Risk identification processing method, electronic device and computer-readable storage medium

文档序号:192076 发布日期:2021-11-02 浏览:24次 中文

阅读说明:本技术 风险识别处理方法、电子设备及计算机可读存储介质 (Risk identification processing method, electronic device and computer-readable storage medium ) 是由 王冰 许培录 于 2021-07-29 设计创作,主要内容包括:本申请提供一种风险识别处理方法、电子设备及计算机可读存储介质。本申请实施例根据预先配置从主接口存储模块中获取目标用户的静态数据,并对所述静态数据进行特征提取,以得到至少一个维度的静态特征,同时,从子接口存储模块中获取所述目标用户在第一业务场景下的动态数据,并对所述动态数据进行特征提取,以得到至少一个维度的动态特征;然后,将所述至少一个维度的静态特征和所述至少一个维度的动态特征输入所述第一业务场景对应的计算模型,由所述计算模型计算得到所述目标用户在所述第一业务场景中的风险识别结果,所述风险识别结果包括所述目标用户的风险类型,从而实现了对各业务场景中用户的风险类型的识别和风险管理。(The application provides a risk identification processing method, an electronic device and a computer readable storage medium. According to the embodiment of the application, static data of a target user is obtained from a main interface storage module according to preset configuration, feature extraction is carried out on the static data to obtain static features of at least one dimension, meanwhile, dynamic data of the target user in a first service scene is obtained from a sub-interface storage module, and feature extraction is carried out on the dynamic data to obtain dynamic features of at least one dimension; then, the static feature of the at least one dimension and the dynamic feature of the at least one dimension are input into a calculation model corresponding to the first business scene, and a risk identification result of the target user in the first business scene is obtained through calculation by the calculation model, wherein the risk identification result comprises a risk type of the target user, so that identification and risk management of the risk type of the user in each business scene are realized.)

1. A risk identification processing method, comprising:

according to the pre-configuration, obtaining static data of a target user from a main interface storage module, and performing feature extraction on the static data to obtain static features of at least one dimension;

according to the pre-configuration, acquiring dynamic data of the target user in a first service scene from a sub-interface storage module, and performing feature extraction on the dynamic data to obtain dynamic features of at least one dimension;

inputting the static feature of the at least one dimension and the dynamic feature of the at least one dimension into a calculation model corresponding to the first business scenario, and calculating by the calculation model to obtain a risk identification result of the target user in the first business scenario, where the risk identification result includes: a risk type of the target user.

2. The method of claim 1, wherein the obtaining static data of the target user from a main interface storage module according to a preset configuration and performing feature extraction on the static data to obtain static features of at least one dimension comprises:

acquiring static data of a target user from a main interface storage module by using an independent interface module corresponding to a first service scene according to preset configuration, and extracting features of the static data to obtain static features of at least one dimension;

the acquiring, according to the pre-configuration, dynamic data of the target user in a first service scenario from a sub-interface storage module, and performing feature extraction on the dynamic data to obtain a dynamic feature of at least one dimension includes:

acquiring dynamic data of the target user in a first service scene from a sub-interface storage module corresponding to the first service scene by using the independent interface module according to the preset configuration, and performing feature extraction on the dynamic data to obtain dynamic features of at least one dimension;

the inputting the static feature of the at least one dimension and the dynamic feature of the at least one dimension into a calculation model corresponding to the first business scenario, and calculating by the calculation model to obtain a risk identification result of the target user in the first business scenario includes:

and inputting the static characteristics of at least one dimension and the dynamic characteristics of at least one dimension into a calculation model corresponding to the first service scene by using the independent interface module, and calculating by using the calculation model to obtain a risk identification result of the target user in the first service scene.

