CN109409892A - Methods of risk assessment and system - Google Patents
Methods of risk assessment and system Download PDFInfo
- Publication number
- CN109409892A CN109409892A CN201710695344.2A CN201710695344A CN109409892A CN 109409892 A CN109409892 A CN 109409892A CN 201710695344 A CN201710695344 A CN 201710695344A CN 109409892 A CN109409892 A CN 109409892A
- Authority
- CN
- China
- Prior art keywords
- risk assessment
- risk
- policy model
- model unit
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application proposes a kind of methods of risk assessment and system, is related to technical field of Internet information.A kind of methods of risk assessment of the application includes: step i) parsing risk control business process map, and risk control business process map includes node and connecting line;Step ii) Policy model unit associated with present node is called, Policy model unit exports risk assessment parameter;Step iii) the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point;Repeat step i)-iii), until all nodes are finished, export tested person's risk evaluation result.By such method, risk control business process map can be automatically parsed, each associated Policy model unit of node is executed according to the sequence of flow chart, facilitate user in a manner of generating risk control business process map based on Policy model unit and connecting line to dispose risk control status, improves the flexibility and efficiency of air control plan implementation.
Description
Technical field
This application involves technical field of Internet information, especially a kind of methods of risk assessment and system.
Background technique
In recent years, internet finance develops rapidly, and shows powerful development potentiality, is sent out in terms of supporting real economy
The effect waved attracts people's attention.But since internet finance has multidimensional opening and multi-directional interaction, the spread area of risk
The remote ultra-traditional finance of diffusion velocity, therefore risk control is particularly important.It is related in order to improve the safety of internet finance
Internet the financial technology a large amount of transaction record and transaction trace that are left by the transaction of internet on the net based on client
To develop air control strategy, rule, and program is converted to customer data progress risk control and analysis by air control strategy, rule.
Summary of the invention
Inventor's discovery: although internet finance solves information collection, information in traditional financial using Internet technology
Inefficiency problem in the links such as audit and risk control, but the internet abundant not enough with the penetration of service, most due to technology
The risk control of financing corporation still remains following two disadvantage:
1. technical barrier is excessively high, the air control deployment development cost of business is high, and the period is long, and docking efficiency is lower.
2. technology relies on high, the configuration of air control and iteration management process complexity, shortage flexibility.
At least one of to solve the above-mentioned problems, the purpose of the application is to propose a kind of holding for risk assessment
Row scheme improves the flexibility and efficiency of risk control status deployment.
According to the one aspect of the application, a kind of methods of risk assessment is proposed, comprising:
Step i) parses risk control business process map, and risk control business process map includes node and connecting line, node
Associated with Policy model unit, connecting line mark node executes sequence;
Step ii) Policy model unit associated with present node is called, Policy model unit is based on predetermined estimation plan
Risk assessment slightly is carried out to tested person, exports risk assessment parameter;
Step iii) the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point;
Repeat step i)-iii), until all nodes in risk control business process map are carried out and finish, export
Tested person's risk evaluation result.
Optionally, Policy model unit obtains the risk assessment of first node output based on standard interface from variable pond
Parameter.
Optionally, if first node is not present in present node, Policy model unit is based on predetermined estimation strategy, according to quilt
It surveys people's information and risk assessment is carried out to tested person, export risk assessment parameter;If there are first node, tactful moulds for present node
Type unit is based on predetermined estimation strategy, and the risk assessment parameter exported according to tested person's information and/or first node is to tested person
Risk assessment is carried out, risk assessment parameter is exported.
Optionally, risk control business process map generates in the following way: according to the multiple tactful moulds of business demand selection
Type unit, with each node of determination;Connection relationship between each node is set, to determine that identifying each Policy model unit executes
The connecting line of sequence.
Optionally, execution sequence includes that sequence executes, executes and select in execution one or more parallel, is held in selection
In row, according to tested person's information and/or the risk assessment parameter selection node to be executed of first node output.
Optionally, if Policy model unit is hard conditions risk assessment unit, determine that risk is commented in Policy model unit
Estimate in unacceptable situation, terminates to execute risk control flow chart, output risk assessment does not pass through.
Optionally, Policy model unit includes rule model and/or decision-tree model, and rule model includes sequentially or parallel
The multiple risk assessment rules executed, decision-tree model include the multiple risk assessment rule executed based on the selection of preset judgment condition
Then.
Optionally, risk assessment rule includes the simple judgment rule that risk assessment is carried out to tested person.
Optionally, the mode for generating new Policy model unit includes one of following manner or a variety of: passing through combination
Multiple risk assessment rules generate new Policy model unit;Risk assessment rule is carried out to existing Policy model unit to add
Add, be deleted or modified, generates new Policy model unit;Import complete Policy model unit, the input of Policy model unit
Export complying with standard interface requirement.
Optionally, the mode for generating new risk assessment rule includes one of following manner or a variety of: being imported new
Risk assessment rule;Write new risk assessment rule;New risk assessment is generated by disassembling existing Policy model unit
Rule;Wherein, input and output the complying with standard interface requirement of new risk assessment rule.
Optionally, if risk assessment rule is rigid risk assessment rule, determine risk assessment not in risk assessment rule
In the case where, terminate implementation strategy model unit, output risk assessment does not pass through.
Optionally, Policy model unit further includes the customized Policy model of user, the input and output symbol of Policy model unit
Standardization interface requirement.
Optionally, the customized Policy model of user includes Random Forest model and/or GBDT (Gradient Boosting
Decision Tree, grad enhancement decision tree) model.
Optionally, risk control business process map, Policy model unit and/or risk assessment rule have access attribute,
Access attribute includes privately owned, open or the user of associated access authority is allowed to access.
By such method, risk control business process map can be automatically parsed, is executed according to the sequence of flow chart each
A associated Policy model unit of node, and it can be invoked at the implementing result of first node in posterior nodal point, to facilitate user
Risk control status is disposed in a manner of generating risk control business process map based on Policy model unit and connecting line, is improved
The flexibility and efficiency of risk control status deployment.
According to further aspect of the application, propose a kind of risk evaluating system, for execute be mentioned above it is any
A kind of methods of risk assessment.
