CN109242740A - Identity information risk assessment method, apparatus, computer equipment and storage medium - Google Patents

Identity information risk assessment method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN109242740A
CN109242740A CN201810791449.2A CN201810791449A CN109242740A CN 109242740 A CN109242740 A CN 109242740A CN 201810791449 A CN201810791449 A CN 201810791449A CN 109242740 A CN109242740 A CN 109242740A
Authority
CN
China
Prior art keywords
data
risk
identity
probability
evaluation model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810791449.2A
Other languages
Chinese (zh)
Inventor
孙静远
徐亮
肖京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810791449.2A priority Critical patent/CN109242740A/en
Priority to PCT/CN2018/104806 priority patent/WO2020015089A1/en
Publication of CN109242740A publication Critical patent/CN109242740A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Evolutionary Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves a kind of identity information risk assessment method, apparatus, computer equipment and storage mediums.The described method includes: receiving identity data;Identity characteristic parameter is extracted from identity data;The corresponding historical verification data of identity data are searched, is extracted from historical verification data and verifies time parameter;Identity characteristic parameter and verification time parameter are inputted into default risk evaluation model and obtain identity risk probability;Risk evaluation result is generated according to identity risk probability.Security protection can be improved using this method and check accuracy rate.

Description

Identity information risk assessment method, apparatus, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of identity information risk assessment method, apparatus, meter Calculate machine equipment and storage medium.
Background technique
Airport, port etc. enter and leave the border place daily all can a large amount of passenger's clearances, wherein being no lack of some smuggle, steal into another country etc. no Method molecule.
The security protection security staff in entry and exit place usually passes through according to itself work when carrying out safety inspection to passenger It tests and is watched the mood and guessed the thoughts to passenger to judge passenger with the presence or absence of security risk.But very due to the flow of the people of daily clearance Greatly, be only by the passenger with security risk that can check of manual inspection of security staff it is very limited, cause The accuracy rate of immigration place security protection inspection is very low, and many criminals is made to become fish that has escape the net.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of identity letter that can be improved security protection and check accuracy rate Relieve the wind syndrome danger assessment method, device, computer equipment and storage medium.
A kind of identity information risk assessment method, which comprises
Receive identity data;
Identity characteristic parameter is extracted from the identity data;
The corresponding historical verification data of the identity data are searched, is extracted from the historical verification data and verifies the time Parameter;
The identity characteristic parameter and the verification time parameter are inputted into default risk evaluation model and obtain identity risk Probability;
Risk evaluation result is generated according to the identity risk probability.
The generating mode of the default risk evaluation model in one of the embodiments, comprising:
The sample data is divided into training set data and test set data by collecting sample data;
Fisrt feature parameter and first object classification are extracted from the training set data;
Attribute gain assessment is carried out according to the fisrt feature parameter and the first object classification, and is increased according to feature Beneficial assessment result carries out feature selecting, is classified to obtain initial decision tree risk evaluation model, root according to selected feature The risk probability of each class node in the initial decision tree risk evaluation model is calculated according to the training set data;
Second feature parameter and the second target category are extracted from the test set data;
According to the second feature parameter and second target category in the initial decision tree risk evaluation model The risk probability of each class node is verified, and is adjusted according to verification result to the initial decision tree risk evaluation model The default risk evaluation model of whole and generation.
In one of the embodiments, further include:
When reaching verification data renewal time, the verification data of update are loaded;
Third feature parameter corresponding with the default risk evaluation model and risk mesh are extracted from the verification data Mark label;
According to the third feature parameter and the risk target label to respectively classifying in the default risk evaluation model The risk probability of node is verified, and is optimized according to verification result to the default risk evaluation model.
It is described in one of the embodiments, that risk evaluation result is generated according to the identity risk probability, comprising:
The corresponding decision path of the maximum identity risk probability of probability value is searched from the default risk evaluation model;
Obtain the node data of the decision path;
Path profile is discovered and seized according to the node data and the maximum identity risk probability generation of the probability value and is exported.
It is described in one of the embodiments, that risk evaluation result is generated according to the identity risk probability, comprising:
The maximum identity risk probability of acquisition probability value;
It obtains current security protection manpower data, searches security protection passenger flow threshold value corresponding with the current security protection manpower data;
Preset threshold change data is obtained, is calculated according to the security protection passenger flow threshold value and the preset threshold change data Risk probability threshold value;
When the maximum identity risk probability of the probability value is more than the risk probability threshold value, it is pre- to generate detection risk It is alert to prompt and export.
It is described in one of the embodiments, that identity characteristic parameter is extracted from the identity data, comprising:
Passport NO. is extracted from the identity data;
Certificate format identification is carried out to the passport NO., searches type of credential corresponding with format recognition result;
The passport NO. is segmented to obtain participle string according to the type of credential;
Search identity characteristic parameter corresponding with each participle string.
A kind of identity information risk assessment device, described device include:
Identity data obtains module, for receiving identity data;
Identification parameters extraction module, for extracting identity characteristic parameter from the identity data;
Time parameter obtains module, for searching the corresponding historical verification data of the identity data, from the history core It looks into extract in data and verifies time parameter;
Risk probability obtains module, for the identity characteristic parameter and the verification time parameter to be inputted default wind Dangerous assessment models obtain identity risk probability;
Risk Results generation module, for generating risk evaluation result according to the identity risk probability.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the place Manage the step of realizing the above method when device executes the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of above method is realized when row.
Above-mentioned identity information risk assessment method, apparatus, computer equipment and storage medium, from passenger's identity of acquisition Identity characteristic parameter is extracted in data, and searches historical verification data corresponding with the identity characteristic parameter extracted, and is set in advance Determine risk evaluation model, identity characteristic parameter and corresponding historical verification data, which are inputted default risk evaluation model, to be obtained To the risk probability of passenger, so as to scientifically be counted according to passenger's feature and historical data to the security risk of passenger Assessment is calculated, security protection is improved and checks accuracy rate.
