Risk identification method and device for service request and processing equipment

A business request and risk identification technology, applied in the computer field, can solve problems such as increasing the complexity of the architecture, increasing the response time of business request risk identification, etc., to achieve the effects of improving efficiency and response speed, reducing storage costs, and reducing response time

Inactive Publication Date: 2020-08-04
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology uses two types of bits: one represents an identifier that describes how likely it's being used by people who are associated with certain services (called “service providers”) while another type called "user data". By comparing these two sets of numbers, we get quicker understanding what factors affect their likelihood of meeting them correctly. These techniques help identify potential threatening situations faster than traditional methods like manual inspections. They also save money compared to other ways such as sending emails over email systems.

Problems solved by technology

This patented describes two technical problem: when there's too much data being sent over networks or users have their personal details compromised during transactions due to bad faith on trustworthiness (IoT). Existing systems require expensive hardware components like servers with large amounts of RAM) to store important customer information such as credit card numbers securely while still allowing access from remote databases faster than needed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and device for service request and processing equipment
  • Risk identification method and device for service request and processing equipment
  • Risk identification method and device for service request and processing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make those skilled in the art better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below with reference to the accompanying drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present specification, but not all of the embodiments. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0026] With the development of science and technology, there are more and more types and forms of business, and the management of business security is also more and more important. Some criminals may use computer networks to conduct illegal business. Identifying whether the business is illegal and whether it has risks and ensuring the s

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a risk identification method and device for a service request and processing equipment. The binary bitmap is used for storing the corresponding relation information between thefeatures and the user; based on the binary bitmap, the corresponding relationship between each feature in the service request and each user can be quickly determined; matching calculation is performedon the binary bitmaps of different feature parameter combinations by using a preset strategy, so that a risk user set corresponding to each feature in the service request can be determined, and the risk identification result of the service request can be further rapidly determined based on the risk user set. Characteristic user information is stored by using a binary bitmap, so that the storage cost can be greatly reduced, offline calculation is not needed, and an online database is not needed either.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products