Unlock instant, AI-driven research and patent intelligence for your innovation.

Risk identification method, risk identification device, cloud risk identification device and system

A risk identification technology that cannot be determined. It is applied in the field of risk identification methods, cloud risk identification devices and systems, and risk identification devices. It can solve the problems of low risk control efficiency and long time consumption, so as to avoid low risk control efficiency and reduce computational complexity. Pressure, the effect of improving user experience

Active Publication Date: 2021-03-19
ADVANCED NEW TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the embodiment of the present application provides a risk identification method, a risk identification device, a cloud risk identification device and a system, which are used to solve the problem that the risk control server takes a long time to process the received data in the prior art. Problems leading to low risk control efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method, risk identification device, cloud risk identification device and system
  • Risk identification method, risk identification device, cloud risk identification device and system
  • Risk identification method, risk identification device, cloud risk identification device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] figure 1 It is a schematic flowchart of a risk identification method provided in the embodiment of this application. The method can be as follows. The execution subject of this embodiment of the application may be a terminal device.

[0046] Step 101: collect service data, which is generated according to a service processing request.

[0047] In this embodiment of the application, the terminal device receives a service processing request sent by a user, and starts a risk identification operation when receiving the service processing request. This can ensure timely risk control during business processing.

[0048]When the terminal device starts the risk identification operation, it uses the service data generated by the service processing request in real time or periodically. The business data here includes but is not limited to: equipment data (such as: equipment identification, data generated during equipment operation, etc.), environmental data, user behavior data...

Embodiment 2

[0079] Based on the same inventive idea, figure 2 It is a schematic flowchart of a risk identification method provided in the embodiment of this application. The executor of this embodiment of the application may be a cloud risk identification device.

[0080] Step 201: The cloud risk identification device receives a risk identification request sent by the terminal device, and the risk identification request includes the service data.

[0081] In this embodiment of the present application, the risk identification request sent by the terminal device received by the cloud risk identification device is sent when the terminal device cannot determine the risk identification result.

[0082] Step 202: The cloud risk identification device performs risk identification on the service processing request that generates the service data based on the stored risk identification rules or risk identification models and in combination with the service data.

[0083] There are differences be...

Embodiment 3

[0089] Based on the same inventive idea, image 3 It is a schematic flowchart of a risk identification method provided in the embodiment of this application.

[0090] Step 301: The terminal device and the cloud risk identification device obtain the risk identification policy data package from the smart platform device.

[0091] In the embodiment of the present application, the intelligent platform device updates the stored risk identification policy data package in real time or periodically, and uses push (Push) or pull (Pull) to transmit the risk identification policy data package to the terminal device and the cloud risk identification device, so that The terminal device and the cloud risk identification device synchronously update the locally stored risk identification policy data package.

[0092]Step 302: The terminal device receives the service processing request sent by the user, and collects service data generated during the execution of the service processing request...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a risk identification method, a risk identification device, a cloud risk identification device and a system, including: when a terminal device collects business data, based on stored risk identification rules, risk identification is performed on a business processing request that generates business data , and when the risk identification result cannot be determined, the cloud risk identification device is triggered to perform risk identification on the business processing request generating the business data. In the embodiment of the present application, a distributed risk identification architecture is proposed, which effectively avoids the problem that the risk server in the prior art takes a long time to process the received data, resulting in low risk control efficiency. It can reduce the computing pressure of the risk server and reduce the overhead of system resources. At the same time, completing the risk identification on the terminal device can shorten the risk identification time and improve the user experience.

Description

technical field [0001] The present application relates to the technical field of Internet information processing, and in particular to a risk identification method, a risk identification device, a cloud risk identification device and a system. Background technique [0002] With the development of Internet technology, various e-commerce platforms have emerged. Among these e-commerce platforms, there is an Internet financial service platform related to the financial industry. For Internet financial business platforms, how to effectively carry out risk control is an important issue of primary consideration. [0003] In practical applications, as the business types, product types, and transaction types in the Internet financial business platform become more and more complex, the successive risk control difficulties are also getting higher and higher. Currently, effective risk control methods are as follows: [0004] The front-end of the Internet financial business platform co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416G06Q40/08H04L67/51G06Q20/4016
Inventor 顾曦李才伟夏巨鹏
Owner ADVANCED NEW TECH CO LTD