Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk identification method, apparatus and system thereof

A risk identification and risk technology, applied in the computer field, can solve the problem of low efficiency of real-time business completion, and achieve the effect of improving the efficiency of risk identification and completion.

Active Publication Date: 2017-05-17
ADVANCED NEW TECH CO LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present application provides a risk identification method, which is used to solve the problem that the risk identification method in the prior art will lead to low completion efficiency of businesses with high real-time requirements
[0008] The embodiment of the present application also provides a risk identification device, which is used to solve the problem that the risk identification method in the prior art will lead to low completion efficiency of businesses with high real-time requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method, apparatus and system thereof
  • Risk identification method, apparatus and system thereof
  • Risk identification method, apparatus and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] In order to solve the problem that using the risk identification method in the prior art will result in low completion efficiency of services with high real-time requirements, an embodiment of the present application provides a risk identification method. The subject of execution of the method may be a server, a risk control system, or any device capable of executing the method. The execution subject does not constitute a limitation of the present application. For the convenience of description, the embodiments of the present application are described by taking the execution subject as a risk control system as an example.

[0035] Specifically, the specific implementation flow chart of the method is as follows figure 2 shown, including the following steps:

[0036] Step 21, the risk control system judges whether the business to be risk identified meets the real-time identification conditions; if the judgment result is yes, execute step 22;

[0037] In the embodiment ...

Embodiment 2

[0079] Based on the same inventive idea as Embodiment 1 of the present application, Embodiment 2 provides a risk identification system to solve the problem of using the risk identification method in the prior art, which will lead to low efficiency in completing businesses with high real-time requirements. The problem.

[0080] The schematic structural diagram of the risk identification system provided in Embodiment 2 is as follows image 3 As shown, it includes a risk control system 31 , a real-time model running system 32 , an asynchronous model running system 33 , a model performance monitoring system 34 , a synchronous model library 35 and a full library 36 . The main function of the risk identification system is to respond to image 3 Consultation on the business system in the business system, and feedback the risk consultation results to the business system. Wherein, the function of the service system is similar to that of the service system in the prior art, and will n...

Embodiment 3

[0093] In order to solve the problem that using the risk identification method in the prior art will result in low completion efficiency of services with high real-time requirements, Embodiment 3 of the present application provides a risk identification device. The specific structural diagram of the device is shown in Figure 4 As shown, it mainly includes the following functional units:

[0094] The judging unit 41 is configured to judge whether the business to be risk identified satisfies the real-time identification condition.

[0095] The real-time identification condition is used to distinguish services with higher real-time requirements for completing services from services with lower real-time requirements.

[0096] The model calling unit 42 is configured to call the risk identification model in the first model set when the judgment result obtained by the judging unit 41 is yes, to identify whether the business is at risk.

[0097] Wherein, the risk identification mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a risk identification method. The method is used to solve a problem that completion efficiency of a service with a high real-time requirement is low through using the risk identification method in the prior art. The method comprises the following steps of determining whether a service which is about to carry out risk identification satisfies a real-time identification condition, wherein the real-time identification condition is used for distinguishing the service which has a high requirement to complete real-time performance of the service and the service which has a low requirement to complete the real-time performance of the service; and when a determination result is yes, calling a risk identification model in a first model set and identifying whether the service has a risk, wherein the risk identification model in the first model set is screened and acquired according to a preset model screening rule. The invention also discloses a risk identification apparatus and a risk identification system.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a risk identification method, device and system. Background technique [0002] At present, in order to ensure network security and to ensure that the legal interests of legitimate users of the Internet are not damaged, it is necessary to carry out risk identification on services on the Internet. The significance of risk identification for business is that for the identified business that may be risky, it is possible to avoid bad results by suspending, terminating or canceling business operations. [0003] In the prior art, a schematic diagram of a typical business risk identification system is as follows figure 1 As shown, it includes risk control system, model running platform, model library and model management system. In practical applications, these parts cooperate with each other to provide risk identification services for business systems. [0004] specifical...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 梁建国叶瑞海
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products