CN109409892A - Methods of risk assessment and system - Google Patents

Methods of risk assessment and system Download PDF

Info

Publication number
CN109409892A
CN109409892A CN201710695344.2A CN201710695344A CN109409892A CN 109409892 A CN109409892 A CN 109409892A CN 201710695344 A CN201710695344 A CN 201710695344A CN 109409892 A CN109409892 A CN 109409892A
Authority
CN
China
Prior art keywords
risk assessment
risk
policy model
model unit
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710695344.2A
Other languages
Chinese (zh)
Inventor
权梁锋
田皓轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fanpu Mutual Gold Co Ltd
Original Assignee
Fanpu Mutual Gold Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fanpu Mutual Gold Co Ltd filed Critical Fanpu Mutual Gold Co Ltd
Priority to CN201710695344.2A priority Critical patent/CN109409892A/en
Publication of CN109409892A publication Critical patent/CN109409892A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application proposes a kind of methods of risk assessment and system, is related to technical field of Internet information.A kind of methods of risk assessment of the application includes: step i) parsing risk control business process map, and risk control business process map includes node and connecting line;Step ii) Policy model unit associated with present node is called, Policy model unit exports risk assessment parameter;Step iii) the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point;Repeat step i)-iii), until all nodes are finished, export tested person's risk evaluation result.By such method, risk control business process map can be automatically parsed, each associated Policy model unit of node is executed according to the sequence of flow chart, facilitate user in a manner of generating risk control business process map based on Policy model unit and connecting line to dispose risk control status, improves the flexibility and efficiency of air control plan implementation.

