System security control method, system and computer equipment for data application
A system security and control method technology, applied in the field of data system security control, can solve the problems of low decision-making efficiency of the process engine and long response time of the process engine, and achieve the effect of improving decision-making efficiency and reducing the response time of a single visit
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] see figure 1 , showing a flow chart of the steps of the data application system security control method according to the embodiment of the present invention. It can be understood that the flowchart in this embodiment of the method is not used to limit the sequence of executing steps. The following description will be exemplified by taking the computer device 2 as the execution subject. details as follows.
[0055] Step S100: Determine target user information according to the received application information.
[0056] When a user applies for a loan on the client terminal, in order to reduce the risk, the user's identity verification information needs to be further confirmed, and the next step can only be performed when the user's identity is confirmed to be correct.
[0057] Exemplarily, the step S100 may further include:
[0058] Step S100a, receiving the application information input by the client terminal.
[0059] The application information can be the amount, loa...
Embodiment 2
[0098] figure 2 It is a schematic diagram of the program modules of the second embodiment of the system safety control system of the data application of the present invention. The lip-language liveness detection system 20 may include or be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to accomplish the present invention, and may The system security control method for realizing the above data application. The program modules referred to in the embodiments of the present invention refer to a series of computer program instruction segments capable of performing specific functions, and are more suitable for describing the execution process of the lip language living detection system 20 in the storage medium than the programs themselves. The following description will specifically introduce the functions of each program module in this embodiment:
[0099] The receiving module 20...
Embodiment 3
[0109] see image 3 , is a schematic diagram of the hardware architecture of the computer device according to the third embodiment of the present invention. In this embodiment, the computer device 2 is a device that can automatically perform numerical calculation and / or information processing according to pre-set or stored instructions. The computer equipment 2 may be a rack-type server, a blade-type server, a tower-type server or a cabinet-type server (including an independent server, or a server cluster composed of multiple servers) and the like. As shown in the figure, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 , and a lip language living detection system 20 that can communicate with each other through a system bus.
[0110] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multime...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com