Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36results about How to "Improve risk assessment efficiency" patented technology

Risk control model application methods and systems based on concurrence of multiple machine learning models

The method discloses a risk control model application methods and systems based on a concurrence of multiple machine learning models. An offline risk control model application method thereof includes:collecting application customer group information; extracting customer portrait data from the above-mentioned information; processing the above-mentioned portrait data, and calculating risk-related indexes; respectively utilizing different feature selection models to process the above-mentioned risk-related indexes to obtain corresponding single-model feature orders; carrying our comprehensive sorting on the obtained corresponding single-model feature orders; and respectively utilizing multiple machine learning models to carry out modeling processing on comprehensively sorted features, evaluating a running effect of each machine learning model, and screening out the plurality of machine learning models with higher ranks. The plurality of machine learning models are put into online runningto process online application flow, and processing results are used as decision bases of whether credit extension is carried out. The flow is allocated in online running according to the rank of eachmachine learning model. By adopting the methods, efficiency of risk evaluation can be improved, and a result is more reliable.
Owner:上海安趣盈科技有限公司

Network safety evaluation method and device based on configuration check

The invention provides a network safety evaluation method and device based on configuration check. The network safety evaluation method comprises obtaining information of M target devices of a target system, wherein the information of the target devices comprises types and internet protocols (IP) of the target devices, and M is an integer which is larger than or equal to 1; aiming at each target device, obtaining a baseline check template corresponding to the type of the target device, wherein the baseline check template includes a baseline check item and a baseline safety discrimination rule corresponding to the baseline check item; obtaining configuration information of a baseline item to be checked of the target device in dependence on the IP of the target device and the baseline check item included in the baseline check template; determining the value-at-risk of the target device in dependence on the configuration information of the baseline item to be checked and the baseline safety discrimination rule; and furthermore determining the value-at-risk of the target system. The network safety evaluation method and device based on configuration check can solve the problem that the existing ICS risk evaluation method is poor in visualization.
Owner:NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1

Data processing method and device, electronic equipment and storage medium

The invention discloses a data processing method and device, electronic equipment and a storage medium, which are used for automatically carrying out risk assessment on desensitized data and improvingthe risk assessment efficiency. According to the embodiment of the invention, the method comprises steps of carrying out desensitization processing on data in an original data set to obtain a plurality of desensitized data sets; selecting a desensitized data set corresponding to the target attribute type from the desensitized data set, and determining at least one target data set; and determininga risk value according to the probability value and the hazard value corresponding to each target data set, and if the risk value is greater than a preset threshold, adjusting a desensitization processing mode. According to the embodiment of the invention, risk assessment is carried out from the two aspects of the possibility that the desensitized data is utilized and the harm caused by successfully restoring the business data by utilizing the desensitized data, and the risk value is automatically determined and the data leakage risk is quantitatively determined; and a desensitization processing mode is adjusted according to the determined risk value, so that the data leakage risk is reduced.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1

Method, device and terminal equipment for detecting risk of Alzheimer's disease

The invention is applicable to the technical field of computers, and provides a method, a device and terminal equipment for detecting risk of Alzheimer's disease (AD). The method includes: acquiring electroencephalogram data corresponding to N channels of a subject; calculating a global energy spectrum according to the electroencephalogram data corresponding to each channel, and determining microstate characteristics of a preset category according to the global energy spectrum and the electroencephalogram data of each channel; marking the micro-state feature corresponding to each time point according to global field power corresponding to each time point in the global energy spectrum to obtain a global feature; and inputting the global characteristics and the electroencephalogram data intoa deep convolution neural network model to obtain an Alzheimer's disease risk evaluation result of the subject. The method, device and terminal equipment comprehensively consider the voltage amplitude change information of the electroencephalogram data and the spatial topology information of the global feature, can make the output result of the deep convolutional neural network model more accurate, can not only improve efficiency of Alzheimer's disease risk assessment, but also improve accuracy of the Alzheimer's disease risk assessment result.
Owner:INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI

Regional power grid environment risk assessment method

The invention discloses a regional power grid environment risk assessment method, and relates to the technical field of power grid planning, and the method comprises the following steps: selecting a target regional environment according to an actual demand, and making a planning scheme; obtaining environment risk related information of the target area, constructing a comprehensive environment risk assessment index system of the target area, and constructing a risk assessment model according to the index system; determining the weight of each index in the risk assessment model; and carrying out grading quantification according to the indicator system to obtain an environment risk value of the target area. According to the regional power grid environment comprehensive risk assessment method, on the basis of the environment data, the power grid planning environment influence key factors are identified, the corresponding risk levels are assessed, the power grid planning environmental impact evaluation and the power transmission and transformation project are effectively combined, the planned substation site selection and line selection can be optimized, the environmental risk can be fully identified and avoided, and the environmental dispute and emergencies can be prevented and reduced.
Owner:STATE GRID LIAONING ELECTRIC POWER RES INST +2

