Risk identification method, client device and risk identification system
A client device and risk identification technology, applied in the computer field, can solve the problem of high server cost, achieve low storage consumption, and reduce storage costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0076] Logical analysis of business data and / or business index data can be realized by invoking business data and / or business index data, and preset risk identification rules or risk identification models. A risk identification rule can be understood as a logical expression, and the preset corresponding relationship between the status value (true or false) of the logical expression and the conclusion whether there is a risk. Business data and / or business index data can be understood as Enter the specific value of the above logical expression. Example 1: A preset risk identification rule is:
[0077] (current amount + accumulated amount of the day 1w): no risk
[0078] In the above risk identification rules, the value of "current amount" comes from the current business operation request to determine whether there is a risk, that is, the current business data; the values of "cumulative amount for the day" and "cumulative payment amount for 7 days" come from business indicato...
example 2
[0079] Example 2: A preset risk identification rule is:
[0080] (current amount>1w) OR (current account is not in the risk-free list): risky
[0081] In the above risk identification rules, the value of "current amount" comes from the current business data, and the information of "current account" comes from the current business data. Therefore, this rule is only based on business data for logical analysis. When determining the state (the current account is not in the risk-free list), in addition to knowing the information of the "current account", you also need to know the "risk-free list". When introducing the configuration data sent by the server through the data channel later Will explain in detail.
example 3
[0082] Example 3: A preset risk identification rule is:
[0083] (Cumulative amount of the day>2000) AND (number of payments within 1 hour> 3) AND (variance of payment amount within 1 hour<0.3): risky
[0084] In the above risk identification rules, the values of "cumulative amount of the day", "number of payments within 1 hour", and "variance of payment amount within 1 hour" come from the business index data. This rule only conducts logical analysis based on the business index data. When the output of the logical expression in the above rules is preset to be "true", it means that the business operation request is risky.
[0085]In the above-mentioned embodiments, the risk identification rules, risk-free list and / or risk identification model used for logical analysis or probability analysis on whether there is a risk can all belong to the configuration data, and the business index update data can also belong to a part of the configuration data. kind. The configuration data...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com