Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User security level identification method and device based on multi-stage time sequence and multiple tasks

A security level, multi-tasking technology, applied in character and pattern recognition, data processing applications, special data processing applications, etc., to ensure the effect of user data

Active Publication Date: 2022-07-12
北京淇瑀信息科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in actual application scenarios, it is difficult for the data in the training data set to accurately reflect the real situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User security level identification method and device based on multi-stage time sequence and multiple tasks
  • User security level identification method and device based on multi-stage time sequence and multiple tasks
  • User security level identification method and device based on multi-stage time sequence and multiple tasks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments, however, can be embodied in various forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this application will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar parts, and thus their repeated descriptions will be omitted.

[0034]Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of the embodiments of the present application. However, those skilled in the art will appreciate that the technical solutions of the present application may be practiced without ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user security level identification method and device based on multiple stages of time sequences and multiple tasks. The method comprises the following steps: generating a plurality of stage sets according to total users and user stages corresponding to the total users; sequentially arranging the plurality of stage sets according to a time sequence; performing multi-task training on the (n + 1) th group of initial models according to the (n + 1) th stage set and the nth group of model parameter vectors to generate the (n + 1) th group of model parameter vectors, n being a positive integer; generating a plurality of groups of stage scoring models based on a plurality of groups of model parameter vectors until the plurality of stage sets are trained; and performing security level identification on the current user through the multiple groups of stage scoring models. According to the method, the multi-task machine learning method can be integrally improved from the aspects of actual problems and application scenes, model samples and model parameters, so that user data security and transaction security of an application system are ensured.

Description

technical field [0001] The present application relates to the field of computer information processing, and in particular, to a method, apparatus, electronic device, and computer-readable medium for identifying user security levels based on multi-stage sequential multitasking. Background technique [0002] Machine learning, which uses useful information from historical data to help analyze future data, usually requires a large amount of labeled data to train a good learner. A deep learning model is a typical machine learning model, because this type of model is a neural network with many hidden layers and many parameters, so it usually requires millions of data samples to learn accurate parameters. However, some applications, including medical image analysis, cannot meet this data requirement because labeling the data requires a lot of human labor. In these cases, multi-task learning (MTL) can help alleviate this data sparsity problem by using useful information from other ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/02G06Q20/38G06N20/00G06K9/62G06F16/2458
CPCG06Q20/382G06F16/2474G06N20/00G06Q40/03G06F18/214
Inventor 王磊宋孟楠苏绥绥郑彦
Owner 北京淇瑀信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products