the present disclosure, the historical transaction behavior information in the object to be identified may also be subjected to data processing such as classification, cleaning, processing, and integration of the above operations, which is not described herein again.
According to an optional embodiment of the present disclosure, before the attribute information of the object to be recognized is preprocessed to obtain the first processing information, the object recognition method may further include the following operation.
Judging the attribute information of the object to be identified, and determining whether the attribute information comprises characteristic unicity information; under the condition that the attribute information of the object to be identified comprises the characteristic unicity information, filtering the characteristic unicity information so as to preprocess the residual information except the characteristic unicity information in the attribute information; and preprocessing the attribute information under the condition that the attribute information of the object to be identified does not include the feature unicity.
According to embodiments of the present disclosure, feature uniqueness information may be understood as information that is too single to distinguish normal, risk-free clients from abnormal, risk-risky clients based on the information. For example, gender in the attribute information is only male and female. When the feature uniqueness is checked, if the gender in the attribute information is not male or female, and there is no feature, the attribute information is regarded as the feature uniqueness information, and the feature information can be deleted before the attribute information of the object to be recognized is preprocessed.
According to the embodiment of the disclosure, the attribute information of the object to be recognized is judged before the attribute information of the object to be recognized is preprocessed, the attribute information can be filtered in advance in one step, useless characteristic unicity information is filtered, the data volume of subsequent preprocessing operation is reduced, and the working efficiency of subsequent data processing and the recognition precision of the object to be recognized are improved.
Fig. 5 schematically shows a flow chart of an object recognition method according to another embodiment of the present disclosure.
As shown in fig. 5, the object recognition method includes operations S510 to S530, S541, S5421 to S5424, S550, and S560.
In operation S510, a user (e.g., a customer manager of a bank) inputs application profile information of the customer to an operation terminal.
According to the embodiment of the disclosure, due diligence application data provided by the customer may include, for example, a customer name, business registration information, a business registration address, a customer identification card, and the like (attribute information).
In operation S520, the operation terminal transmits the request carrying the application information to the server having the object identification method processing function.
In operation S530, the server acquires historical transaction behavior information of the client based on the application profile information of the client.
In operation S541, the server performs a pre-processing on the attribute information to obtain first processed information.
The server sequentially performs the following operation processing on the historical transaction behavior information.
In operation S5421, a transaction map is generated;
in operation S5422, a behavior sequence is obtained;
in operation S5423, one-hot encoding;
in operation S5424, feature extraction results in second processing information.
In operation S550, the first processing information and the second processing information are processed using a logistic regression model to obtain a recognition result of the customer.
In operation S560, the recognition result of the customer is transmitted to the operation terminal so that the customer manager can reasonably plan the subsequent operation.
In summary, the embodiment of the disclosure provides an object identification method for solving the hysteresis of manual processing for identifying novel fraud measures, which utilizes various structured and unstructured financial data in lines such as attribute information and historical transaction behavior information to automatically process and identify so as to identify different fraud behaviors of telecommunication fraud staff, and presents identification results and identification explanations to dispatching staff, thereby improving identification rate and reducing risks; in addition, automatic comparison is carried out, manual checking is omitted, and examination and approval efficiency is improved.
Fig. 6 schematically shows a block diagram of an object recognition apparatus according to an embodiment of the present disclosure.
As shown in fig. 6, the object recognition apparatus 600 includes a receiving module 610, an obtaining module 620, a processing module 630, and a determining module 640.
A receiving module 610, configured to receive a request for identifying an object, where the request carries attribute information of the object to be identified;
an obtaining module 620, configured to obtain historical transaction behavior information of an object to be identified based on attribute information of the object to be identified;
the processing module 630 is configured to process the historical transaction behavior information of the object to be identified, so as to obtain a behavior sequence of the object to be identified; and
a determining module 640, configured to determine a recognition result of the object to be recognized based on the attribute information of the object to be recognized and the behavior sequence of the object to be recognized, where the recognition result includes at risk or no risk.
According to the embodiment of the disclosure, the method comprises the steps of receiving a request for identifying an object, wherein the request carries attribute information of the object to be identified; acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified; processing historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; determining an identification result of the object to be identified based on the attribute information of the object to be identified and the behavior sequence of the object to be identified, wherein the identification result comprises a risky or risk-free technical means, and the automatic identification and risk estimation are realized by using the attribute information and the behavior sequence of the object to be identified as judgment references; therefore, the technical problem of low processing efficiency caused by investigation of full-time personnel in the prior art is at least partially solved, and the technical effect of efficient and rapid risk estimation is achieved.
