Event risk prevention and control method, device and equipment
A risk control and risk technology, applied in the computer field, can solve problems such as difficulty in training risk control models, low coverage of risk control strategies, and bias in training samples.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] like figure 1 As shown, the embodiments of this specification provide a method for risk prevention and control of events, and the execution body of the method may be a terminal device or a server, wherein the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, etc., or a notebook computer. Or a computer device such as a desktop computer, or it can also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.), etc. The server can be an independent server or a server cluster composed of multiple different servers. In this embodiment, the server is used as the execution body for detailed description. For the case where the execution body is a terminal device, the execution can be performed based on the following content, which is not repeated here. The method may specifically include the following steps:
[0020] In step S102, the to-be-processed event data of the target event is acquired.
[0021] The target e...
Embodiment 2
[0037] like image 3 As shown, the embodiments of this specification provide a method for risk prevention and control of events, and the execution subject of the method may be a terminal device or a server, wherein the terminal device may be a mobile terminal device such as a mobile phone and a tablet computer, or a notebook computer. Or a computer device such as a desktop computer, or it can also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.), etc. The server can be an independent server or a server cluster composed of multiple different servers. In this embodiment, the server is used as the execution body for detailed description. For the case where the execution body is a terminal device, the execution can be performed based on the following content, which is not repeated here. The method may specifically include the following steps:
[0038] In step S302, a risk control strategy corresponding to the target event is obtained, and the risk co...
Embodiment 3
[0070] The method for preventing and controlling the risk of an event provided by the embodiments of the present specification above, based on the same idea, the embodiment of the present specification also provides a device for preventing and controlling the risk of an event, such as Figure 4 shown.
[0071] The risk prevention and control device for this event includes: a data acquisition module 401, a first risk detection module 402 and a risk determination module 403, wherein:
[0072] The data acquisition module 401 acquires the pending event data of the target event;
[0073] The first risk detection module 402 determines a risk detection result corresponding to the first risk control model based on the event data and the first risk control model corresponding to the target event, where the first risk control model is determined by the The model constructed by the risk control strategy corresponding to the target event;
[0074] The risk determination module 403 deter...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


