Risk user identification method and device, computer equipment and storage medium

A technology for user identification and risk location, applied in the fields of computer equipment and computer-readable storage media, risk user identification methods, and devices, and can solve the problems of slow identification speed and low identification accuracy of risk users.

Pending Publication Date: 2020-01-14
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention provides a risk user identification method, device, computer equipment and storage medium, aiming to solve the problems of low identification accuracy and slow identification speed of risk users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk user identification method and device, computer equipment and storage medium
  • Risk user identification method and device, computer equipment and storage medium
  • Risk user identification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or The presence or addition of one or more other features, integers, steps, operations, elements, components and / or collections thereof.

[0029] It should also be understood that the terminolog...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a risk user identification method and device, computer equipment and a storage medium. The method is applied to the field of data processing, and comprises thesteps of obtaining a position data set corresponding to a terminal if order data sent by a user through the terminal is received; performing clustering processing on the position data set according to a preset first clustering algorithm to obtain a position data cluster corresponding to the position data set after clustering processing; performing clustering processing on the position data cluster according to a preset second clustering algorithm to obtain a centroid corresponding to the position data cluster after clustering processing; judging whether the user is a risk user or not according to the centroid, the reserved position data corresponding to the user and preset risk position data; and if the user is a risk user, determining the order data corresponding to the user as risk data. By implementing the embodiment of the invention, the accuracy and recognition speed of risk user recognition can be improved.

Description

technical field [0001] The present invention relates to the field of computer data processing, in particular to a risk user identification method, device, computer equipment and computer-readable storage medium. Background technique [0002] With the rapid development of the Internet, more and more products can be traded through the Internet (such as commodity transactions, service transactions, etc.). In order to ensure the security of transactions using the Internet, it is necessary to identify risky users (such as advertisers operating fraudulent websites, merchants operating illegal products, users who forge information to defraud insurance, etc.) and prevent them from participating in transactions. In the prior art, the way to check the risk users is to manually identify the risks of the order data after the user submits the order. Manual identification of risky users is not only easily affected by subjective factors, resulting in low identification accuracy, but also ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q30/06
CPCG06Q10/0635G06Q30/0609
Inventor 丁露涛
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products