Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A risk identification method and system

A risk identification and risk technology, applied in the Internet field, can solve problems such as single latitude, misjudgment, and lack of risk analysis solutions, and achieve the effect of mitigating network behavior and reducing costs.

Active Publication Date: 2022-04-15
南京星联数字技术有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this method requires regular maintenance of the risk identification model. Since the latitude of the rules is relatively single, it can only identify some major risk behaviors. For some special or sudden network behaviors, such as the combination of online and offline scenarios , such as shopping in offline stores through online payment tools, there is a lack of appropriate risk analysis solutions, and misjudgments often occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A risk identification method and system
  • A risk identification method and system
  • A risk identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Hereinafter, embodiments of the present invention will be described in detail, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a risk identification method and system, which relate to the field of Internet technology and a risk analysis scheme in a scene combining online and offline. The present invention includes: when receiving a risk identification request message, determining the user terminal to be detected according to the risk identification request message, and acquiring behavior data of the corresponding user terminal; requesting the algorithm system to acquire an algorithm model according to the behavior data, and According to the acquired algorithm model, request and retrieve risk feature data matching the algorithm model from the risk feature database; Perform risk analysis on the data; send the result of the risk analysis to the business system. The present invention is applicable to risk identification in online and offline scenarios.

Description

technical field [0001] The present invention relates to the field of Internet technologies, in particular to a risk identification method and system. Background technique [0002] With the application and development of Internet technology, especially the development of mobile Internet technology, hundreds of millions of users use Internet applications in real time every day, and how to ensure the security of various network applications in the process of using them and the risk of users' network behavior control, known as a problem in urgent need of research. [0003] The currently adopted scheme is mainly to accumulate the network behavior data of a large number of users over a period of time to form black samples (such as abnormal network behavior data such as fraud and embezzlement) and white samples (that is, normal network behavior data); and The risk identification model is regularly updated based on black / white samples, and the risk identification of network behavio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/147H04L43/50G06Q20/40
CPCH04L41/147H04L43/50G06Q20/4016
Inventor 周斌吴礼阳张侦成敬业李文海
Owner 南京星联数字技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products