3. The method of claim 2, further comprising:

storing static data of users of registered applications in a main interface storage module in advance, and updating the static data of a first user in the main interface storage module when the static data of the first user in the users of the registered applications changes; wherein the application comprises at least one service scenario, and the at least one service scenario comprises the first service scenario; wherein the static data comprises user basic information data;

storing the dynamic data of the user of the registered application in a sub-interface storage module corresponding to each service scene in the at least one service scene in advance, and updating the dynamic data of a second user in the sub-interface storage module corresponding to a second service scene when the dynamic data of the second user in the second service scene in the user of the registered application changes; wherein the dynamic data comprises user behavior data and content data.

4. The method of claim 2, wherein the inputting the static feature of the at least one dimension and the dynamic feature of the at least one dimension into the computational model corresponding to the first business scenario comprises:

fusing the static features of the at least one dimension and the dynamic features of the at least one dimension to obtain fused features;

and inputting the fusion characteristics into a calculation model corresponding to the first service scene.

5. The method of claim 2, wherein the risk identification further comprises: and calculating at least one service scene index corresponding to the first service scene.

6. The method of claim 5, wherein after the calculating by the calculation model of the risk identification result of the target user in the first business scenario, further comprises:

respectively comparing whether the calculation result of each service scene index in the at least one service scene index meets the corresponding preset requirement;

and in response to that the calculation result of the first service scene index in the at least one service scene index does not meet the corresponding preset requirement, performing punishment on the behavior or content of the target user corresponding to the first service scene index according to a preset punishment mode.

7. The method of claim 5, wherein after the calculating by the calculation model of the risk identification result of the target user in the first business scenario, further comprises:

and storing the risk identification result of the target user in the at least one service scene, wherein the at least one service scene comprises the first service scene.

8. The method of claim 7, wherein after storing the risk identification result of the target user in the at least one service scenario, further comprising:

according to a preset monitoring period, acquiring a risk identification result of a user in a current monitoring period and in a third service scene in a preset range;

splicing the acquired risk identification results of the user in the third service scene within the preset range according to the dimensionality of the risk identification results to obtain merged result data;

according to a preset statistical mode, carrying out statistical processing of specified dimensionality on the merged result data to obtain statistical result data;

and displaying the statistical result data in a visual mode.

9. The method of claim 7, wherein after storing the risk identification result of the target user in at least one business scenario, further comprising:

according to a preset statistical period, acquiring a risk identification result of a user in a current statistical period and in a third service scene in a preset range;

splicing the acquired risk identification results of the user in the third service scene within the preset range according to the dimensionality of the risk identification results to obtain merged result data and storing the merged result data;

according to the monitoring period and a preset statistical mode, carrying out statistical processing of specified dimensionality on the merged result data to obtain statistical result data;

and displaying the statistical result data in a visual mode.

10. The method according to claim 8 or 9, wherein after storing the risk identification result of the target user in at least one service scenario, the method further comprises:

according to a preset mode, obtaining users with preset risk types in the risk identification results to obtain a user group; and the users in the preset range comprise the user group.

11. The method according to claim 8 or 9, wherein said visually presenting said statistical result data comprises:

displaying the statistical result data by using a visual effect graph; alternatively, the first and second electrodes may be,

and displaying the statistical result data by using a structured data table.

12. An electronic device, comprising:

at least one processor; and

a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,

the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-11.

13. A non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform the method according to any one of claims 1 to 11.

14. A computer program product, characterized in that it comprises a computer program which, when being executed by a processor, carries out the method according to any one of claims 1 to 11.

[ technical field ] A method for producing a semiconductor device

The present application relates to the field of internet technologies, and in particular, to an internet data processing technology, and in particular, to a risk identification processing method, an electronic device, and a computer-readable storage medium.

[ background of the invention ]

The Risk Management System (Risk Management System) refers to a collection of elements in an organizational Management System that are relevant to managing Risk. In the financial industry, the risk management system is generally divided into four aspects of risk management strategy, organization function system, internal control system and risk and financing measures. Risk management is the formulation and execution of policies and procedures to help ensure that risk management is effectively implemented.

Currently, with the technology and development of the internet, social software products are more and more abundant, and more users carry out various communication through the social software products. Risk management applications in social software products are currently less. The data volume and the scenes of the current social software are larger, the scenes are more complex and the data rigor is lower compared with the financial scenes.