Such risk evaluating system can automatically parse risk control business process map, execute according to the sequence of flow chart
Each associated Policy model unit of node, and it can be invoked at the implementing result of first node in posterior nodal point, to facilitate use
Risk control status is disposed in a manner of generating risk control business process map based on Policy model unit and connecting line in family, mentions
The high flexibility and efficiency of risk control status deployment.
According to the another aspect of the application, a kind of risk evaluating system is proposed, comprising: flow chart interface, for showing
Risk control business process map, risk control business process map include node and connecting line, and node is related to Policy model unit
Connection, connecting line mark node execute sequence;Business Stream engine, for according to any one the risk assessment side being mentioned above
Method executes risk control business process map, exports tested person's risk evaluation result.
Optionally, risk evaluating system further includes flow chart generation module, for generating risk control in the following way
Business process map: multiple Policy model units are selected according to business demand, with each node of determination;It is arranged between each node
Connection relationship, to determine the connecting line for the execution sequence for identifying each Policy model unit.
Optionally, risk evaluating system further includes Policy model unit generation module, for one in the following manner
Kind or a variety of generation strategy model units: new Policy model unit is generated by combining multiple risk assessment rules;To existing
Policy model unit carry out risk assessment rule addition, be deleted or modified, generate new Policy model unit;It imports complete
Policy model unit, input and output the complying with standard interface requirement of the Policy model unit imported.
Optionally, risk evaluating system further includes risk assessment rule generation module, for one in the following manner
Kind or a variety of generation risk assessment rules: new risk assessment rule is imported;Write new risk assessment rule;By disassembling
Some Policy model units generate new risk assessment rule;Wherein, the input and output of new risk assessment rule comply with standard
Change interface requirement.
Such risk evaluating system can automatically parse and execute risk control business process map, facilitate user to be based on
Policy model unit and connecting line generate the mode of risk control business process map to dispose risk control status, improve risk
The flexibility and efficiency of control program deployment.
According to another aspect of the application, a kind of risk evaluating system is proposed, comprising: memory;And it is coupled to and deposits
The processor of reservoir, processor are configured as any one risk being mentioned above based on the instruction execution for being stored in memory
Appraisal procedure.
Such risk evaluating system can facilitate user to generate risk control based on Policy model unit and connecting line
The mode of business process map disposes risk control status, improves the flexibility and efficiency of risk control status deployment.
In addition, proposing a kind of computer readable storage medium according to the one aspect of the application, being stored thereon with computer
The step of program instruction, any one methods of risk assessment that realization is mentioned above when which is executed by processor.
Such computer readable storage medium can automatically parse risk control Business Stream by executing program thereon
Cheng Tu executes each associated Policy model unit of node according to the sequence of flow chart, and can call formerly in posterior nodal point
The implementing result of node, to facilitate user to generate risk control business process map based on Policy model unit and connecting line
Mode disposes risk control status, improves the flexibility and efficiency of risk control status deployment.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the flow chart of one embodiment of the methods of risk assessment of the application.
Fig. 2 is the process that one embodiment of risk control business process map is generated in the methods of risk assessment of the application
Figure.
Fig. 3 is the schematic diagram that the methods of risk assessment risk of the application controls one embodiment of business process map.
Fig. 4 is the schematic diagram of another embodiment of the methods of risk assessment of the application.
Fig. 5 is the schematic diagram of one embodiment of the risk evaluating system of the application.
Fig. 6 is the schematic diagram of one embodiment of the flow chart interface in the risk evaluating system of the application.
Fig. 7 is the schematic diagram of another embodiment of the risk evaluating system of the application.
Fig. 8 is the schematic diagram of another embodiment of the risk evaluating system of the application.
Fig. 9 is the schematic diagram of the further embodiment of the risk evaluating system of the application.
Specific embodiment
Below by drawings and examples, the technical solution of the application is described in further detail.
The schematic diagram of one embodiment of the methods of risk assessment of the application is as shown in Figure 1.
In a step 101, risk control business process map is parsed.In one embodiment, risk control business process map
Including node and connecting line, node is associated with Policy model unit, and connecting line mark node executes sequence.
In one embodiment, the connecting line that can first parse risk control business process map, according to connecting line mark
Execution sequence determines present node, and then determines Policy model unit associated with the present node.In one embodiment,
When selection branch occurs in connecting line, the present node to be executed can be selected according to the judging result of branch condition, and then really
Surely the Policy model unit to be executed;When parallel branch occurs in connecting line, it regard parallel multiple nodes as present node.
In a step 102, Policy model unit associated with present node is called, by Policy model unit to tested person
Carry out risk assessment.In one embodiment, Policy model unit can carry out risk to tested person based on predetermined estimation strategy
Assessment exports risk assessment parameter.For example, being directed to personal credit situation, the personal income situation, individual deposit of tested person respectively
Situation, risk tolerance and kinsfolk's situation etc. carry out risk assessment, and each Policy model unit can be from an angle
Degree is assessed, or executes the component assesses condition etc. in entire risk assessment strategies.In one embodiment, tested person removes
It can be individual, be also possible to group, enterprise etc..Risk assessment parameter may include that assessment passes through, assesses and do not pass through or comment
Estimate the information such as score.
It in one embodiment, can be according only to tested person's information to tested person if first node is not present in present node
Risk assessment is carried out, risk assessment parameter is exported;If there are first nodes for present node, can be according only to tested person's information pair
Tested person carries out risk assessment, the risk assessment parameter that first node generates can also be extracted, in conjunction with tested person's information to tested
People carries out risk assessment, or the risk assessment parameter that can be generated according only to first node carries out risk assessment to tested person.
In step 103, the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point.
In one embodiment, variable pond can be the various forms such as database, tables of data, storehouse, queue.
In one embodiment, risk assessment parameter can be stored in variable pond and generate the tactful mould of the risk assessment parameter
The mark of the information such as the mark or weight of type unit, Policy model unit can be number information.In one embodiment, tactful
The mark of model unit is also possible to the assessment emphasis information of Policy model unit.For example, Policy model unit is laid particular emphasis on pair
The risk tolerance of tested person is assessed, and is passed through consequently facilitating intuitively identifying which tested person assess in terms of, at which
A little aspect assessments do not pass through.
