Risk identification method, client device and risk identification system

A client device and risk identification technology, applied in the computer field, can solve the problem of high server cost, achieve low storage consumption, and reduce storage costs

Inactive Publication Date: 2018-01-30
ADVANCED NEW TECH CO LTD
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a risk identification method, which aims to solve the problem of high cost of the server in the prior art, reduce the consumption of the server, and reduce the storage cost of risk identification and control
[0005] The embodiment of the present application also provides a client device, which solves the problem of high cost of the server in the prior art, reduces the consumption of the server, and reduces the storage cost of risk identification and control
[0006] The embodiment of the present application also provides a risk identification system, which solves the problem of high cost of the server in the prior art, reduces the consumption of the server, and reduces the storage cost and calculation and analysis cost of risk identification and control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method, client device and risk identification system
  • Risk identification method, client device and risk identification system
  • Risk identification method, client device and risk identification system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0076] Logical analysis of business data and / or business index data can be realized by invoking business data and / or business index data, and preset risk identification rules or risk identification models. A risk identification rule can be understood as a logical expression, and the preset corresponding relationship between the status value (true or false) of the logical expression and the conclusion whether there is a risk. Business data and / or business index data can be understood as Enter the specific value of the above logical expression. Example 1: A preset risk identification rule is:

[0077] (current amount + accumulated amount of the day 1w): no risk

[0078] In the above risk identification rules, the value of "current amount" comes from the current business operation request to determine whether there is a risk, that is, the current business data; the values ​​of "cumulative amount for the day" and "cumulative payment amount for 7 days" come from business indicato...

example 2

[0079] Example 2: A preset risk identification rule is:

[0080] (current amount>1w) OR (current account is not in the risk-free list): risky

[0081] In the above risk identification rules, the value of "current amount" comes from the current business data, and the information of "current account" comes from the current business data. Therefore, this rule is only based on business data for logical analysis. When determining the state (the current account is not in the risk-free list), in addition to knowing the information of the "current account", you also need to know the "risk-free list". When introducing the configuration data sent by the server through the data channel later Will explain in detail.

example 3

[0082] Example 3: A preset risk identification rule is:

[0083] (Cumulative amount of the day>2000) AND (number of payments within 1 hour> 3) AND (variance of payment amount within 1 hour<0.3): risky

[0084] In the above risk identification rules, the values ​​of "cumulative amount of the day", "number of payments within 1 hour", and "variance of payment amount within 1 hour" come from the business index data. This rule only conducts logical analysis based on the business index data. When the output of the logical expression in the above rules is preset to be "true", it means that the business operation request is risky.

[0085]In the above-mentioned embodiments, the risk identification rules, risk-free list and / or risk identification model used for logical analysis or probability analysis on whether there is a risk can all belong to the configuration data, and the business index update data can also belong to a part of the configuration data. kind. The configuration data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a risk identification method. The method comprises: receiving a risk identification request initiated according to a service operation request through a client, whereinthe service operation request comprises service data; obtaining service data corresponding to the risk identification request by the client; and based on a risk identification rule or a risk identification model, determining whether the service operation request has risks or not according to the service data and / or service index data stored in the client, wherein the service index data is determined according to the service data. The present invention further discloses a risk identification device. The risk identification device comprises a data obtaining module, an index storage module and arisk identification module. The present invention further discloses a risk identification system. The system comprises a client device and a server device, or a client device, a server device and a cloud risk identification device. The problem is solved that the cost of a server is too high in the prior art, consumption for the server is reduced, and storage cost of risk identification and control is reduced.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a risk identification method, a client device and a risk identification system. Background technique [0002] With the rapid development of the Internet financial industry, there are more and more types of businesses, products, and transactions, and the resulting business risks are also getting higher and higher. Therefore, it is necessary to control the risks of Internet businesses. [0003] In the existing risk control system, the server cluster centralized processing method is usually adopted, and the risk identification and control are started after the server receives the data. This method needs to consume a lot of server-side resources for data storage, calculation and risk analysis, and the calculation cost and hardware cost of the server cluster are very expensive. Contents of the invention [0004] The embodiment of the present application provides a r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q20/38
CPCG06Q20/4016G06Q20/4093G06Q20/3223G06Q20/405G06Q10/0635G06Q10/0637G06Q30/0609G06Q20/40H04L63/1433
Inventor 夏巨鹏李才伟
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products