Detailed description of the invention
Fig. 1 is the application scenario diagram of identity information risk assessment method in one embodiment;
Fig. 2 is the flow diagram of identity information risk assessment method in one embodiment;
Fig. 3 is the flow diagram that risk evaluation model generation method is preset in one embodiment;
Fig. 4 is the structural block diagram of identity information risk assessment device in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
In order to which the objects, technical solutions and advantages of the application are more clearly understood, with reference to the accompanying drawings and embodiments, The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to paraphrase the application, It is not used to limit the application.
Identity information risk assessment method provided by the present application, can be applied in application environment as shown in Figure 1.Its In, terminal 102 is communicated by network with server 104.Server 104 receives passenger's identity number that terminal 102 is sent According to extracting identity characteristic parameter from received identity data, search the corresponding historical verification data of identity data, from described It is extracted in historical verification data and verifies time parameter, by identity characteristic parameter and verify the default risk assessment of time parameter input Model obtains identity risk probability, generates risk evaluation result according to identity risk probability, server 104 is by the risk of generation Assessment result returns to terminal 102.Wherein, terminal 102 can be, but not limited to be various personal computers, laptop, intelligence Energy mobile phone, tablet computer and portable wearable device, server 104 can use the either multiple services of independent server The server cluster of device composition is realized.
In one embodiment, it as shown in Fig. 2, providing a kind of identity information risk assessment method, applies in this way It is illustrated for server 104 in Fig. 1, comprising the following steps:
Step 210, identity data is received.
Identity data is the data that can uniquely determine passenger's identity, such as identity card, visa, student's identity card identity document Certificate classification, passport NO. etc..
The staff of security terminal can be acquired by identity information acquisition equipment such as POS etc. by the passenger of safety check Identity data, the identity data of the passenger of acquisition is transferred to security terminal by identity information acquisition equipment, and staff can also In the identity data of security terminal typing passenger.The identity data for the passenger that security terminal will acquire is sent to server, clothes Business device receives the identity data that security terminal is sent.
Step 220, identity characteristic parameter is extracted from identity data.
Identity characteristic parameter is the parameter for characterizing passenger's feature, and identity characteristic parameter may include passenger's age, trip The parameters such as settler from another province passes through, passenger's gender.It include the characteristic parameter of passenger in the identity data of passenger, server is from received identity Identity characteristic parameter is extracted in data.
In one embodiment, the step of identity characteristic parameter is extracted from identity data may include: from identity data Middle extraction passport NO.;Certificate format identification is carried out to passport NO., searches type of credential corresponding with format recognition result; Passport NO. is segmented according to type of credential to obtain participle string;It is special to search identity corresponding with each participle string Levy parameter.
Server extracts passport NO. from identity data.Server carries out certificate format identification, identification to passport NO. The certificates format such as the number length of passport NO., alphanumeric composition situation out.The mapping relations of type of credential and certificate format It being previously stored in the server, server searches type of credential corresponding with the certificate format identified, in embodiment, card Part classification may include the classifications such as identity card, the pass, home return permit, passport.
The character string of predeterminated position corresponds to a certain identity characteristic parameter, service in the passport NO. of different type of credential Device obtains the corresponding character string predeterminated position of type of credential and preset length, according to character string predeterminated position and preset length pair Passport NO. is segmented, and participle string is obtained.Server obtains the data of each preset characters string corresponding with type of credential Conversion table, the specific character string value that each preset characters string is stored in data conversion table corresponding with identity characteristic parameter are closed System.Server searches identity characteristic parameter corresponding with each participle string from data conversion table.
If type of credential is identity card, after ID card No. participle, the front three of ID card No. is a participle word Symbol string, and the corresponding identity characteristic of ID card No. front three is passenger's native place, and server obtains ID card No. front three Corresponding data conversion table, if ID card No. front three is " 410 ", what is found from data conversion table is corresponding with " 410 " Passenger's native place parameter be " Henan ".Using the above method, server searches identity characteristic corresponding with all participle strings Parameter.
Step 230, the corresponding historical verification data of identity data are searched, is extracted from historical verification data and verifies the time Parameter.
Historical verification data are the historical record data that passenger carries out safety inspection, and historical record data may include trip The data such as safety check time, safety check result when objective all previous carry out safety inspection.Server is according to the certificate in passenger's identity data Number searching historical verification data corresponding with passenger.
Verifying time parameter may include that passenger passes in and out the frequency of safety check place progress safety inspection, pacifies every time The period of total inspection, the parameters such as period belonging to the current safety check moment can specifically set the frequency of safety inspection It is set to daily safety check frequency, weekly safety check frequency and monthly safety check frequency etc., the frequency of safety inspection can be by staff's root Factually safety check demand in border is specifically set.Server carries out data statistics to historical verification data, therefrom counts every core Look into time parameter.
Step 240, identity characteristic parameter and verification time parameter are inputted into default risk evaluation model and obtains identity risk Probability.
Server obtains default risk evaluation model, and it is preset to passenger safety wind for presetting risk evaluation model The model that danger is assessed.The input of default risk evaluation model is every identity characteristic parameter and verification time parameter, output For passenger, there are the probability of security risk.Server is by the every identity characteristic parameter extracted and verifies time parameter input Default risk evaluation model, default risk evaluation model obtain identity risk probability after carrying out calculation process to parameters.
Step 250, risk evaluation result is generated according to identity risk probability.
Server generates risk evaluation result according to the identity risk probability that is calculated, can be in risk evaluation result Including information such as identity risk probability, passenger's history safety check information and security protection deployment recommendations.
In the present embodiment, server extracts identity characteristic parameter from the identity data of received passenger, and searches Historical verification data corresponding with the identity characteristic parameter of extraction, and risk evaluation model is preset, by identity characteristic parameter The identity risk probability of passenger can be obtained by inputting default risk evaluation model with corresponding historical verification data, so as to The security risk of passenger scientifically calculate according to passenger's feature and historical data and is assessed, security protection is improved and checks accuracy rate.
In one embodiment, as shown in figure 3, the generating mode of default risk evaluation model, comprising:
Step 201, sample data is divided into training set data and test set data by collecting sample data.
