Method, device and equipment for mining fraud risk nodes and storage medium
A node and risk technology, applied in the information field, can solve problems such as slow manual screening process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below through specific implementation methods in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0021] A mining method for fraud risk nodes provided by this application can be applied to such as figure 1 shown in the application environment. Among them, the terminal 1 is the place where this method is implemented, and the terminal 1 can interact with the server 2 through the network, wherein, the terminal 1 receives the enterprise data from the server 2, and finally obtains the target risk degree of the target enterprise, which can be transmitted to In the server 2, similarly, the place where this solution is implemented can also be in the form of a server, which is ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


