Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method, data sending method, and risk identifying method and device

A data processing device and data processing technology, applied in data processing applications, electrical digital data processing, special data processing applications, etc., can solve problems such as the increase in risk identification processing time, so as to avoid the increase in processing time, reduce storage overhead, and solve Effects of Data Transfer Issues

Inactive Publication Date: 2018-01-30
ADVANCED NEW TECH CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present application provides a data processing method, a data sending method, a risk identification method and equipment, which are used to solve the problem in the prior art that the processing time for server-side risk identification caused by the client sending a large amount of business data growth problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, data sending method, and risk identifying method and device
  • Data processing method, data sending method, and risk identifying method and device
  • Data processing method, data sending method, and risk identifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] figure 1 It is a flow chart of a data processing method provided by the embodiment of this application. The execution subject of the data processing method may be a client, and this article introduces the technical solution by taking the client as an execution subject as an example. The data processing method comprises the steps of:

[0055] S101: Collect service data generated by the user performing the current operation behavior.

[0056] Since the user will generate business data when using the client to perform the operation behavior, the data content of the business data generated by different operation behaviors is also different. When business data is generated, it can be stored in the storage unit of the client in real time; the data processing method described in the embodiment of the application can also be started in real time, and the data obtained after processing can be stored in the storage unit; it can also be stored in the client. The business data i...

Embodiment 2

[0126] At present, there is still such an existing technology: the client collects the business data generated by the user in the process of using the client, and transmits the collected business data to the server. The business data is calculated to obtain the value of a certain variable, and the calculated value of the variable is used as the input of the risk identification model for risk identification. In the above prior art, since the user's business data is generated along with the user's operation behavior on the client, generally the amount of business data collected by the client will continue to increase. Therefore, sending a large amount of business data collected by the client to the server will inevitably cause a large consumption of network transmission resources. Aiming at the above problems, the present application also proposes a data sending method to solve the problem in the prior art that a large amount of business data collected by the client is transmitt...

Embodiment 3

[0140] Based on the same inventive concept, the accumulated results of the above preset variables can be applied to the scenario of risk identification. Figure 4 It is a schematic flowchart of a risk identification method provided in the embodiment of this application. The execution subject of this embodiment of the application is a server. The risk identification method includes the following steps:

[0141] S401: Receive the cumulative result sent by the terminal device.

[0142] The cumulative result is at least one preset variable object included in the current operation behavior performed by the user on the terminal device, and is obtained through the data processing method described in Embodiment 1.

[0143] As mentioned above, the preset variable can be, for example: the decay time (decay sum) of the user's browsing behavior on the same page, or the decay count of the user's browsing behavior on the same page (decay count), or the user's browsing behavior on the same...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data sending and processing method, a data sending method, and a risk identifying method and device. The data processing method comprises that a client triggers a calculatingoperation aiming at a preset variable when acquiring business data, and the calculating operation includes carrying out calculation again on the basis of a cumulative result of the preset variable and obtained through an adjacent last calculating operation to obtain a new cumulative result of the preset variable. In this way, the business data acquired by the client is subjected to cumulative processing on the client, and therefore the data volume subsequently sent to a rear-end server is reduced, the problem that because the client sends a lot of business data, the processing duration of server risk identification is increased is effectively avoided, the data transmission problem in the prior art is effectively solved, and the memory cost of the client is reduced at the same time.

Description

technical field [0001] The present application relates to the technical field of Internet information processing, and in particular to a data processing method, a data sending method, a risk identification method and equipment. Background technique [0002] In the Internet environment, data analysis based on the user's business data on the client side has been applied in many scenarios, and a common application scenario is "risk identification". The above business data may include: the time when the user browses a certain page, the duration of browsing a certain page, the total amount paid by the user in history, and the like. [0003] In the prior art, the client collects business data generated by the user while using the client, and sends the business data to the backend server; the backend server performs risk identification according to the collected business data. In the risk identification scenario, these business data (including the processed business data obtained ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08G06F17/30
CPCG06F21/316G06F21/552G06F21/554G06Q20/4016H04L63/1425G06F2221/2115G06F21/57G06F2221/034
Inventor 陈露佳周庆岳王维强
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products