Sample data is the historical data that true security places carry out safety inspection, collection of server preset time model Enclose interior history safety inspection data, preset time range can be set as 1 month, 3 months, half a year etc., and server is by the sample of acquisition Notebook data carries out random division, is divided into training set data and test set data, includes in training set data and test set data Sample size can be the same or different.
Step 203, fisrt feature parameter and first object classification are extracted from training set data.
Sample data can be divided into positive sample data and negative sample data, positive sample according to the inspection result of safety inspection Notebook data is the history safety inspection data that inspection result is normal passenger, and negative sample data are that inspection result is abnormal passenger History safety inspection data.It in training set data and both include positive sample data and negative sample data in test set data.
Server extracts fisrt feature parameter and first object classification from each sample of training set data one by one. Wherein, fisrt feature parameter includes identity characteristic parameter and verifies time parameter, i.e., in fisrt feature parameter and practical safety check from The identity characteristic parameter extracted in passenger's identity data and the verification time parameter extracted from passenger's historical verification data are opposite It answers.First object classification be safety inspection resulting class, first object classification be divided into safety check normally and safety check extremely two classes.
Step 205, attribute gain assessment is carried out according to fisrt feature parameter and first object classification, and is increased according to feature Beneficial assessment result carries out feature selecting, is classified to obtain initial decision tree risk evaluation model, root according to selected feature The risk probability of each class node in initial decision tree risk evaluation model is calculated according to training set data.
In the present embodiment, the default risk evaluation model of building is decision-tree model.Decision tree be it is a kind of by node and The tree structure for classifying to example of directed edge composition, there are two types of the types of node: internal node and leaf section Point.Wherein, internal node indicates the test condition of feature or attribute, leaf node presentation class.It is carried out using decision-tree model The specific method of classification is: since root node, testing a certain feature of example, is divided example according to test result It is fitted on its child node.When being likely to be breached leaf node along the branch or reaching another internal node, then new test is used The execution of condition recurrence is gone down, and until arriving at a leaf node, when reaching leaf node, then obtains final classification as a result, will Leaf node is as class node.
In the present embodiment, initial decision tree risk evaluation model is constructed using ID3 algorithm, ID3 algorithm is to each feature Information gain assessment is carried out, selecting the maximum characteristic parameter of information gain as judgment module establishes child node every time.Server The information gain of the corresponding each feature of fisrt feature parameter is calculated, chooses the maximum feature of information gain as judgment module Child node is established, the corresponding training set data of child node is divided into subset data, subset data is divided in a recursive manner Zhi Jianli branch node, until all branch nodes correspond to identical first object classification.
Specifically, server calculates the information gain of the corresponding each feature of fisrt feature parameter using following equation (1):
G (D, A)=H (D)-H (D | A) (1)
Wherein, g (D, A) is characterized A to the information gain of training dataset D, and H (D) is the empirical entropy of training dataset D, H (D | A) A is characterized to the empirical condition entropy of data set D.
Server calculates the empirical entropy H (D) of training dataset D using following equation (2):
Wherein, CkFor the corresponding sample size of first object classification, K is the categorical measure of first object classification, in this reality It applies in example, first object classification is divided into safety check normally and safety check is two kinds abnormal.
Server calculates feature A to the empirical condition entropy H of training dataset D (D | A) using following equation (3):
Wherein, value (A) is all value set of feature A, and i is a value of feature A, DiIt is training dataset Feature A value is the sample set of i in D, | Di| indicate that value is the sample size of the sample set of i, | D | it indicates to carry out sample The total quantity of sample before example set divides.If the corresponding feature A of sex character parameter all values are male and female, as male can To be indicated with 0, female can be indicated with 1, and value (A) is (0,1).
Server establishes decision tree using the recursive fashion of Hunt algorithm, when the information gain for calculating each characteristic parameter And after carrying out feature selecting, the corresponding training set data subset of the maximum characteristic parameter of information gain is obtained, and using identical Mode carries out feature selecting to training set data subset, so that training dataset to be gradually divided into purer subset.
The recursive definition of Hunt algorithm is as follows: setting Dt is training data subset associated with node t, and y=y1, Y2 ... ..., yc } it is target category label, if all sample datas belong to the same classification in Dt, t is leaf node, It is marked with yt;If in Dt including the sample data for belonging to multiple classifications, a characteristic test condition is selected, by sample number According to being divided into lesser subset.Each output for test condition creates a branch node, and will according to test result Sample data in Dt is distributed in branch node.For each branch node, the algorithm is recursively called.
After server construction goes out initial decision tree risk evaluation model, the first spy of various kinds sheet is concentrated according to training data Parameter and first object classification are levied, is counted and section of respectively classifying in initial decision tree risk evaluation model from training data concentration The negative sample data of the negative sample data of the corresponding characteristic parameter combinations matches of point, counting statistics are concentrated always in training data Shared ratio in negative sample data, using the risk probability of the ratio each class node as in.
Step 207, second feature parameter and the second target category are extracted from test set data.
Server extracts second feature parameter and the second target category from each sample of test set data one by one. Wherein, second feature parameter includes identity characteristic parameter and verifies time parameter, i.e., in second feature parameter and practical safety check from The identity characteristic parameter extracted in passenger's identity data and the verification time parameter extracted from passenger's historical verification data are opposite It answers.Second target category be safety inspection resulting class, the second target category be divided into safety check normally and safety check extremely two classes.
Step 209, according to second feature parameter and the second target category to each point in initial decision tree risk evaluation model The risk probability of class node is verified, and initial decision tree risk evaluation model is adjusted and is generated according to verification result Default risk evaluation model.
