Unlock instant, AI-driven research and patent intelligence for your innovation.

Risk control method and system

A risk control and risk level technology, applied in the field of big data, can solve problems such as waste of resources

Active Publication Date: 2019-11-26
CHINA PING AN LIFE INSURANCE CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Jin Guanjia APP needs to spend a lot of memory to store GPS data every day. If it is not used, it will only cause serious waste of resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk control method and system
  • Risk control method and system
  • Risk control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] refer to figure 1 , shows a flow chart of the steps of the risk control method in Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. It should be noted that this embodiment uses the computer device 2 as an execution subject for exemplary description. details as follows:

[0056] Step S100, using the APP buried point data to obtain first GPS coordinate information of the target location when the customer logs into the APP, wherein the first GPS coordinate information includes first latitude information X1 and first longitude information Y1.

[0057] In a preferred embodiment, if customer A logs into an APP (for example: Jin Guanjia APP) in Hubei, the computer device 2 uses the APP buried point data to obtain the GPS coordinate information of the customer A when logging into the APP.

[0058] In a specific embodiment, before using the APP buried point data to obt...

Embodiment 2

[0080] see figure 2 , shows a flow chart of the steps of the risk control method in Embodiment 2 of the present invention. After step S110, steps S200-S204 are also included:

[0081] Step S200, acquire the input information of the customer according to the verification rule, so as to perform identity verification on the customer and obtain a verification result.

[0082] For example, if the calculated location of the customer when logging into the Jinguanjia APP is Hubei Province, and the customer's home address is in Shenzhen, Guangdong, and work is also in Shenzhen, the preset distance is 20 kilometers, obviously the distance from Hubei to Shenzhen is huge 20 kilometers, the computer device 2 sends the information to be verified to the customer’s Jin Guanjia APP according to the preset verification rules, and obtains the customer’s input information from the Jin Guanjia APP to verify Whether the customer's input information is consistent with the customer's information s...

Embodiment 3

[0096] see image 3 , shows a schematic diagram of the hardware architecture of the computer device according to Embodiment 3 of the present invention. The computer device 2 includes, but is not limited to, a memory 21, a processing 22, and a network interface 23 that can communicate with each other through a system bus, figure 2 Only the computer device 2 is shown with components 21-23, but it should be understood that implementation of all of the illustrated components is not required and that more or fewer components may instead be implemented.

[0097] The memory 21 includes at least one type of readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia card, a card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static Random Access Memory (SRAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Programmable Read Only Memory (PROM), Magnetic Memory, Magnet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a risk control method, which comprises the steps: obtaining first GPS coordinate information of a target position when a client logs in an APP by utilizing APPburying point data; obtaining preset address information of the preset position of the client; converting the preset address information into second GPS coordinate information by calling an application program interface; calculating the distance between the target position and the preset position according to a preset calculation formula based on the first GPS coordinate information and the second GPS coordinate information; inputting the distance into a pre-trained classification model to classify the distance, and judging the risk level of the target position according to a classification result; and according to the risk level, setting a corresponding verification rule to carry out identity verification on the customer so as to control the risk. Through the embodiment of the invention,the risk management and control level is improved, and meanwhile, the precision and accuracy of the classification model are remarkably improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of big data, and in particular to a risk control method, system, computer equipment and readable storage medium. Background technique [0002] The current application program Jin Guanjia APP already has more than 300 million registered users. Since Jin Guanjia APP has various buried point data, GPS is an important buried point data. Jin Guanjia APP needs to spend a lot of memory to store GPS data every day. If it is not used, it will only cause serious waste of resources. Therefore, the embodiment of the present invention aims at how to use GPS data to carry out risk control on preservation, underwriting and claim settlement, so as to improve the accuracy and efficiency of risk control. Contents of the invention [0003] In view of this, it is necessary to provide a risk control method, system, computer equipment and readable storage medium, which can control business risks, improve the le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/08
CPCG06Q40/08
Inventor 王进刘行行
Owner CHINA PING AN LIFE INSURANCE CO LTD