Risk-management model training method and device

A model training and risk control technology, applied in the field of network security, can solve problems such as user property loss, transaction risk misjudgment and missed judgment, and achieve the effect of avoiding missed judgment and ensuring property safety

Inactive Publication Date: 2017-11-21
ALIBABA GRP HLDG LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in this prior art, manual review is used to determine whether there is a risk of fraud in the relevant transaction, which relies too much on the professional quality and working status of the reviewer, which is prone to misjudgment and missed judgment of transaction risk, thereby causing property losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk-management model training method and device
  • Risk-management model training method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present application provide a method and device for training a risk control model.

[0027] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0028] figure 1 It is the process of the risk control model training method in the embodiment of the present application, and the method includes the following steps.

[0029] S101. Obtain historical data of known results.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a risk control model training method and a device applying the method. By dividing the historical data of known results into the first and second data sets, the first data set is used to train each risk model with different loss functions. Each risk control model is verified through the second data set, so as to select the optimal model according to the verification result. Subsequently, the optimal model is used to carry out risk control processing on the data to be processed. Realize rapid judgment of data risks such as online transactions, avoid missed judgments of data risks, and ensure the safety of users' property.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and device for training a risk control model. Background technique [0002] With the rapid development of network security technology, there are more and more demands for online transactions using network technology. How to prevent users from encountering fraud risks such as bank card fraud and counterfeit goods in these transactions, and effectively improve the security of transactions, the more The development is valued by the industry. [0003] In the existing technology, it is generally judged whether there is a risk of fraud in a related transaction through a manual trial, which includes the following steps: First, formulate judgment rules for the transaction based on historical experience, for example, when the identities of both parties to the transaction have integrity issues, determine the fraud risk of the related transaction The level is hi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06
CPCG06Q10/0635
Inventor 夏威杨维嘉
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products