Risk assessment model training, risk assessment method and device

A risk assessment model and risk assessment technology, applied in the field of risk assessment methods and devices, and risk assessment model training, can solve problems such as low efficiency, reduce costs and expenses, improve utilization, and improve risk assessment efficiency.

Active Publication Date: 2022-07-22
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, traditional risk assessment methods are less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment model training, risk assessment method and device
  • Risk assessment model training, risk assessment method and device
  • Risk assessment model training, risk assessment method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The solution provided in this specification will be described below with reference to the accompanying drawings.

[0039] Before describing the solution provided by this specification, the inventive concept of the solution is described as follows.

[0040] As mentioned above, in the traditional technology, the trained risk assessment model can usually only realize the assessment of a single risk type, that is to say, the risk assessment model trained by the traditional method is usually a single-task model, which will greatly waste the training. resource. Applicants of the present application have taken into account that there are often similarities between the tasks of assessing different risk types. For example, 48% of fraudulent users are high-risk users who violate the rules and regulations. Furthermore, there is a strong correlation between the task of assessing combined risks and the task of assessing individual risks. For example, a user with a higher individu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of this specification provide a training of a risk assessment model, a risk assessment method, and an apparatus. In the training method, a batch of user samples are collected, and each user sample includes user characteristics and a risk label, and the risk label is used to indicate the user , as well as multiple individual risk scores for each predetermined risk type. Based on the user characteristics of each user sample and the total risk score in the risk label, the feature coding layer is trained to obtain a trained feature coding layer, and based on the trained feature coding layer, the feature coding result of each user sample is obtained. Based on the feature encoding results of each user sample and the total risk score in the risk label, the comprehensive risk assessment layer is trained. For each single risk assessment layer in each single risk assessment layer, the single risk assessment layer is trained based on the feature coding result of each user sample and the individual risk score of the corresponding risk type in the risk label.

Description

technical field [0001] One or more embodiments of the present specification relate to the technical field of machine learning, and in particular, to a risk assessment model training, a risk assessment method, and an apparatus. Background technique [0002] With the increasing popularity of network technology, there are more and more risks in network transactions. In order to effectively reduce high-risk transactions and strengthen market monitoring, it is extremely important to conduct risk assessment on users. [0003] In traditional technologies, risk assessment is usually performed only for a single risk type (eg, a risk type suspected of gambling). The specific evaluation process may be as follows: first, based on the sample users and normal sample users of the risk type, the risk evaluation model is trained. Then, based on the risk assessment model, assess whether the target user is a user of the corresponding risk type. Therefore, traditional risk assessment methods...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06K9/62
CPCG06Q20/4016G06F18/24323G06F18/214
Inventor 许小龙
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products