According to an embodiment of the present disclosure, among other things, the processing module 630 includes a processing sub-module and an extraction sub-module.
The processing submodule is used for processing the historical transaction behavior information of the object to be identified by using a knowledge graph algorithm to generate a transaction graph associated with the object to be identified; and
and the extraction submodule is used for extracting the information in the transaction map by using a random walk mode to obtain a behavior sequence of the object to be identified.
According to an embodiment of the present disclosure, the determining module 640 includes a preprocessing sub-module, a feature extraction sub-module, an input sub-module, and a determining sub-module, among others.
The preprocessing submodule is used for preprocessing the attribute information of the object to be identified to obtain first processing information;
the characteristic extraction submodule is used for extracting the characteristics of the behavior sequence of the object to be recognized to obtain second processing information;
the input submodule is used for inputting the first processing information and the second processing information into the logistic regression model and outputting the prediction probability of the object to be recognized; and
and the determining submodule is used for determining the recognition result of the object to be recognized based on the prediction probability of the object to be recognized.
According to an embodiment of the present disclosure, the feature extraction submodule includes an encoding unit and a feature extraction unit.
The encoding unit is used for carrying out one-hot encoding processing on the behavior sequence of the object to be identified and generating an encoding result corresponding to the behavior sequence; and
and the characteristic extraction unit is used for extracting the characteristics of the coding result to obtain second processing information.
According to an embodiment of the present disclosure, wherein the feature extraction unit comprises a feature extraction subunit.
And the characteristic extraction subunit is used for inputting the behavior sequence of the object to be recognized into the deep long-short term memory neural network to obtain second processing information.
According to the embodiment of the present disclosure, the object recognition apparatus 600 further includes a determination module.
The judging module is used for judging the attribute information of the object to be identified and determining whether the attribute information comprises characteristic unicity information; under the condition that the attribute information of the object to be identified comprises the characteristic unicity information, filtering the characteristic unicity information so as to preprocess the residual information except the characteristic unicity information in the attribute information; and preprocessing the attribute information under the condition that the attribute information of the object to be identified does not include the feature unicity.
According to an embodiment of the present disclosure, the preprocessing submodule includes a classification unit and a discretization unit.
The classification unit is used for classifying the attribute information of the object to be identified according to a preset rule to obtain preliminary preprocessing information; and
and the discretization unit is used for performing discretization processing on the preliminary preprocessing information to obtain first processing information.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the receiving module 610, the obtaining module 620, the processing module 630, and the determining module 640 may be combined and implemented in one module/unit/sub-unit, or any one of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least part of the functionality of one or more of these modules/units/sub-units may be combined with at least part of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to an embodiment of the disclosure, at least one of the receiving module 610, the obtaining module 620, the processing module 630, and the determining module 640 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or in any one of three implementations of software, hardware, and firmware, or in any suitable combination of any of them. Alternatively, at least one of the receiving module 610, the obtaining module 620, the processing module 630, and the determining module 640 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
It should be noted that the object identification apparatus part in the embodiment of the present disclosure corresponds to the object identification method part in the embodiment of the present disclosure, and the description of the object identification apparatus part specifically refers to the object identification method part, which is not described herein again.
FIG. 7 schematically illustrates a block diagram of a computer system suitable for implementing the above-described method, according to an embodiment of the present disclosure. The computer system illustrated in FIG. 7 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 7, a computer system 700 according to an embodiment of the present disclosure includes a processor 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 703, various programs and data necessary for the operation of the computer system 700 are stored. The processor 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. The processor 701 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 702 and/or the RAM 703. It is noted that the programs may also be stored in one or more memories other than the ROM 702 and RAM 703. The processor 701 may also perform various operations of method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the computer system 700 may also include an input/output (I/O) interface 705, the input/output (I/O) interface 705 also being connected to the bus 704. The system 700 may also include one or more of the following components connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program, when executed by the processor 701, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to an embodiment of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 702 and/or the RAM 703 and/or one or more memories other than the ROM 702 and the RAM 703 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method provided by the embodiments of the present disclosure, when the computer program product is run on an electronic device, the program code being adapted to cause the electronic device to carry out the object recognition method provided by the embodiments of the present disclosure.
The computer program, when executed by the processor 701, performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted in the form of a signal on a network medium, distributed, downloaded and installed via the communication section 709, and/or installed from the removable medium 711. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (11)

1. An object recognition method, comprising:
receiving a request for identifying an object, wherein the request carries attribute information of the object to be identified;
acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified;
processing the historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; and
determining an identification result of the object to be identified based on the attribute information of the object to be identified and the behavior sequence of the object to be identified, wherein the identification result comprises risk or no risk.
2. The method of claim 1, wherein the processing the historical transaction behavior information of the object to be identified to obtain the behavior sequence of the object to be identified comprises:
processing the historical transaction behavior information of the object to be identified by using a knowledge graph algorithm to generate a transaction graph associated with the object to be identified;
and extracting information in the transaction map by using a random walk mode to obtain a behavior sequence of the object to be identified.
3. The method of claim 2, wherein the determining the recognition result of the object to be recognized based on the attribute information of the object to be recognized and the behavior sequence of the object to be recognized comprises:
preprocessing the attribute information of the object to be identified to obtain first processing information;
performing characteristic extraction on the behavior sequence of the object to be recognized to obtain second processing information;
inputting the first processing information and the second processing information into a logistic regression model, and outputting the prediction probability of the object to be recognized;
and determining the recognition result of the object to be recognized based on the prediction probability of the object to be recognized.
4. The method according to claim 3, wherein the performing feature extraction on the behavior sequence of the object to be recognized to obtain second processing information comprises:
carrying out one-hot coding processing on the behavior sequence of the object to be identified to generate a coding result corresponding to the behavior sequence;
and performing feature extraction on the coding result to obtain second processing information.
5. The method of claim 4, wherein the extracting the feature of the encoding result to obtain the second processing information comprises:
and inputting the coding result into a deep long-short term memory neural network to obtain the second processing information.
6. The method according to claim 3, wherein before preprocessing the attribute information of the object to be identified to obtain the first processing information, the method further comprises:
judging the attribute information of the object to be identified, and determining whether the attribute information comprises characteristic unicity information;
under the condition that the attribute information of the object to be identified comprises the characteristic unicity information, filtering the characteristic unicity information so as to preprocess the residual information except the characteristic unicity information in the attribute information;
and preprocessing the attribute information under the condition that the attribute information of the object to be identified does not comprise feature unicity.
7. The method according to claim 5, wherein the preprocessing the attribute information of the object to be identified to obtain first processing information comprises:
classifying the attribute information of the object to be identified according to a preset rule to obtain preliminary preprocessing information;
and carrying out discretization processing on the preliminary preprocessing information to obtain first processing information.
8. An object recognition apparatus comprising:
the device comprises a receiving module, a judging module and a judging module, wherein the receiving module is used for receiving a request for identifying an object, and the request carries attribute information of the object to be identified;
the acquisition module is used for acquiring historical transaction behavior information of the object to be identified based on the attribute information of the object to be identified;
the processing module is used for processing the historical transaction behavior information of the object to be identified to obtain a behavior sequence of the object to be identified; and
the determining module is used for determining the recognition result of the object to be recognized based on the attribute information of the object to be recognized and the behavior sequence of the object to be recognized, wherein the recognition result comprises risks or no risks.
9. A computer system, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-7.
10. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to carry out the method of any one of claims 1 to 7.
11. A computer program product comprising a computer program comprising computer executable instructions for implementing the method of any one of claims 1 to 7 when executed.
CN202110380121.3A 2021-04-08 2021-04-08 Object recognition method, device, computer system and readable storage medium Pending CN113095805A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110380121.3A CN113095805A (en) 2021-04-08 2021-04-08 Object recognition method, device, computer system and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110380121.3A CN113095805A (en) 2021-04-08 2021-04-08 Object recognition method, device, computer system and readable storage medium