Thus, risk management is more challenging for social software. In risk management of social software, how to identify target risk users is a great challenge.

[ summary of the invention ]

Aspects of the present disclosure provide a risk identification processing method, an electronic device, and a computer-readable storage medium.

One aspect of the present application provides a risk identification processing method, including:

according to the pre-configuration, obtaining static data of a target user from a main interface storage module, and performing feature extraction on the static data to obtain static features of at least one dimension;

according to the pre-configuration, acquiring dynamic data of the target user in a first service scene from a sub-interface storage module, and performing feature extraction on the dynamic data to obtain dynamic features of at least one dimension;

inputting the static feature of the at least one dimension and the dynamic feature of the at least one dimension into a calculation model corresponding to the first business scenario, and calculating by the calculation model to obtain a risk identification result of the target user in the first business scenario, where the risk identification result includes: a risk type of the target user.

In another aspect of the present application, there is provided an electronic device including:

at least one processor; and

a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,

the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method provided in accordance with any of the aspects above.

In yet another aspect of the application, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform a method provided according to any of the above aspects.

In a further aspect of the application, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method provided according to any of the above aspects.

According to the technical scheme, according to the preset configuration, the static data of the target user is obtained from the main interface storage module, the characteristics of the static data are extracted to obtain the static characteristics of at least one dimension, meanwhile, the dynamic data of the target user in the first service scene is obtained from the sub-interface storage module, and the characteristics of the dynamic data are extracted to obtain the dynamic characteristics of at least one dimension; then, the static feature of the at least one dimension and the dynamic feature of the at least one dimension are input into a calculation model corresponding to the first business scenario, and a risk identification result of the target user in the first business scenario is obtained through calculation by the calculation model, wherein the risk identification result comprises a risk type of the target user. Therefore, the method and the device for identifying the risk types of the users in the business scenes realize identification of the risk types of the users in the business scenes, can effectively identify the target risk users according to the risk types of the users in risk management of the social software, and are beneficial to realizing the risk management of the social software.

In addition, by adopting the technical scheme provided by the application, the static data of the user and the dynamic data in the service scene are respectively stored in the main interface storage module and the sub-interface storage module, and due to the fact that the updating frequency of the static data and the updating frequency of the dynamic data are different, the static data of the user and the dynamic data in the service scene are separately stored in different places, the storage efficiency of the static data and the dynamic data can be improved, the access acquisition speed of the static data and the dynamic data is increased, and therefore the risk identification processing efficiency is improved.

In addition, by adopting the technical scheme provided by the application, the static data of the user and the dynamic data under the service scene are separately stored in different places, so that the data confusion possibly caused by frequent updating and writing of the dynamic data can be reduced, and the stability of the data is improved.

[ description of the drawings ]

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and those skilled in the art can also obtain other drawings according to the drawings without inventive labor.

Fig. 1 is a schematic flowchart of a risk identification processing method according to an embodiment of the present application.

Fig. 2 is a visualization effect diagram in a risk identification processing method according to an embodiment of the present application.

Fig. 3 is a block diagram of a risk identification processing system for implementing the risk identification processing method according to the embodiment of the present application.

FIG. 4 is a block diagram of a data storage module in the risk identification processing system of FIG. 3.

Fig. 5 is a block diagram of an intelligent service port module in the risk identification processing system of fig. 3.

FIG. 6 is a schematic flow diagram of the risk identification processing system of FIG. 3 for use in risk identification processing.

Fig. 7 is a block diagram of an electronic device for implementing a method for processing a service index according to an embodiment of the present application.

[ detailed description ] embodiments

In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

It should be noted that the terminal according to the embodiment of the present invention may include, but is not limited to, a mobile phone, a Personal Digital Assistant (PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a Personal Computer (PC), an MP3 player, an MP4 player, a wearable device (e.g., smart glasses, smart watch, smart bracelet, etc.), and the like.

