WO2021184211A1 - Procédé et appareil d'évaluation de risques, dispositif électronique et support de stockage - Google Patents

Procédé et appareil d'évaluation de risques, dispositif électronique et support de stockage Download PDF

Info

Publication number
WO2021184211A1
WO2021184211A1 PCT/CN2020/079761 CN2020079761W WO2021184211A1 WO 2021184211 A1 WO2021184211 A1 WO 2021184211A1 CN 2020079761 W CN2020079761 W CN 2020079761W WO 2021184211 A1 WO2021184211 A1 WO 2021184211A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
risk
feature
evaluation
score
Prior art date
Application number
PCT/CN2020/079761
Other languages
English (en)
Chinese (zh)
Inventor
程肯
Original Assignee
深圳市欢太科技有限公司
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市欢太科技有限公司, Oppo广东移动通信有限公司 filed Critical 深圳市欢太科技有限公司
Priority to PCT/CN2020/079761 priority Critical patent/WO2021184211A1/fr
Priority to CN202080096711.7A priority patent/CN115088007A/zh
Publication of WO2021184211A1 publication Critical patent/WO2021184211A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the embodiments of the present application relate to computer technology, and in particular to a risk assessment method, device, electronic equipment, and storage medium.
  • electronic devices perform risk assessment on tasks to be performed to solve safety problems caused by the diversified functions of electronic devices.
  • risk assessment of tasks to be performed requires manual manual operations, such as manual manual assessment of task data and warnings to users who perform high-risk services.
  • the subjectiveness of the assessment criteria leads to low risk assessment accuracy.
  • This application provides a risk assessment method, device, electronic equipment, and storage medium, which can improve the accuracy of risk assessment.
  • an embodiment of the present application provides a risk assessment method, including:
  • Score the data to be evaluated according to the first feature vector and the first risk evaluation model to obtain a first evaluation score
  • Score the data to be evaluated according to the first feature vector and the second risk evaluation model to obtain a second evaluation score
  • the target risk type of the data to be evaluated is determined.
  • an embodiment of the present application also provides a risk assessment device, including:
  • the first acquisition module is configured to acquire the data to be evaluated, and extract the first feature vector from the data to be evaluated through a feature extraction algorithm
  • the first scoring module is configured to score the data to be evaluated according to the first feature vector and the first risk evaluation model to obtain a first evaluation score
  • the second scoring module is configured to score the data to be evaluated according to the first feature vector and the second risk evaluation model to obtain a second evaluation score
  • the determining module is configured to determine the target risk type of the data to be evaluated according to the first evaluation score and the second evaluation score.
  • an embodiment of the present application also provides an electronic device, including: a processor, a memory, and a computer program stored in the memory and running on the processor, and the processor implements the risk when the computer program is executed. assessment method:
  • Score the data to be evaluated according to the first feature vector and the first risk evaluation model to obtain a first evaluation score
  • Score the data to be evaluated according to the first feature vector and the second risk evaluation model to obtain a second evaluation score
  • the target risk type of the data to be evaluated is determined.
  • an embodiment of the present application also provides a storage medium containing executable instructions of an electronic device.
  • the executable instructions of the electronic device are used to perform the risk assessment described in the embodiments of the present application when executed by the processor of the electronic device. method.
  • Fig. 1 is a schematic diagram of a first scenario of a risk assessment method provided by an embodiment of the present application.
  • Fig. 2 is a schematic diagram of a second scenario of a risk assessment method provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of the first process of a risk assessment method provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a third scenario of a risk assessment method provided by an embodiment of the present application.
  • Fig. 5 is a schematic structural diagram of a self-encoder provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of the second process of the risk assessment method provided by the embodiment of the present application.
  • Fig. 7 is a schematic structural diagram of a risk assessment device provided by an embodiment of the present application.
  • FIG. 8 is a first structural schematic diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a second structure of an electronic device provided by an embodiment of the present application.
  • the embodiment of the present application provides a risk assessment method, which is applied to an electronic device.
  • the execution subject of the risk assessment method may be the risk assessment device provided in the embodiment of the present application, or an electronic device integrated with the risk assessment device.
  • the risk assessment device may be implemented in hardware or software, and the electronic device may be a smart device. Mobile phones, tablet computers, handheld computers, notebook computers, or desktop computers are equipped with processors and have processing capabilities.
  • FIG. 1 is a schematic diagram of a first scenario of a risk assessment method provided by an embodiment of the application.
  • the client detects a payment request based on payment task A triggered by the user, the client sends a payment request for payment task A to the server.
  • the server After receiving the payment request sent by the client, the server combines the first risk assessment model and the second risk assessment model to perform risk assessment on payment task A. If the risk of payment task A is not high, the server responds to the payment request of payment task A, processes payment task A, and sends a "payment successful" notification to the client. If the risk of payment task A is high, in order to improve security, the server prohibits responding to the payment request of payment task A and sends an identity verification request to the client.