Publications (1)

Publication Number Publication Date
CN113095805A true CN113095805A (en) 2021-07-09

Family

ID=76675350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110380121.3A Pending CN113095805A (en) 2021-04-08 2021-04-08 Object recognition method, device, computer system and readable storage medium

Country Status (1)

Country Link
CN (1) CN113095805A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108153901A (en) * 2018-01-16 2018-06-12 北京百度网讯科技有限公司 The information-pushing method and device of knowledge based collection of illustrative plates
CN111382793A (en) * 2020-03-09 2020-07-07 腾讯音乐娱乐科技(深圳)有限公司 Feature extraction method and device and storage medium
CN111932262A (en) * 2020-09-27 2020-11-13 南京吉拉福网络科技有限公司 Methods, computing devices, and media for identifying transaction risk with respect to consumption credentials
CN112053151A (en) * 2020-08-09 2020-12-08 中信银行股份有限公司 Behavior determination method and apparatus, storage medium, and electronic device
CN112434169A (en) * 2020-11-13 2021-03-02 北京创业光荣信息科技有限责任公司 Knowledge graph construction method and system and computer equipment
CN112581281A (en) * 2020-12-28 2021-03-30 中国建设银行股份有限公司 Product recommendation method and device, storage medium and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108153901A (en) * 2018-01-16 2018-06-12 北京百度网讯科技有限公司 The information-pushing method and device of knowledge based collection of illustrative plates
CN111382793A (en) * 2020-03-09 2020-07-07 腾讯音乐娱乐科技(深圳)有限公司 Feature extraction method and device and storage medium
CN112053151A (en) * 2020-08-09 2020-12-08 中信银行股份有限公司 Behavior determination method and apparatus, storage medium, and electronic device
CN111932262A (en) * 2020-09-27 2020-11-13 南京吉拉福网络科技有限公司 Methods, computing devices, and media for identifying transaction risk with respect to consumption credentials
CN112434169A (en) * 2020-11-13 2021-03-02 北京创业光荣信息科技有限责任公司 Knowledge graph construction method and system and computer equipment
CN112581281A (en) * 2020-12-28 2021-03-30 中国建设银行股份有限公司 Product recommendation method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US11531987B2 (en) User profiling based on transaction data associated with a user
US20180330437A1 (en) System and method for online evaluation and underwriting of loan products
US9798788B1 (en) Holistic methodology for big data analytics
CN114462532A (en) Model training method, device, equipment and medium for predicting transaction risk
CN113393299A (en) Recommendation model training method and device, electronic equipment and storage medium
CN113610230A (en) Training method, prediction method, device, computer system and storage medium
CN114358147A (en) Training method, identification method, device and equipment of abnormal account identification model
CN111582932A (en) Inter-scene information pushing method and device, computer equipment and storage medium
CN113010798A (en) Information recommendation method, information recommendation device, electronic equipment and readable storage medium
US11645716B2 (en) System and method for implementing a trust discretionary distribution tool
CN113379554A (en) Method, apparatus, device, medium, and program product for recommending financial product
CN113128773A (en) Training method of address prediction model, address prediction method and device
CN117437020A (en) Merchant risk judging method and device, electronic equipment and medium
CN113094595A (en) Object recognition method, device, computer system and readable storage medium
CN116451938A (en) Task processing method and device, electronic equipment and storage medium
CN115795345A (en) Information processing method, device, equipment and storage medium
CN114066513A (en) User classification method and device
CN113095805A (en) Object recognition method, device, computer system and readable storage medium
CN114493853A (en) Credit rating evaluation method, credit rating evaluation device, electronic device and storage medium
CN117172632B (en) Enterprise abnormal behavior detection method, device, equipment and storage medium
CN116562974A (en) Object recognition method, device, electronic equipment and storage medium
CN114820214A (en) Information processing method and device, electronic equipment and computer readable storage medium
CN114065050A (en) Method, system, electronic device and storage medium for product recommendation
CN118096170A (en) Risk prediction method and apparatus, device, storage medium, and program product
CN115062698A (en) User identification method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination