Risk identification method and system

A risk identification and risk technology, applied in the Internet field, can solve problems such as single latitude, misjudgment, and lack of risk analysis solutions, and achieve the effect of mitigating network behavior and reducing costs.

Active Publication Date: 2019-01-01
南京星联数字技术有限公司
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this method requires regular maintenance of the risk identification model. Since the latitude of the rules is relatively single, it can only identify some major risk behaviors. For some special or sudden network behaviors, such as the combination of online and offline scenarios , such as shopping in offline stores through online payment tools, there is a lack of appropriate risk analysis solutions, and misjudgments often occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and system
  • Risk identification method and system
  • Risk identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Hereinafter, embodiments of the present invention will be described in detail, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a risk identification method and system, which relates to a risk analysis scheme in online-offline combined scenarios in the field of Internet technologies. The risk identification method comprises the steps of receiving a risk identification request message, determining a user terminal to be detected according to the risk identification request message, and obtaining behavior data of the corresponding user terminal; requesting the acquisition of an algorithm model from an algorithm system according to the behavior data, and requesting the taking of risk feature data matched with the algorithm model from a risk feature library according to the acquired algorithm model; performing risk analysis on the behavior data of the corresponding user terminalaccording to the algorithm model and the risk feature data matched with the algorithm model; and sending the risk analysis result to a service system. The risk identification method and system are applicable to risk identification in online and offline scenarios.

Description

technical field [0001] The present invention relates to the field of Internet technologies, in particular to a risk identification method and system. Background technique [0002] With the application and development of Internet technology, especially the development of mobile Internet technology, hundreds of millions of users use Internet applications in real time every day, and how to ensure the security of various network applications in the process of using them and the risk of users' network behavior control, known as a problem in urgent need of research. [0003] The currently adopted scheme is mainly to accumulate the network behavior data of a large number of users over a period of time to form black samples (such as abnormal network behavior data such as fraud and embezzlement) and white samples (that is, normal network behavior data); and The risk identification model is regularly updated based on black / white samples, and the risk identification of network behavio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/26G06Q20/40
CPCH04L41/147H04L43/50G06Q20/4016
Inventor 周斌吴礼阳张侦成敬业李文海
Owner 南京星联数字技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products