Description

Methods of risk assessment and system
Technical field
This application involves technical field of Internet information, especially a kind of methods of risk assessment and system.
Background technique
In recent years, internet finance develops rapidly, and shows powerful development potentiality, is sent out in terms of supporting real economy The effect waved attracts people's attention.But since internet finance has multidimensional opening and multi-directional interaction, the spread area of risk The remote ultra-traditional finance of diffusion velocity, therefore risk control is particularly important.It is related in order to improve the safety of internet finance Internet the financial technology a large amount of transaction record and transaction trace that are left by the transaction of internet on the net based on client To develop air control strategy, rule, and program is converted to customer data progress risk control and analysis by air control strategy, rule.
Summary of the invention
Inventor's discovery: although internet finance solves information collection, information in traditional financial using Internet technology Inefficiency problem in the links such as audit and risk control, but the internet abundant not enough with the penetration of service, most due to technology The risk control of financing corporation still remains following two disadvantage:
1. technical barrier is excessively high, the air control deployment development cost of business is high, and the period is long, and docking efficiency is lower.
2. technology relies on high, the configuration of air control and iteration management process complexity, shortage flexibility.
At least one of to solve the above-mentioned problems, the purpose of the application is to propose a kind of holding for risk assessment Row scheme improves the flexibility and efficiency of risk control status deployment.
According to the one aspect of the application, a kind of methods of risk assessment is proposed, comprising:
Step i) parses risk control business process map, and risk control business process map includes node and connecting line, node Associated with Policy model unit, connecting line mark node executes sequence;
Step ii) Policy model unit associated with present node is called, Policy model unit is based on predetermined estimation plan Risk assessment slightly is carried out to tested person, exports risk assessment parameter;
Step iii) the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point;
Repeat step i)-iii), until all nodes in risk control business process map are carried out and finish, export Tested person's risk evaluation result.
Optionally, Policy model unit obtains the risk assessment of first node output based on standard interface from variable pond Parameter.
Optionally, if first node is not present in present node, Policy model unit is based on predetermined estimation strategy, according to quilt It surveys people's information and risk assessment is carried out to tested person, export risk assessment parameter;If there are first node, tactful moulds for present node Type unit is based on predetermined estimation strategy, and the risk assessment parameter exported according to tested person's information and/or first node is to tested person Risk assessment is carried out, risk assessment parameter is exported.
Optionally, risk control business process map generates in the following way: according to the multiple tactful moulds of business demand selection Type unit, with each node of determination;Connection relationship between each node is set, to determine that identifying each Policy model unit executes The connecting line of sequence.
Optionally, execution sequence includes that sequence executes, executes and select in execution one or more parallel, is held in selection In row, according to tested person's information and/or the risk assessment parameter selection node to be executed of first node output.
Optionally, if Policy model unit is hard conditions risk assessment unit, determine that risk is commented in Policy model unit Estimate in unacceptable situation, terminates to execute risk control flow chart, output risk assessment does not pass through.
Optionally, Policy model unit includes rule model and/or decision-tree model, and rule model includes sequentially or parallel The multiple risk assessment rules executed, decision-tree model include the multiple risk assessment rule executed based on the selection of preset judgment condition Then.
Optionally, risk assessment rule includes the simple judgment rule that risk assessment is carried out to tested person.
Optionally, the mode for generating new Policy model unit includes one of following manner or a variety of: passing through combination Multiple risk assessment rules generate new Policy model unit;Risk assessment rule is carried out to existing Policy model unit to add Add, be deleted or modified, generates new Policy model unit;Import complete Policy model unit, the input of Policy model unit Export complying with standard interface requirement.
Optionally, the mode for generating new risk assessment rule includes one of following manner or a variety of: being imported new Risk assessment rule;Write new risk assessment rule;New risk assessment is generated by disassembling existing Policy model unit Rule;Wherein, input and output the complying with standard interface requirement of new risk assessment rule.
Optionally, if risk assessment rule is rigid risk assessment rule, determine risk assessment not in risk assessment rule In the case where, terminate implementation strategy model unit, output risk assessment does not pass through.
Optionally, Policy model unit further includes the customized Policy model of user, the input and output symbol of Policy model unit Standardization interface requirement.
Optionally, the customized Policy model of user includes Random Forest model and/or GBDT (Gradient Boosting Decision Tree, grad enhancement decision tree) model.
Optionally, risk control business process map, Policy model unit and/or risk assessment rule have access attribute, Access attribute includes privately owned, open or the user of associated access authority is allowed to access.
By such method, risk control business process map can be automatically parsed, is executed according to the sequence of flow chart each A associated Policy model unit of node, and it can be invoked at the implementing result of first node in posterior nodal point, to facilitate user Risk control status is disposed in a manner of generating risk control business process map based on Policy model unit and connecting line, is improved The flexibility and efficiency of risk control status deployment.
According to further aspect of the application, propose a kind of risk evaluating system, for execute be mentioned above it is any A kind of methods of risk assessment.
Such risk evaluating system can automatically parse risk control business process map, execute according to the sequence of flow chart Each associated Policy model unit of node, and it can be invoked at the implementing result of first node in posterior nodal point, to facilitate use Risk control status is disposed in a manner of generating risk control business process map based on Policy model unit and connecting line in family, mentions The high flexibility and efficiency of risk control status deployment.
According to the another aspect of the application, a kind of risk evaluating system is proposed, comprising: flow chart interface, for showing Risk control business process map, risk control business process map include node and connecting line, and node is related to Policy model unit Connection, connecting line mark node execute sequence;Business Stream engine, for according to any one the risk assessment side being mentioned above Method executes risk control business process map, exports tested person's risk evaluation result.
Optionally, risk evaluating system further includes flow chart generation module, for generating risk control in the following way Business process map: multiple Policy model units are selected according to business demand, with each node of determination;It is arranged between each node Connection relationship, to determine the connecting line for the execution sequence for identifying each Policy model unit.
Optionally, risk evaluating system further includes Policy model unit generation module, for one in the following manner Kind or a variety of generation strategy model units: new Policy model unit is generated by combining multiple risk assessment rules;To existing Policy model unit carry out risk assessment rule addition, be deleted or modified, generate new Policy model unit;It imports complete Policy model unit, input and output the complying with standard interface requirement of the Policy model unit imported.
Optionally, risk evaluating system further includes risk assessment rule generation module, for one in the following manner Kind or a variety of generation risk assessment rules: new risk assessment rule is imported;Write new risk assessment rule;By disassembling Some Policy model units generate new risk assessment rule;Wherein, the input and output of new risk assessment rule comply with standard Change interface requirement.
Such risk evaluating system can automatically parse and execute risk control business process map, facilitate user to be based on Policy model unit and connecting line generate the mode of risk control business process map to dispose risk control status, improve risk The flexibility and efficiency of control program deployment.
According to another aspect of the application, a kind of risk evaluating system is proposed, comprising: memory;And it is coupled to and deposits The processor of reservoir, processor are configured as any one risk being mentioned above based on the instruction execution for being stored in memory Appraisal procedure.
Such risk evaluating system can facilitate user to generate risk control based on Policy model unit and connecting line The mode of business process map disposes risk control status, improves the flexibility and efficiency of risk control status deployment.
In addition, proposing a kind of computer readable storage medium according to the one aspect of the application, being stored thereon with computer The step of program instruction, any one methods of risk assessment that realization is mentioned above when which is executed by processor.
Such computer readable storage medium can automatically parse risk control Business Stream by executing program thereon Cheng Tu executes each associated Policy model unit of node according to the sequence of flow chart, and can call formerly in posterior nodal point The implementing result of node, to facilitate user to generate risk control business process map based on Policy model unit and connecting line Mode disposes risk control status, improves the flexibility and efficiency of risk control status deployment.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the flow chart of one embodiment of the methods of risk assessment of the application.
Fig. 2 is the process that one embodiment of risk control business process map is generated in the methods of risk assessment of the application Figure.
Fig. 3 is the schematic diagram that the methods of risk assessment risk of the application controls one embodiment of business process map.
