Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data processing method, device, system and equipment

A data processing and data technology, applied in the field of data processing, can solve the problems of small amount of data, low risk identification accuracy, poor risk identification effect of risk identification model, etc.

Pending Publication Date: 2022-07-05
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, companies such as online banking may have a small amount of user sample data and risk label data, and poor data quality, which will lead to poor risk identification effect and low risk identification accuracy of the trained risk identification model. Therefore, , needs a solution that can improve the risk identification effect of the risk identification model and the accuracy of risk identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device, system and equipment
  • Data processing method, device, system and equipment
  • Data processing method, device, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] like Figure 1A and 1B As shown, the embodiments of this specification provide a data processing method, the execution subject of the method may be a server, and the server may be an independent server or a server cluster composed of multiple servers. The method may specifically include the following steps:

[0033] In S102, pseudo sample data is determined based on the feature information of the first sample data.

[0034] The first sample data may include real user data composed of service data generated when a user triggers the execution of a certain service and attribute data of the user. For example, the feature information of the first sample data may be the attribute data of the user. Information (such as information that can represent one or more attributes of the user), behavior information (such as transfer behavior, call behavior, etc. triggering the execution of a business data generated by a certain business), etc. Specifically, for example, the first samp...

Embodiment 2

[0052] The embodiments of this specification provide a data processing method. The execution body of the method may be a server, and the server may be an independent server or a server cluster composed of multiple servers. The method may specifically include the following steps:

[0053] There are many ways to determine pseudo sample data, such as figure 2 As shown, the pseudo sample data can be determined according to the following S202-S208.

[0054] In S202, a risk label of the first sample data is obtained, and a pseudo label is determined based on the risk label.

[0055] There may be various risk labels of the first sample data. For example, the risk labels of the first sample data may be 0 and 1 labels. That is, if the risk label of the first sample data is 0, it can indicate that the first sample data has a risk label of 0. A sample data is risk-free sample data. If the risk label of the first sample data is 1, it can indicate that the first sample data is risk samp...

Embodiment 3

[0081] like Figure 7A and Figure 7B As shown, the embodiments of this specification provide a data processing method, the execution subject of the method may be a target device, and the target device may be a server or a terminal device, wherein the server may be an independent server or a plurality of servers. A server cluster is formed, and the terminal device can be a personal computer or other mobile terminal device such as a mobile phone and a tablet computer. The method may specifically include the following steps:

[0082] In S702, the pseudo sample data sent by the server is received.

[0083] The pseudo sample data may be the feature information based on the first sample data sent by the server when it is determined that the pseudo sample data meets the preset risk identification requirements based on the risk identification accuracy rate of the trained first risk identification model. For the determined sample data, the trained first risk identification model can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data processing method, device, system and equipment, and the method comprises the steps: determining pseudo sample data based on the feature information of first sample data; training a preset first risk identification model based on the pseudo sample data and second sample data determined by the data volume of the pseudo sample data to obtain a trained first risk identification model, and determining the risk identification accuracy of the trained first risk identification model based on third sample data; if it is determined that the pseudo sample data meets a preset risk identification requirement based on the risk identification accuracy of the trained first risk identification model, sending the pseudo sample data to a target device, the pseudo sample data being used for triggering the target device to train a second risk identification model based on the pseudo sample data, and performing risk identification processing on the user based on the second risk identification model obtained by training.

Description

technical field [0001] This document relates to the technical field of data processing, in particular to a data processing method, device, system and device. Background technique [0002] With the rapid development of computer technology, the number of users of enterprises that provide users with resource transfer services such as online banking has increased rapidly, and the data risks faced by enterprises are also increasing. In order to reduce data risks, enterprises can build a risk identification model by building a risk identification model method for risk identification. For example, an enterprise can train a risk identification model based on locally stored user sample data and risk labels, and perform risk identification processing based on the trained risk identification model. [0003] However, enterprises such as online banking may have a small amount of user sample data and risk label data, and the data quality is poor, which will lead to poor risk identificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06G06K9/62G06Q40/02
CPCG06Q10/0635G06Q40/02G06F18/2415
Inventor 王立
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More