In addition, the term "and/or" in the embodiment of the present application is only one kind of association relationship describing an associated object, and means that three kinds of relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" in the embodiment of the present application generally indicates that the preceding and following related objects are in an "or" relationship.

Fig. 1 is a schematic flowchart of a risk identification processing method according to an embodiment of the present application, as shown in fig. 1.

101, according to the preset configuration, obtaining static data of a target user from a main interface storage module, and performing feature extraction on the static data to obtain static features of at least one dimension.

The application can be used for applications including but not limited to social software Applications (APP), wherein the social software is mainly software for realizing communication through a network, such as WeChat, QQ and the like.

The interfaces in this application are software-like interfaces, which refer to referenced types or other types of implementation interfaces that define agreements to ensure that they support certain operations. Interface designations may be implemented by members of a class offering or other interface implementing it.

The static data in the application refers to data mainly used as control or reference in the running process of the APP, and the static data does not change within a preset long period of time and generally does not change along with the running of the APP.

102, according to the pre-configuration, obtaining dynamic data of the target user in a first service scene from a sub-interface storage module, and performing feature extraction on the dynamic data to obtain dynamic features of at least one dimension.

Dynamic data in this application refers to data that changes during the operation of the APP, as well as data that needs to be input and output during operation and data that needs to be changed during inline operation.

The main interface storage module and the sub-interface storage module in the application store static data such as user basic information data and user portrait data in the main interface storage module and store dynamic data generated in a service scene in the sub-interface storage module based on function division.

103, inputting the static feature of the at least one dimension and the dynamic feature of the at least one dimension into a calculation model corresponding to the first business scenario, and calculating by the calculation model to obtain a risk identification result of the target user in the first business scenario.

Wherein the risk identification result comprises: a risk type of the target user.

The risk types in this application are used to represent the risk level of the user, and in one implementation, the risk types may include, for example, but are not limited to: low risk, medium risk, high risk, etc.

It should be noted that part or all of the execution subjects 101 to 103 may be an application located in the terminal, or may also be a functional unit such as a plug-in or Software Development Kit (SDK) set in the application located in the terminal, or may also be a processing engine located in a network side server, which is not particularly limited in this embodiment.

It is to be understood that the application may be a native app (native app) installed on the terminal, or may also be a web page program (webApp) of a browser on the terminal, which is not limited in this embodiment.

Therefore, the identification of the risk types of the users in each business scene is realized, the target risk users can be effectively identified according to the risk types of the users in the risk management of the social software, and the risk management of the social software is facilitated; static data of a user and dynamic data under a service scene are respectively stored in a main interface storage module and a sub-interface storage module, due to the fact that the updating frequency of the static data is different from that of the dynamic data, the static data of the user and the dynamic data under the service scene are separately stored in different places, the storage efficiency of the static data and the storage efficiency of the dynamic data can be improved, the access acquisition speed of the static data and the access acquisition speed of the dynamic data are increased, the risk identification processing efficiency is improved, frequent updating of the dynamic data can be reduced, data confusion possibly caused by writing can be reduced, and the stability of the data is improved.

Optionally, in a possible implementation manner of this embodiment, different service scenarios may correspond to different sub-interface storage modules and independent interface modules. Correspondingly, in this embodiment, in 101, static data of a target user may be acquired from a main interface storage module according to a pre-configuration by using an independent interface module corresponding to a first service scenario, and feature extraction may be performed on the static data to obtain a static feature of at least one dimension. Correspondingly, in 102, the independent interface module may be utilized to obtain dynamic data of the target user in the first service scenario from the sub-interface storage module corresponding to the first service scenario according to the pre-configuration, and then perform feature extraction on the dynamic data to obtain a dynamic feature of at least one dimension. In 103, the independent interface module may be utilized to input the static feature of the at least one dimension and the dynamic feature of the at least one dimension into a calculation model corresponding to the first service scenario, and a risk identification result of the target user in the first service scenario is obtained through calculation by the calculation model.

