Risk identification model training method and device and server

A technology of risk identification and model training, applied in the Internet field, can solve problems such as unsupervised machine learning of false transactions, difficulty in obtaining historical transaction labels of bad guys, etc., and achieve the effect of ensuring accuracy and high recognition accuracy

Active Publication Date: 2019-07-12
ADVANCED NEW TECH CO LTD
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identification of false transactions is an important part and cornerstone of financial security, but such risks are usually difficult to obtain the historical transaction labels of bad actors, so the identification of false transactions is an unsupervised machine learning problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification model training method and device and server
  • Risk identification model training method and device and server
  • Risk identification model training method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to better understand the above technical solutions, the technical solutions of the embodiments of this specification will be described in detail below through the drawings and specific examples. It should be understood that the embodiments of this specification and the specific features in the embodiments are the technical solutions of the embodiments of this specification. It is a detailed description, rather than a limitation to the technical solutions of this specification. In the case of no conflict, the embodiments of this specification and the technical features in the embodiments can be combined with each other.

[0022] See figure 1 , is a schematic diagram of an application scenario of risk identification model training in the embodiment of this specification. The terminal 100 is located on the user side and communicates with the server 200 on the network side. The user can generate transaction information and various types of information correspondin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a risk identification model training method. Due to the fact that different types of unsupervised machine learning algorithms have different requirements for characteristics, the type of the target unsupervised machine learning algorithm can be firstly determined, then various types of characteristic information are extracted from input information, and then target characteristic information is extracted from the characteristic information according to a characteristic extraction mode corresponding to the type of the target unsupervised machine learningalgorithm. Due to the fact that the target characteristic information matched with the target unsupervised machine learning algorithm is extracted, the target characteristic information is trained based on the target unsupervised machine learning algorithm, the identification precision of the obtained target risk identification model corresponding to the target unsupervised machine learning algorithm is higher, and the risk identification accuracy is ensured.

Description

technical field [0001] The embodiment of this specification relates to the field of Internet technologies, and in particular to a risk identification model training method, device and server. Background technique [0002] With the rapid development of the Internet, more and more services can be realized through the Internet, such as online payment, online shopping, online transfer and other Internet services. While the Internet provides convenience to people's lives, it also brings risks. One type of risk is mainly the transactions that users conduct through their own accounts for the purpose of obtaining illegal benefits. These transactions themselves are often false because they are not for the purpose of actual purchase. This type of risk is called false transaction risk. The identification of false transactions is an important part and cornerstone of financial security, but such risks are usually difficult to obtain the historical transaction labels of bad actors, so th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06K9/62
CPCG06Q10/0635G06Q10/067G06F18/214G06Q40/02G06Q30/0185G06N20/00G06N5/01G06N3/044G06N5/04G06Q20/4016
Inventor 程羽刘腾飞刘晓韵陆逊陈弢杨洋徐轶
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products