At step 104, judge according to risk control business process map execution sequence whether all nodes have executed
It finishes.If being finished, 105 are thened follow the steps;If failing to be finished, 101 are returned to step, is continued to execute in deutomerite
Point.
In step 105, tested person's risk evaluation result is exported.In one embodiment, risk evaluation result can wrap
Assessment is included to pass through, assess and do not pass through or assess score etc..
In one embodiment, the risk assessment parameter that can be exported to each Policy model unit is weighted,
Obtain risk evaluation result.For example, each Policy model unit outputs respective assessment score, each assessment score is matched
It closes weight and carries out operation, obtain final assessment score.Pass through or comment in another example each Policy model unit outputs assessment
Estimate unacceptable as a result, total weight shared by the Policy model unit that output assessment is passed through and the unacceptable strategy of output assessment
Total weight shared by model unit is compared, it is determined whether assessment passes through.
By such method, risk control business process map can be automatically parsed, is executed according to the sequence of flow chart each
A associated Policy model unit of node, and it can be invoked at the implementing result of first node in posterior nodal point, to facilitate user
Risk control status is disposed in a manner of generating risk control business process map based on Policy model unit and connecting line, is improved
The flexibility and efficiency of risk control status deployment.
In one embodiment, Policy model unit can call first node output in risk control business process map
Risk assessment parameter, such as the assessment score of first node output.Variable pond has standardized data call interface, Policy model
Unit also has standard interface.Policy model unit can carry out the extraction of parameter based on standard interface from variable pond,
To make the data in risk control business process map transmit between each node, the flexible of risk control status deployment is improved
Property.
Flow chart such as Fig. 2 of one embodiment of risk control business process map is generated in the methods of risk assessment of the application
It is shown.
In step 201, select multiple Policy model units with each node of determination according to business demand.Implement at one
In example, user can select suitable Policy model list according to the risk control strategy to be arranged from Policy model cell library
Member.For example, selection is associated with consumption loan examination & approval rule when being necessary to determine whether the consumptive loan of approval tested person's application
Policy model unit.
In step 202, the connection relationship between each node is set, to determine that it is suitable that each Policy model unit of mark executes
The connecting line of sequence.In one embodiment, the Policy model unit for being configured to tandem can have certain logic and close
System, or the context with data generation, calling, to complement each other to form complete risk control strategy.
In one embodiment, execution sequence may include sequence execute, execute and select parallel it is in execution a kind of or
It is a variety of.For example, as shown in figure 3, executing X risk control according to arrow sequence after risk control business process map starts execution
Model node, A1 Policy model unit.Condition judgement is carried out according to the result of A1 Policy model unit output, when meeting condition B1
When, notice service node is executed, when meeting condition B2, executes A2 Policy model unit.If B1, B2 are all satisfied, hold parallel
Row notice service node and A2 Policy model unit, and after the completion of A2 Policy model unit executes, according to the sequence of arrow
Execute notice service node.
In one embodiment, it in selection executes, can be commented according to the risk that tested person's information and first node export
Estimate one or both of parameter selection node to be executed.
By such method, user can pass through regulative strategy model unit and be formed by way of configuring its connection relationship
Risk control business process map improves the formation efficiency of risk control business process map, reduces to risk control strategy structure
The requirement for building personnel's programming levels improves the flexibility and efficiency of risk control status deployment.
In one embodiment, can also store generated risk control business process map makes so that next time calls directly
With;It can also be using generated risk control business process map as a part of new risk control business process map, application
In building risk control business process map next time, to further improve the efficiency and flexibly of risk control policy deployment
Property.
In one embodiment, visual risk control operation flow map generalization Interface Construction such as Fig. 3 can be used
Shown in flow chart.User can call each Policy model unit to pull, in a manner of newly-built node etc., and utilize various connections
Line carries out the control of execution sequence, further reduced the technical threshold that risk control business process map is built, improves user
The efficiency of friendliness and risk control policy deployment.
The schematic diagram of another embodiment of the methods of risk assessment of the application is as shown in Figure 4.
In step 401, risk control business process map is parsed, risk control business process map includes node and connection
Line, wherein node is associated with Policy model unit, and connecting line mark node executes sequence.
In step 402, Policy model unit associated with present node is called, by Policy model unit to tested person
Carry out risk assessment.
In step 403, whether determination strategy model unit is rigid policy condition risk assessment unit, and whether the list
The risk evaluation result of member is not pass through.
So-called rigidity policy condition risk assessment unit refers to the necessary condition unit that assessment passes through, when the tactful item of rigidity
The assessment result of part be it is obstructed out-of-date, the risk evaluation result of entire risk control strategy is not pass through.For example, some tactful mould
Type unit is used to judge according to information such as the income of tested person, expenditure, kinsfolk's situations whether the year net income of tested person to be full
Foot requires, if being unsatisfactory for requiring, can not offer loans to the tested person.This Policy model unit is rigid policy condition
Risk assessment unit.
If Policy model unit is rigid policy condition risk assessment unit, and is risk evaluation result not pass through, then
Execute step 406;Otherwise, step 404 is executed.
In step 404, risk assessment parameter present node exported, as present node is assessed whether by or is assessed
Score etc. is stored in variable pond to use in posterior nodal point.
In step 405, judge to execute sequence according to risk control business process map, if all nodes have executed
It finishes.If being finished, 407 are thened follow the steps;If failing to be finished, 401 are returned to step, is continued to execute in deutomerite
Point.
In a step 406, determine that risk evaluation result is not pass through.
In step 407, if having determined, risk evaluation result is not pass through, and is directly exported;If not determining, risk is commented
Estimating result is not pass through, then determines that risk is commented according to the risk assessment parameter that node each in risk control business process map exports
Estimate result.
In one embodiment, risk evaluation result can also be determined according to the output result of the last one node.Risk
Assessment result may include that assessment passes through, assesses and do not pass through or assess score etc..
By such method, when the assessment knot of policy condition risk assessment unit rigid in risk control business process map
Fruit be it is obstructed out-of-date, no longer execute node thereafter, output risk assessment does not pass through, to improve risk control operation flow
The execution efficiency of figure, also reduce system executes burden.
In one embodiment, risk evaluation result can also include offering loans to tested person or allowing tested person
The interest rate for carrying out the business such as Investment & Financing, provides loan or the financing of different interest rates so as to the tested person for different situations.
In one embodiment, risk evaluation result can also include the amount of the loan provided to tested person, so as to
The loan of different amounts is provided for the tested person of different situations.
By such method, more intuitive risk evaluation result can be exported, to make the portion of risk control strategy
It affixes one's name to more flexible, easily facilitates use
In one embodiment, Policy model unit may include that rule model, decision-tree model and user are customized
One of Policy model is a variety of.Rule model may include the multiple risk assessment rules executed sequentially or parallel.Decision
Tree-model may include the multiple risk assessment rules executed based on the selection of preset judgment condition.
Risk assessment rule refer to tested person carry out risk assessment simple judgment rule, as the age 18~60 it
Between or annual income 100,000 with first-class.The customized Policy model of user may include Random Forest model, GBDT model etc..With
Family can voluntarily the relatively independent Policy model of create-rule, the input and output of Policy model unit need to comply with standard according to demand
Change interface requirement.
By such method, material abundant can be provided to establish risk control business process map, further increased
The formation efficiency of air control strategy.
In one embodiment, if the risk assessment rule in Policy model unit is rigid risk assessment rule, and
In the implementation procedure of risk control business process map, the implementing result of the risk assessment rule is that risk assessment does not pass through, then without
Other rules in implementation strategy model unit are needed, the output risk assessment of Policy model unit does not pass through, stops executing risk control
In business process map processed the Policy model unit in posterior nodal point, export risk assessment and do not pass through.For example, risk assessment rule is
Tested person must can not provide finance and money management or financial service to tested person if tested person is 18 years old discontented over 18 years old.It should
Risk assessment rule is rigid risk assessment rule.
It by such method, can be rigid risk assessment rule in risk assessment rule, and in risk control strategy
In the implementation procedure of flow chart, the implementing result of the risk assessment rule is that risk assessment is obstructed out-of-date, terminates whole flow process
It executes, output assessment is unacceptable as a result, further improving execution efficiency.
In one embodiment, user can generate new Policy model unit using various means according to demand.It is raw
The mode of the Policy model unit of Cheng Xin may include: that the multiple risk assessment rules of combination generate new Policy model unit;It is right
Existing Policy model unit carries out the addition of risk assessment rule, is deleted or modified, and generates new Policy model unit;With text
The forms such as part, data flow import complete Policy model unit etc..The input and output of Policy model unit need complying with standard
Interface requirement.
By such method, it can allow for user voluntarily to construct new Policy model unit, enrich for generating risk
The material database of control business process map also meets user while further increasing the formation efficiency of risk control strategy
Individual demand, improve risk control status deployment flexibility.
In one embodiment, user can also generate new risk assessment rule using various means.For example, can be with
The forms such as file, data flow import new risk assessment rule, or can directly be write in the form of regular expression etc. new
Risk assessment rule can also generate new risk assessment rule etc. by way of disassembling existing Policy model unit.Respectively
The input and output of a new risk assessment rule need the requirement of complying with standard interface.
By such method, it can allow for user voluntarily to construct new risk assessment rule, enrich user's generation strategy
The material database of model unit, improve air control strategy generating efficiency while, the also further satisfaction individual demand of user,
Improve the flexibility of risk control status deployment.
In one embodiment, risk control business process map, Policy model unit and risk assessment rule can divide
It Ju You not respective access attribute.Access attribute may include privately owned, open or the user of associated access authority allowed to visit
It asks, so that multi-user, tenant be allowed to be used in conjunction with, strengthens protection and control to data.
In one embodiment, the access authority of each user can be set, the user of different access permission can call
Risk assessment rule, Policy model unit and completed risk control business process map it is different, to realize
The service of differentiation is provided for user.
In one embodiment, voluntarily newly-built risk assessment rule, Policy model unit and wind can be set in user
The access authority of danger control business process map, such as can only in person or our company accesses and application, to realize between different user
Data isolation, guarantee the safety of user's risk control strategy newly developed.User is also an option that voluntarily newly-built risk
Assessment rule, Policy model unit and risk control business process map are open to other parts or whole users, thus to use
Family provides the approach for utilizing risk control strategy extra earning.
In one embodiment, user can also voluntarily increase, delete or search target parameter, user can pass through data
The increase of the means such as importing, page editing progress index parameter.Index parameter refers to that risk control business process map is executing
The various data needed in the process, such as weight, the tested person's information of Policy model unit, so as to convenient, accurately right
Tested person assesses.
In one embodiment, risk evaluating system of the invention may include be able to carry out be mentioned above it is any one
The device of kind methods of risk assessment, automatically parses risk control business process map, executes each node according to the sequence of flow chart
Associated Policy model unit, and the implementing result of first node can be invoked at based on standard interface in posterior nodal point, thus
Facilitate user in a manner of generating risk control business process map based on Policy model unit and connecting line to dispose risk control
Scheme improves the flexibility and efficiency of air control plan implementation.
The schematic diagram of one embodiment of the risk evaluating system of the application is as shown in Figure 5.Flow chart interface 501 can be shown
Show risk control business process map.Risk control business process map includes node and connecting line, node and Policy model unit phase
Association, connecting line mark node execute sequence.Business Stream engine 502 can be commented using any one risk being mentioned above
The method of estimating automatically parses risk control business process map, executes each associated Policy model of node according to the sequence of flow chart
Unit, and the implementing result of first node can be invoked at based on standard interface in posterior nodal point, to facilitate user based on plan
Slightly model unit and connecting line generates the mode of risk control business process map to dispose risk control status, improves risk control
The flexibility and efficiency of plan implementation processed.
In one embodiment, flow chart interface 501 may include increasing newly, cloning, checking, editing, issuing and bring a prisoner before the court, initiate
The function choosing-items such as verifying, audit, search.When user's editing process figure, flow chart interface can be as shown in fig. 6,601 be component
Area, the various assemblies including beginning, model, script, conditional branching, parallel branch and end node, model, script are section
The mark of point.The attribute for the component that user chooses can be shown in component property area 602, and button area 604 provides storage, cuts
It cuts, turn to, the function buttons such as size scaling.User can call each Policy model list using modes such as dragging or newly-built nodes
Member is carried out the editor of flow chart in flow chart editing area 603, execution is realized using connecting line and conditional branching, parallel branch
The control of sequence.