In this embodiment, for different service scenarios, the input static features and dynamic features may be calculated through corresponding calculation models, so as to obtain risk identification results in the corresponding service scenarios and output the risk identification results. The risk identification result of the target user in the multiple service scenes can be obtained through parallel calculation of the corresponding calculation models of the multiple service scenes in at least one service scene in the APP.

Generally, at least one functional area is related to one APP product and is provided for a user to participate or use, and a service scenario in the application, that is, a scenario corresponding to the functional area related to the APP product, for example, people nearby in the WeChat APP, a sweep, and the like are respectively service scenarios in the WeChat APP.

The first service scenario in the application is a service scenario that needs risk identification processing, and if risk identification processing needs to be performed on a plurality of service scenarios in the APP, each of the plurality of service scenarios may be used as the first service scenario to execute the process of this embodiment.

Optionally, in a possible implementation manner of this embodiment, the static data of the user who registers the APP may be stored in the main interface storage module in advance, and when the static data of the first user among the users who register the APP changes, the static data of the first user in the main interface storage module is updated. The APP comprises at least one service scene, and the at least one service scene comprises the first service scene. The first user may be one or more users with static data changing.

Optionally, in a possible implementation manner of this embodiment, the static data may include user basic information data, which may include, but is not limited to, gender, age, city, hobbies, user portrait data, and the like of the user. In addition, the static data may also include the user's partial static data, such as the user's registration time at APP, the number of active days, the number of chats, the number of days since the last activity, and the like. All data that can be stored statically for a user belong to static data.

The user portrait data, namely the user information, is labeled and can be obtained by collecting and analyzing main information data of the user, such as social attributes, living habits, consumption behaviors and the like, the user appearance can be abstracted, and the method is a basic mode of applying a big data technology to enterprises.

Optionally, in a possible implementation manner of this embodiment, the main interface storage module may store the static data of the user through a relational database management system (mysql) database or other database.

As shown in table 1 below, an example of the static data dimensions (fields) stored in the memory module for the primary interface is shown.

TABLE 1 static data dimension

Wherein the user ID uniquely identifies a registered user on an APP.

Optionally, in a possible implementation manner of this embodiment, the dynamic data of the user who registers the APP may be stored in the sub-interface storage module corresponding to each service scenario in the at least one service scenario in advance, and when the dynamic data of a second user in a second service scenario among the users who register the APP changes, the dynamic data of the second user in the sub-interface storage module corresponding to the second service scenario may be updated. The second service scenario is a service scenario in which dynamic data of a user changes, and may be one service scenario in the APP or multiple service scenarios in the APP. Wherein the at least one service scenario includes the second service scenario.

Optionally, in a possible implementation manner of this embodiment, the dynamic data is data expressed by the user in the APP functional area, and may include, but is not limited to, user behavior data, content data (for example, a sent or uploaded picture, a received and sent message content, and the like), used device information, longitude and latitude information, and the like, and belongs to service scene data of a product.

Optionally, in a possible implementation manner of this embodiment, the sub-interface storage module may store dynamic data of the user through a data structure server (redis) database or another database, where the part of the dynamic data is not limited to user behavior data, content data, and the like, and may also include dynamically updated data with a bias. All dynamically updated data about the user traffic in the scenes and products can be stored in the sub-interface storage module. Taking social APP as an example, a business scenario may include, but is not limited to, nearby people, a sweep, a circle of friends, a group, a live broadcast, and so on, for example.

Taking the business scenario of a nearby person as an example, one example of the dynamic data dimension (field) stored in the subinterface storage module is shown in table 2 below.

TABLE 2 dynamic data dimension

Optionally, in a possible implementation manner of this embodiment, in 103, the independent interface module may specifically fuse the static feature of the at least one dimension and the dynamic feature of the at least one dimension to obtain a fused feature, then input the fused feature into a computation model corresponding to the first service scenario, and obtain a risk identification result of the target user in the first service scenario through computation by the computation model.

