CN106897807A - A kind of business risk control method and equipment - Google Patents

A kind of business risk control method and equipment Download PDF

Info

Publication number
CN106897807A
CN106897807A CN201510958421.XA CN201510958421A CN106897807A CN 106897807 A CN106897807 A CN 106897807A CN 201510958421 A CN201510958421 A CN 201510958421A CN 106897807 A CN106897807 A CN 106897807A
Authority
CN
China
Prior art keywords
rule
risk
business
synchronization rules
asynchronous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510958421.XA
Other languages
Chinese (zh)
Other versions
CN106897807B (en
Inventor
梁建国
叶瑞海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510958421.XA priority Critical patent/CN106897807B/en
Publication of CN106897807A publication Critical patent/CN106897807A/en
Application granted granted Critical
Publication of CN106897807B publication Critical patent/CN106897807B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Abstract

This application discloses a kind of business risk control method, while the rule in synchronization rules storehouse performs risk to current business and judges to export Risk Results in recording synchronism rule base in addition to the hit situation of each rule, risk judgment is performed to current business always according to the rule in asynchronous rule base, and record the hit situation of each rule in asynchronous rule base, when certain the regular hit situation in the asynchronous rule base of record reach first it is pre-conditioned when the rule increased into synchronization rules storehouse, and the rule is rejected from synchronization rules storehouse when certain the regular hit situation in the synchronization rules storehouse of record is pre-conditioned less than second.So as on the premise of ensureing that risk is controllable, improve the treatment effeciency of business risk judgement, and effectively reduce the cost of labor and hardware resource required for carrying out business rule adjustment.