Server concentrates the second feature parameter and the second target category of various kinds sheet according to test data, from test data Concentrate the negative sample for counting characteristic parameter combinations matches corresponding with class node each in initial decision tree risk evaluation model Data, the negative sample data of counting statistics concentrate ratio shared in total negative sample data in test data, and according to calculating Ratio out verifies the risk probability of class node each in decision-tree model.In verifying, server can set pre- If fault-tolerant error, when the absolute difference of calculated ratio and risk probability, which is less than, presets fault-tolerant error, it is verified, when Greater than when presetting fault-tolerant error, verifying does not pass through the absolute difference of calculated ratio and risk probability.When verifying does not pass through When, the sample data that server can concentrate test data is added training data and concentrates, and enlarged sample capacity is to initial decision Tree risk evaluation model is trained, and default risk assessment mould is generated after being adjusted to initial decision tree risk evaluation model Type.
In one embodiment, identity information risk assessment method can also include: when data renewal time is verified in arrival When, load the verification data of update;From verify in data extract corresponding with default risk evaluation model third feature parameter and Risk target label;According to third feature parameter and risk target label to each class node in default risk evaluation model Risk probability is verified, and is optimized according to verification result to default risk evaluation model.
Server, which is preset, verifies data renewal time, and verifying data renewal time is to examine to the safety of security places Look into the time that data are updated.After reaching preset verification data renewal time, the verification number of server load update According to, verify identity characteristic data that data include passenger, verify time and safety inspection as a result, security terminal can actively or The verification data updated are passively sent to server.
Server extracts third feature parameter and risk target label from verifying in data, third feature parameter and pre- If the feature set in risk evaluation model is corresponding, risk target label is safety inspection result queue, is divided into no safety wind Danger label and two class of security risk label.
Server is according to the third feature parameter and risk target label for verifying each sample in data, from verification data The negative sample data of characteristic parameter combinations matches corresponding with class node each in default risk evaluation model are counted, are calculated The negative sample data of statistics are verifying ratio shared in the total negative sample data of data, and according to calculated ratio to pre- If the risk probability of each class node is verified in risk evaluation model.In verifying, server can set default inclined Difference is verified when the absolute difference of calculated ratio and risk probability is less than predetermined deviation;When calculated ratio When being greater than predetermined deviation with the absolute difference of risk probability, verifying does not pass through.Obstructed out-of-date when verifying, server can be by core It looks into data to continue that default risk evaluation model is trained and is adjusted, thus according to data are verified to default risk assessment mould Type is continued to optimize, thus by the training of big data so that the risk assessment knot obtained by presetting risk evaluation model Fruit is more and more accurate.
In one embodiment, the step of generating risk evaluation result according to identity risk probability may include: from default The corresponding decision path of the maximum identity risk probability of probability value is searched in risk evaluation model;Obtain the node of decision path Data;Path profile is discovered and seized according to node data and the maximum identity risk probability generation of probability value and is exported.
After the identity characteristic parameter extracted and verification time parameter are inputted default risk evaluation model by server, Identity characteristic parameter and verification time parameter may be with the characteristic parameter phases in a plurality of decision path in default risk evaluation model Matching, accordingly, it is possible to which the corresponding identity risk probability of multiple matched class nodes can be obtained.Such as default risk evaluation model In the corresponding characteristic parameter of class node be clearance frequency, then the parameter inputted may both meet class node be " work as Tian An Inspection number ", node diagnostic value are the decision path one of " being greater than twice ", and it is " last naturally all for being able to satisfy class node Safety check number ", the decision path two that node diagnostic value is " between 8-15 days ", the corresponding identity risk of decision path one are general Rate is 21%, and the corresponding identity risk probability of decision path two is 25%.Calculating knot of the server from default risk evaluation model The corresponding decision path of the maximum identity risk probability of probability value is found out in fruit.
Server obtains the corresponding characteristic parameter of each node in the decision path that finds out, and node includes internal branch Node and classification leaf node.Server discovers and seizes path profile according to the generation that is together in series of the characteristic parameter of all nodes, and will most The identity risk probability of data, which is also added to, afterwards discovers and seizes in path profile, will discover and seize path profile and returns to security terminal, so that security protection Terminal will discover and seize path profile and show, i.e., visualize to the output result of default risk evaluation model, so as to So that security personnel have a clear understanding of the various features and existing potential security risk of current passenger, discovered and seized according to visualization Path profile determines whether to take further inspection to current passenger.
For example, the identity characteristic parameter of the passenger of input model and verification time parameter are that " Zhang San, male are 24 years old, Chinese Nationality, birthplace Guangdong, this month third time are verified ", meet in default risk evaluation model " in the age bracket of male -20-30 years old - The decision path of nationality-birthplace south China-this month verification 3-5 times ", it is all that the risk probability of the decision path, which is 30%, The maximum decision path of probability value in the matched decision path of characteristic parameter, it is raw according to decision path and corresponding risk probability At discovering and seizing path profile.
In one embodiment, the step of generating risk evaluation result according to identity risk probability may include: to obtain generally Rate is worth maximum identity risk probability;Current security protection manpower data are obtained, security protection corresponding with current security protection manpower data is searched Passenger flow threshold value;Preset threshold change data is obtained, according to security protection passenger flow threshold value and preset threshold change data calculation risk probability Threshold value;When the maximum identity risk probability of probability value is more than risk probability threshold value, generation detection risk early warning is simultaneously defeated Out.
Server obtains the identity risk probability of the corresponding output of each class node of default risk evaluation model, and therefrom Select the maximum identity risk probability of probability value.
Security protection passenger flow threshold value is the maximum of the passenger traffic volume that can carry out safety inspection corresponding with current security protection manpower Value.Server obtains current security protection manpower data, and current security protection manpower data may include the total of current safety check place deployment Security protection manpower, the data such as security protection manpower of the corresponding current security check deployment of security terminal.Server obtains the security protection people prestored The mapping relations of force data and security protection passenger flow threshold value, the mapping relations including total security protection manpower Yu total security protection passenger flow threshold value, and work as The mapping relations of the security protection manpower of preceding security check and corresponding security protection passenger flow threshold value.Server is searched and current total security protection manpower Corresponding total security protection passenger flow threshold value, and search security check security protection passenger flow threshold value corresponding with the security protection manpower of current security check.
Risk probability threshold value is that can determine that passenger has the minimum value of the identity risk probability of security risk, and risk is general Rate threshold value is not fixed, is adjusted according to security protection manpower, and when security protection abundant manpower, risk probability threshold value is set It is relatively smallerly fixed, conversely, risk probability threshold value is set to relatively larger.
Server obtains preset threshold change data, and preset threshold change data is security protection passenger flow threshold value and risk probability The change data converted between threshold value, change data can close for the mapping of security protection passenger flow threshold value and risk probability threshold value It is table, or preset conversion calculation formula etc..Server calculates and security protection passenger flow according to preset threshold change data The corresponding risk probability threshold value of threshold value, including the first risk probability threshold value corresponding with total security protection passenger flow threshold value and security check peace The corresponding second risk probability threshold value of anti-passenger flow threshold value, and will be in the first risk probability threshold value and the second risk probability threshold value Minimum value is as risk probability threshold value.
The maximum identity risk probability of the probability value that server will acquire is compared with calculated risk probability threshold value Compared with when the maximum identity risk probability of probability value is less than or equal to risk probability threshold value, current passenger's safety check passes through, server Safety check qualification can be generated to notify and return to security terminal;When the maximum identity risk probability of probability value is more than risk probability When threshold value, server generates detection risk early warning, can carry calculated current passenger in detection risk early warning Identity risk probability, when the history historical verification data of current passenger are there are when safety check exception record, by exception record information It is also added in detection risk early warning, the detection risk early warning of generation is sent to security terminal by server, to mention Show that the staff of the security check passenger has definitely security risk, needs to carry out further safety inspection.
It should be understood that although each step in the flow chart of Fig. 2-3 is successively shown according to the instruction of arrow, It is these steps is not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps There is no stringent sequences to limit for rapid execution, these steps can execute in other order.Moreover, in Fig. 2-3 at least A part of step may include that perhaps these sub-steps of multiple stages or stage are not necessarily same to multiple sub-steps Moment executes completion, but can execute at different times, and the execution sequence in these sub-steps or stage is also not necessarily Successively carry out, but can at least part of the sub-step or stage of other steps or other steps in turn or Alternately execute.
In one embodiment, as shown in figure 4, providing a kind of identity information risk assessment device, comprising: identity number According to obtaining, module 410, identification parameters extraction module 420, time parameter obtain module 430, risk probability obtains 440 and of module Risk Results generation module 450, in which:
Identity data obtains module 410, for receiving identity data.
Identification parameters extraction module 420, for extracting identity characteristic parameter from identity data.
Time parameter obtains module 430, for searching the corresponding historical verification data of identity data, from historical verification number Time parameter is verified according to middle extraction.
Risk probability obtains module 440, for identity characteristic parameter and verification time parameter to be inputted default risk assessment Model obtains identity risk probability.
Risk Results generation module 450, for generating risk evaluation result according to identity risk probability.
In one embodiment, device can also include:
Data acquisition module is used for collecting sample data, sample data is divided into training set data and test set number According to.
Training data extraction module, for extracting fisrt feature parameter and first object classification from training set data.
Initial model constructs module, for carrying out attribute gain assessment according to fisrt feature parameter and first object classification, And feature selecting is carried out according to attribute gain assessment result, classified to obtain initial decision tree wind according to selected feature Dangerous assessment models calculate the risk probability of each class node in initial decision tree risk evaluation model according to training set data.
Test data extraction module, for extracting second feature parameter and the second target category from test set data.
Evaluation module generation module is used for according to second feature parameter and the second target category to initial decision tree risk The risk probability of each class node is verified in assessment models, according to verification result to initial decision tree risk evaluation model It is adjusted and generates default risk evaluation model.
In one embodiment, device can also include:
Data loading module is verified, for loading the verification data of update when reaching verification data renewal time.
Data extraction module is verified, for special from extraction third corresponding with default risk evaluation model in data is verified Levy parameter and risk target label.
Model optimization module is used for according to third feature parameter and risk target label in default risk evaluation model The risk probability of each class node is verified, and is optimized according to verification result to default risk evaluation model.
In one embodiment, Risk Results generation module 450 may include:
Path searching module, for searching the maximum identity risk probability pair of probability value from default risk evaluation model The decision path answered.
Path data obtains module, for obtaining the node data of decision path.
Path profile generation module, for discovering and seizing road according to node data and the maximum identity risk probability generation of probability value Diameter figure simultaneously exports.
In one embodiment, Risk Results generation module 450 may include:
Probability obtains module, is used for the maximum identity risk probability of acquisition probability value.
Security protection threshold value searching module is searched corresponding with current security protection manpower data for obtaining current security protection manpower data Security protection passenger flow threshold value.
Risk threshold value computing module, for obtaining preset threshold change data, according to security protection passenger flow threshold value and preset threshold Change data calculation risk probability threshold value.
Early warning generation module is used for when the maximum identity risk probability of probability value is more than risk probability threshold value, raw At detection risk early warning and export.
In one embodiment, identification parameters extraction module 420 may include:
Number retention module, for extracting passport NO. from identity data.
Type of credential searching module is searched and format recognition result pair for carrying out certificate format identification to passport NO. The type of credential answered.
Word segmentation module obtains participle string for being segmented according to type of credential to passport NO..
Parameter searching module, for searching identity characteristic parameter corresponding with each participle string.
Specific restriction about identity information risk assessment device may refer to above for identity information risk assessment The restriction of method, details are not described herein.Modules in above-mentioned identity information risk assessment device can be fully or partially through Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more The corresponding operation of modules.
In one embodiment, a kind of computer equipment is provided, which can be server, inside Structure chart can be as shown in Figure 5.The computer equipment includes processor, the memory, network interface connected by system bus And database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The storage of the computer equipment Device includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program And database.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium. The database of the computer equipment is used to store the related data of identity information risk assessment.The network of the computer equipment connects Mouth with external terminal by network connection for being communicated.To realize a kind of identity when the computer program is executed by processor Information Risk assessment method.
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component cloth than more or fewer components as shown in the figure It sets.