Fig. 4 is the schematic diagram of another embodiment of the methods of risk assessment of the application.
Fig. 5 is the schematic diagram of one embodiment of the risk evaluating system of the application.
Fig. 6 is the schematic diagram of one embodiment of the flow chart interface in the risk evaluating system of the application.
Fig. 7 is the schematic diagram of another embodiment of the risk evaluating system of the application.
Fig. 8 is the schematic diagram of another embodiment of the risk evaluating system of the application.
Fig. 9 is the schematic diagram of the further embodiment of the risk evaluating system of the application.
Specific embodiment
Below by drawings and examples, the technical solution of the application is described in further detail.
The schematic diagram of one embodiment of the methods of risk assessment of the application is as shown in Figure 1.
In a step 101, risk control business process map is parsed.In one embodiment, risk control business process map Including node and connecting line, node is associated with Policy model unit, and connecting line mark node executes sequence.
In one embodiment, the connecting line that can first parse risk control business process map, according to connecting line mark Execution sequence determines present node, and then determines Policy model unit associated with the present node.In one embodiment, When selection branch occurs in connecting line, the present node to be executed can be selected according to the judging result of branch condition, and then really Surely the Policy model unit to be executed;When parallel branch occurs in connecting line, it regard parallel multiple nodes as present node.
In a step 102, Policy model unit associated with present node is called, by Policy model unit to tested person Carry out risk assessment.In one embodiment, Policy model unit can carry out risk to tested person based on predetermined estimation strategy Assessment exports risk assessment parameter.For example, being directed to personal credit situation, the personal income situation, individual deposit of tested person respectively Situation, risk tolerance and kinsfolk's situation etc. carry out risk assessment, and each Policy model unit can be from an angle Degree is assessed, or executes the component assesses condition etc. in entire risk assessment strategies.In one embodiment, tested person removes It can be individual, be also possible to group, enterprise etc..Risk assessment parameter may include that assessment passes through, assesses and do not pass through or comment Estimate the information such as score.
It in one embodiment, can be according only to tested person's information to tested person if first node is not present in present node Risk assessment is carried out, risk assessment parameter is exported;If there are first nodes for present node, can be according only to tested person's information pair Tested person carries out risk assessment, the risk assessment parameter that first node generates can also be extracted, in conjunction with tested person's information to tested People carries out risk assessment, or the risk assessment parameter that can be generated according only to first node carries out risk assessment to tested person.
In step 103, the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point. In one embodiment, variable pond can be the various forms such as database, tables of data, storehouse, queue.
In one embodiment, risk assessment parameter can be stored in variable pond and generate the tactful mould of the risk assessment parameter The mark of the information such as the mark or weight of type unit, Policy model unit can be number information.In one embodiment, tactful The mark of model unit is also possible to the assessment emphasis information of Policy model unit.For example, Policy model unit is laid particular emphasis on pair The risk tolerance of tested person is assessed, and is passed through consequently facilitating intuitively identifying which tested person assess in terms of, at which A little aspect assessments do not pass through.
At step 104, judge according to risk control business process map execution sequence whether all nodes have executed It finishes.If being finished, 105 are thened follow the steps;If failing to be finished, 101 are returned to step, is continued to execute in deutomerite Point.
In step 105, tested person's risk evaluation result is exported.In one embodiment, risk evaluation result can wrap Assessment is included to pass through, assess and do not pass through or assess score etc..
In one embodiment, the risk assessment parameter that can be exported to each Policy model unit is weighted, Obtain risk evaluation result.For example, each Policy model unit outputs respective assessment score, each assessment score is matched It closes weight and carries out operation, obtain final assessment score.Pass through or comment in another example each Policy model unit outputs assessment Estimate unacceptable as a result, total weight shared by the Policy model unit that output assessment is passed through and the unacceptable strategy of output assessment Total weight shared by model unit is compared, it is determined whether assessment passes through.
By such method, risk control business process map can be automatically parsed, is executed according to the sequence of flow chart each A associated Policy model unit of node, and it can be invoked at the implementing result of first node in posterior nodal point, to facilitate user Risk control status is disposed in a manner of generating risk control business process map based on Policy model unit and connecting line, is improved The flexibility and efficiency of risk control status deployment.
In one embodiment, Policy model unit can call first node output in risk control business process map Risk assessment parameter, such as the assessment score of first node output.Variable pond has standardized data call interface, Policy model Unit also has standard interface.Policy model unit can carry out the extraction of parameter based on standard interface from variable pond, To make the data in risk control business process map transmit between each node, the flexible of risk control status deployment is improved Property.
Flow chart such as Fig. 2 of one embodiment of risk control business process map is generated in the methods of risk assessment of the application It is shown.
In step 201, select multiple Policy model units with each node of determination according to business demand.Implement at one In example, user can select suitable Policy model list according to the risk control strategy to be arranged from Policy model cell library Member.For example, selection is associated with consumption loan examination & approval rule when being necessary to determine whether the consumptive loan of approval tested person's application Policy model unit.
In step 202, the connection relationship between each node is set, to determine that it is suitable that each Policy model unit of mark executes The connecting line of sequence.In one embodiment, the Policy model unit for being configured to tandem can have certain logic and close System, or the context with data generation, calling, to complement each other to form complete risk control strategy.
In one embodiment, execution sequence may include sequence execute, execute and select parallel it is in execution a kind of or It is a variety of.For example, as shown in figure 3, executing X risk control according to arrow sequence after risk control business process map starts execution Model node, A1 Policy model unit.Condition judgement is carried out according to the result of A1 Policy model unit output, when meeting condition B1 When, notice service node is executed, when meeting condition B2, executes A2 Policy model unit.If B1, B2 are all satisfied, hold parallel Row notice service node and A2 Policy model unit, and after the completion of A2 Policy model unit executes, according to the sequence of arrow Execute notice service node.
In one embodiment, it in selection executes, can be commented according to the risk that tested person's information and first node export Estimate one or both of parameter selection node to be executed.
By such method, user can pass through regulative strategy model unit and be formed by way of configuring its connection relationship Risk control business process map improves the formation efficiency of risk control business process map, reduces to risk control strategy structure The requirement for building personnel's programming levels improves the flexibility and efficiency of risk control status deployment.
In one embodiment, can also store generated risk control business process map makes so that next time calls directly With;It can also be using generated risk control business process map as a part of new risk control business process map, application In building risk control business process map next time, to further improve the efficiency and flexibly of risk control policy deployment Property.
In one embodiment, visual risk control operation flow map generalization Interface Construction such as Fig. 3 can be used Shown in flow chart.User can call each Policy model unit to pull, in a manner of newly-built node etc., and utilize various connections Line carries out the control of execution sequence, further reduced the technical threshold that risk control business process map is built, improves user The efficiency of friendliness and risk control policy deployment.
The schematic diagram of another embodiment of the methods of risk assessment of the application is as shown in Figure 4.
In step 401, risk control business process map is parsed, risk control business process map includes node and connection Line, wherein node is associated with Policy model unit, and connecting line mark node executes sequence.
In step 402, Policy model unit associated with present node is called, by Policy model unit to tested person Carry out risk assessment.
In step 403, whether determination strategy model unit is rigid policy condition risk assessment unit, and whether the list The risk evaluation result of member is not pass through.
So-called rigidity policy condition risk assessment unit refers to the necessary condition unit that assessment passes through, when the tactful item of rigidity The assessment result of part be it is obstructed out-of-date, the risk evaluation result of entire risk control strategy is not pass through.For example, some tactful mould Type unit is used to judge according to information such as the income of tested person, expenditure, kinsfolk's situations whether the year net income of tested person to be full Foot requires, if being unsatisfactory for requiring, can not offer loans to the tested person.This Policy model unit is rigid policy condition Risk assessment unit.
If Policy model unit is rigid policy condition risk assessment unit, and is risk evaluation result not pass through, then Execute step 406;Otherwise, step 404 is executed.
In step 404, risk assessment parameter present node exported, as present node is assessed whether by or is assessed Score etc. is stored in variable pond to use in posterior nodal point.
In step 405, judge to execute sequence according to risk control business process map, if all nodes have executed It finishes.If being finished, 407 are thened follow the steps;If failing to be finished, 401 are returned to step, is continued to execute in deutomerite Point.
