Business risk assessment method and device, and risk control system

A technology of risk assessment and risk assessment model, which is applied in the fields of devices, risk control systems, and business risk assessment methods, can solve problems such as difficult simultaneous judgment, manual experience, time-consuming and labor-consuming, etc., to improve generalization ability and processing efficiency Effect

Inactive Publication Date: 2017-08-18
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF8 Cites 67 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for a malicious access, only the only rule that it hits can be obtained, but in fact, a malicious access will hit multiple rules at the same time, which makes it difficult to combine multiple rules for simultaneous judgment
[0006] (2) Low efficiency
[0007] Time-consuming and labor-intensive due to the need to manually set the priority of each ru

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business risk assessment method and device, and risk control system
  • Business risk assessment method and device, and risk control system
  • Business risk assessment method and device, and risk control system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] In order to make the above objectives, features and advantages of the present invention more obvious and understandable, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0029] The embodiment of the present invention proposes a business risk assessment method based on weight accumulation in view of the fact that it is difficult for the existing risk control system to make full use of all triggered rule information and the manual setting of rule priority is time-consuming and labor-intensive. For example, this method first trains the data obtained by the existing risk control system through the logistic regression algorithm to obtain the model weight, and then converts the model weight into the sub-rule score in the form of weight accumulation according to the risk level of each sub-rule. The low-level scores of the same type of rules are accumulated to the high-level to ensure that the hi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a business risk assessment method and device, and a risk control system. The method comprises steps that to-be-assessed business data is received, and a risk behavior rule set matched with the business data is identified according to a preset risk rule engine; for multiple rules of the rule set, a risk value of each corresponding rule is assessed according to a pre-established risk assessment model; the risk values of the corresponding rules are accumulated, the accumulated risk value sum is compared with a total risk score threshold of each preset risk grade, and a risk grade of the business data is determined. The method is advantaged in that generalization capability and processing efficiency of a risk system can be improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a business risk assessment method, device and risk control system. Background technique [0002] The risk control system is the business security risk control system, which aims to ensure the normal and safe operation of various businesses. see figure 1 , is a schematic diagram of a typical risk system architecture. The working process of the risk control system is: the business system transmits user access behavior data to the rule engine through the service access module, and the rule engine mainly depends on the security data warehouse and model strategy. The security data warehouse refers to the social engineering database (social engineering database), that is, malicious user information, including mobile phone number, IP, user name, etc.; model strategy mainly includes rules and strategies formulated by data analysts through data mining and other methods, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06
CPCG06Q10/0635
Inventor 陈亚东
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products