Such risk evaluating system further reduced what risk control business process map was built in a manner of visual
Technical threshold improves the efficiency and user-friendliness of risk control policy deployment.
It in one embodiment, can as shown in fig. 7, risk evaluating system can also include flow chart generation module 703
Select multiple Policy model units with each node of determination according to business demand.Be arranged again the connection relationship between each node with
Configuration strategy model unit executes sequence, so that complete risk control flow chart is generated, the completion risk control of convenience and high-efficiency
Make the deployment of strategy.
Using such risk evaluating system, user by regulative strategy model unit and can configure its connection relationship
Mode forms risk control business process map, improves the formation efficiency of risk control business process map, reduces to risk control
The requirement of construction of strategy personnel programming levels processed improves the flexibility and efficiency of risk control status deployment.
In one embodiment, as shown in fig. 7, risk evaluating system can also include Policy model unit generation module
704, new Policy model unit can be generated using various means according to demand for user.
In one embodiment, the means for generating new Policy model unit can be the multiple risk assessment rules lifes of combination
The Policy model unit of Cheng Xin, be also possible to existing Policy model unit carry out risk assessment rule addition, delete or
Modification can also be and be imported complete Policy model unit etc. in the form of file, data flow etc..The input of Policy model unit is defeated
Complying with standard interface requirement is needed out.
In one embodiment, Policy model unit may include that rule model, decision-tree model and user are customized
One of Policy model is a variety of.Rule model may include the multiple risk assessment rules executed sequentially or parallel.Decision
Tree-model may include the multiple risk assessment rules executed based on the selection of preset judgment condition.
For rule model, Policy model unit generation module 704 may include increase newly, modify, cloning, issue bring a prisoner before the court,
Initiate the functions such as verifying, audit, search.For decision-tree model, Policy model unit generation module 704 may include increase newly,
Editor, clone, addition child node, editor's child node, deletion child node, formula verification, publication bring a prisoner before the court, initiate to verify, audit, search
The functions such as rope, wherein child node refer to a part being made of in decision-tree model one or more risk assessment rules or
One branch.For the customized Policy model of user, Policy model unit generation module 704 may include increasing newly, modifying, issuing
It brings a prisoner before the court, initiate the functions such as verifying, audit, download model algorithm file, search.
Such risk evaluating system can provide material abundant to establish risk control business process map, improve wind
The scalability of dangerous assessment system improves the efficiency and flexibility of risk control policy deployment.
In one embodiment, as shown in fig. 7, risk evaluating system can also include risk assessment rule generation module
705, risk assessment rule can be generated using various means for user, such as import new risk assessment rule;Write new wind
Danger assessment rule;New risk assessment rule etc. is generated by disassembling existing Policy model unit, wherein new risk assessment
The input and output of rule need complying with standard interface requirement.Risk assessment rule generation module 705 may include increasing newly, repairing
Change, issue and the functions such as bring a prisoner before the court, audit, verifying, searching for.In one embodiment, risk assessment rule can be with regular expression
Mode present.
Such risk evaluating system can allow for generating new risk assessment rule, further improve risk assessment system
The scalability of system and the flexibility of application.
In one embodiment, risk evaluating system can also include index parameter generation module, can using newly-built or
The operations such as importing, modification generate index parameter.Index parameter includes the tested person's information and each strategy for risk assessment
The parameters such as the weight of model unit.In one embodiment, additionally it is possible to which deletion, search operation are executed to index parameter.Risk control
In the process of implementation, each Policy model unit can call index parameter to assess tested person to business process map processed.In this way
Risk evaluating system can facilitate configuration tested person information, to improve the risk assessment efficiency to tested person.
In one embodiment, each risk control rule, Policy model unit and risk control flow chart all have
Standard interface, thus facilitate workflow engine call standard interface between risk assessment rule, Policy model unit it
Between and risk control business process map between, or in risk assessment rule, Policy model unit and risk control Business Stream
Journey figure carries out data transmitting between each other, guarantees the smooth execution of risk control flow chart.
In one embodiment, risk evaluating system can also include system login module, the use that can be provided user
Family log-on message carries out safety certification, and distributes and manage user right, so as to according to risk control business process map, tactful mould
The use of the access attribute of type unit and risk assessment rule limitation user.
In one embodiment, system login interface can be pacified using CAS (Compare and Swap compares and exchanges)
Full authentication function guarantees the safety of system.Risk control business process map, Policy model unit and risk assessment rule can
With with access attribute, access attribute includes privately owned, open or the user of associated access authority is allowed to access.It belongs to not
User with user right can check and comment using different risk control business process maps, Policy model unit and risk
Estimate rule, to realize the data isolation between different user, guarantees the safety of user's risk control strategy newly developed.
In one embodiment, when carrying out risk assessment according to risk control business process map, Business Stream engine 702 is adjusted
With the risk control business process map of flow chart interface 701, flow chart interface 701 calls the wherein associated strategy of each node
Model unit.If Policy model unit is made of a plurality of risk assessment rule, the wind that Policy model cell call includes
Danger assessment rule, while tested person's information being called to carry out risk assessment.
When user needs to generate risk control business process map, firstly, being generated by risk assessment rule generation module 705
Risk assessment rule, then 704 generation strategy model unit of Policy model unit generation module.703 base of flow chart generation module
In Policy model building unit risk control business process map, and being generated by index parameter generation module includes that tested person's information exists
Interior index parameter.
In one embodiment, if generating Policy model unit, risk assessment based on existing risk assessment rule
Rule generation module 705 generates the process of new risk assessment rule without executing.If being based on existing Policy model unit structure
Risk control business process map is built, then Policy model unit generation module 704 generates new Policy model unit without executing
Process.User executes instruction in the sending of flow chart interface 701 after deployment more than completion, and Business Stream engine can be used and above be mentioned
To any one methods of risk assessment execute the risk control business process map.
Such risk evaluating system can automatically parse risk control business process map, execute according to the sequence of flow chart
Each associated Policy model unit of node, can further regulative strategy model unit include risk control rule, from
And level calling is realized, it ensure that the smooth execution of risk control business process map.Meanwhile, it is capable to realize risk evaluating system
Optimization, reduce system risk assessment rule and Policy model unit duplicate, redundancy a possibility that, also improve and be
The scalability of system.
The structural schematic diagram of one embodiment of the risk evaluating system of the application is as shown in Figure 8.Risk evaluating system packet
Include memory 810 and processor 820.Memory 810 can be disk, flash memory or other any non-volatile memory mediums.It deposits
Reservoir is used to store the instruction in the above corresponding embodiment of any one methods of risk assessment.Processor 820, which is coupled to, to be deposited
Reservoir 810 can be used as one or more integrated circuits to implement, such as microprocessor or microcontroller.The processor 820 is used
In executing the instruction stored in memory, the flexibility and efficiency of risk control status deployment can be improved.
In one embodiment, as shown in figure 9, risk evaluating system 900 includes memory 910 and processor 920, processing
Device 920 is coupled to memory 910 by BUS bus 930.The risk evaluating system 900 can also be connected by memory interface 940
To external memory 950 to call external data, network or one other can also be connected to by network interface 960
Computer system (not shown).Memory is used to store the finger in the above corresponding embodiment of any one methods of risk assessment
It enables, processor 920 executes the instruction stored in memory, and specific signaling flow direction and data treatment process no longer carry out detailed herein
It is thin to introduce.
In this embodiment, it is instructed by memory stores data, then above-metioned instruction is handled by processor, can be improved
The flexibility and efficiency of risk control status deployment.
In one embodiment, the present invention also proposes a kind of computer readable storage medium, the computer-readable storage medium
It is stored with computer program instructions in matter, any one risk assessment being mentioned above is realized when which is executed by processor
Step in method corresponding embodiment.It should be understood by those skilled in the art that, the available embodiment of the application include method,
Device or computer program product.Therefore, the application can be used complete hardware embodiment, complete software embodiment or combine soft
The form of the embodiment of part and hardware aspect is presented.Moreover, it wherein includes computer that the application, which can be used in one or more,
The computer of usable program code can (including but not limited to magnetic disk storage, CD-ROM, optics be deposited with non-transient storage medium
Reservoir etc.) on the form of computer program product implemented present.
The application is reference according to the method for the embodiment of the present application, the flow chart of equipment (system) and computer program product
And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions
And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to
Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate
One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing
The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
So far, the application is described in detail.In order to avoid covering the design of the application, it is public that this field institute is not described
The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein
Scheme.
The present processes and device may be achieved in many ways.For example, can by software, hardware, firmware or
Person's software, hardware, firmware any combination realize the present processes and device.The step of for the method it is above-mentioned
Sequence is merely to be illustrated, and the step of the present processes is not limited to sequence described in detail above, unless with other sides
Formula illustrates.In addition, in some embodiments, the application can be also embodied as recording program in the recording medium, these
Program includes for realizing according to the machine readable instructions of the present processes.Thus, the application also covers storage for executing
According to the recording medium of the program of the present processes.
Finally it should be noted that: above embodiments are only to illustrate the technical solution of the application rather than its limitations;To the greatest extent
Pipe is described in detail the application referring to preferred embodiment, it should be understood by those ordinary skilled in the art that: still
It can modify to the specific embodiment of the application or some technical features can be equivalently replaced;Without departing from this Shen
Please technical solution spirit, should all cover in the claimed technical proposal scope of the application.
Claims (21)
1. a kind of methods of risk assessment, comprising:
Step i) parses risk control business process map, and the risk control business process map includes node and connecting line, described
Node is associated with Policy model unit, and the connecting line mark node executes sequence;
Step ii) Policy model unit associated with present node is called, the Policy model unit is based on predetermined estimation plan
Risk assessment slightly is carried out to tested person, exports risk assessment parameter;
Step iii) the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point;
Repeat step i)-iii), until all nodes in the risk control business process map are carried out and finish, export
Tested person's risk evaluation result.
2. according to the method described in claim 1, wherein, the Policy model unit is based on standard interface from the variable pond
The middle risk assessment parameter for obtaining first node output.
3. according to the method described in claim 1, wherein,
If first node is not present in the present node, the Policy model unit is based on predetermined estimation strategy, according to tested
People's information carries out risk assessment to tested person, exports risk assessment parameter;
If there are first nodes for the present node, the Policy model unit is based on predetermined estimation strategy, according to tested person
Information and/or the risk assessment parameter of first node output carry out risk assessment to tested person, export risk assessment parameter.
4. according to the method described in claim 1, the risk control business process map generates in the following way:
Multiple Policy model units are selected according to business demand, with each node of determination;
Connection relationship between each node is set, to determine the connecting line for identifying each Policy model unit execution sequence.
5. method described in any one according to claim 1~4, wherein
Execution sequence include sequence execute, execute and select parallel it is in execution one or more, in selection execution
In, according to tested person's information and/or the risk assessment parameter selection node to be executed of first node output.
6. method described in any one according to claim 1~4, wherein
If the Policy model unit is hard conditions risk assessment unit, determine risk assessment not in the Policy model unit
In the case where, terminate to execute the risk control flow chart, output risk assessment does not pass through.
7. according to the method described in claim 1, wherein, the Policy model unit includes rule model and/or decision tree mould
Type,
The rule model includes the multiple risk assessment rules executed sequentially or parallel,
The decision-tree model includes the multiple risk assessment rules executed based on the selection of preset judgment condition.
8. according to the method described in claim 7, wherein,
The risk assessment rule includes the simple judgment rule that risk assessment is carried out to the tested person.
9. method according to claim 7 or 8, wherein it includes following for generating the mode of the new Policy model unit
One of mode is a variety of:
New Policy model unit is generated by combining multiple risk assessment rules;
The addition of risk assessment rule is carried out to the existing Policy model unit, is deleted or modified, new tactful mould is generated
Type unit;
Import complete Policy model unit, input and output the complying with standard interface requirement of the Policy model unit.
10. method according to claim 7 or 8, wherein the mode for generating new risk assessment rule includes following manner
One of or it is a variety of:
Import new risk assessment rule;
Write new risk assessment rule;
New risk assessment rule is generated by disassembling the existing Policy model unit;
Wherein, the input and output of the new risk assessment rule meet the standard interface requirement.
11. method according to claim 7 or 8, wherein
If the risk assessment rule is rigid risk assessment rule, determine that risk assessment does not pass through in the risk assessment rule
In the case where, terminate to execute the Policy model unit, output risk assessment does not pass through.
12. method according to claim 7 or 8, wherein the Policy model unit further includes the customized tactful mould of user
Type, input and output the complying with standard interface requirement of the Policy model unit.
13. according to the method for claim 12, wherein the customized Policy model of user includes Random Forest model
And/or grad enhancement decision tree GBDT model.
14. method according to claim 7 or 8, wherein
The risk control business process map, the Policy model unit and/or the risk assessment rule have access attribute,
The access attribute includes privately owned, open or the user of associated access authority is allowed to access.
15. a kind of risk evaluating system, including requiring methods of risk assessment described in 1~14 any one for perform claim
Device.
16. a kind of risk evaluating system, comprising:
Flow chart interface, for showing risk control business process map, the risk control business process map includes node and company
Wiring, the node is associated with Policy model unit, and the connecting line mark node executes sequence;
Business Stream engine executes the risk control for methods of risk assessment described in any one according to claim 1~14
Business process map processed exports tested person's risk evaluation result.
17. system according to claim 16 further includes flow chart generation module, described in generating in the following way
Risk control business process map:
Multiple Policy model units are selected according to business demand, with each node of determination;
Connection relationship between each node is set, to determine the connecting line for the execution sequence for identifying each Policy model unit.
18. system according to claim 17 further includes Policy model unit generation module, used in the following manner
One or more generation strategy model units:
New Policy model unit is generated by combining multiple risk assessment rules;
The addition of risk assessment rule is carried out to existing Policy model unit, is deleted or modified, new Policy model list is generated
Member;
Complete Policy model unit is imported, input and output the complying with standard interface requirement of the Policy model unit imported.
19. system according to claim 18 further includes risk assessment rule generation module, used in the following manner
One or more generation risk assessment rules:
Import new risk assessment rule;
Write new risk assessment rule;
New risk assessment rule is generated by disassembling the existing Policy model unit;
Wherein, input and output the complying with standard interface requirement of the new risk assessment rule.
20. a kind of risk evaluating system, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to based on the instruction execution for being stored in the memory
Such as the described in any item methods of claim 1 to 14.
21. a kind of computer readable storage medium, is stored thereon with computer program instructions, real when which is executed by processor
The step of method described in existing claim 1 to 14 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710695344.2A CN109409892A (en) | 2017-08-15 | 2017-08-15 | Methods of risk assessment and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710695344.2A CN109409892A (en) | 2017-08-15 | 2017-08-15 | Methods of risk assessment and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109409892A true CN109409892A (en) | 2019-03-01 |
Family
ID=65454046
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710695344.2A Pending CN109409892A (en) | 2017-08-15 | 2017-08-15 | Methods of risk assessment and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109409892A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110189220A (en) * | 2019-05-09 | 2019-08-30 | 天创信用服务有限公司 | A kind of risk analysis decision-making technique, device, system and storage medium |
CN110349013A (en) * | 2019-07-12 | 2019-10-18 | 蔷薇智慧科技有限公司 | Risk control method and device |
CN110400219A (en) * | 2019-06-14 | 2019-11-01 | 阿里巴巴集团控股有限公司 | Method for processing business and system, transaction monitoring method and system |
CN110458412A (en) * | 2019-07-16 | 2019-11-15 | 阿里巴巴集团控股有限公司 | The generation method and device of risk monitoring and control data |
CN110704045A (en) * | 2019-09-20 | 2020-01-17 | 凡普数字技术有限公司 | Method and device for constructing decision flow and storage medium |
CN110992045A (en) * | 2019-11-15 | 2020-04-10 | 安徽海汇金融投资集团有限公司 | Method and system for monitoring abnormal risk of transfer of accounts receivable and debt right |
CN111311392A (en) * | 2020-03-17 | 2020-06-19 | 深圳市随手金服信息科技有限公司 | Wind control decision method, device, server and storage medium |
CN111324357A (en) * | 2020-02-11 | 2020-06-23 | 支付宝(杭州)信息技术有限公司 | Method for accessing application program to wind control platform and related equipment |
CN111563254A (en) * | 2020-05-07 | 2020-08-21 | 中国工商银行股份有限公司 | Threat risk processing method and apparatus for product, computer system and medium |
CN112149951A (en) * | 2020-08-11 | 2020-12-29 | 招联消费金融有限公司 | Risk control method and device, computer equipment and storage medium |
CN112633619A (en) * | 2019-10-08 | 2021-04-09 | 阿里巴巴集团控股有限公司 | Risk assessment method and device |
CN113344695A (en) * | 2021-06-21 | 2021-09-03 | 支付宝(杭州)信息技术有限公司 | Elastic wind control method, device, equipment and readable medium |
CN113657779A (en) * | 2021-08-20 | 2021-11-16 | 杭州时趣信息技术有限公司 | Dynamically-configured wind control decision method, system, equipment and storage medium |
CN113762671A (en) * | 2020-09-15 | 2021-12-07 | 北京同邦卓益科技有限公司 | Risk assessment method, device and system |
CN114066584A (en) * | 2021-11-05 | 2022-02-18 | 支付宝(杭州)信息技术有限公司 | Method and device for risk prevention and control of block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040267660A1 (en) * | 2003-02-21 | 2004-12-30 | Automated Financial Systems, Inc. | Risk management system |