  • FIG. 2 is a schematic diagram of a second scenario of the risk assessment method provided by an embodiment of the application.
  • the client terminal detects a payment request based on the payment task B triggered by the user, the client terminal performs risk assessment on the payment task B in combination with the first risk assessment model and the second risk assessment model. If the risk of payment task B is not high, the client sends the payment request of payment task B to the server, so that the server can process payment task B according to the payment request. If the risk of payment task B is high, the client requires the user to reconfirm whether payment task B is executed, and requires the user to provide identity verification. After the user reconfirms and the identity verification is qualified, the client sends the payment request of payment task B to the server, so that the server can process payment task B according to the payment request.
  • FIG. 3 is a schematic diagram of the first process of the risk assessment method provided by an embodiment of the application.
  • the process of this risk assessment method is as follows:
  • the electronic device when a task to be executed is detected, the electronic device obtains the data to be evaluated corresponding to the task to be executed, and extracts the first feature vector from the data to be evaluated through a feature extraction algorithm for the risk assessment model to perform risk scoring .
  • the task to be performed is different, and the corresponding data to be evaluated is also different.
  • the to-be-evaluated data corresponding to the to-be-executed task "application A's membership recharge” is different from the to-be-evaluated data corresponding to the to-be-executed task "download application A”.
  • the data to be evaluated may be multi-dimensional data, and the data to be evaluated includes at least task data, account data, and device data.
  • the data to be evaluated corresponding to the task to be performed includes at least task data (e.g., downloaded application name, download time, download location, etc.), account data (e.g., total number of account logins to the app store, account login to the app store) The collection of time, the collection of login locations for the account to log in to the application store, the total number of times the account has downloaded applications, the type of applications downloaded by the account, etc.), device data (such as the total number of device logins to the application store, the collection of time devices log in to the application store) , The set of login locations where the device logs in to the application store, the total number of times the device has downloaded applications, the type of applications downloaded by the device, etc.).
  • task data e.g., downloaded application name, download time, download location, etc.
  • account data e.g., total number of account logins to the app store, account login to the app store
  • the collection of time e.g., the collection of login locations for the account to log in to the application store,
  • multiple accounts can be logged in to the same device, and one account can also be logged in to multiple devices. Therefore, when the electronic device obtains the data to be evaluated, it obtains both the account data and the device data, which can make the data to be evaluated more comprehensive, thereby improving the accuracy of the risk assessment.
  • the feature extraction algorithm is used to extract features from the data and generate feature vectors based on the features. For example, suppose that an electronic device extracts 1,000 features from the data to be evaluated through a feature extraction algorithm, and then generates a 1,000-dimensional first feature vector based on the 1,000 features for risk assessment by the risk assessment model.
  • the electronic device cleans and completes the data to be evaluated, and then uses a feature extraction algorithm to extract the first feature vector from the processed data to be evaluated.
  • the electronic device after obtaining the first feature vector, inputs the first feature vector into the first risk assessment model, and scores the data to be assessed through the first risk assessment model to obtain the first assessment score.
  • the first risk assessment model uses an unsupervised algorithm, which can be used to score the risk of the data to be assessed.
  • the first risk assessment model can be obtained by training a pre-built cluster analysis model.
  • the first risk assessment model can be obtained by training a pre-built isolated forest model.
  • the first risk assessment model may also be another model that can perform risk scoring on the data to be assessed through an unsupervised algorithm, which is not specifically limited in the embodiment of the present application.
  • the electronic device after obtaining the first feature vector, inputs the first feature vector into the second risk assessment model, and scores the data to be assessed through the second risk assessment model to obtain the second assessment score.
  • the second risk assessment model uses a supervised algorithm, which can be used to score the risk of the data to be assessed.
  • the second risk assessment model can be obtained by training a pre-built classification model.
  • the second risk assessment model can be obtained by training a neural network model built in advance.
  • the second risk assessment model may also be another model that can perform risk scoring on the data to be assessed through a supervised algorithm, which is not specifically limited in the embodiment of the present application.
  • the electronic device may determine the target evaluation score of the data to be evaluated according to the first evaluation score and the second evaluation score, and then set the target evaluation score corresponding to a preset The risk type is determined as the target risk type of the data to be evaluated.
  • the electronic device may use the sum of the first evaluation score and the second evaluation score as the target evaluation score of the data to be evaluated.