In one embodiment, a kind of computer equipment, including memory and processor, memory storage are provided There is computer program, which performs the steps of reception identity data when executing computer program;From identity data Extract identity characteristic parameter;The corresponding historical verification data of identity data are searched, is extracted from historical verification data and verifies the time Parameter;Identity characteristic parameter and verification time parameter are inputted into default risk evaluation model and obtain identity risk probability;According to body Part risk probability generates risk evaluation result.
In one embodiment, collecting sample data are also performed the steps of when processor executes computer program, it will Sample data is divided into training set data and test set data;Fisrt feature parameter and the first mesh are extracted from training set data Mark classification;Attribute gain assessment is carried out according to fisrt feature parameter and first object classification, and according to attribute gain assessment result Feature selecting is carried out, is classified to obtain initial decision tree risk evaluation model according to selected feature, according to training set number According to the risk probability for calculating each class node in initial decision tree risk evaluation model;It is special that second is extracted from test set data Levy parameter and the second target category;According to second feature parameter and the second target category to initial decision tree risk evaluation model In the risk probability of each class node verified, initial decision tree risk evaluation model is adjusted according to verification result And generate default risk evaluation model.
In one embodiment, it is also performed the steps of when processor executes computer program when arrival verifies data more When the new time, the verification data of update are loaded;Third feature corresponding with default risk evaluation model is extracted in data from verifying Parameter and risk target label;According to third feature parameter and risk target label to respectively classifying in default risk evaluation model The risk probability of node is verified, and is optimized according to verification result to default risk evaluation model.
In one embodiment, realize that generating risk according to identity risk probability comments when processor executes computer program It is also used to when estimating the step of result: it is corresponding to search the maximum identity risk probability of probability value from default risk evaluation model Decision path;Obtain the node data of decision path;It is looked into according to node data and the maximum identity risk probability generation of probability value It obtains path profile and exports.
In one embodiment, realize that generating risk according to identity risk probability comments when processor executes computer program It is also used to when estimating the step of result: the maximum identity risk probability of acquisition probability value;Current security protection manpower data are obtained, are searched Security protection passenger flow threshold value corresponding with current security protection manpower data;Obtain preset threshold change data, according to security protection passenger flow threshold value and Preset threshold change data calculation risk probability threshold value;When the maximum identity risk probability of probability value is more than risk probability threshold value When, it generates detection risk early warning and exports.
In one embodiment, it is realized when processor executes computer program and extracts identity spy from the identity data It is also used to when levying the step of parameter: extracting passport NO. from identity data;Certificate format identification is carried out to passport NO., is looked into Look for type of credential corresponding with format recognition result;Passport NO. is segmented according to type of credential to obtain participle string; Search identity characteristic parameter corresponding with each participle string.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is counted Calculation machine program performs the steps of reception identity data when being executed by processor;Identity characteristic ginseng is extracted from identity data Number;The corresponding historical verification data of identity data are searched, is extracted from historical verification data and verifies time parameter;By identity spy Sign parameter and verification time parameter input default risk evaluation model and obtain identity risk probability;It is raw according to identity risk probability At risk evaluation result.
In one embodiment, collecting sample data are also performed the steps of when computer program is executed by processor, Sample data is divided into training set data and test set data;Fisrt feature parameter and first is extracted from training set data Target category;Attribute gain assessment is carried out according to fisrt feature parameter and first object classification, and is assessed and is tied according to attribute gain Fruit carries out feature selecting, is classified to obtain initial decision tree risk evaluation model according to selected feature, according to training set Data calculate the risk probability of each class node in initial decision tree risk evaluation model;Second is extracted from test set data Characteristic parameter and the second target category;According to second feature parameter and the second target category to initial decision tree risk assessment mould The risk probability of each class node is verified in type, is adjusted according to verification result to initial decision tree risk evaluation model The default risk evaluation model of whole and generation.
In one embodiment, it is also performed the steps of when computer program is executed by processor when data are verified in arrival When renewal time, the verification data of update are loaded;Third spy corresponding with default risk evaluation model is extracted from verifying in data Levy parameter and risk target label;According to third feature parameter and risk target label to each point in default risk evaluation model The risk probability of class node is verified, and is optimized according to verification result to default risk evaluation model.
In one embodiment, it is realized when computer program is executed by processor and risk is generated according to identity risk probability It is also used to when the step of assessment result: it is corresponding to search the maximum identity risk probability of probability value from default risk evaluation model Decision path;Obtain the node data of decision path;It is generated according to node data and the maximum identity risk probability of probability value It discovers and seizes path profile and exports.
In one embodiment, it is realized when computer program is executed by processor and risk is generated according to identity risk probability It is also used to when the step of assessment result: the maximum identity risk probability of acquisition probability value;Current security protection manpower data are obtained, are looked into Look for security protection passenger flow threshold value corresponding with current security protection manpower data;Preset threshold change data is obtained, according to security protection passenger flow threshold value With preset threshold change data calculation risk probability threshold value;When the maximum identity risk probability of probability value is more than risk probability threshold When value, generates detection risk early warning and export.
In one embodiment, realization is also performed the steps of when computer program is executed by processor from the identity It is also used to when extracting the step of identity characteristic parameter in data: extracting passport NO. from identity data;Passport NO. is carried out Certificate format identification searches type of credential corresponding with format recognition result;Passport NO. is segmented according to type of credential Obtain participle string;Search identity characteristic parameter corresponding with each participle string.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can It is completed with instructing relevant hardware by computer program, the computer program can be stored in a non-volatile meter In calculation machine read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method. Wherein, any of memory, storage, database or other media is drawn used in each embodiment provided herein With may each comprise non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), can Programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile storage Device may include random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is with more Kind form can obtain, such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of identity information risk assessment method, which comprises
Receive identity data;
Identity characteristic parameter is extracted from the identity data;
The corresponding historical verification data of the identity data are searched, is extracted from the historical verification data and verifies time parameter;
The identity characteristic parameter and the verification time parameter are inputted into default risk evaluation model and obtain identity risk probability;
Risk evaluation result is generated according to the identity risk probability.