In a step 406, determine that risk evaluation result is not pass through.
In step 407, if having determined, risk evaluation result is not pass through, and is directly exported;If not determining, risk is commented Estimating result is not pass through, then determines that risk is commented according to the risk assessment parameter that node each in risk control business process map exports Estimate result.
In one embodiment, risk evaluation result can also be determined according to the output result of the last one node.Risk Assessment result may include that assessment passes through, assesses and do not pass through or assess score etc..
By such method, when the assessment knot of policy condition risk assessment unit rigid in risk control business process map Fruit be it is obstructed out-of-date, no longer execute node thereafter, output risk assessment does not pass through, to improve risk control operation flow The execution efficiency of figure, also reduce system executes burden.
In one embodiment, risk evaluation result can also include offering loans to tested person or allowing tested person The interest rate for carrying out the business such as Investment & Financing, provides loan or the financing of different interest rates so as to the tested person for different situations.
In one embodiment, risk evaluation result can also include the amount of the loan provided to tested person, so as to The loan of different amounts is provided for the tested person of different situations.
By such method, more intuitive risk evaluation result can be exported, to make the portion of risk control strategy It affixes one's name to more flexible, easily facilitates use
In one embodiment, Policy model unit may include that rule model, decision-tree model and user are customized One of Policy model is a variety of.Rule model may include the multiple risk assessment rules executed sequentially or parallel.Decision Tree-model may include the multiple risk assessment rules executed based on the selection of preset judgment condition.
Risk assessment rule refer to tested person carry out risk assessment simple judgment rule, as the age 18~60 it Between or annual income 100,000 with first-class.The customized Policy model of user may include Random Forest model, GBDT model etc..With Family can voluntarily the relatively independent Policy model of create-rule, the input and output of Policy model unit need to comply with standard according to demand Change interface requirement.
By such method, material abundant can be provided to establish risk control business process map, further increased The formation efficiency of air control strategy.
In one embodiment, if the risk assessment rule in Policy model unit is rigid risk assessment rule, and In the implementation procedure of risk control business process map, the implementing result of the risk assessment rule is that risk assessment does not pass through, then without Other rules in implementation strategy model unit are needed, the output risk assessment of Policy model unit does not pass through, stops executing risk control In business process map processed the Policy model unit in posterior nodal point, export risk assessment and do not pass through.For example, risk assessment rule is Tested person must can not provide finance and money management or financial service to tested person if tested person is 18 years old discontented over 18 years old.It should Risk assessment rule is rigid risk assessment rule.
It by such method, can be rigid risk assessment rule in risk assessment rule, and in risk control strategy In the implementation procedure of flow chart, the implementing result of the risk assessment rule is that risk assessment is obstructed out-of-date, terminates whole flow process It executes, output assessment is unacceptable as a result, further improving execution efficiency.
In one embodiment, user can generate new Policy model unit using various means according to demand.It is raw The mode of the Policy model unit of Cheng Xin may include: that the multiple risk assessment rules of combination generate new Policy model unit;It is right Existing Policy model unit carries out the addition of risk assessment rule, is deleted or modified, and generates new Policy model unit;With text The forms such as part, data flow import complete Policy model unit etc..The input and output of Policy model unit need complying with standard Interface requirement.
By such method, it can allow for user voluntarily to construct new Policy model unit, enrich for generating risk The material database of control business process map also meets user while further increasing the formation efficiency of risk control strategy Individual demand, improve risk control status deployment flexibility.
In one embodiment, user can also generate new risk assessment rule using various means.For example, can be with The forms such as file, data flow import new risk assessment rule, or can directly be write in the form of regular expression etc. new Risk assessment rule can also generate new risk assessment rule etc. by way of disassembling existing Policy model unit.Respectively The input and output of a new risk assessment rule need the requirement of complying with standard interface.
By such method, it can allow for user voluntarily to construct new risk assessment rule, enrich user's generation strategy The material database of model unit, improve air control strategy generating efficiency while, the also further satisfaction individual demand of user, Improve the flexibility of risk control status deployment.
In one embodiment, risk control business process map, Policy model unit and risk assessment rule can divide It Ju You not respective access attribute.Access attribute may include privately owned, open or the user of associated access authority allowed to visit It asks, so that multi-user, tenant be allowed to be used in conjunction with, strengthens protection and control to data.
In one embodiment, the access authority of each user can be set, the user of different access permission can call Risk assessment rule, Policy model unit and completed risk control business process map it is different, to realize The service of differentiation is provided for user.
In one embodiment, voluntarily newly-built risk assessment rule, Policy model unit and wind can be set in user The access authority of danger control business process map, such as can only in person or our company accesses and application, to realize between different user Data isolation, guarantee the safety of user's risk control strategy newly developed.User is also an option that voluntarily newly-built risk Assessment rule, Policy model unit and risk control business process map are open to other parts or whole users, thus to use Family provides the approach for utilizing risk control strategy extra earning.
In one embodiment, user can also voluntarily increase, delete or search target parameter, user can pass through data The increase of the means such as importing, page editing progress index parameter.Index parameter refers to that risk control business process map is executing The various data needed in the process, such as weight, the tested person's information of Policy model unit, so as to convenient, accurately right Tested person assesses.
In one embodiment, risk evaluating system of the invention may include be able to carry out be mentioned above it is any one The device of kind methods of risk assessment, automatically parses risk control business process map, executes each node according to the sequence of flow chart Associated Policy model unit, and the implementing result of first node can be invoked at based on standard interface in posterior nodal point, thus Facilitate user in a manner of generating risk control business process map based on Policy model unit and connecting line to dispose risk control Scheme improves the flexibility and efficiency of air control plan implementation.
The schematic diagram of one embodiment of the risk evaluating system of the application is as shown in Figure 5.Flow chart interface 501 can be shown Show risk control business process map.Risk control business process map includes node and connecting line, node and Policy model unit phase Association, connecting line mark node execute sequence.Business Stream engine 502 can be commented using any one risk being mentioned above The method of estimating automatically parses risk control business process map, executes each associated Policy model of node according to the sequence of flow chart Unit, and the implementing result of first node can be invoked at based on standard interface in posterior nodal point, to facilitate user based on plan Slightly model unit and connecting line generates the mode of risk control business process map to dispose risk control status, improves risk control The flexibility and efficiency of plan implementation processed.
In one embodiment, flow chart interface 501 may include increasing newly, cloning, checking, editing, issuing and bring a prisoner before the court, initiate The function choosing-items such as verifying, audit, search.When user's editing process figure, flow chart interface can be as shown in fig. 6,601 be component Area, the various assemblies including beginning, model, script, conditional branching, parallel branch and end node, model, script are section The mark of point.The attribute for the component that user chooses can be shown in component property area 602, and button area 604 provides storage, cuts It cuts, turn to, the function buttons such as size scaling.User can call each Policy model list using modes such as dragging or newly-built nodes Member is carried out the editor of flow chart in flow chart editing area 603, execution is realized using connecting line and conditional branching, parallel branch The control of sequence.
Such risk evaluating system further reduced what risk control business process map was built in a manner of visual Technical threshold improves the efficiency and user-friendliness of risk control policy deployment.
It in one embodiment, can as shown in fig. 7, risk evaluating system can also include flow chart generation module 703 Select multiple Policy model units with each node of determination according to business demand.Be arranged again the connection relationship between each node with Configuration strategy model unit executes sequence, so that complete risk control flow chart is generated, the completion risk control of convenience and high-efficiency Make the deployment of strategy.
Using such risk evaluating system, user by regulative strategy model unit and can configure its connection relationship Mode forms risk control business process map, improves the formation efficiency of risk control business process map, reduces to risk control The requirement of construction of strategy personnel programming levels processed improves the flexibility and efficiency of risk control status deployment.
In one embodiment, as shown in fig. 7, risk evaluating system can also include Policy model unit generation module 704, new Policy model unit can be generated using various means according to demand for user.