  • the electronic device may determine the first weight coefficient corresponding to the first evaluation score and the corresponding value corresponding to the second evaluation score according to the type of the data to be evaluated.
  • the second weight coefficient Based on the first weight coefficient, the second weight coefficient, the first evaluation score, and the second evaluation score, the target evaluation score of the data to be evaluated is calculated.
  • the first weight coefficient corresponding to the first assessment score is greater than the second assessment score corresponding to the second Weight coefficient.
  • the first weight coefficient corresponding to the first assessment score is smaller than the second weight coefficient corresponding to the second assessment score .
  • the electronic device may directly determine the target risk type of the data to be evaluated according to the first evaluation score.
  • the value range of the first assessment score is between 0 and 1. The smaller the first evaluation score, the lower the risk degree of the target risk type of the data to be evaluated, and the larger the first evaluation score, the higher the risk degree of the target risk type of the data to be evaluated.
  • the electronic device may directly determine the target risk type of the data to be evaluated according to the second evaluation score. For example, when the second risk assessment model is trained by a pre-built classification model, the size of the second assessment score is positively correlated or negatively correlated with the risk degree of the target risk type of the data to be evaluated.
  • the electronic device scores the evaluation data in two ways: the first risk evaluation model is used to score the evaluation data, the second risk evaluation model is used to score the evaluation data, and finally the two methods are combined. Method of scoring results to comprehensively determine the target risk type of the data to be assessed, which can improve the accuracy of risk assessment.
  • FIG. 4 is a schematic diagram of a third scenario of a risk assessment method provided by an embodiment of the application.
  • the electronic device may perform the following:
  • the encoding algorithm is used to encode the feature vector, so that the vector elements of the feature vector are changed from discrete features to continuous features.
  • the encoding algorithm in this solution is based on pre-built autoencoder (AE) training.
  • the electronic device obtains multiple sample vectors to form the first training set. Then use the first training set to train the autoencoder to update the model parameters of the autoencoder. Finally, based on the encoder in the autoencoder after updating the model parameters, an encoding algorithm is constructed.
  • the self-encoder includes an encoder (encoder) and a decoder (decoder).
  • FIG. 5 is a schematic structural diagram of a self-encoder according to an embodiment of the application.
  • the autoencoder will perform encoding and decoding operations on each sample vector X.
  • the encoding operation refers to mapping the sample vector X to the feature space through the encoder to obtain the abstract feature vector Z.
  • Decoding operation refers to mapping the abstract feature vector Z back to the original space through the decoder to obtain the reconstructed vector It is understandable that when the sample vector X and the reconstruction vector When the error of is the smallest, the autoencoder training is completed.
  • an encoding algorithm is used to convert the eigenvectors whose vector elements are discrete features into eigenvectors whose vector elements are continuous features. Make it suitable for risk scoring using the first risk assessment model, thereby improving the accuracy of risk assessment.
  • FIG. 6 is a schematic diagram of the second process of the risk assessment method provided by the embodiment of the application.
  • the process of this risk assessment method is as follows:
  • the first numerical feature refers to a feature represented by a numerical value.
  • the electronic device uses a feature extraction algorithm to extract the feature of "the number of times the device downloads the application C: 5" to obtain the first numerical feature: "5".
  • the text feature refers to the feature represented by the text.
  • the electronic device uses the feature extraction algorithm to extract the feature of "the location where the device downloads the application C: Beijing" to obtain the text feature: "Beijing".
  • the purpose of the normalization processing is to normalize the value representing the first numerical feature, so that the value representing the first numerical feature is within a specified numerical range (for example, within a numerical range of 0 to 1).
  • the purpose of the conversion process in this solution is to convert text features into second numerical features.
  • the second numerical characteristic also refers to a characteristic expressed by a numerical value.
  • an electronic device converts the text feature "Beijing” into a second numerical feature, it determines whether the electronic device is located in Beijing. If the electronic device is located in Beijing, it converts the text feature "Beijing" into a second numerical feature: " 1", if the electronic device is not located in Beijing, the text feature "Beijing" is converted into a second numerical feature: "0".
  • the electronic device after obtaining the first numerical feature and the second numerical feature, the electronic device generates the first feature vector according to the preset order of each feature according to the first numerical feature and the second numerical feature.
  • the electronic device obtains 2 first numerical characteristics and 1 second numerical characteristic.
  • the two first numerical features are respectively: 0.05 (obtained from the number of times the account has downloaded application D "5"), 0.1 (obtained from the number of account logins "100"), and one second numerical characteristic is: 1 (by downloading Get the location "Beijing").
  • the preset order of the first numerical feature "0.05” is 2.