2. the method according to claim 1, wherein the generating mode of the default risk evaluation model, comprising:
The sample data is divided into training set data and test set data by collecting sample data;
Fisrt feature parameter and first object classification are extracted from the training set data;
Attribute gain assessment is carried out according to the fisrt feature parameter and the first object classification, and is assessed according to attribute gain As a result feature selecting is carried out, is classified to obtain initial decision tree risk evaluation model according to selected feature, according to described Training set data calculates the risk probability of each class node in the initial decision tree risk evaluation model;
Second feature parameter and the second target category are extracted from the test set data;
According to the second feature parameter and second target category to each point in the initial decision tree risk evaluation model The risk probability of class node is verified, and the initial decision tree risk evaluation model is adjusted and is given birth to according to verification result At default risk evaluation model.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
When reaching verification data renewal time, the verification data of update are loaded;
Third feature parameter corresponding with the default risk evaluation model and risk target mark are extracted from the verification data Note;
According to the third feature parameter and the risk target label to each class node in the default risk evaluation model Risk probability verified, the default risk evaluation model is optimized according to verification result.
4. according to the method described in claim 2, it is characterized in that, described generate risk assessment according to the identity risk probability As a result, comprising:
The corresponding decision path of the maximum identity risk probability of probability value is searched from the default risk evaluation model;
Obtain the node data of the decision path;
Path profile is discovered and seized according to the node data and the maximum identity risk probability generation of the probability value and is exported.
5. according to the method described in claim 2, it is characterized in that, described generate risk assessment according to the identity risk probability As a result, comprising:
The maximum identity risk probability of acquisition probability value;
It obtains current security protection manpower data, searches security protection passenger flow threshold value corresponding with the current security protection manpower data;
Preset threshold change data is obtained, it is general according to the security protection passenger flow threshold value and the preset threshold change data calculation risk Rate threshold value;
When the maximum identity risk probability of the probability value is more than the risk probability threshold value, detection risk early warning is generated And it exports.
6. the method according to claim 1, wherein described extract identity characteristic ginseng from the identity data Number, comprising:
Passport NO. is extracted from the identity data;
Certificate format identification is carried out to the passport NO., searches type of credential corresponding with format recognition result;
The passport NO. is segmented to obtain participle string according to the type of credential;
Search identity characteristic parameter corresponding with each participle string.
7. a kind of identity information risk assessment device, which is characterized in that described device includes:
Identity data obtains module, for receiving identity data;
Identification parameters extraction module, for extracting identity characteristic parameter from the identity data;
Time parameter obtains module, for searching the corresponding historical verification data of the identity data, from the historical verification number Time parameter is verified according to middle extraction;
Risk probability obtains module, for the identity characteristic parameter and the verification time parameter to be inputted default risk assessment Model obtains identity risk probability;
Risk Results generation module, for generating risk evaluation result according to the identity risk probability.
8. device according to claim 7, which is characterized in that described device further include:
Data acquisition module is used for collecting sample data, the sample data is divided into training set data and test set data;
Training data extraction module, for extracting fisrt feature parameter and first object classification from the training set data;
Initial model constructs module, comments for carrying out attribute gain according to the fisrt feature parameter and the first object classification Estimate, and feature selecting is carried out according to attribute gain assessment result, is classified to obtain initial decision tree according to selected feature Risk evaluation model calculates the wind of each class node in the initial decision tree risk evaluation model according to the training set data Dangerous probability;
Test data extraction module, for extracting second feature parameter and the second target category from the test set data;
Evaluation module generation module is used for according to the second feature parameter and second target category to the initial decision The risk probability of each class node is verified in tree risk evaluation model, according to verification result to the initial decision tree risk Assessment models are adjusted and generate default risk evaluation model.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 6 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
CN201810791449.2A 2018-07-18 2018-07-18 Identity information risk assessment method, apparatus, computer equipment and storage medium Withdrawn CN109242740A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810791449.2A CN109242740A (en) 2018-07-18 2018-07-18 Identity information risk assessment method, apparatus, computer equipment and storage medium
PCT/CN2018/104806 WO2020015089A1 (en) 2018-07-18 2018-09-10 Identity information risk assessment method and apparatus, and computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810791449.2A CN109242740A (en) 2018-07-18 2018-07-18 Identity information risk assessment method, apparatus, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109242740A true CN109242740A (en) 2019-01-18

Family

ID=65072033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810791449.2A Withdrawn CN109242740A (en) 2018-07-18 2018-07-18 Identity information risk assessment method, apparatus, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109242740A (en)
WO (1) WO2020015089A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110992119A (en) * 2019-02-21 2020-04-10 北京嘀嘀无限科技发展有限公司 Method and system for sequencing risk orders
CN111445106A (en) * 2020-03-02 2020-07-24 国网辽宁省电力有限公司电力科学研究院 Power utilization acquisition equipment fault processing operation site safety control method and system
CN112883061A (en) * 2020-12-07 2021-06-01 浙江大华技术股份有限公司 Dangerous article detection method, device and system and computer equipment
