Unlock instant, AI-driven research and patent intelligence for your innovation.

Risk identification method, device and system, and cloud risk identification device

A technology of risk identification and risk control, which is applied in transmission system, payment system structure, data processing application, etc., can solve the problems of low risk control efficiency and time-consuming, etc., so as to avoid low risk control efficiency, reduce computing pressure, and improve The effect of user experience

Active Publication Date: 2018-01-30
ADVANCED NEW TECH CO LTD
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the embodiment of the present application provides a risk identification method, a risk identification device, a cloud risk identification device and a system, which are used to solve the problem that the risk control server takes a long time to process the received data in the prior art. Problems leading to low risk control efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method, device and system, and cloud risk identification device
  • Risk identification method, device and system, and cloud risk identification device
  • Risk identification method, device and system, and cloud risk identification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] figure 1 A schematic flowchart of a risk identification method provided in an embodiment of the present application. The method can be as follows. The execution subject of the embodiment of the present application may be a terminal device.

[0046] Step 101: Collect service data, where the service data is generated according to a service processing request.

[0047] In this embodiment of the present application, the terminal device receives a service processing request sent by a user, and starts a risk identification operation when receiving the service processing request. This can ensure timely risk control during business processing.

[0048]When the terminal device starts the risk identification operation, it adopts the service data generated by the service processing request in real time or periodically. The business data here includes but is not limited to: device data (for example: device identification, data generated when the device is running, etc.), enviro...

Embodiment 2

[0079] Based on the same inventive concept, figure 2 A schematic flowchart of a risk identification method provided in an embodiment of the present application. The execution body of the embodiment of the present application may be a cloud risk identification device.

[0080] Step 201: The cloud risk identification device receives a risk identification request sent by the terminal device, where the risk identification request includes the service data.

[0081] In this embodiment of the present application, the risk identification request sent by the terminal device received by the cloud risk identification device is sent when the terminal device cannot determine the risk identification result.

[0082] Step 202: The cloud risk identification device performs risk identification on the business processing request generating the business data based on the stored risk identification rule or risk identification model and in combination with the business data.

[0083] There are...

Embodiment 3

[0089] Based on the same inventive concept, image 3 A schematic flowchart of a risk identification method provided in an embodiment of the present application.

[0090] Step 301: The terminal device and the cloud risk identification device acquire the risk identification policy data package from the intelligent platform device.

[0091] In the embodiment of the present application, the intelligent platform device updates the stored risk identification policy data packet in real time or periodically, and transmits the risk identification policy data packet to the terminal device and the cloud risk identification device in a push or pull manner, so that The terminal device and the cloud risk identification device synchronously update the locally stored risk identification policy data package.

[0092]Step 302: The terminal device receives the service processing request sent by the user, and collects service data generated during the execution of the service processing request....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a risk identification method, device and system, and a cloud risk identification device. The method comprises: when a terminal device collects service data, performingrisk identification of a service processing request generating service data based on a stored risk identification rule, and triggering risk identification of the service processing request generatingthe service data through a risk identification device when a risk identification result cannot be determined. In this embodiment of the present application, a distributed risk identification architecture is provided to effectively avoid the problem that a risk server takes a long time to process received data to cause low risk control efficiency in the prior art. Through this multi-level identification, computing pressure of the risk server is reduced, a system resource overhead is reduced, and risk identification is completed on a terminal device so as to shorten time of risk identification and enhance user experience of users.

Description

technical field [0001] The present application relates to the technical field of Internet information processing, and in particular, to a risk identification method, a risk identification device, a cloud risk identification device and a system. Background technique [0002] With the development of Internet technology, various e-commerce platforms have emerged. Among these e-commerce platforms, there is an Internet financial business platform related to the financial industry. For Internet financial business platforms, how to effectively control risks is an important issue to consider. [0003] In practical applications, as the business types, product types and transaction types in the Internet financial business platform become more and more complex, the successively generated risk control becomes more and more difficult. At present, the effective way to carry out risk control is as follows: [0004] The front end of the Internet financial business platform collects vario...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416G06Q40/08H04L67/51G06Q20/4016
Inventor 顾曦李才伟夏巨鹏
Owner ADVANCED NEW TECH CO LTD