  • the preset order of the first numerical feature "0.1” is 1, and the preset order of the second numerical feature "1" is 3.
  • the first feature vector generated by the electronic device is (0.1, 0.05, 1).
  • the electronic device determines the weight value corresponding to each vector element in the second risk assessment model according to the arrangement order of the vector elements in the first feature vector. For example, for vector elements arranged in the second dimension in the first feature vector, their corresponding weight values in the second risk assessment model are also arranged in the second dimension.
  • the weight value can represent the importance of the feature represented by the vector element.
  • the larger the weight value the more important the feature represented by the vector element.
  • the smaller the weight value the less important the feature represented by the vector element.
  • the weight value corresponding to each vector element in the second risk assessment model can represent the importance of the feature represented by the vector element.
  • the size of each vector element is adjusted according to the size of the corresponding weight value.
  • the electronic device can increase the value of the vector element so that the vector element can be distinguished from other vector elements.
  • the electronic device may increase the value of the preset number of vector elements with the largest corresponding weight value. For example, assuming that the weight values corresponding to 7 vector elements are recorded as: 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, and the preset number is 3, the electronic device sets the vector element corresponding to the weight value 0.5 and the vector element corresponding to 0.6 The value of the vector element corresponding to 0.7 increases.
  • the preset number is preset in the electronic device, and the preset number can be determined autonomously by the electronic device or manually determined by the user.
  • the electronic device after obtaining the third feature vector, inputs the third feature vector into the first risk assessment model, and scores the data to be assessed through the first risk assessment model to obtain the first assessment score.
  • the electronic device After obtaining the third feature vector, the electronic device inputs the third feature vector into the first risk assessment model to determine the average path length corresponding to each vector element in the second risk assessment model, according to the average path length of each vector element , Get and output the first evaluation score.
  • the first risk assessment model includes at least two isolated trees. The number of nodes traversed by a vector element in each isolated tree is used as the path length of the vector element in the isolated tree.
  • the average path length corresponding to the vector elements in the second risk assessment model is the average of the path lengths of the vector elements in each isolated tree.
  • the electronic device may use the sub-score obtained based on the vector element as an important component of the first evaluation score.
  • the electronic device after obtaining the first feature vector, inputs the first feature vector into the second risk assessment model, and scores the data to be assessed through the second risk assessment model to obtain the second assessment score.
  • the electronic device After obtaining the first feature vector, the electronic device inputs the first feature vector into the second risk assessment model, and then, according to the arrangement order of the vector elements in the first feature vector, determines the corresponding value of each vector element in the second risk assessment model.
  • the weight value is weighted and summed based on the weight value and the vector elements to obtain and output the second evaluation score.
  • the electronic device may determine the target evaluation score of the data to be evaluated according to the first evaluation score and the second evaluation score, and then set the target evaluation score to a preset
  • the risk type is determined as the target risk type of the data to be evaluated.
  • the electronic device may execute the task to be performed corresponding to the data to be evaluated.
  • the electronic device may prohibit the task to be performed corresponding to the data to be evaluated, and output prompt information to the user, such as a prompt message of "the task to be performed has a high risk level".
  • the electronic device before processing the task to be performed, the electronic device first performs risk assessment through the to-be-evaluated data corresponding to the task to be performed, and executes the task to be performed when the risk level is lower than or equal to the preset level When the risk level is higher than the preset level, the execution of the task to be performed is prohibited and the prompt information is output to the user, which can improve the safety of the electronic device.
  • the second risk assessment model is a classification model
  • the electronic device may also perform the following:
  • the specific implementation manner of extracting the fourth feature vector from the sample evaluation data through the feature extraction algorithm can refer to the above specific implementation manner of extracting the first feature vector from the data to be evaluated through the feature extraction algorithm. It should be noted that a fourth feature vector can be extracted from one sample evaluation data. A fourth feature vector corresponds to a sample risk type.
  • the method for obtaining the sample risk type in this solution is not specifically limited in the embodiment of the present application.
  • the electronic device can obtain the sample risk type by receiving the sample risk type set by the user for the sample evaluation data.
  • the electronic device can automatically determine the sample risk type of the sample evaluation data, etc.
  • the electronic device when acquiring the sample risk type of each sample evaluation data, the electronic device may perform the following:
  • the sample assessment data is scored to obtain the third assessment score, and the sample risk type of the sample assessment data is determined according to the third assessment score.
