Risk control method and system
A risk control and risk level technology, applied in the field of big data, can solve problems such as waste of resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] refer to figure 1 , shows a flow chart of the steps of the risk control method in Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. It should be noted that this embodiment uses the computer device 2 as an execution subject for exemplary description. details as follows:
[0056] Step S100, using the APP buried point data to obtain first GPS coordinate information of the target location when the customer logs into the APP, wherein the first GPS coordinate information includes first latitude information X1 and first longitude information Y1.
[0057] In a preferred embodiment, if customer A logs into an APP (for example: Jin Guanjia APP) in Hubei, the computer device 2 uses the APP buried point data to obtain the GPS coordinate information of the customer A when logging into the APP.
[0058] In a specific embodiment, before using the APP buried point data to obt...
Embodiment 2
[0080] see figure 2 , shows a flow chart of the steps of the risk control method in Embodiment 2 of the present invention. After step S110, steps S200-S204 are also included:
[0081] Step S200, acquire the input information of the customer according to the verification rule, so as to perform identity verification on the customer and obtain a verification result.
[0082] For example, if the calculated location of the customer when logging into the Jinguanjia APP is Hubei Province, and the customer's home address is in Shenzhen, Guangdong, and work is also in Shenzhen, the preset distance is 20 kilometers, obviously the distance from Hubei to Shenzhen is huge 20 kilometers, the computer device 2 sends the information to be verified to the customer’s Jin Guanjia APP according to the preset verification rules, and obtains the customer’s input information from the Jin Guanjia APP to verify Whether the customer's input information is consistent with the customer's information s...
Embodiment 3
[0096] see image 3 , shows a schematic diagram of the hardware architecture of the computer device according to Embodiment 3 of the present invention. The computer device 2 includes, but is not limited to, a memory 21, a processing 22, and a network interface 23 that can communicate with each other through a system bus, figure 2 Only the computer device 2 is shown with components 21-23, but it should be understood that implementation of all of the illustrated components is not required and that more or fewer components may instead be implemented.
[0097] The memory 21 includes at least one type of readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia card, a card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static Random Access Memory (SRAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Programmable Read Only Memory (PROM), Magnetic Memory, Magnet...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


