Supercharge Your Innovation With Domain-Expert AI Agents!

System security control method, system and computer equipment for data application

A system security and control method technology, applied in the field of data system security control, can solve the problems of low decision-making efficiency of the process engine and long response time of the process engine, and achieve the effect of improving decision-making efficiency and reducing the response time of a single visit

Active Publication Date: 2022-05-27
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, it is necessary to provide a system security control method, system, computer equipment, and computer-readable storage medium for data application, so as to solve the problems of excessively long response time of the process engine and low decision-making efficiency of the process engine during a large number of accesses. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System security control method, system and computer equipment for data application
  • System security control method, system and computer equipment for data application
  • System security control method, system and computer equipment for data application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] see figure 1 , showing a flow chart of the steps of the data application system security control method according to the embodiment of the present invention. It can be understood that the flowchart in this embodiment of the method is not used to limit the sequence of executing steps. The following description will be exemplified by taking the computer device 2 as the execution subject. details as follows.

[0055] Step S100: Determine target user information according to the received application information.

[0056] When a user applies for a loan on the client terminal, in order to reduce the risk, the user's identity verification information needs to be further confirmed, and the next step can only be performed when the user's identity is confirmed to be correct.

[0057] Exemplarily, the step S100 may further include:

[0058] Step S100a, receiving the application information input by the client terminal.

[0059] The application information can be the amount, loa...

Embodiment 2

[0098] figure 2 It is a schematic diagram of the program modules of the second embodiment of the system safety control system of the data application of the present invention. The lip-language liveness detection system 20 may include or be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to accomplish the present invention, and may The system security control method for realizing the above data application. The program modules referred to in the embodiments of the present invention refer to a series of computer program instruction segments capable of performing specific functions, and are more suitable for describing the execution process of the lip language living detection system 20 in the storage medium than the programs themselves. The following description will specifically introduce the functions of each program module in this embodiment:

[0099] The receiving module 20...

Embodiment 3

[0109] see image 3 , is a schematic diagram of the hardware architecture of the computer device according to the third embodiment of the present invention. In this embodiment, the computer device 2 is a device that can automatically perform numerical calculation and / or information processing according to pre-set or stored instructions. The computer equipment 2 may be a rack-type server, a blade-type server, a tower-type server or a cabinet-type server (including an independent server, or a server cluster composed of multiple servers) and the like. As shown in the figure, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 , and a lip language living detection system 20 that can communicate with each other through a system bus.

[0110] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides a system security control method for data application. The method includes: determining the target user information according to the received application information; obtaining the target user corresponding to the target user from the framework database according to the target user information. Intermediate variable data; perform risk control analysis on the application information according to the target intermediate variable data and through a pre-configured analysis template; determine whether the target user is a safe user according to the risk control analysis result; when the target user If it is a safe user, forward the application information of the target user to the server. The embodiment of the present invention uses the intermediate variable data pre-stored in the framework database and the pre-configured parsing template, so that it is not necessary to re-analyze the information of the target user when applying for data, which reduces the response time of a single visit and improves the efficiency of the engine. decision-making efficiency.

Description

technical field [0001] Embodiments of the present invention relate to the field of data system security control, and in particular, to a system security control method, system, computer device, and computer-readable storage medium for data application. Background technique [0002] Risk control means that risk managers take various measures and methods to eliminate or reduce various possibilities of risk events, or reduce the losses caused by risk events. In the financial industry, risk control is an indispensable part. It can effectively identify users who are at risk of fraud, so as to ensure the safety of funds or transactions. For example, risk control can determine whether users are at risk by querying user-related information (such as PBOC credit information, education, black and white lists, etc.); however, if the risk control operations are hard-coded, it will lead to changes in logic when the logic needs to be modified. , the process of developing and testing onlin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/445G06F16/80G06F40/186
CPCG06F9/4451G06F16/80G06F40/186
Inventor 徐欣周盛臻施奕明
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More