  • the electronic device automatically determines the sample risk type of the sample evaluation data through the first risk assessment model, which can reduce manual operations and save the time for determining the sample risk type, thereby shortening the training time of the second risk assessment model and increasing the second risk Evaluate the training efficiency of the model.
  • the first risk assessment model automatically determines the sample risk type of the sample assessment data, which improves the training efficiency of the second risk assessment model.
  • the electronic device can train the second risk assessment model in a short time. For example, the electronic device trains the second risk assessment model every preset time interval (for example, 30 minutes), thereby improving the real-time performance of the second risk assessment model.
  • the electronic device when determining the sample risk type of the sample evaluation data according to the third evaluation score, the electronic device may perform the following:
  • the sample risk type set by the user for the sample evaluation data is acquired.
  • the electronic device presets at least two preset intervals. Different preset intervals correspond to different sample risk types.
  • the sample risk type corresponding to the preset interval of the third evaluation score is the sample risk type of the sample evaluation data.
  • the electronic device is setting the preset When setting the interval, only the third evaluation score of the corresponding sample risk type is considered stable. For the third evaluation score that corresponds to the unstable risk type of the sample, the user manually determines the risk type of the sample.
  • the training effect of the second risk assessment model can be improved, and the training efficiency of the second risk assessment model can be improved to a certain extent.
  • the sample risk types include non-risk types and risky types.
  • the first risk assessment model is trained by the pre-built isolated forest model, and the value range of the third assessment score is 0 to 1. Because the sample evaluation data with the third evaluation score near 0.5 is difficult to distinguish between the risk-free type and the risky type, the preset interval preset by the electronic device includes the risk-free interval (such as [0, 0.2]) and the risky interval (such as [0.8, 1]).
  • FIG. 7 is a schematic structural diagram of a risk assessment device provided by an embodiment of the present application.
  • the device is used to implement the risk assessment method provided in the above-mentioned embodiment, and has functional modules and beneficial effects corresponding to the execution method.
  • the risk assessment device 300 specifically includes: a first obtaining module 301, a first scoring module 302, a second scoring module 303, and a determining module 304, wherein:
  • the first acquisition module 301 is configured to acquire data to be evaluated, and extract a first feature vector from the data to be evaluated by a feature extraction algorithm;
  • the first scoring module 302 is configured to score the data to be evaluated according to the first feature vector and the first risk evaluation model to obtain a first evaluation score
  • the second scoring module 303 is configured to score the data to be evaluated according to the first feature vector and the second risk evaluation model to obtain a second evaluation score
  • the determining module 304 is configured to determine the target risk type of the data to be evaluated according to the first evaluation score and the second evaluation score.
  • the data to be evaluated is scored according to the first feature vector and the first risk assessment model, and when the first evaluation score is obtained, the first scoring module 302 may be used to:
  • Score the data to be assessed based on the second feature vector and the first risk assessment model to obtain a first assessment score.
  • the first acquisition module 301 may be used to:
  • a first feature vector is generated.
  • the first risk assessment model is obtained by training a pre-built isolated forest model, and the second risk assessment model is obtained by a pre-built classification model;
  • the data to be evaluated is scored, and when the first evaluation score is obtained, the first scoring module 302 can be used to:
  • the weight value corresponding to each vector element in the second risk assessment model is determined, wherein the vector element includes the first numerical feature and the second Numerical characteristics;
  • the third feature vector and the first risk assessment model score the data to be assessed to obtain a first assessment score.
  • the first scoring module 302 when adjusting the size of each vector element according to the size of the corresponding weight value, the first scoring module 302 may be used to:
  • the risk evaluation device 300 after determining the target risk type of the data to be evaluated according to the first evaluation score and the second evaluation score, the risk evaluation device 300 further includes:
  • the execution module is configured to execute the task to be executed corresponding to the data to be evaluated when the risk level of the target risk type is lower than or equal to the preset level.
  • the second risk assessment model is a classification model
  • the risk assessment device 300 further includes:
  • the second acquisition module is used to acquire multiple sample evaluation data
  • An extraction module configured to extract a fourth feature vector from the sample evaluation data through the feature extraction algorithm
  • the third acquisition module is used to acquire the sample risk type of each sample evaluation data, and form a training set according to the fourth feature vector and the sample risk type;
  • the training module is configured to use the training set to train the classification model to update the model parameters of the classification model.
  • the third obtaining module when obtaining the sample risk type of each sample evaluation data, the third obtaining module may be used to:
  • the sample assessment data is scored to obtain a third assessment score, and the sample risk type of the sample assessment data is determined according to the third assessment score.
