Risk identification method based on data analysis and related equipment
A risk identification and data analysis technology, applied in the computer field, can solve the problems of low identification accuracy and lack of pertinence in the risk identification process, and achieve the effect of improving accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
[0045] see figure 1 , is a schematic flowchart of a risk identification method based on data analysis provided in the embodiment of the present application. The method can be applied to electronic devices. An electronic device can be a terminal or a server. The terminal can be a tablet computer, a notebook computer, or a desktop computer. The server can be a server or a cluster of servers. Specifically, the method may include the following steps:
[0046] S101. Obtain risk data of a target object in a target scene.
[0047] Wherein, the target object can be any object, or it can be any object in the target scene, or it can be any object in the target scene that needs risk identification, or it can be an input or search Any object that needs risk identification in the target scene. The subject...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