In one embodiment, the means for generating new Policy model unit can be the multiple risk assessment rules lifes of combination The Policy model unit of Cheng Xin, be also possible to existing Policy model unit carry out risk assessment rule addition, delete or Modification can also be and be imported complete Policy model unit etc. in the form of file, data flow etc..The input of Policy model unit is defeated Complying with standard interface requirement is needed out.
In one embodiment, Policy model unit may include that rule model, decision-tree model and user are customized One of Policy model is a variety of.Rule model may include the multiple risk assessment rules executed sequentially or parallel.Decision Tree-model may include the multiple risk assessment rules executed based on the selection of preset judgment condition.
For rule model, Policy model unit generation module 704 may include increase newly, modify, cloning, issue bring a prisoner before the court, Initiate the functions such as verifying, audit, search.For decision-tree model, Policy model unit generation module 704 may include increase newly, Editor, clone, addition child node, editor's child node, deletion child node, formula verification, publication bring a prisoner before the court, initiate to verify, audit, search The functions such as rope, wherein child node refer to a part being made of in decision-tree model one or more risk assessment rules or One branch.For the customized Policy model of user, Policy model unit generation module 704 may include increasing newly, modifying, issuing It brings a prisoner before the court, initiate the functions such as verifying, audit, download model algorithm file, search.
Such risk evaluating system can provide material abundant to establish risk control business process map, improve wind The scalability of dangerous assessment system improves the efficiency and flexibility of risk control policy deployment.
In one embodiment, as shown in fig. 7, risk evaluating system can also include risk assessment rule generation module 705, risk assessment rule can be generated using various means for user, such as import new risk assessment rule;Write new wind Danger assessment rule;New risk assessment rule etc. is generated by disassembling existing Policy model unit, wherein new risk assessment The input and output of rule need complying with standard interface requirement.Risk assessment rule generation module 705 may include increasing newly, repairing Change, issue and the functions such as bring a prisoner before the court, audit, verifying, searching for.In one embodiment, risk assessment rule can be with regular expression Mode present.
Such risk evaluating system can allow for generating new risk assessment rule, further improve risk assessment system The scalability of system and the flexibility of application.
In one embodiment, risk evaluating system can also include index parameter generation module, can using newly-built or The operations such as importing, modification generate index parameter.Index parameter includes the tested person's information and each strategy for risk assessment The parameters such as the weight of model unit.In one embodiment, additionally it is possible to which deletion, search operation are executed to index parameter.Risk control In the process of implementation, each Policy model unit can call index parameter to assess tested person to business process map processed.In this way Risk evaluating system can facilitate configuration tested person information, to improve the risk assessment efficiency to tested person.
In one embodiment, each risk control rule, Policy model unit and risk control flow chart all have Standard interface, thus facilitate workflow engine call standard interface between risk assessment rule, Policy model unit it Between and risk control business process map between, or in risk assessment rule, Policy model unit and risk control Business Stream Journey figure carries out data transmitting between each other, guarantees the smooth execution of risk control flow chart.
In one embodiment, risk evaluating system can also include system login module, the use that can be provided user Family log-on message carries out safety certification, and distributes and manage user right, so as to according to risk control business process map, tactful mould The use of the access attribute of type unit and risk assessment rule limitation user.
In one embodiment, system login interface can be pacified using CAS (Compare and Swap compares and exchanges) Full authentication function guarantees the safety of system.Risk control business process map, Policy model unit and risk assessment rule can With with access attribute, access attribute includes privately owned, open or the user of associated access authority is allowed to access.It belongs to not User with user right can check and comment using different risk control business process maps, Policy model unit and risk Estimate rule, to realize the data isolation between different user, guarantees the safety of user's risk control strategy newly developed.
In one embodiment, when carrying out risk assessment according to risk control business process map, Business Stream engine 702 is adjusted With the risk control business process map of flow chart interface 701, flow chart interface 701 calls the wherein associated strategy of each node Model unit.If Policy model unit is made of a plurality of risk assessment rule, the wind that Policy model cell call includes Danger assessment rule, while tested person's information being called to carry out risk assessment.
When user needs to generate risk control business process map, firstly, being generated by risk assessment rule generation module 705 Risk assessment rule, then 704 generation strategy model unit of Policy model unit generation module.703 base of flow chart generation module In Policy model building unit risk control business process map, and being generated by index parameter generation module includes that tested person's information exists Interior index parameter.
In one embodiment, if generating Policy model unit, risk assessment based on existing risk assessment rule Rule generation module 705 generates the process of new risk assessment rule without executing.If being based on existing Policy model unit structure Risk control business process map is built, then Policy model unit generation module 704 generates new Policy model unit without executing Process.User executes instruction in the sending of flow chart interface 701 after deployment more than completion, and Business Stream engine can be used and above be mentioned To any one methods of risk assessment execute the risk control business process map.
Such risk evaluating system can automatically parse risk control business process map, execute according to the sequence of flow chart Each associated Policy model unit of node, can further regulative strategy model unit include risk control rule, from And level calling is realized, it ensure that the smooth execution of risk control business process map.Meanwhile, it is capable to realize risk evaluating system Optimization, reduce system risk assessment rule and Policy model unit duplicate, redundancy a possibility that, also improve and be The scalability of system.
The structural schematic diagram of one embodiment of the risk evaluating system of the application is as shown in Figure 8.Risk evaluating system packet Include memory 810 and processor 820.Memory 810 can be disk, flash memory or other any non-volatile memory mediums.It deposits Reservoir is used to store the instruction in the above corresponding embodiment of any one methods of risk assessment.Processor 820, which is coupled to, to be deposited Reservoir 810 can be used as one or more integrated circuits to implement, such as microprocessor or microcontroller.The processor 820 is used In executing the instruction stored in memory, the flexibility and efficiency of risk control status deployment can be improved.
In one embodiment, as shown in figure 9, risk evaluating system 900 includes memory 910 and processor 920, processing Device 920 is coupled to memory 910 by BUS bus 930.The risk evaluating system 900 can also be connected by memory interface 940 To external memory 950 to call external data, network or one other can also be connected to by network interface 960 Computer system (not shown).Memory is used to store the finger in the above corresponding embodiment of any one methods of risk assessment It enables, processor 920 executes the instruction stored in memory, and specific signaling flow direction and data treatment process no longer carry out detailed herein It is thin to introduce.
In this embodiment, it is instructed by memory stores data, then above-metioned instruction is handled by processor, can be improved The flexibility and efficiency of risk control status deployment.
In one embodiment, the present invention also proposes a kind of computer readable storage medium, the computer-readable storage medium It is stored with computer program instructions in matter, any one risk assessment being mentioned above is realized when which is executed by processor Step in method corresponding embodiment.It should be understood by those skilled in the art that, the available embodiment of the application include method, Device or computer program product.Therefore, the application can be used complete hardware embodiment, complete software embodiment or combine soft The form of the embodiment of part and hardware aspect is presented.Moreover, it wherein includes computer that the application, which can be used in one or more, The computer of usable program code can (including but not limited to magnetic disk storage, CD-ROM, optics be deposited with non-transient storage medium Reservoir etc.) on the form of computer program product implemented present.
The application is reference according to the method for the embodiment of the present application, the flow chart of equipment (system) and computer program product And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
So far, the application is described in detail.In order to avoid covering the design of the application, it is public that this field institute is not described The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein Scheme.
The present processes and device may be achieved in many ways.For example, can by software, hardware, firmware or Person's software, hardware, firmware any combination realize the present processes and device.The step of for the method it is above-mentioned Sequence is merely to be illustrated, and the step of the present processes is not limited to sequence described in detail above, unless with other sides Formula illustrates.In addition, in some embodiments, the application can be also embodied as recording program in the recording medium, these Program includes for realizing according to the machine readable instructions of the present processes.Thus, the application also covers storage for executing According to the recording medium of the program of the present processes.
Finally it should be noted that: above embodiments are only to illustrate the technical solution of the application rather than its limitations;To the greatest extent Pipe is described in detail the application referring to preferred embodiment, it should be understood by those ordinary skilled in the art that: still It can modify to the specific embodiment of the application or some technical features can be equivalently replaced;Without departing from this Shen Please technical solution spirit, should all cover in the claimed technical proposal scope of the application.

Claims (21)

1. a kind of methods of risk assessment, comprising:
Step i) parses risk control business process map, and the risk control business process map includes node and connecting line, described Node is associated with Policy model unit, and the connecting line mark node executes sequence;
Step ii) Policy model unit associated with present node is called, the Policy model unit is based on predetermined estimation plan Risk assessment slightly is carried out to tested person, exports risk assessment parameter;
Step iii) the risk assessment parameter of present node output is stored in variable pond to be used in posterior nodal point;
Repeat step i)-iii), until all nodes in the risk control business process map are carried out and finish, export Tested person's risk evaluation result.
2. according to the method described in claim 1, wherein, the Policy model unit is based on standard interface from the variable pond The middle risk assessment parameter for obtaining first node output.
3. according to the method described in claim 1, wherein,
If first node is not present in the present node, the Policy model unit is based on predetermined estimation strategy, according to tested People's information carries out risk assessment to tested person, exports risk assessment parameter;
If there are first nodes for the present node, the Policy model unit is based on predetermined estimation strategy, according to tested person Information and/or the risk assessment parameter of first node output carry out risk assessment to tested person, export risk assessment parameter.
4. according to the method described in claim 1, the risk control business process map generates in the following way:
Multiple Policy model units are selected according to business demand, with each node of determination;
Connection relationship between each node is set, to determine the connecting line for identifying each Policy model unit execution sequence.
5. method described in any one according to claim 1~4, wherein
Execution sequence include sequence execute, execute and select parallel it is in execution one or more, in selection execution In, according to tested person's information and/or the risk assessment parameter selection node to be executed of first node output.
6. method described in any one according to claim 1~4, wherein
If the Policy model unit is hard conditions risk assessment unit, determine risk assessment not in the Policy model unit In the case where, terminate to execute the risk control flow chart, output risk assessment does not pass through.
7. according to the method described in claim 1, wherein, the Policy model unit includes rule model and/or decision tree mould Type,
The rule model includes the multiple risk assessment rules executed sequentially or parallel,
The decision-tree model includes the multiple risk assessment rules executed based on the selection of preset judgment condition.
8. according to the method described in claim 7, wherein,
The risk assessment rule includes the simple judgment rule that risk assessment is carried out to the tested person.
9. method according to claim 7 or 8, wherein it includes following for generating the mode of the new Policy model unit One of mode is a variety of:
New Policy model unit is generated by combining multiple risk assessment rules;
The addition of risk assessment rule is carried out to the existing Policy model unit, is deleted or modified, new tactful mould is generated Type unit;
Import complete Policy model unit, input and output the complying with standard interface requirement of the Policy model unit.
10. method according to claim 7 or 8, wherein the mode for generating new risk assessment rule includes following manner One of or it is a variety of:
Import new risk assessment rule;
Write new risk assessment rule;
New risk assessment rule is generated by disassembling the existing Policy model unit;
Wherein, the input and output of the new risk assessment rule meet the standard interface requirement.
11. method according to claim 7 or 8, wherein
If the risk assessment rule is rigid risk assessment rule, determine that risk assessment does not pass through in the risk assessment rule In the case where, terminate to execute the Policy model unit, output risk assessment does not pass through.
12. method according to claim 7 or 8, wherein the Policy model unit further includes the customized tactful mould of user Type, input and output the complying with standard interface requirement of the Policy model unit.
13. according to the method for claim 12, wherein the customized Policy model of user includes Random Forest model And/or grad enhancement decision tree GBDT model.
14. method according to claim 7 or 8, wherein
The risk control business process map, the Policy model unit and/or the risk assessment rule have access attribute, The access attribute includes privately owned, open or the user of associated access authority is allowed to access.
15. a kind of risk evaluating system, including requiring methods of risk assessment described in 1~14 any one for perform claim Device.
16. a kind of risk evaluating system, comprising:
Flow chart interface, for showing risk control business process map, the risk control business process map includes node and company Wiring, the node is associated with Policy model unit, and the connecting line mark node executes sequence;
Business Stream engine executes the risk control for methods of risk assessment described in any one according to claim 1~14 Business process map processed exports tested person's risk evaluation result.
17. system according to claim 16 further includes flow chart generation module, described in generating in the following way Risk control business process map:
Multiple Policy model units are selected according to business demand, with each node of determination;
Connection relationship between each node is set, to determine the connecting line for the execution sequence for identifying each Policy model unit.
18. system according to claim 17 further includes Policy model unit generation module, used in the following manner One or more generation strategy model units:
New Policy model unit is generated by combining multiple risk assessment rules;
The addition of risk assessment rule is carried out to existing Policy model unit, is deleted or modified, new Policy model list is generated Member;
Complete Policy model unit is imported, input and output the complying with standard interface requirement of the Policy model unit imported.
19. system according to claim 18 further includes risk assessment rule generation module, used in the following manner One or more generation risk assessment rules:
Import new risk assessment rule;
Write new risk assessment rule;
New risk assessment rule is generated by disassembling the existing Policy model unit;
Wherein, input and output the complying with standard interface requirement of the new risk assessment rule.
20. a kind of risk evaluating system, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to based on the instruction execution for being stored in the memory Such as the described in any item methods of claim 1 to 14.
21. a kind of computer readable storage medium, is stored thereon with computer program instructions, real when which is executed by processor The step of method described in existing claim 1 to 14 any one.
CN201710695344.2A 2017-08-15 2017-08-15 Methods of risk assessment and system Pending CN109409892A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710695344.2A CN109409892A (en) 2017-08-15 2017-08-15 Methods of risk assessment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710695344.2A CN109409892A (en) 2017-08-15 2017-08-15 Methods of risk assessment and system

Publications (1)

Publication Number Publication Date
CN109409892A true CN109409892A (en) 2019-03-01

Family

ID=65454046

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710695344.2A Pending CN109409892A (en) 2017-08-15 2017-08-15 Methods of risk assessment and system

Country Status (1)

Country Link
CN (1) CN109409892A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110189220A (en) * 2019-05-09 2019-08-30 天创信用服务有限公司 A kind of risk analysis decision-making technique, device, system and storage medium
CN110349013A (en) * 2019-07-12 2019-10-18 蔷薇智慧科技有限公司 Risk control method and device
CN110400219A (en) * 2019-06-14 2019-11-01 阿里巴巴集团控股有限公司 Method for processing business and system, transaction monitoring method and system
CN110458412A (en) * 2019-07-16 2019-11-15 阿里巴巴集团控股有限公司 The generation method and device of risk monitoring and control data
CN110704045A (en) * 2019-09-20 2020-01-17 凡普数字技术有限公司 Method and device for constructing decision flow and storage medium
CN110992045A (en) * 2019-11-15 2020-04-10 安徽海汇金融投资集团有限公司 Method and system for monitoring abnormal risk of transfer of accounts receivable and debt right
CN111311392A (en) * 2020-03-17 2020-06-19 深圳市随手金服信息科技有限公司 Wind control decision method, device, server and storage medium
CN111324357A (en) * 2020-02-11 2020-06-23 支付宝(杭州)信息技术有限公司 Method for accessing application program to wind control platform and related equipment
CN111563254A (en) * 2020-05-07 2020-08-21 中国工商银行股份有限公司 Threat risk processing method and apparatus for product, computer system and medium
CN112149951A (en) * 2020-08-11 2020-12-29 招联消费金融有限公司 Risk control method and device, computer equipment and storage medium
CN112633619A (en) * 2019-10-08 2021-04-09 阿里巴巴集团控股有限公司 Risk assessment method and device
CN113344695A (en) * 2021-06-21 2021-09-03 支付宝(杭州)信息技术有限公司 Elastic wind control method, device, equipment and readable medium
CN113657779A (en) * 2021-08-20 2021-11-16 杭州时趣信息技术有限公司 Dynamically-configured wind control decision method, system, equipment and storage medium
CN113762671A (en) * 2020-09-15 2021-12-07 北京同邦卓益科技有限公司 Risk assessment method, device and system
CN114066584A (en) * 2021-11-05 2022-02-18 支付宝(杭州)信息技术有限公司 Method and device for risk prevention and control of block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040267660A1 (en) * 2003-02-21 2004-12-30 Automated Financial Systems, Inc. Risk management system
CN101930585A (en) * 2010-09-01 2010-12-29 中国建设银行股份有限公司 Credit business risk monitoring system and method thereof
CN105469308A (en) * 2015-12-24 2016-04-06 安徽融信金模信息技术有限公司 Financing risk evaluation system and method of middle and small-sized enterprises
CN105894369A (en) * 2015-01-04 2016-08-24 必普(上海)金融信息服务有限公司 Risk assessment model for internet financial network loan platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040267660A1 (en) * 2003-02-21 2004-12-30 Automated Financial Systems, Inc. Risk management system
CN101930585A (en) * 2010-09-01 2010-12-29 中国建设银行股份有限公司 Credit business risk monitoring system and method thereof
CN105894369A (en) * 2015-01-04 2016-08-24 必普(上海)金融信息服务有限公司 Risk assessment model for internet financial network loan platform
CN105469308A (en) * 2015-12-24 2016-04-06 安徽融信金模信息技术有限公司 Financing risk evaluation system and method of middle and small-sized enterprises

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110189220A (en) * 2019-05-09 2019-08-30 天创信用服务有限公司 A kind of risk analysis decision-making technique, device, system and storage medium
CN110400219A (en) * 2019-06-14 2019-11-01 阿里巴巴集团控股有限公司 Method for processing business and system, transaction monitoring method and system
CN110400219B (en) * 2019-06-14 2024-05-17 创新先进技术有限公司 Service processing method and system, and transaction monitoring method and system
CN110349013A (en) * 2019-07-12 2019-10-18 蔷薇智慧科技有限公司 Risk control method and device
CN110458412A (en) * 2019-07-16 2019-11-15 阿里巴巴集团控股有限公司 The generation method and device of risk monitoring and control data
CN110704045A (en) * 2019-09-20 2020-01-17 凡普数字技术有限公司 Method and device for constructing decision flow and storage medium
CN112633619A (en) * 2019-10-08 2021-04-09 阿里巴巴集团控股有限公司 Risk assessment method and device
CN110992045A (en) * 2019-11-15 2020-04-10 安徽海汇金融投资集团有限公司 Method and system for monitoring abnormal risk of transfer of accounts receivable and debt right
CN110992045B (en) * 2019-11-15 2024-03-22 安徽海汇金融投资集团有限公司 Method and system for monitoring abnormal risk of account-receivables and right-of-way flows
CN111324357A (en) * 2020-02-11 2020-06-23 支付宝(杭州)信息技术有限公司 Method for accessing application program to wind control platform and related equipment
CN111324357B (en) * 2020-02-11 2022-06-28 支付宝(杭州)信息技术有限公司 Method for accessing application program to wind control platform and related equipment
CN111311392A (en) * 2020-03-17 2020-06-19 深圳市随手金服信息科技有限公司 Wind control decision method, device, server and storage medium
CN111563254A (en) * 2020-05-07 2020-08-21 中国工商银行股份有限公司 Threat risk processing method and apparatus for product, computer system and medium
CN111563254B (en) * 2020-05-07 2024-05-07 中国工商银行股份有限公司 Threat risk processing method and apparatus for product, computer system, and medium
CN112149951A (en) * 2020-08-11 2020-12-29 招联消费金融有限公司 Risk control method and device, computer equipment and storage medium
CN113762671A (en) * 2020-09-15 2021-12-07 北京同邦卓益科技有限公司 Risk assessment method, device and system
CN113344695A (en) * 2021-06-21 2021-09-03 支付宝(杭州)信息技术有限公司 Elastic wind control method, device, equipment and readable medium
CN113657779A (en) * 2021-08-20 2021-11-16 杭州时趣信息技术有限公司 Dynamically-configured wind control decision method, system, equipment and storage medium
CN113657779B (en) * 2021-08-20 2024-01-09 杭州时趣信息技术有限公司 Dynamic configuration wind control decision method, system, equipment and storage medium
CN114066584A (en) * 2021-11-05 2022-02-18 支付宝(杭州)信息技术有限公司 Method and device for risk prevention and control of block chain

Similar Documents

Publication Publication Date Title
CN109409892A (en) Methods of risk assessment and system
US10169215B2 (en) Method and system for analyzing test cases for automatically generating optimized business models
De Leoni et al. Data-aware process mining: discovering decisions in processes using alignments
Buijs Flexible evolutionary algorithms for mining structured process models
CN102449598B (en) Bag design and generation
US11048762B2 (en) User-defined automated document feature modeling, extraction and optimization
CN108322473A (en) User behavior analysis method and apparatus
CN110349000A (en) Method, apparatus and electronic equipment are determined based on the volume strategy that mentions of tenant group
CN109922032A (en) Method and apparatus for determining the risk of logon account
CN109063952B (en) Policy generation and risk control method and device
US20150134424A1 (en) Systems and methods for assessing hybridization of cloud computing services based on data mining of historical decisions
US20090138248A1 (en) Linked decision nodes in a business process model
CN106909543A (en) The method for mode matching and device of a kind of regulation engine
US20210209505A1 (en) Parametric modeling and simulation of complex systems using large datasets and heterogeneous data structures
CN108921600A (en) Realize the device and method and storage medium of information classification
AU2012201529A1 (en) MVT optimization of business process modeling and management
CN110189220A (en) A kind of risk analysis decision-making technique, device, system and storage medium
CN109345379A (en) A kind of intelligence credit method and apparatus
KR20060070609A (en) Apparatus and method for product-line architecture description and verification
CN110415103A (en) The method, apparatus and electronic equipment that tenant group mentions volume are carried out based on variable disturbance degree index
CN109800401A (en) Information report automatic generation method and device
Zekos Political, economic and legal effects of artificial intelligence
Ouchani et al. A probabilistic verification framework of SysML activity diagrams
CN102364440A (en) System for establishing software demand model and method for establishing software demand model
CN109255389A (en) A kind of equipment evaluation method, device, equipment and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190301