Description

A kind of business risk control method and equipment
Technical field
The application is related to communication technical field, more particularly to business risk control method always.The application is same When further relate to a kind of business risk control device.
Background technology
During people are obtained using internet or provide service, always some things are to control , these uncontrollable factors are referred to as risk.Risk along with the project implementation whole process, risk Event brings the Project Cost to increase, and project process slows down, and produces influence etc. to the completion quality of project Negative factor, so as to influence the prospective earnings of investor.
Because risk exists always along with the activity of people, therefore people need reduction of adopting various measures The possibility that risk case occurs, or possible loss control in certain scope, so as to avoid The burdensome loss brought when risk case occurs.For a financial company, risk control System processed is very important system.If none of good risk control system, then company is exposed to Under huge clean risk of liquidation.
As shown in figure 1, being risk control solution schematic diagram of the prior art, wherein business risk is sentenced Cutout journey is comprised the following steps:
Step a) operation systems called risk control system (to be such as account transfer behaviour before a certain business is done Make), whether risky seek advice from this operation;
Step b) risk control system calling rule platforms, judge whether it is risky, if return have Risk.If it is not, continuing to run with other risk control systems;
Step c) operation systems judge whether user can perform the operation according to risk judgment result.
In above process, when regulation management flow is related to, operation system is according to own service demand Rule is increased and decreased by rule management system.
But inventor has found during the application is realized, with the continuous hair of current Internet service Exhibition, for service provider or platform operation business, will have increasing operation system to access its Risk system.Then the quantity of corresponding rule can substantial amounts of increase, even reach the water of magnanimity grade It is flat.Correspondingly, risk system carries out time of risk judgment can also become more and more long, will so lead Some are caused to spend too many to requirement of real-time business very high business such as (such as pay, transfer accounts) certifications Time on risk judgment, severely impacts the experience of user.
As can be seen here, risk control is conflicting with both Consumer's Experiences, how to ensure the premise of safety The lower consulting treatment effeciency improved for risk case, as those skilled in the art's technology urgently to be resolved hurrily Problem.
The content of the invention
This application provides a kind of business risk control method, it is used to solve magnanimity business rule in the prior art The query time for then being brought is long and the problems such as too high maintenance cost, the method is applied to risk control In system, comprise the following steps:
Rule in synchronization rules storehouse performs risk judgment to current business, exports Risk Results, and The hit situation of each rule in recording synchronism rule base;
Rule in asynchronous rule base performs risk judgment to current business, in recording asynchronous rule base The hit situation of each rule, the rule in the asynchronous rule base is the complete rule set for performing risk judgment;
When certain the regular hit situation in the asynchronous rule base of the record reach first it is pre-conditioned when, During the rule increased into synchronization rules storehouse;
When certain the regular hit situation in the synchronization rules storehouse of the record is pre-conditioned less than second, The rule is rejected from synchronization rules storehouse.
Preferably, the current business that the rule in synchronization rules storehouse performs risk judgment is with high real The business of when property requirement.
Preferably, if the business of current pending risk judgment is the low business of requirement of real-time, root Risk judgment is performed to current business according to the rule in asynchronous rule base, Risk Results are exported.
Preferably, the hit situation is specially the rule and is used to carry out the number of times of risk judgment and works as The ratio of the number of times of the preceding risk judgment for performing altogether.
Preferably, also include:
When synchronization rules addition request is received, the rule that will be carried in synchronization rules addition request Added in the synchronization rules storehouse;
When synchronization rules removal request is received, rejected from synchronization rules storehouse and the synchronization rules are moved Except the rule corresponding to the rule of carrying in request.
Accordingly, the application also proposed a kind of business risk control device, be applied to risk control system In, the equipment includes:
First performing module, the rule in synchronization rules storehouse performs risk judgment to current business, defeated Go out the hit situation of each rule in Risk Results, and recording synchronism rule base;
Second performing module, the rule in asynchronous rule base performs risk judgment, note to current business The hit situation of each rule in asynchronous rule base is recorded, the rule in the asynchronous rule base is sentenced to perform risk Disconnected complete rule set;
Add module, when certain the regular hit situation in the asynchronous rule base of the record, to reach first pre- If during condition, during the rule increased into synchronization rules storehouse;
Module is rejected, when certain the regular hit situation in the synchronization rules storehouse of the record is pre- less than second If during condition, the rule is rejected from synchronization rules storehouse.
Preferably, the current business that the rule in synchronization rules storehouse performs risk judgment is with high real The business of when property requirement.
Preferably, if the business of current pending risk judgment is the low business of requirement of real-time, root Risk judgment is performed to current business according to the rule in asynchronous rule base, Risk Results are exported.
Preferably, the hit situation is specially the rule and is used to carry out the number of times of risk judgment and works as The ratio of the number of times of the preceding risk judgment for performing altogether.
Preferably, also include:
When the add module receives synchronization rules addition request, the add module is by the synchronization The rule carried in rule addition request is added in the synchronization rules storehouse;
When the rejecting module receives synchronization rules removes request, the rejecting module is from synchronization rules The rule corresponding to the rule for being removed with the synchronization rules and being carried in request is rejected in storehouse.
As can be seen here, by the above-mentioned technical proposal of application the application, except according in synchronization rules storehouse Respectively advised in recording synchronism rule base while rule performs risk to current business and judges output Risk Results Outside hit situation then, risk judgment is performed to current business always according to the rule in asynchronous rule base, And each regular hit situation in asynchronous rule base is recorded, certain rule in the asynchronous rule base when record Hit situation reach first it is pre-conditioned when the rule is increased into synchronization rules storehouse, and when note By the rule from synchronization when certain regular hit situation in the synchronization rules storehouse of record is pre-conditioned less than second Rejected in rule base.So as on the premise of ensureing that risk is controllable, improve the treatment of business risk judgement Efficiency, and effectively reduce cost of labor and hardware resource required for carrying out business rule adjustment.
Brief description of the drawings
Fig. 1 is risk control solution schematic diagram of the prior art;
Fig. 2 is a kind of schematic flow sheet of business risk control method that the application is proposed;
A kind of schematic diagram of business risk control program that Fig. 3 is proposed by the application specific embodiment;
Fig. 4 is a kind of structural representation of business risk control device that the application is proposed.
Specific embodiment