CN113052413A (en) * 2019-12-26 2021-06-29 北京中科闻歌科技股份有限公司 Risk passenger assessment method, device, terminal and computer readable medium
CN113642820A (en) * 2020-12-18 2021-11-12 航天信息股份有限公司广州航天软件分公司 Method and system for evaluating and managing personnel data information based on big data
CN113671589A (en) * 2021-09-14 2021-11-19 清华大学 Safety detection match physical system
CN114756716A (en) * 2022-04-18 2022-07-15 马上消费金融股份有限公司 Information processing method, device, equipment and storage medium
CN115146725A (en) * 2022-06-30 2022-10-04 北京百度网讯科技有限公司 Determination method of object classification mode, object classification method, device and equipment
CN116797357A (en) * 2023-08-24 2023-09-22 杭银消费金融股份有限公司 Financial terminal-based credit authorization processing method and equipment

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404721B (en) * 2020-02-13 2023-07-25 中国平安人寿保险股份有限公司 Visual processing method, device and equipment for model training process data based on web
CN111427883A (en) * 2020-02-18 2020-07-17 深圳壹账通智能科技有限公司 Data processing method and device based on AeroPike, computer equipment and storage medium
CN111738331A (en) * 2020-06-19 2020-10-02 北京同邦卓益科技有限公司 User classification method and device, computer-readable storage medium and electronic device
CN112465626B (en) * 2020-11-24 2023-08-29 平安科技(深圳)有限公司 Combined risk assessment method based on client classification aggregation and related equipment
CN112750031A (en) * 2021-01-20 2021-05-04 北京赛思信安技术股份有限公司 Multidimensional risk verification device applied to financing guarantee mechanism
CN113807858B (en) * 2021-09-23 2024-04-26 中科软科技股份有限公司 Data processing method and related equipment based on decision tree model
CN116319083B (en) * 2023-05-17 2023-08-04 南京哲上信息科技有限公司 Data transmission security detection method and system
CN116308762B (en) * 2023-05-19 2023-08-11 杭州钱袋数字科技有限公司 Credibility evaluation and trust processing method based on artificial intelligence
CN117634873A (en) * 2023-11-15 2024-03-01 中国人寿保险股份有限公司江苏省分公司 System and method for evaluating risk of sales personnel in insurance industry
CN117675387B (en) * 2023-12-12 2024-06-14 广州达悦信息科技有限公司 Network security risk prediction method and system based on user behavior analysis

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105260628B (en) * 2014-06-03 2019-01-11 腾讯科技(深圳)有限公司 Classifier training method and apparatus, auth method and system
CN108198116A (en) * 2016-12-08 2018-06-22 同方威视技术股份有限公司 For being detected the method and device of staffing levels in safety check
CN108009914A (en) * 2017-12-19 2018-05-08 马上消费金融股份有限公司 Credit risk assessment method, system, equipment and computer storage medium
CN108269012A (en) * 2018-01-12 2018-07-10 中国平安人寿保险股份有限公司 Construction method, device, storage medium and the terminal of risk score model

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110992119A (en) * 2019-02-21 2020-04-10 北京嘀嘀无限科技发展有限公司 Method and system for sequencing risk orders
CN113052413A (en) * 2019-12-26 2021-06-29 北京中科闻歌科技股份有限公司 Risk passenger assessment method, device, terminal and computer readable medium
CN111445106A (en) * 2020-03-02 2020-07-24 国网辽宁省电力有限公司电力科学研究院 Power utilization acquisition equipment fault processing operation site safety control method and system
CN111445106B (en) * 2020-03-02 2023-12-01 国网辽宁省电力有限公司电力科学研究院 Safety control method and system for fault processing operation site of electricity acquisition equipment
CN112883061A (en) * 2020-12-07 2021-06-01 浙江大华技术股份有限公司 Dangerous article detection method, device and system and computer equipment
CN113642820A (en) * 2020-12-18 2021-11-12 航天信息股份有限公司广州航天软件分公司 Method and system for evaluating and managing personnel data information based on big data
CN113642820B (en) * 2020-12-18 2024-05-28 航天信息股份有限公司广州航天软件分公司 Method and system for evaluating and managing personnel data information based on big data
CN113671589A (en) * 2021-09-14 2021-11-19 清华大学 Safety detection match physical system
CN114756716A (en) * 2022-04-18 2022-07-15 马上消费金融股份有限公司 Information processing method, device, equipment and storage medium
CN115146725A (en) * 2022-06-30 2022-10-04 北京百度网讯科技有限公司 Determination method of object classification mode, object classification method, device and equipment
CN116797357A (en) * 2023-08-24 2023-09-22 杭银消费金融股份有限公司 Financial terminal-based credit authorization processing method and equipment
CN116797357B (en) * 2023-08-24 2023-11-21 杭银消费金融股份有限公司 Financial terminal-based credit authorization processing method and equipment

Also Published As

Publication number Publication date
WO2020015089A1 (en) 2020-01-23

Similar Documents

Publication Publication Date Title
CN109242740A (en) Identity information risk assessment method, apparatus, computer equipment and storage medium
US20210257066A1 (en) Machine learning based medical data classification method, computer device, and non-transitory computer-readable storage medium
WO2020077895A1 (en) Signing intention determining method and apparatus, computer device, and storage medium
CN109002988B (en) Risk passenger flow prediction method, apparatus, computer device and storage medium
WO2019218699A1 (en) Fraud transaction determining method and apparatus, computer device, and storage medium
CN109523153A (en) Acquisition methods, device, computer equipment and the storage medium of illegal fund collection enterprise
CN110598206A (en) Text semantic recognition method and device, computer equipment and storage medium
Ounacer et al. Using Isolation Forest in anomaly detection: the case of credit card transactions
CN111191568B (en) Method, device, equipment and medium for identifying flip image
CN109063984B (en) Method, apparatus, computer device and storage medium for risky travelers
CN110222992A (en) A kind of network swindle method for early warning and device based on group's portrait of being deceived
CN109949154A (en) Customer information classification method, device, computer equipment and storage medium
CN109325118A (en) Uneven sample data preprocess method, device and computer equipment
CN114298176A (en) Method, device, medium and electronic equipment for detecting fraudulent user
CN109102159A (en) Passenger's rating model generation method, device, computer equipment and storage medium
WO2023024670A1 (en) Device clustering method and apparatus, and computer device and storage medium
Wu et al. Dual autoencoders generative adversarial network for imbalanced classification problem
Divakar et al. Performance evaluation of credit card fraud transactions using boosting algorithms
Hou et al. Mahalanobis distance based adversarial network for anomaly detection
Zhou et al. Credit card fraud identification based on principal component analysis and improved AdaBoost algorithm
CN110399432A (en) A kind of classification method of table, device, computer equipment and storage medium
CN110413994A (en) Hot topic generation method, device, computer equipment and storage medium
CN109101984B (en) Image identification method and device based on convolutional neural network
CN114168788A (en) Audio audit processing method, device, equipment and storage medium
CN114359811A (en) Data authentication method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190118