Risk monitoring method and device, storage medium and terminal

A risk and algorithm technology, applied in the field of communication, can solve the problems of poor timeliness, poor efficiency, and lack of scientific basis for risk monitoring business rules, and achieve the effect of solving poor efficiency and poor timeliness

Inactive Publication Date: 2018-08-24
CHINA PING AN LIFE INSURANCE CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention provides a risk monitoring method, device, storage medium and terminal to solve the pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk monitoring method and device, storage medium and terminal
  • Risk monitoring method and device, storage medium and terminal
  • Risk monitoring method and device, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0094] Figure 5 A structural diagram of the risk monitoring device provided by the embodiment of the present invention is shown, and for convenience of description, only parts related to the embodiment of the present invention are shown.

[0095] In the embodiment of the present invention, the risk monitoring device is used to realize the above figure 1 , figure 2 , image 3 ,or Figure 4 The risk monitoring method described in the embodiments may be a software unit, a hardware unit or a combination of software and hardware built into the terminal.

[0096] refer to Figure 5 , the risk monitoring device includes:

[0097] The configuration module 51 is used to configure business rules under different business scenarios, and adopts an offline algorithm to calculate a rule threshold corresponding to each business rule to generate an online business rule;

[0098] The acquiring module 52 is configured to acquire the online business rules that the user account has violate...

Embodiment 3

[0119] This embodiment provides a computer-readable storage medium, on which a computer program is stored. When the computer program is executed by a processor, the risk monitoring method in Embodiment 1 is implemented. To avoid repetition, details are not repeated here. Alternatively, when the computer program is executed by the processor, the functions of each module / unit in the risk monitoring device in Embodiment 2 are realized, and to avoid repetition, details are not repeated here.

Embodiment 4

[0121] Figure 6 It is a schematic diagram of a terminal provided by an embodiment of the present invention, and the terminal includes but is not limited to a server and a mobile terminal. Such as Figure 6 As shown, the terminal 6 of this embodiment includes: a processor 60 , a memory 61 and a computer program 62 stored in the memory 61 and operable on the processor 60 . When the processor 60 executes the computer program 62, the steps in the above risk monitoring method embodiment are realized, for example figure 1 shown in steps S101 to S104, figure 2 Step S105 described in the embodiment, image 3 Steps S1011 to S1013 described in the embodiment and Figure 4 Steps S1021 to S1023 described in the embodiment, or, when the processor 60 executes the computer program 62, realizes the functions of the various modules / units in the above risk monitoring device embodiment, for example Figure 5 The functions of modules 51 to 54 are shown.

[0122] Exemplarily, the computer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication technical field, and provides a risk monitoring method comprising the following steps: configuring business rules under different business scenes, employingan offline algorithm to calculate a rule threshold corresponding to each business rule, and forming online business rules; if a user account violates at least one online business rule under the business scene when executing the business scene, obtaining online business rules that are violated by the user account till the present time; obtaining score information corresponding to all online business rules that are violated by the user account, and calculating the total sum of the score information, thus obtaining the accumulated risk score of the user account; if the accumulated risk score is greater than the first threshold, executing verification operation for the user account. The method and device can solve the problems that existing risk monitoring business rules are lack of scientificbasis, and poor in risk monitoring timeliness and efficiency.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a risk monitoring method, device, storage medium and terminal. Background technique [0002] In real-time business scenarios such as registration, login, password modification, and payment transactions, existing risk monitoring is based on expert rules or historical experience to define the threshold of business rules, which lacks scientific basis and has low security. Moreover, the existing risk monitoring technology mainly focuses on post-event analysis of offline strategies, and cannot perform real-time monitoring in scenarios such as registration, login, password modification, payment transactions, etc., and restricts user behavior. The timeliness of risk monitoring is poor; and it can only target a single Business scenarios carry out risk analysis, and the risks of different business scenarios vary from large to small. Risky accounts cannot be quickly ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q40/04G06K9/62
CPCG06Q10/0635G06Q40/04G06F18/23
Inventor 刘杰于洋马宁
Owner CHINA PING AN LIFE INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products