Risk identification method and device

A risk identification and risk technology, applied in character and pattern recognition, instruments, payment systems, etc., can solve problems such as difficulty in meeting real-time application requirements, low processing efficiency, and time-consuming processing, achieving verification difficulty, improving efficiency, The effect of high safety

Inactive Publication Date: 2017-01-04
ADVANCED NEW TECH CO LTD
View PDF4 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] From the above description, it can be seen that in order to identify a small number of individual risk operations from a large number of business operations in the traditional risk control method, it is necessary to carry out risk management for all business operations one by one based on a large amount of data of various types. Rule analysis and / or model algorithm calculation, the processing process is time-consuming and inefficient. In some network business systems with a large number of business operations, the above risk control methods have been difficult to meet the online real-time application requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and device
  • Risk identification method and device
  • Risk identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementations disclosed below.

[0067] In this application, a risk identification method and a risk identification device are respectively provided, which will be described in detail in the following embodiments. In order to facilitate the understanding of the technical solution of the present application, the background of the present application and the technical solution of the present application are briefly described first.

[0068] In order to identify a small number of individual risky operations from a large number of business operations, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a risk identification method comprising the following steps: acquiring text communication information related to a current service operation according to the attribute information of the current service operation; extracting feature words from the text communication information to generate a word vector set; determining the risk category of the word vector set using a classification model built according to historical text communication information; and identifying whether the current service operation is at risk or not according to the risk category of the word vector set. The application further provides a risk identification device. The method provides a new way of service operation risk identification. Through risk identification according to the text communication information related to the current service operation, a service operation which may be at risk can be identified efficiently, and a powerful reference is provided for the subsequent risk control link.

Description

technical field [0001] This application relates to the field of risk control, in particular to a risk identification method and device. Background technique [0002] With the development of Internet technology, there are more and more Internet-based business operations, and most of the user's operations are normal. However, there are also a small number of fraudulent activities such as hackers or malicious users stealing other people's accounts or swiping cards. In response to this situation, risk control has become an indispensable part of the business operation process. Through risk control, on the one hand, fraudulent behavior can be avoided through early identification of risks, and on the other hand, risky business operations can be dealt with in a timely manner to avoid losses to legitimate users or minimize losses. [0003] Risk control in the prior art is usually carried out on the basis of analyzing a large amount of various types of data, for example, collecting u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q40/08G06K9/62
CPCG06Q20/4016G06Q40/08G06F18/24155
Inventor 沈雄郝静云
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products