  • the third acquisition module when determining the sample risk type of the sample evaluation data according to the third evaluation score, the third acquisition module may be used to:
  • the first acquisition module 301 acquires the data to be evaluated, and extracts the first feature vector from the data to be evaluated through the feature extraction algorithm, and then the first scoring module 302 uses the first feature
  • the vector and the first risk evaluation model are used to score the data to be evaluated to obtain the first evaluation score
  • the second scoring module 303 scores the data to be evaluated according to the first feature vector and the second risk evaluation model to obtain the second evaluation score
  • the final determination module 304 determines the target risk type of the data to be evaluated according to the first evaluation score and the second evaluation score. Combining the scoring results of the first risk assessment model and the second risk assessment model to comprehensively determine the target risk type of the data to be assessed can improve the accuracy of risk assessment.
  • the risk assessment device provided in the embodiment of this application belongs to the same concept as the risk assessment method in the above embodiment. Any method provided in the risk assessment method embodiment can be run on the risk assessment device, and its specific implementation For details of the process, refer to the embodiment of the risk assessment method, which will not be repeated here.
  • FIG. 8 is a first schematic structural diagram of the electronic device provided by the embodiment of the present application.
  • the electronic device 400 includes a processor 401 and a memory 402. Wherein, the processor 401 and the memory 402 are electrically connected.
  • the processor 401 is the control center of the electronic device 400. It uses various interfaces and lines to connect various parts of the entire electronic device. Various functions of the device 400 and processing data.
  • the memory 402 may be used to store software programs and modules.
  • the processor 401 executes various functional applications and data processing by running the computer programs and modules stored in the memory 402.
  • the memory 402 may mainly include a program storage area and a data storage area.
  • the program storage area may store an operating system, a computer program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data created by the use of electronic equipment, etc.
  • the memory 402 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the memory 402 may also include a memory controller to provide the processor 401 with access to the memory 402.
  • the processor 401 in the electronic device 400 will load the instructions corresponding to the process of one or more computer programs into the memory 402 according to the following steps, and run the instructions by the processor 401 and store them in the memory 402.
  • the processor 401 in the electronic device 400 will load the instructions corresponding to the process of one or more computer programs into the memory 402 according to the following steps, and run the instructions by the processor 401 and store them in the memory 402.
  • Score the data to be evaluated according to the first feature vector and the first risk evaluation model to obtain a first evaluation score
  • Score the data to be evaluated according to the first feature vector and the second risk evaluation model to obtain a second evaluation score
  • the target risk type of the data to be evaluated is determined.
  • FIG. 9 is a schematic diagram of a second structure of an electronic device provided by an embodiment of the application.
  • the electronic device further includes: a radio frequency circuit 403, a display screen 404, a control circuit 405, Input unit 406, audio circuit 407, sensor 408, and power supply 409.
  • the processor 401 is electrically connected to the radio frequency circuit 403, the display screen 404, the control circuit 405, the input unit 406, the audio circuit 407, the sensor 408, and the power supply 409, respectively.
  • the radio frequency circuit 403 is used to transmit and receive radio frequency signals to communicate with network equipment or other electronic equipment through wireless communication.
  • the display screen 404 may be used to display information input by the user or information provided to the user and various graphical user interfaces of the electronic device. These graphical user interfaces may be composed of images, text, icons, videos, and any combination thereof.
  • the control circuit 405 is electrically connected to the display screen 404 for controlling the display screen 404 to display information.
  • the input unit 406 can be used to receive inputted numbers, character information, or user characteristic information (such as fingerprints), and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
  • the input unit 406 may include a fingerprint recognition module.
  • the audio circuit 407 can provide an audio interface between the user and the electronic device through a speaker and a microphone.
  • the audio circuit 407 includes a microphone.
  • the microphone is electrically connected to the processor 401.
  • the microphone is used to receive voice information input by the user.
  • the sensor 408 is used to collect external environmental information.
  • the sensor 408 may include one or more of sensors such as an environmental brightness sensor, an acceleration sensor, and a gyroscope.
  • the power supply 409 is used to supply power to various components of the electronic device 400.
  • the power supply 409 may be logically connected to the processor 401 through a power management system, so that functions such as charging, discharging, and power consumption management can be managed through the power management system.
  • the electronic device 400 may also include a camera, a Bluetooth module, etc., which will not be repeated here.
  • the processor 401 in the electronic device 400 will load the instructions corresponding to the process of one or more computer programs into the memory 402 according to the following steps, and run the instructions by the processor 401 and store them in the memory 402.
