Risk identification method, device and system, and cloud risk identification device
A technology of risk identification and risk control, which is applied in transmission system, payment system structure, data processing application, etc., can solve the problems of low risk control efficiency and time-consuming, etc., so as to avoid low risk control efficiency, reduce computing pressure, and improve The effect of user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] figure 1 A schematic flowchart of a risk identification method provided in an embodiment of the present application. The method can be as follows. The execution subject of the embodiment of the present application may be a terminal device.
[0046] Step 101: Collect service data, where the service data is generated according to a service processing request.
[0047] In this embodiment of the present application, the terminal device receives a service processing request sent by a user, and starts a risk identification operation when receiving the service processing request. This can ensure timely risk control during business processing.
[0048]When the terminal device starts the risk identification operation, it adopts the service data generated by the service processing request in real time or periodically. The business data here includes but is not limited to: device data (for example: device identification, data generated when the device is running, etc.), enviro...
Embodiment 2
[0079] Based on the same inventive concept, figure 2 A schematic flowchart of a risk identification method provided in an embodiment of the present application. The execution body of the embodiment of the present application may be a cloud risk identification device.
[0080] Step 201: The cloud risk identification device receives a risk identification request sent by the terminal device, where the risk identification request includes the service data.
[0081] In this embodiment of the present application, the risk identification request sent by the terminal device received by the cloud risk identification device is sent when the terminal device cannot determine the risk identification result.
[0082] Step 202: The cloud risk identification device performs risk identification on the business processing request generating the business data based on the stored risk identification rule or risk identification model and in combination with the business data.
[0083] There are...
Embodiment 3
[0089] Based on the same inventive concept, image 3 A schematic flowchart of a risk identification method provided in an embodiment of the present application.
[0090] Step 301: The terminal device and the cloud risk identification device acquire the risk identification policy data package from the intelligent platform device.
[0091] In the embodiment of the present application, the intelligent platform device updates the stored risk identification policy data packet in real time or periodically, and transmits the risk identification policy data packet to the terminal device and the cloud risk identification device in a push or pull manner, so that The terminal device and the cloud risk identification device synchronously update the locally stored risk identification policy data package.
[0092]Step 302: The terminal device receives the service processing request sent by the user, and collects service data generated during the execution of the service processing request....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