CN101930585A (en) * | 2010-09-01 | 2010-12-29 | 中国建设银行股份有限公司 | Credit business risk monitoring system and method thereof |
CN105469308A (en) * | 2015-12-24 | 2016-04-06 | 安徽融信金模信息技术有限公司 | Financing risk evaluation system and method of middle and small-sized enterprises |
CN105894369A (en) * | 2015-01-04 | 2016-08-24 | 必普(上海)金融信息服务有限公司 | Risk assessment model for internet financial network loan platform |
-
2017
- 2017-08-15 CN CN201710695344.2A patent/CN109409892A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040267660A1 (en) * | 2003-02-21 | 2004-12-30 | Automated Financial Systems, Inc. | Risk management system |
CN101930585A (en) * | 2010-09-01 | 2010-12-29 | 中国建设银行股份有限公司 | Credit business risk monitoring system and method thereof |
CN105894369A (en) * | 2015-01-04 | 2016-08-24 | 必普(上海)金融信息服务有限公司 | Risk assessment model for internet financial network loan platform |
CN105469308A (en) * | 2015-12-24 | 2016-04-06 | 安徽融信金模信息技术有限公司 | Financing risk evaluation system and method of middle and small-sized enterprises |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110189220A (en) * | 2019-05-09 | 2019-08-30 | 天创信用服务有限公司 | A kind of risk analysis decision-making technique, device, system and storage medium |
CN110400219A (en) * | 2019-06-14 | 2019-11-01 | 阿里巴巴集团控股有限公司 | Method for processing business and system, transaction monitoring method and system |
CN110400219B (en) * | 2019-06-14 | 2024-05-17 | 创新先进技术有限公司 | Service processing method and system, and transaction monitoring method and system |
CN110349013A (en) * | 2019-07-12 | 2019-10-18 | 蔷薇智慧科技有限公司 | Risk control method and device |
CN110458412A (en) * | 2019-07-16 | 2019-11-15 | 阿里巴巴集团控股有限公司 | The generation method and device of risk monitoring and control data |
CN110704045A (en) * | 2019-09-20 | 2020-01-17 | 凡普数字技术有限公司 | Method and device for constructing decision flow and storage medium |
CN112633619A (en) * | 2019-10-08 | 2021-04-09 | 阿里巴巴集团控股有限公司 | Risk assessment method and device |
CN110992045A (en) * | 2019-11-15 | 2020-04-10 | 安徽海汇金融投资集团有限公司 | Method and system for monitoring abnormal risk of transfer of accounts receivable and debt right |
CN110992045B (en) * | 2019-11-15 | 2024-03-22 | 安徽海汇金融投资集团有限公司 | Method and system for monitoring abnormal risk of account-receivables and right-of-way flows |
CN111324357A (en) * | 2020-02-11 | 2020-06-23 | 支付宝(杭州)信息技术有限公司 | Method for accessing application program to wind control platform and related equipment |
CN111324357B (en) * | 2020-02-11 | 2022-06-28 | 支付宝(杭州)信息技术有限公司 | Method for accessing application program to wind control platform and related equipment |
CN111311392A (en) * | 2020-03-17 | 2020-06-19 | 深圳市随手金服信息科技有限公司 | Wind control decision method, device, server and storage medium |
CN111563254A (en) * | 2020-05-07 | 2020-08-21 | 中国工商银行股份有限公司 | Threat risk processing method and apparatus for product, computer system and medium |
CN111563254B (en) * | 2020-05-07 | 2024-05-07 | 中国工商银行股份有限公司 | Threat risk processing method and apparatus for product, computer system, and medium |
CN112149951A (en) * | 2020-08-11 | 2020-12-29 | 招联消费金融有限公司 | Risk control method and device, computer equipment and storage medium |
CN113762671A (en) * | 2020-09-15 | 2021-12-07 | 北京同邦卓益科技有限公司 | Risk assessment method, device and system |
CN113344695A (en) * | 2021-06-21 | 2021-09-03 | 支付宝(杭州)信息技术有限公司 | Elastic wind control method, device, equipment and readable medium |
CN113657779A (en) * | 2021-08-20 | 2021-11-16 | 杭州时趣信息技术有限公司 | Dynamically-configured wind control decision method, system, equipment and storage medium |
CN113657779B (en) * | 2021-08-20 | 2024-01-09 | 杭州时趣信息技术有限公司 | Dynamic configuration wind control decision method, system, equipment and storage medium |
CN114066584A (en) * | 2021-11-05 | 2022-02-18 | 支付宝(杭州)信息技术有限公司 | Method and device for risk prevention and control of block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109409892A (en) | Methods of risk assessment and system | |
US10169215B2 (en) | Method and system for analyzing test cases for automatically generating optimized business models | |
De Leoni et al. | Data-aware process mining: discovering decisions in processes using alignments | |
Buijs | Flexible evolutionary algorithms for mining structured process models | |
CN102449598B (en) | Bag design and generation | |
US11048762B2 (en) | User-defined automated document feature modeling, extraction and optimization | |
CN108322473A (en) | User behavior analysis method and apparatus | |
CN110349000A (en) | Method, apparatus and electronic equipment are determined based on the volume strategy that mentions of tenant group | |
CN109922032A (en) | Method and apparatus for determining the risk of logon account | |
CN109063952B (en) | Policy generation and risk control method and device | |
US20150134424A1 (en) | Systems and methods for assessing hybridization of cloud computing services based on data mining of historical decisions | |
US20090138248A1 (en) | Linked decision nodes in a business process model | |
CN106909543A (en) | The method for mode matching and device of a kind of regulation engine | |
US20210209505A1 (en) | Parametric modeling and simulation of complex systems using large datasets and heterogeneous data structures | |
CN108921600A (en) | Realize the device and method and storage medium of information classification | |
AU2012201529A1 (en) | MVT optimization of business process modeling and management | |
CN110189220A (en) | A kind of risk analysis decision-making technique, device, system and storage medium | |
CN109345379A (en) | A kind of intelligence credit method and apparatus | |
KR20060070609A (en) | Apparatus and method for product-line architecture description and verification | |
CN110415103A (en) | The method, apparatus and electronic equipment that tenant group mentions volume are carried out based on variable disturbance degree index | |
CN109800401A (en) | Information report automatic generation method and device | |
Zekos | Political, economic and legal effects of artificial intelligence | |
Ouchani et al. | A probabilistic verification framework of SysML activity diagrams | |
CN102364440A (en) | System for establishing software demand model and method for establishing software demand model | |
CN109255389A (en) | A kind of equipment evaluation method, device, equipment and readable storage medium storing program for executing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190301 |