By fusing the static feature of the at least one dimension and the dynamic feature of the at least one dimension, the static feature and the dynamic feature can be spliced in the dimension in a data fusion mode, and information simultaneously comprising the static feature of the at least one dimension and the dynamic feature of the at least one dimension is obtained. As shown in table 3 below, the feature of the static data shown in table 1 is fused with the feature of the dynamic data of the nearby human business scenario shown in table 2 by user ID matching, so as to obtain a fused feature.

TABLE 3 fusion characteristics

Optionally, in a possible implementation manner of this embodiment, in 103, the risk identification result may further include: and calculating at least one service scene index corresponding to the first service scene.

The service scene indexes in the application can be general indexes in the industry or personalized indexes which are set independently aiming at the service scenes. For example, in a service scenario of a nearby person in the WeChat APP, the service scenario index may be an entry rate of the nearby person, and is obtained by dividing the number of users entering the nearby person by the number of newly-added users in the current day, and the index may be used to reflect the usage of the nearby person by the newly-added users.

Optionally, in a possible implementation manner of this embodiment, after the risk identification result of the target user in the first service scenario is obtained through calculation by the calculation model 103, whether the calculation result of each service scenario index in the at least one service scenario index meets the corresponding preset requirement may also be respectively compared; and in response to that the calculation result of the first service scene index in the at least one service scene index does not meet the corresponding preset requirement, performing punishment on the behavior or content of the target user corresponding to the first service scene index according to a preset punishment mode.

And punishing the behavior or content of the target user corresponding to the first service scene index, namely, limiting the behavior or content of the target user corresponding to the first service scene index to a certain extent. For example, when the first service scenario is a person attached to the WeChat APP, if the risk type of the target user is high risk, the target user may be prohibited from appearing in a nearby person list, and the like, so that risk control of the risk user for the service scenario is achieved.

Optionally, in a possible implementation manner of this embodiment, after the risk identification result of the target user in the first service scenario is obtained through calculation by the calculation model in 103, the risk identification result of the target user in at least one service scenario may also be stored, where the at least one service scenario includes the first service scenario.

Based on the embodiment, a risk identification result in at least one service scenario can be obtained for each user, so that the user can be directly called for use in risk management and control in the following process.

Further optionally, in a possible implementation manner of this embodiment, after storing the risk identification result of the target user in the at least one service scenario, the risk identification result of the user in the current monitoring period within a preset range in a third service scenario may also be obtained according to a preset monitoring period, where the at least one service scenario includes the third service scenario, and then the obtained risk identification results of the user in the third service scenario within the preset range are spliced according to the dimension of the risk identification result to obtain merged result data, and the merged result data is subjected to statistical processing of a specified dimension according to a preset statistical manner to obtain statistical result data; and further, displaying the statistical result data in a visual mode.

Or, further optionally, in a possible implementation manner of this embodiment, after the risk identification result of the target user in the at least one service scenario is stored, according to a preset statistical period, a risk identification result of the user in a third service scenario within a preset range in a current statistical period may also be obtained, where the at least one service scenario includes the third service scenario, and a service scenario in which a user group needs to be supervised is the third service scenario. And then, splicing the acquired risk identification results of the user in the third service scene within the preset range according to the dimensionality of the risk identification results to obtain merged result data, storing the merged result data, performing specified dimensionality statistical processing on the merged result data according to a monitoring period and a preset statistical mode to obtain statistical result data, and displaying the statistical result data in a visual mode.

Based on the embodiment, the risk identification results of multiple users in the same service scene in the preset range are merged and stored, namely the risk identification results are spliced and stored based on the dimension, so that the follow-up supervision requirements for the multiple user group are met. The embodiment can support the real-time generation and display of statistical result data or the off-line generation and display.

Optionally, in a possible implementation manner of this embodiment, after storing the risk identification result of the target user in the at least one service scenario, the user whose risk type is the preset risk type in the risk identification result may also be obtained according to a preset manner, for example, a dimension reduction technique, an unsupervised clustering algorithm, and the like, so as to obtain a user group of the preset risk type, where the user in the preset range includes the user group of the preset risk type (e.g., high risk).

