Unlock instant, AI-driven research and patent intelligence for your innovation.

Event risk prevention and control method, device and equipment

A risk control and risk technology, applied in the computer field, can solve problems such as difficulty in training risk control models, low coverage of risk control strategies, and bias in training samples.

Pending Publication Date: 2022-07-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the risk prevention and control system, the risk prevention and control process can usually be realized through risk control strategies and risk control models. However, for the case of the risk control model, the risk control model depends on the training samples. The training samples cannot obtain their real label information. Therefore, during the model training, the above-mentioned training samples will be removed. In this way, the data distribution of the remaining training samples after removal is different from the actual data or the data distribution of the training samples before removal. Inconsistent, and the training samples that are eliminated are often training samples with a high probability of risk, resulting in bias in the training samples for training the risk control model. In addition, the number of positive samples in the above training samples is often relatively small, so that Makes the risk control model difficult to train
In the case of risk control strategies, risk control strategies are the embodiment of the knowledge and experience of risk control experts. Risk control strategies often have low coverage, but their accuracy is high. A risk prevention and control plan with higher control accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Event risk prevention and control method, device and equipment
  • Event risk prevention and control method, device and equipment
  • Event risk prevention and control method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] like figure 1 As shown, the embodiments of this specification provide a method for risk prevention and control of events, and the execution body of the method may be a terminal device or a server, wherein the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, etc., or a notebook computer. Or a computer device such as a desktop computer, or it can also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.), etc. The server can be an independent server or a server cluster composed of multiple different servers. In this embodiment, the server is used as the execution body for detailed description. For the case where the execution body is a terminal device, the execution can be performed based on the following content, which is not repeated here. The method may specifically include the following steps:

[0020] In step S102, the to-be-processed event data of the target event is acquired.

[0021] The target e...

Embodiment 2

[0037] like image 3 As shown, the embodiments of this specification provide a method for risk prevention and control of events, and the execution subject of the method may be a terminal device or a server, wherein the terminal device may be a mobile terminal device such as a mobile phone and a tablet computer, or a notebook computer. Or a computer device such as a desktop computer, or it can also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.), etc. The server can be an independent server or a server cluster composed of multiple different servers. In this embodiment, the server is used as the execution body for detailed description. For the case where the execution body is a terminal device, the execution can be performed based on the following content, which is not repeated here. The method may specifically include the following steps:

[0038] In step S302, a risk control strategy corresponding to the target event is obtained, and the risk co...

Embodiment 3

[0070] The method for preventing and controlling the risk of an event provided by the embodiments of the present specification above, based on the same idea, the embodiment of the present specification also provides a device for preventing and controlling the risk of an event, such as Figure 4 shown.

[0071] The risk prevention and control device for this event includes: a data acquisition module 401, a first risk detection module 402 and a risk determination module 403, wherein:

[0072] The data acquisition module 401 acquires the pending event data of the target event;

[0073] The first risk detection module 402 determines a risk detection result corresponding to the first risk control model based on the event data and the first risk control model corresponding to the target event, where the first risk control model is determined by the The model constructed by the risk control strategy corresponding to the target event;

[0074] The risk determination module 403 deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an event risk prevention and control method, device and equipment, and the method comprises the steps: obtaining to-be-processed event data of a target event, then determining a risk detection result corresponding to a first risk control model based on the event data and the first risk control model corresponding to the target event, and obtaining a risk detection result corresponding to the first risk control model; the first risk control model is a model constructed by a risk control strategy corresponding to the target event, and finally, initial risk information corresponding to the event data can be determined based on a risk detection result corresponding to the first risk control model. And inputting initial risk information corresponding to the event data and the event data into a second risk control model corresponding to the target event to obtain risk information corresponding to the event data, the second risk control model being a model obtained by performing model training through an event data sample corresponding to the target event.

Description

technical field [0001] This document relates to the field of computer technology, in particular to a method, device and equipment for event risk prevention and control. Background technique [0002] With the continuous development of network technology, handling certain businesses through the network has become an important way of current business handling. Carry out risk prevention and control to avoid user information leakage and even resource loss. [0003] In the risk prevention and control system, risk prevention and control can usually be achieved through risk control strategies and risk control models. However, in the case of the risk control model, the risk control model depends on the training samples. The training samples cannot obtain their real label information. Therefore, during model training, the above training samples will be removed, which will cause the data distribution of the remaining training samples after removal to be the same as the actual data or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06G06K9/62G06V10/764
CPCG06Q10/0635G06F18/285G06F18/24
Inventor 李志峰朱预立崔世文孟昌华王维强
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD