Check patentability & draft patents in minutes with Patsnap Eureka AI!

A kind of risk identification method and device

A risk identification and risk technology, applied in the field of network security, can solve problems such as time-consuming, ignoring risks, and easy-to-miss risks, and achieve the effects of reducing negative impacts, improving identification capabilities, and improving performance

Active Publication Date: 2021-10-22
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When the existing risk control engine conducts risk identification, it ignores the possible risks of the user's event behavior before this risk behavior, lacks a mechanism for backtracking on event risks, and easily misses the risk that has not been identified before due to various reasons. The identified risks, the identification ability of risk identification is not enough
Secondly, the risk control engine needs to obtain a large amount of data in real time to identify risks. In scenarios with high performance requirements, such as the scenario of millions of concurrent requests during promotional activities, it takes a long time to obtain a large amount of data in real time, which directly affects risk control. The performance of the engine cannot guarantee millisecond-level services
Thirdly, due to its own problems, the risk control engine cannot normally identify risk control events, resulting in a large number of wrong risk identification results, which has a negative impact on the normal operation of network services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of risk identification method and device
  • A kind of risk identification method and device
  • A kind of risk identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0076] The technical solutions introduced in the various embodiments of the present application can be applied to risk control services such as e-commerce and online finance, and specifically can be applied to risk control of behaviors such as login, transaction, and query.

[0077] In this application, an event corresponds to a behavior of a user in the system, which may specifically include behaviors of the own business or a third...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a risk identification method and device, wherein the method includes: identifying the current event as a risk event, searching for historical events associated with the risk event based on event attributes, and updating the risk identification of the historical event from a non-risk event to Risk events, so that for the related historical events before this risk event, consider the possible risks, increase the corresponding mechanism for backtracking the risks of historical events, and avoid missing risks that have not been identified before due to various reasons. The ability to identify historical event risks has been improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a risk identification method and a risk identification device. Background technique [0002] As network services cover more and more fields, the security of network services becomes more and more important. While online business brings convenience to people's life, it also brings risks, especially in the fields of e-commerce and online finance. It is very important to effectively control the risk of online business. [0003] Risk control refers to the safeguard measures and methods for Internet business security, which eliminate or reduce the various possibilities of risk events, or reduce the losses caused by risk events. Business behavior events that usually require risk prevention and control are called risk control events, such as logins and transactions. When a user generates a risk control event in its own business or a third-party business, it needs to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/2455G06Q10/06
CPCG06Q10/0635G06F16/24565G06F16/24568
Inventor 胡四海
Owner ALIBABA GRP HLDG LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More