Risk identification method, risk identification device, cloud risk identification device and system
A risk identification technology that cannot be determined. It is applied in the field of risk identification methods, cloud risk identification devices and systems, and risk identification devices. It can solve the problems of low risk control efficiency and long time consumption, so as to avoid low risk control efficiency and reduce computational complexity. Pressure, the effect of improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] figure 1 It is a schematic flowchart of a risk identification method provided in the embodiment of this application. The method can be as follows. The execution subject of this embodiment of the application may be a terminal device.
[0046] Step 101: collect service data, which is generated according to a service processing request.
[0047] In this embodiment of the application, the terminal device receives a service processing request sent by a user, and starts a risk identification operation when receiving the service processing request. This can ensure timely risk control during business processing.
[0048]When the terminal device starts the risk identification operation, it uses the service data generated by the service processing request in real time or periodically. The business data here includes but is not limited to: equipment data (such as: equipment identification, data generated during equipment operation, etc.), environmental data, user behavior data...
Embodiment 2
[0079] Based on the same inventive idea, figure 2 It is a schematic flowchart of a risk identification method provided in the embodiment of this application. The executor of this embodiment of the application may be a cloud risk identification device.
[0080] Step 201: The cloud risk identification device receives a risk identification request sent by the terminal device, and the risk identification request includes the service data.
[0081] In this embodiment of the present application, the risk identification request sent by the terminal device received by the cloud risk identification device is sent when the terminal device cannot determine the risk identification result.
[0082] Step 202: The cloud risk identification device performs risk identification on the service processing request that generates the service data based on the stored risk identification rules or risk identification models and in combination with the service data.
[0083] There are differences be...
Embodiment 3
[0089] Based on the same inventive idea, image 3 It is a schematic flowchart of a risk identification method provided in the embodiment of this application.
[0090] Step 301: The terminal device and the cloud risk identification device obtain the risk identification policy data package from the smart platform device.
[0091] In the embodiment of the present application, the intelligent platform device updates the stored risk identification policy data package in real time or periodically, and uses push (Push) or pull (Pull) to transmit the risk identification policy data package to the terminal device and the cloud risk identification device, so that The terminal device and the cloud risk identification device synchronously update the locally stored risk identification policy data package.
[0092]Step 302: The terminal device receives the service processing request sent by the user, and collects service data generated during the execution of the service processing request...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