Supply chain financial risk assessment method based on block chain

The invention relates to supply chain financial risk assessment, specifically relates to a supply chain financial risk assessment method based on a block chain. The participation nodes of the same type are combined into a similar alliance chain; basic data of each participation node is obtained; the participation nodes in the similar alliance chain perform similar risk assessment on the participation nodes of the same type according to the acquired basic data; an industry alliance chain is formed by nodes of the same kind of risk assessment; the participating nodes which do not pass through are excluded to wait for next similar risk assessment, heterogeneous risk assessment is carried out on different types of participation nodes by the participation nodes of the industry alliance chain according to the obtained basic data, a supply alliance chain is formed by the participation nodes passing the heterogeneous risk assessment, the participation nodes which do not pass the supply alliance chain are excluded to wait for next heterogeneous risk assessment; the technical scheme provided by the invention can effectively overcome the defects that in the prior art, the cross-industry riskassessment efficiency is relatively low, and small and medium-sized enterprises are difficult to quickly and effectively obtain financing.
Owner:安徽高山科技有限公司

Electronic warrant full-process management and risk management and control system based on block chain

The invention, which relates to the technical field of the electronic warranty, discloses a blockchain-based electronic warranty full-process management and risk management and control system comprising a blockchain smart contract, an electronic warranty management platform and a credit risk assessment module. A user sends an insurance request to the electronic warranty management platform through the block chain smart contract, and the electronic warranty management platform calls a credit risk assessment module to verify a corresponding user identity after receiving the insurance request, and judges whether the insurance request is within a credit risk security level; then, the request passing the credit risk assessment is returned to the warranty issuing module, and the warranty issuing module is used for analyzing the received insurance request and checking and replying the insurance request in sequence according to the risk coefficient; and the warranty distribution module is used for encrypting the electronic warranty through the warranty access gateway and then distributing the encrypted electronic warranty to a storage address specified by the electronic warranty management platform through a specified transmission mode, so that the electronic warranty is effectively prevented from being tampered, and the data security is improved.
Owner:一方函互联网有限公司

Engineering field supply chain financial risk assessment system based on block chain

The invention discloses an engineering field supply chain financial risk assessment system based on a block chain, relates to the technical field of financial risk assessment, and solves the problem that the financing loan reply time is too long due to the fact that information is dispersed and not integrated and loan risks are difficult to control. The system comprises a supply chain financial platform, a risk assessment module and a financing and lending module. The user sends a financing request to the supply chain financial platform through the block chain smart contract, and the supply chain financial platform verifies the identity of the corresponding user after receiving the financing request and judges whether the financing request is legal; if the financing request is legal, the risk assessment module is used for performing risk coefficient assessment according to the content of the financing request in combination with a customer level model to obtain a processing sequence table of the financing request; and the financing and lending module is used for auditing and replying the financing request according to the sequence position fed back by the risk assessment module, so that the lending risk is effectively controlled, the replying time of the financing request is shortened, the working efficiency is improved, and the asset circulation rate is maximized.
Owner:湖南和信安华区块链科技有限公司

The whole process management and risk control system of electronic letter of guarantee based on blockchain

The invention discloses a block chain-based electronic letter of guarantee full-process management and risk control system, which relates to the technical field of electronic letters of guarantee, including block chain smart contracts, electronic letter of guarantee management platforms and credit risk assessment modules; The electronic letter of guarantee management platform sends an insurance application request. After receiving the insurance application request, the electronic letter of guarantee management platform calls the credit risk assessment module to verify the identity of the corresponding user, and judges whether the insurance application request is within the credit risk safety level; then returns the request that passes the credit risk assessment. To the letter of guarantee issuance module, the letter of guarantee issuance module is used to analyze the insurance application received, and to review and approve the insurance application request in turn according to the risk factor; the letter of guarantee distribution module is used to encrypt the electronic letter of guarantee through the letter of guarantee access gateway and pass the specified The transmission method is distributed to the storage address specified by the electronic letter of guarantee management platform, which can effectively prevent the electronic letter of guarantee from being tampered with and improve data security.
Owner:一方函互联网有限公司

Risk assessment method, device and system

The invention relates to a risk assessment method, device and system. The risk assessment method comprises the following steps of receiving a risk assessment request of a risk control business system, wherein the risk assessment request comprises a risk control project identifier, a process identifier and a risk assessment parameter; executing a process script corresponding to the risk control item identifier and the process identifier to process the risk assessment parameter to obtain a risk assessment result; sending the risk assessment result to a risk control service system; risk control items being created according to the item creation request, and the risk control items being in one-to-one correspondence with risk control item identifiers; creating at least one functional interface required by the risk control project according to the interface creation request; according to the process creation request, creating at least one process of the risk control project, each process corresponding to one process identifier; a schematic diagram of each process being received, the schematic diagram of each process comprising a plurality of process nodes, and part of the process nodes being associated with the function interfaces; and analyzing the schematic diagram of each process to obtain a process script of each process.
Owner:BEIJING TONGBANGZHUOYI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products