  • the processor 401 in the electronic device 400 will load the instructions corresponding to the process of one or more computer programs into the memory 402 according to the following steps, and run the instructions by the processor 401 and store them in the memory 402.
  • Score the data to be evaluated according to the first feature vector and the first risk evaluation model to obtain a first evaluation score
  • Score the data to be evaluated according to the first feature vector and the second risk evaluation model to obtain a second evaluation score
  • the target risk type of the data to be evaluated is determined.
  • the data to be evaluated is scored according to the first feature vector and the first risk assessment model, and when the first evaluation score is obtained, the processor 401 is configured to execute:
  • Score the data to be assessed based on the second feature vector and the first risk assessment model to obtain a first assessment score.
  • the processor 401 when the first feature vector is extracted from the data to be evaluated by a feature extraction algorithm, the processor 401 is configured to execute:
  • a first feature vector is generated.
  • the first risk assessment model is obtained by training a pre-built isolated forest model, and the second risk assessment model is obtained by a pre-built classification model;
  • the processor 401 is configured to execute:
  • the weight value corresponding to each vector element in the second risk assessment model is determined, wherein the vector element includes the first numerical feature and the second Numerical characteristics;
  • the third feature vector and the first risk assessment model score the data to be assessed to obtain a first assessment score.
  • the processor 401 when the size of each vector element is adjusted according to the size of the corresponding weight value, the processor 401 is configured to execute:
  • the processor 401 is further configured to execute:
  • the task to be performed corresponding to the data to be evaluated is executed.
  • the second risk assessment model is a classification model
  • the processor 401 is further configured to execute:
  • the training set is used to train the classification model to update the model parameters of the classification model.
  • the processor 401 when obtaining the sample risk type of each sample evaluation data, the processor 401 is configured to execute:
  • the sample assessment data is scored to obtain a third assessment score, and the sample risk type of the sample assessment data is determined according to the third assessment score.
  • the processor 401 when determining the sample risk type of the sample evaluation data according to the third evaluation score, is configured to execute:
  • the electronic device uses a feature extraction algorithm to extract a first feature vector from the data to be evaluated, and then, according to the first feature vector and the first risk assessment model, the electronic device extracts the first feature vector from the data to be evaluated.
  • the data is scored to obtain the first evaluation score, and the evaluation data is scored according to the first feature vector and the second risk evaluation model, and the second evaluation score is obtained. Finally, according to the first evaluation score and the second evaluation score, the evaluation is determined The target risk type of the data. Combining the scoring results of the first risk assessment model and the second risk assessment model to comprehensively determine the target risk type of the data to be assessed can improve the accuracy of risk assessment.
  • An embodiment of the present application also provides a storage medium that stores a computer program, and when the computer program runs on a computer, the computer is caused to execute the risk assessment method in any of the above embodiments, such as: obtaining data to be assessed , And extract a first feature vector from the data to be evaluated by a feature extraction algorithm; score the data to be evaluated according to the first feature vector and the first risk assessment model to obtain a first evaluation score; The first feature vector and the second risk evaluation model are used to score the data to be evaluated to obtain a second evaluation score; according to the first evaluation score and the second evaluation score, the target risk of the data to be evaluated is determined type.
  • the storage medium may be a magnetic disk, an optical disk, a read only memory (Read Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
  • the computer program can be stored in a computer readable storage medium, such as stored in the memory of an electronic device, and executed by at least one processor in the electronic device.
  • the execution process can include, for example, the implementation of a risk assessment method Example process.
  • the storage medium can be a magnetic disk, an optical disk, a read-only memory, a random access memory, and the like.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un procédé et un appareil d'évaluation de risques, ainsi qu'un dispositif électronique et un support de stockage. Le procédé consiste à : extraire un premier vecteur de caractéristiques à partir de données acquises à évaluer ; déterminer, en fonction du premier vecteur de caractéristiques et d'un premier modèle d'évaluation de risques, un premier score d'évaluation des données à évaluer ; déterminer, en fonction du premier vecteur de caractéristiques et d'un second modèle d'évaluation de risques, un second score d'évaluation des données à évaluer ; et déterminer, en fonction du premier score d'évaluation et du second score d'évaluation, un type de risque cible des données à évaluer.
PCT/CN2020/079761 2020-03-17 2020-03-17 Procédé et appareil d'évaluation de risques, dispositif électronique et support de stockage WO2021184211A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/079761 WO2021184211A1 (fr) 2020-03-17 2020-03-17 Procédé et appareil d'évaluation de risques, dispositif électronique et support de stockage
CN202080096711.7A CN115088007A (zh) 2020-03-17 2020-03-17 风险评估方法、装置、电子设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/079761 WO2021184211A1 (fr) 2020-03-17 2020-03-17 Procédé et appareil d'évaluation de risques, dispositif électronique et support de stockage

