blog
Dinsight: How Operators Can Quickly Manage Components

Risk control component refers to the module or tool used in the risk control system to monitor, identify and handle various risk behaviors. They assist institutions or enterprises in implementing effective risk management and precautions by using different algorithms, rules and technologies. Through data analysis, model building, rule engine and other technical means, risk control components help institutions or enterprises to timely identify and warn all kinds of risk behaviors, and take corresponding measures to control and prevent risks. Through effective risk control components, institutions or enterprises can reduce risk losses, improve operational efficiency, and protect users' rights and interests and data security.

Risk control components can include data collection, risk identification, rules, monitoring, decision making, anti-fraud, analysis and reporting and other components.

Data acquisition module: Collect, organize and analyze user behavior, transactions, and equipment information based on device fingerprint, secure SDK, black and white list data, so as to obtain the basic data for analysis and judgment of possible risk behaviors.

Risk identification module: through the use of machine learning, data mining and other technologies, the collected data pattern analysis, abnormal detection, used to identify potential risk behaviors, and their risk assessment and classification.

Rule module: The rule module can match and determine the risk behavior according to the requirements of specific scenarios, such as multiple accounts opening under the same IP address, and high-risk behavior patterns, according to the pre-set rules and strategies, so as to determine the risk degree.

Real-time monitoring module: real-time monitoring and control the operation of the system, and alert and notify abnormal and suspicious activities according to the preset thresholds and rules. These alerts can be sent to relevant personnel by email, text messages, etc.

Risk decision module: Make risk decision making and treatment according to the risk assessment results and strategies. For high-risk behaviors or transactions, it can automatically trigger the review, restriction or interception operations, to protect the interests of the institution or enterprise and the security of the system.

Anti-fraud module: to identify and prevent fraud, including device fingerprint identification, blacklist verification, multi-dimensional cross-verification and other technical means, to reduce the risk and loss of fraud.

Analysis and report module: generate all kinds of risk reports, provide data analysis and statistics, help institutions or enterprises to understand the risk situation, optimize the strategy, and make corresponding decisions.

According to their own needs and risk characteristics, enterprises customize and adjust the specific content and functions of their risk control components.

Dinsight: Step-by-Step Component Management

Risk control engine is the core system used for managing and executing risk control models, responsible for integrating, deploying and monitoring the operation of various risk control models. According to the actual business needs, the performance and stability requirements should also be considered, in order to achieve efficient and reliable risk management.

The Dinsight real-time risk control engine provides a visual interface that allows business people to quickly start working, easily configure components, and observe the running status of components in real time.

Take "action" as an example, detail the component configuration steps of Dinsight real-time risk control engine.

1、 After entering the user name and password, log in to the top image Dinsight real-time risk control engine background, enter the "Policy Center-Component Management", and click on the "Basic Information" page in the "Component Mode" drop-down box to select "Action"

2023092101.jpg

In the component configuration interface, you can freely select the configuration actions during the condition. Currently, you support the configuration actions during "Before condition execution", "After condition execution", "conditional hit", "and" conditional miss ". After selecting the conditions, you can configure the action directly.

2023092102.jpg At present, Dinsight real-time risk control engine can be configured with four types of actions: value assignment, list category, process control and risk level. In each set of action configuration, only one risk level and process control can be configured. 2023092103.jpg

Assignment class: A function in an action expression can only select the assignment class function. List class: The outermost function of the action expression can only select the function of the list class. Process control: node exit, process exit, policy exit, and event exit. Risk level: normal request, suspected risk request, risk request; add risk type for suspected risk and risk request.

  1. Select "Assignment Class" in the "Action Type" drop-down box for function; in "Function Expression", select specific field for assignment: for example, select "prompt Information" to indicate the content of the prompt information when the condition is hit. Assignment types can be Constant, Field, Index, Model, External Data, Function; For example, select the Constant type and edit the constant value in the input box and click the OK button.

2023092104.jpg

  1. Select "List Class" in the "Action Type" drop-down box, click the selection box below the expression, pop up the optional function, and configure according to the type of function. For example, select the "Add to List" function, the function needs to input two parameters. The first parameter is any constant, field, index, model, external data, function, and the second parameter is "list".

2023092105.jpg

  1. Select "Risk Level" in the "Action Type" drop-down box. The risk level includes "Normal Request", "Suspected Risk Request" and "Risk Request".

2023092106.jpg

5、 Select Process Control in the Action Type drop-down box. According to the business requirements of the components, select Node Exit, Process Exit, Policy Exit, and Event Exit for the requirements of the components. After all action configurations are complete, you can adjust the priority order and delete settings in the action bar of the action list. 2023092107.jpg

2023-10-30
    Copyright © 2024 AISECURIUS, Inc. All rights reserved
    Hi! We are glad to have you here! Before you start visiting our Site, please note that for the best user experience, we use Cookies. By continuing to browse our Site, you consent to the collection, use, and storage of cookies on your device for us and our partners. You can revoke your consent any time in your device browsing settings. Click “Cookies Policy” to check how you can control them through your device.