Risk control method, risk control system and terminal equipment

A risk control and risk control technology, applied in the financial field, can solve the problems of high risk of leakage in the risk control system, models and strategies cannot be changed, etc., to achieve the effect of flexible changes and reduce the risk of leakage

Inactive Publication Date: 2019-12-03
深圳福莱信息科技有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present application provides a risk control method, a risk control system, and a terminal device to solve the problems in the prior art that the models and strategies in the risk control system cannot be changed according to actual data and the risk of the risk control system being leaked is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk control method, risk control system and terminal equipment
  • Risk control method, risk control system and terminal equipment
  • Risk control method, risk control system and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 It shows a schematic diagram of the implementation flow of a risk control method provided by the embodiment of the present application, and the details are as follows:

[0024] Step S11, detecting whether there are rules or / and models that need to be updated in the risk control system, wherein the rules and the models are stored in different locations, the rules are used to judge whether the business data is legal, and the models are used to Determine the applicable type of the business data;

[0025] In the risk control system provided by the embodiment of the present application, various rules for judging whether business data is legal are stored in different nodes, and each node is stored in a rule container. Similarly, the rules used for judging business data Types of model storage and different algorithm modules, the above nodes and the above algorithm modules are independent of each other and stored in different locations. For example, if there are 10 r...

Embodiment 2

[0053] Corresponding to the risk control method described in the above embodiment, figure 2 A structural block diagram of the wind control system provided by the embodiment of the present application is shown, and for convenience of description, only parts related to the embodiment of the present application are shown.

[0054] refer to figure 2 , the wind control system includes: a detection unit 21, an update unit 22, and a verification unit 23, wherein:

[0055] The detection unit 21 is used to detect whether there are rules or / and models that need to be updated in the risk control system, wherein the rules and the models are stored in different locations, and the rules are used to judge whether the business data is legal. The model is used to determine the applicable type of the business data;

[0056] An updating unit 22, configured to update the rule to be updated to a specified rule if there is a rule or / and model to be updated, and / or update the model to be updated...

Embodiment 3

[0073] image 3 It is a schematic diagram of a terminal device provided by an embodiment of the present application. Such as image 3 As shown, the terminal device 3 in this embodiment includes: a processor 30 , a memory 31 , and a computer program 32 stored in the memory 31 and operable on the processor 30 . When the processor 30 executes the computer program 32, it realizes the steps in the above embodiments of the various risk control methods, for example figure 1 Steps S11 to S13 are shown. Alternatively, when the processor 30 executes the computer program 32, it realizes the functions of the modules / units in the above-mentioned device embodiments, for example figure 2 Function of units 21 to 23 shown.

[0074] Exemplarily, the computer program 32 can be divided into one or more modules / units, and the one or more modules / units are stored in the memory 31 and executed by the processor 30 to complete this application. The one or more modules / units may be a series of c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method is suitable for the financial field, provides a risk control method, a risk control system and terminal equipment, and the method comprises the steps: detecting whether there is a to-be-updated rule or/and model in the risk control system or not, wherein the rule and the model are stored at different positions, the rule is used for judging whether service data is legal or not, and the model is used for judging the application type of the service data; if the rule or/and model needing to be updated exist, updating the rule needing to be updated to be a specified rule, and/or updatingthe model needing to be updated to be a specified model, and obtaining the updated risk control system; and when service data is received, verifying the service data through the updated risk controlsystem. The rule and the model in the risk control system are subjected to module division, so that online flexible change of each module of the risk control system is realized, and meanwhile, the risk of leakage of service data is also reduced.

Description

technical field [0001] The application belongs to the financial field, and in particular relates to a risk control method, a risk control system and terminal equipment. Background technique [0002] Effective risk control in financial and other fields is a necessary means to prevent and combat economic crimes. With the development of Internet technology, various network economic activities are developing rapidly, such as online shopping, online transactions and other business scenarios, which pose a challenge to the means of risk monitoring. In addition, the risks in the financial market are constantly changing, and financial risks are affected by factors such as transaction volume, customer group characteristics, channels, and product categories. At present, the risk control system is facing problems such as large concurrency, various products, channel differences, big data processing, and data delay. The various models and strategies of the risk control system cannot be c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q40/04
CPCG06Q10/0635G06Q40/04
Inventor 王曦毛大伟魏文华黄世宁黄晓彬
Owner 深圳福莱信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products