Based on the embodiment, the users can be grouped according to a preset mode, and the user groups with the aggregated preset risk types are monitored and supervised. For example, according to a preset supervision policy, limiting the behavior and/or content of the user group in the service scenario.

In the application, monitoring and supervision refer to that risk indexes are pushed to a visual interface or a report form in a visual real-time or off-line mode for displaying, and massive friend applications appear in a person business scene nearby in a short time, so that the purpose of prompting risks is achieved.

As shown in table 4 below, is one example of a regulatory group of users with a risk type of medium to high risk.

TABLE 4A supervision example of a high-risk user population

Optionally, in a possible implementation manner of this embodiment, when the statistical result data is displayed in a visual manner, the statistical result data may be displayed specifically by using a visual effect graph; alternatively, the statistical result data may be presented using a structured data table.

As shown in Table 5 below, is a regulatory example of a structured data table.

TABLE 5A supervisory example of a structured data table

Extent of risk Time Number of users Report form one
High and high risk Eight points in the morning 500 User number trend chart for hour-level risk condition

Fig. 2 is a visual effect diagram in the risk identification processing method according to an embodiment of the present application. The number of chat messages for the at-risk user group and the high-risk user group in each time period over a 24 hour period is shown in fig. 2.

Based on the embodiment, the statistical result data can be displayed in a visual mode, so that risk monitoring and early warning are carried out on the service scene.

Fig. 3 is a block diagram of a risk identification processing system for implementing the risk identification processing method according to the embodiment of the present application. As shown in fig. 3, the risk identification processing system includes a data storage module, an intelligent service port module, and a penalty monitoring service module. FIG. 4 is a block diagram of a data storage module in the risk identification processing system of FIG. 3. Fig. 5 is a block diagram of an intelligent service port module in the risk identification processing system of fig. 3. FIG. 6 is a schematic flow diagram of the risk identification processing system of FIG. 3 for use in risk identification processing.

The data storage module comprises a main interface storage module and a sub-interface storage module corresponding to each service scene.

The intelligent service port module comprises independent interface modules corresponding to each service scene, and respectively requests data stored in the main interface storage module and the sub-interface storage module according to service requirement configuration, so that preparation work is prepared for the subsequent calculation model access to carry out calculation. The accessed data is used for meeting the requirements from various aspects including business requirements and model requirements, but not limited to the two requirements, and the intelligent business port module supports the matching of computing models, supports the logic selection of parallel computing processing of a plurality of computing models and supports complex business requirements. The intelligent service port module combines each independent interface module with a machine learning technology, so that locking risks can be quickly analyzed in a multidimensional way aiming at a service scene, an intelligent service port interface is formed, and the intelligent service port interface has the functions of anti-province and self-learning, for example, learning is carried out by utilizing risk identification results generated by the intelligent service port interface module and reference information, and the functions of self-checking and self-learning are achieved.

And the penalty monitoring service module is used for performing penalty on users whose calculation results of the service scene indexes do not meet the corresponding preset requirements according to a preset penalty mode and supervising user groups with preset risk types. Through punishing and supervision services of the punishment monitoring service module, punishment can be carried out on users according to the requirements of service scenes, and scene atmosphere is monitored by combining with service scene indexes, so that the supervision and early warning effect is achieved.

Optionally, in the foregoing embodiments of the present application, when the storage and calculation resources are sufficient, the dynamic data and the static data may also be uniformly stored, and corresponding data is obtained from the uniform storage for each service scenario to perform large-batch calculation.

Optionally, in the foregoing embodiments of the present application, a penalty manner and a supervision manner provided by a third party may also be adopted to perform risk management and control on users and user groups with preset risk types.

