Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for setting a risk control scorecard

A scoring card and risk control technology, applied in the Internet field, can solve the problems of not being able to reflect the real risk level of user access behaviors, repeated accumulation of scores, and a large proportion of similar rules, so as to achieve the effect of avoiding the real risk level

Active Publication Date: 2020-09-01
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides a method and device for setting a risk control scorecard to solve the problem that the existing scorecard cannot reflect user access behavior due to the repeated accumulation of similar rules and the excessive proportion of similar rules. The question of the true level of risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for setting a risk control scorecard
  • A method and device for setting a risk control scorecard
  • A method and device for setting a risk control scorecard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] figure 1 It is a flowchart of steps of a method for setting a risk control scorecard provided by an embodiment of the present invention.

[0049] refer to figure 1 As shown, the setting method of the risk control scorecard provided by this embodiment is applied to the risk control system of the website, and the risk control system is used to detect the nature of user access behaviors imported from the business system to avoid damage to the website caused by dangerous behaviors . This setting method is used to set the risk control scorecard required by the rule engine of the risk control system to detect user access behavior. The setting method specifically includes steps:

[0050] S101: Receive the data set delivered by the wind control system.

[0051] This data set comes from the results obtained by the wind control system through processing the log files of the website. Device id, device fingerprint, etc. Correspondingly, a corresponding rule name can be configu...

Embodiment 2

[0081] Figure 4 A final structural block diagram of a risk control scorecard provided by an embodiment of the present invention.

[0082] refer to Figure 4 As shown, the setting of the risk control scorecard provided by this embodiment is finally applied to the risk control system of the website. The risk control system is used to detect the nature of user access behaviors imported from the business system, and to avoid damage to the website caused by dangerous behaviors. . This setting method is used to set the risk control scorecard required by the rule engine of the risk control system to detect user access behavior. The setting device specifically includes a data receiving module 10 , a feature organizing module 20 , a cluster processing module 30 , a cluster labeling module 40 and a scorecard output module 60 .

[0083] The data receiving module is used to receive the data set delivered by the wind control system.

[0084] This data set comes from the results obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method for setting a risk control score card. The setting method is applied to a risk control system of a website, and specifically comprises the following steps: receiving a data set transmitted by a business system of the website, wherein the data set comprises a plurality of rules; organizing each rule into a preset characteristic form, and obtaining aplurality of characteristic values corresponding to the plurality of rules; clustering the plurality of characteristic values by utilizing a density-based unsupervised clustering algorithm to obtaina plurality of characteristic sets; marking the characteristic sets containing pre-marked abnormal samples as abnormal samples, and acquiring the value range of the characteristic values in each abnormal sample; performing model training based on the abnormal samples and normal samples obtained by sampling, and obtaining a supervised learning model; and determining a threshold of each rule according to the value range of the characteristic values in each abnormal sample, and establishing the risk control score card based on a rule tree. The risk control score card provided by the invention canavoid the problem that an existing score card cannot reflect the true risk level of user access behaviors.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for setting a risk control scorecard. Background technique [0002] The risk control system of the website is used to prevent possible business security risks on the entire site, such as: account theft, account scanning, wool parties, account sharing, SMS bombers, malicious hangups, malicious orders, malicious payments, etc. The risk control system is dedicated to helping business parties identify, evaluate, and prevent existing business risks, providing cross-business protection functions, and providing a query and feedback mechanism for risk events to facilitate traceability and subsequent continuous improvement. [0003] During the normal operation of the website, its business system receives the user's access behavior and transmits the access behavior to the rule engine of the risk control system through service access. The rule engine mainly relies o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/14H04L63/1425
Inventor 陈亚东
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products