Publications (1)

Publication Number Publication Date
WO2021184211A1 true WO2021184211A1 (fr) 2021-09-23

Family

ID=77769972

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/079761 WO2021184211A1 (fr) 2020-03-17 2020-03-17 Procédé et appareil d'évaluation de risques, dispositif électronique et support de stockage

Country Status (2)

Country Link
CN (1) CN115088007A (fr)
WO (1) WO2021184211A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115563657A (zh) * 2022-09-27 2023-01-03 冯淑芳 一种数据信息安全处理方法、系统及云平台

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363567A1 (en) * 2014-06-13 2015-12-17 T.K. Pettus LLC Comprehensive health assessment system and method
EP3200188A1 (fr) * 2016-01-27 2017-08-02 Telefonica Digital España, S.L.U. Procédés implémentés par ordinateur pour évaluer une maladie par analyse vocale et programmes informatiques associés
CN109657931A (zh) * 2018-11-29 2019-04-19 平安科技(深圳)有限公司 风控模型建模、企业风险评估方法、装置和存储介质
CN110827033A (zh) * 2019-10-11 2020-02-21 支付宝(杭州)信息技术有限公司 信息处理方法、装置及电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363567A1 (en) * 2014-06-13 2015-12-17 T.K. Pettus LLC Comprehensive health assessment system and method
EP3200188A1 (fr) * 2016-01-27 2017-08-02 Telefonica Digital España, S.L.U. Procédés implémentés par ordinateur pour évaluer une maladie par analyse vocale et programmes informatiques associés
CN109657931A (zh) * 2018-11-29 2019-04-19 平安科技(深圳)有限公司 风控模型建模、企业风险评估方法、装置和存储介质
CN110827033A (zh) * 2019-10-11 2020-02-21 支付宝(杭州)信息技术有限公司 信息处理方法、装置及电子设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115563657A (zh) * 2022-09-27 2023-01-03 冯淑芳 一种数据信息安全处理方法、系统及云平台
CN115563657B (zh) * 2022-09-27 2023-12-01 国信金宏(成都)检验检测技术研究院有限责任公司 一种数据信息安全处理方法、系统及云平台

Also Published As

Publication number Publication date
CN115088007A (zh) 2022-09-20

Similar Documents

Publication Publication Date Title
CN112417439B (zh) 账号检测方法、装置、服务器及存储介质
CN109243432B (zh) 话音处理方法以及支持该话音处理方法的电子设备
KR102314241B1 (ko) 적응적 인증 수행 방법 및 이를 지원하는 전자 장치
US11290447B2 (en) Face verification method and device
WO2020119448A1 (fr) Vérification d'informations vocales
CN113228064A (zh) 用于个性化的机器学习模型的分布式训练
WO2022105118A1 (fr) Procédé et appareil d'identification d'état de santé basés sur une image, dispositif et support de stockage
WO2019196534A1 (fr) Procédé et appareil de reconnaissance homme/machine basée sur un code de vérification
KR102653450B1 (ko) 전자 장치의 입력 음성에 대한 응답 방법 및 그 전자 장치
WO2021093380A1 (fr) Procédé et appareil de traitement du bruit, et système
WO2018233481A1 (fr) Procédé de traitement de données et produits associés
CN108111399B (zh) 消息处理的方法、装置、终端及存储介质
KR20160104668A (ko) 특징 정보를 추출하기 위한 방법 및 시스템
US20230050655A1 (en) Dialog agents with two-sided modeling
WO2021184211A1 (fr) Procédé et appareil d'évaluation de risques, dispositif électronique et support de stockage
CN110945455A (zh) 处理用户话语以用于控制外部电子装置的电子装置及其控制方法
CN112256975A (zh) 信息推送方法、装置、计算机设备及存储介质
CN116798129A (zh) 一种活体检测方法、装置、存储介质及电子设备
CN114399028B (zh) 信息处理方法、图卷积神经网络训练方法及电子设备
KR20230090979A (ko) 뉴럴 네트워크를 이용한 상담 가이드 정보 추천 방법 및 장치
US20230109260A1 (en) Techniques for cursor trail capture using generative neural networks
CN115344839A (zh) 一种基于用户击键动力学的身份认证方法及装置
JP2022547998A (ja) 対話システムのセマンティックパーサを訓練するための敵対的生成ネットワークの使用
CN114205164B (zh) 流量分类方法及装置、训练方法及装置、设备和介质
KR102602241B1 (ko) 블록체인 기반의 인공지능 헬스케어 플랫폼 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20926070

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16.02.2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20926070

Country of ref document: EP

Kind code of ref document: A1