Risk identification model training method and device and server
A technology of risk identification and model training, applied in the Internet field, can solve problems such as unsupervised machine learning of false transactions, difficulty in obtaining historical transaction labels of bad guys, etc., and achieve the effect of ensuring accuracy and high recognition accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to better understand the above technical solutions, the technical solutions of the embodiments of this specification will be described in detail below through the drawings and specific examples. It should be understood that the embodiments of this specification and the specific features in the embodiments are the technical solutions of the embodiments of this specification. It is a detailed description, rather than a limitation to the technical solutions of this specification. In the case of no conflict, the embodiments of this specification and the technical features in the embodiments can be combined with each other.
[0022] See figure 1 , is a schematic diagram of an application scenario of risk identification model training in the embodiment of this specification. The terminal 100 is located on the user side and communicates with the server 200 on the network side. The user can generate transaction information and various types of information correspondin...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com