Risk control model training method, risk identification method and hardware for personal information protection
An information protection and risk control technology, applied in character and pattern recognition, digital data protection, computer parts, etc., can solve problems such as inability to give accurate understanding, and achieve the effect of protecting privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] In order to make those skilled in the art better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below with reference to the accompanying drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present specification, but not all of the embodiments. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.
[0046] As mentioned above, at this stage, the training of the risk control model mainly relies on the user portrait features in the historical data. The risk analysis dimension of this method is relatively simple, and generally only some relatively simple risk-related user characteristics are excavated. However, with the evolution o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


