Business processing method and device

A business processing and identification algorithm technology, applied in the Internet field, can solve the problems of increased system resource consumption and analysis time, high computational complexity, and many rule models for risk identification, so as to save system resource consumption, ensure accuracy, The effect of improving the recognition efficiency

Active Publication Date: 2017-05-10
ADVANCED NEW TECH CO LTD
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]As the risk monitoring system needs to monitor more and more business scenarios and the risk situation is becoming more and more complex, the requirements for the monitoring of various risks and the timeliness of monitoring It is also getting higher and higher, there are more and more rule models for risk identification, and the computational complexity is getting higher and higher
All of these lead to a significant increase in the consumption of system resources and analysis time by the risk monitoring system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business processing method and device
  • Business processing method and device
  • Business processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 As shown, it is a flow chart of the business processing method provided in Embodiment 1 of the present application, including the following steps:

[0040] S101: After receiving a service processing request from a user, perform rapid risk identification on the service processing request based on the identification algorithm of the rapid risk identification layer.

[0041] In the specific implementation process, first, based on the pre-stored trusted user list and risk user list, rapid risk identification can be performed on the service processing request. The trusted user list here may include the user's trusted Internet Protocol (Internet Protocol, IP) address, trusted Media Access Control (MediaAccess Control, MAC) address, trusted terminal location and other user data; correspondingly, the risk user The list may include user data such as risk application account numbers, risk bank card numbers, and risk IP addresses. If the user data in the busines...

Embodiment 2

[0057] In the second embodiment of the present application, in order to further improve the accuracy of risk identification, a comprehensive risk identification layer is designed. The risk identification process is performed asynchronously with the rapid risk identification and in-depth risk identification, that is, it does not affect the business processing process. The results of comprehensive risk identification can be used to optimize user data and rule models for rapid risk identification and in-depth risk identification.

[0058] Such as figure 2 As shown, it is a flow chart of the risk identification method provided in Embodiment 2 of the present application, including:

[0059] S201: After receiving the user's business processing request, the business server performs rapid risk identification on the business processing request based on the comparison of trusted user list / risk user list / user behavior profile. If it can be determined in this step that the service proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of internet, particularly relates to a business processing method and device, and is used for saving system resource consumption and enhancing the risk identification performance. A risk identification method comprises the steps that rapid risk identification is performed on a business processing request based on the identification algorithm of a rapid risk identification layer; if the situation that the business processing request is a secure request or a risk request cannot be determined after performing rapid risk identification, deep risk identification is performed on the business processing request based on the identification algorithm of a deep risk identification layer, wherein the data volume used for performing deep risk identification is greater than the data volume used for performing rapid risk identification, and the identification duration used for performing deep risk identification is greater than the identification duration used for performing rapid risk identification; and the business processing request is processed according to the result of performing deep risk identification.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a business processing method and device. Background technique [0002] With the development of Internet information technology, it is becoming more and more common to provide business services to users through the Internet, and there are more and more business service scenarios. While network business services bring convenience to users, they also bring certain risks. In order to ensure the smooth progress of network business services, it is necessary to set up a risk monitoring system to identify risks for users' business processing requests. [0003] As the risk monitoring system needs to monitor more and more business scenarios and the risk situation is becoming more and more complex, the requirements for the monitoring of various risks and the timeliness of monitoring are also getting higher and higher. More and more, the computational complexity is getti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1408G06Q10/0635H04L63/1433H04L67/02G06F21/55H04L67/535H04L63/102H04L63/105G06F21/552G06F21/00H04L63/101H04L63/205
Inventor 沈涛雷鑫孙宏发黄海
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products