According to the embodiment of the application, the static data of a target user is obtained from a main interface storage module according to the preset configuration, the static data is subjected to feature extraction to obtain the static feature of at least one dimension, meanwhile, the dynamic data of the target user in a first service scene is obtained from a sub-interface storage module, and the dynamic data is subjected to feature extraction to obtain the dynamic feature of at least one dimension; then, the static feature of the at least one dimension and the dynamic feature of the at least one dimension are input into a calculation model corresponding to the first business scenario, and a risk identification result of the target user in the first business scenario is obtained through calculation by the calculation model, wherein the risk identification result comprises a risk type of the target user. Therefore, the method and the device for identifying the risk types of the users in the business scenes realize identification of the risk types of the users in the business scenes, can effectively identify the target risk users according to the risk types of the users in risk management of the social software, and are beneficial to realizing the risk management of the social software.

In addition, by adopting the technical scheme provided by the application, the static data of the user and the dynamic data in the service scene are respectively stored in the main interface storage module and the sub-interface storage module, and due to the fact that the updating frequency of the static data and the updating frequency of the dynamic data are different, the static data of the user and the dynamic data in the service scene are separately stored in different places, the storage efficiency of the static data and the dynamic data can be improved, the access acquisition speed of the static data and the dynamic data is increased, and therefore the risk identification processing efficiency is improved.

In addition, by adopting the technical scheme provided by the application, the static data of the user and the dynamic data under the service scene are separately stored in different places, so that the data confusion possibly caused by frequent updating and writing of the dynamic data can be reduced, and the stability of the data is improved.

Based on the technical scheme provided by the application, the wind control system of the social software can be understood as a comprehensive system for designing and implementing the product atmosphere for resisting risk protection, and the comprehensive system comprises a comprehensive system for formulating a risk control strategy, performing strategic identification on a target user, implementing corresponding punishment, behavior limitation or guidance, monitoring and managing the product atmosphere, keeping continuous self-optimization and the like.

Based on the technical scheme provided by the application, achievements such as machine learning and artificial intelligence can be introduced into the wind control system, more accurate and efficient supervision control is carried out in each business scene, an intelligent primary and secondary matched risk management system is formed, and driving protection and navigation are guaranteed for social software.

Based on the technical scheme provided by the application, the personalized and customized wind control nodes can be provided for the service scene, and flexible punishment and management can be performed to meet the service requirements; the method is characterized in that a relatively independent wind control environment is carried out by combining an algorithm at a service scene end, a risk coefficient is extracted, the service scene is protected on the one hand, and on the other hand, a risk identification result is output to be used by other service scenes and a data information main body, so that an animal antenna appears, the function of the system is not only realized, but also information interaction can be carried out with the data information main body.

It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.

In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.

The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.

FIG. 7 illustrates a schematic block diagram of an example electronic device 700 that can be used to implement embodiments of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular telephones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.

As shown in fig. 7, the electronic device 700 includes a computing unit 701, which may perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)702 or a computer program loaded from a storage unit 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data required for the operation of the electronic device 700 can also be stored. The computing unit 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.

A number of components in the electronic device 700 are connected to the I/O interface 705, including: an input unit 706 such as a keyboard, a mouse, or the like; an output unit 707 such as various types of displays, speakers, and the like; a storage unit 708 such as a magnetic disk, optical disk, or the like; and a communication unit 709 such as a network card, modem, wireless communication transceiver, etc. The communication unit 709 allows the electronic device 700 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.

Computing unit 701 may be a variety of general purpose and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 701 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 701 executes the respective methods and processes described above, such as the data processing method. For example, in some embodiments, the data processing method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 708. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 700 via the ROM 702 and/or the communication unit 709. When the computer program is loaded into the RAM 703 and executed by the computing unit 701, one or more steps of the data processing method described above may be performed. Alternatively, in other embodiments, the computing unit 701 may be configured to perform the data processing method by any other suitable means (e.g. by means of firmware).

Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.

Program code for implementing the methods of the present application may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.

In the context of this application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.

To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.

The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), the internet, and blockchain networks.

The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The Server can be a cloud Server, also called a cloud computing Server or a cloud host, and is a host product in a cloud computing service system, so as to solve the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service ("Virtual Private Server", or simply "VPS"). The server may also be a server of a distributed system, or a server incorporating a blockchain.

It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.

The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

18页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于资金交易的主体亲密度计算方法、装置及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!