As stated in the Background Art, when the development rule with business also becomes more and more, too many rule The disadvantage of consulting overlong time can be then brought, while how to be directed to the industry of magnanimity according to the consulting situation of business It is also the extra problem for considering required for technical staff that business rule is adjusted and safeguards.Especially existing In some network operation platforms, the overlong time of operation system risk judgment will business it is big concurrent and Serious Consumer's Experience is caused to decline problem when higher to requirement of real-time.
To solve the technical problem, this application provides a kind of business risk control method, based on existing Rule in risk control system, the method is by for all of rule for being currently used in execution risk judgment It is respectively provided with synchronization rules storehouse and asynchronous rule base.Wherein, the rule in synchronization rules storehouse is real-time Operation and the follow-up rule for allowing to run when risk judgment is carried out for business, in asynchronous rule base Rule is the complete rule set for performing risk judgment, for example for the rule in synchronization rules storehouse The all rules for performing risk judgment that there is currently, or use the need for technical staff is specified In the strictly all rules for performing risk judgment.Divided in synchronous rule by by the business rule in business rule base Then in storehouse and asynchronous rule base, can will effectively have different ageing and importance business rule Then distinguished.
In the preferred embodiment of the application, the rule in synchronization rules storehouse both reached the including hit situation One pre-conditioned (this first pre-conditioned can be a threshold value that technical staff is set according to actual conditions) Rule, it is also possible to including being the preassigned rule of technical staff, technical staff can be with this basis Division and setting for rule are further improved and expand, and these belong to the application's Protection domain.
Based on above-mentioned setting, as shown in Fig. 2 a kind of stream of the business risk control method for the application proposition Journey schematic diagram, the method is comprised the following steps:
S201, the rule in synchronization rules storehouse performs risk judgment to current business, exports risk knot Really, the hit situation of each rule and in recording synchronism rule base.
Because the application is intended to be improved existing risk control system, it is set to know current industry The risk situation of business and can in time to user feedback, therefore the risk control system have can with it is existing The port docked of operation system, and needs can be obtained from operation system according to different agreements Carry out the business (being subsequently collectively referred to as current business) of risk judgment.In specific application scenarios, work as industry When business system needs to carry out risk judgment for certain business, can be incited somebody to action by way of risk judgment is asked Current business is sent to the risk control system, and risk control system can be asked by parsing the risk judgment Ask to obtain the current business for needing to carry out risk judgment.
In order to avoid occurring as the situation for hit judgement for all business rules in the prior art, should Preferred embodiment is additionally provided with synchronization rules storehouse in risk control system, and by existing rule compared with For part and parcel rule is placed in synchronization rules storehouse.These rules are in conventional business risk deterministic process In be queried and hit, and its respective hit situation has all reached first pre-conditioned, and this One pre-conditioned can be flexibly adjusted by technical staff according to actual conditions such that it is able to ensure synchronous rule The quantity of the business rule then specifically having in storehouse is maintained at can quickly be performed by batch and covering user is basic The level for needing.So when needing to carry out risk judgment for current business, even the application Related equipment (such as server) performs the rule in the synchronization rules storehouse, so as to ensure security And the risk judgment result of current business can be obtained on the basis of operational efficiency.
It should be noted that in the business risk control method that operation the application is proposed first, business The hit situation of each business rule can be set by technical staff according to conventional experience in rule base Put, or be arranged to an average value, can be adjusted according to Query Result during follow-up or Keep constant.For constant scheme is kept, each business rule are dynamically adjusted according to Query Result Being hit situation and undoubtedly can more adapt to the processing environment of diversified business then, these belong to this Shen Protection domain please.
S202, the rule in asynchronous rule base performs risk judgment to current business, records asynchronous rule Then in storehouse it is each rule hit situation, the rule in the asynchronous rule base be perform risk judgment it is complete Rule set.
The quick hit that business rule is no doubt realized by only performing the rule in synchronization rules storehouse is processed, But in order to adapt to existing Protean Business Processing environment, the application will also be advised based on current asynchronous Then all of rule is adjusted with the hit situation of current task to the hit situation of each rule in storehouse, because After this rule in operation synchronization rules storehouse, the step will be deposited according to currently all in asynchronous rule base Rule perform risk judgment, and record the hit situation of each rule in asynchronous rule base.As rear The adjustment offer treatment basis for entering line discipline in business rule base is provided.
The quick treatment of current business is realized by S201 and S202 and the standard of risk judgment has been ensured True property.But in practical application scene, usually contain high real-time business (such as transferred account service, Payment business) and low real-time business (such as inquire about, retrieval etc.).Wherein high real-time requires Business due to need quickly be necessarily required to be processed using synchronization rules storehouse to user's returning result, and The influence then when processing slower to Consumer's Experience of the low business of requirement of real-time is little, therefore in order to take into account The accuracy for the treatment of effeciency and risk judgment, the application preferred embodiment will be to needing according to synchronization rules The current business that rule in storehouse performs risk judgment is screened so that according to the rule in synchronization rules storehouse The current business for then performing risk judgment is the business with high real-time requires.Further, current The business of pending risk judgment is the low business of requirement of real-time, then the rule in asynchronous rule base Risk judgment is performed to current business, Risk Results are exported.
S203, when certain the regular hit situation in the asynchronous rule base of the record reaches the first default bar During part, during the rule increased into synchronization rules storehouse;
S204, when certain the regular hit situation in the synchronization rules storehouse of the record is less than the second default bar During part, the rule is rejected from synchronization rules storehouse.
When the hit situation according to the business rule for obtaining the current all presence of result adjustment is needed, ability Field technique personnel can be updated first against the hit-count of the business rule for having hit, and be subsequently based on this Business rule be used to carry out in the past the number of times of risk judgment and the current risk judgment for performing altogether time Several ratio is adjusted to its hit situation.Those skilled in the art can take other on this basis The scheme that identical hit situation adjusts purpose can be reached, these belong to the protection domain of the application.
Enter after Mobile state adjustment in the situation that is hit for current all of business rule, the application's Preferred embodiment also proposed the concrete scheme being adjusted for the rule in synchronization rules storehouse:Work as arrival During the default adjustment cycle, hit situation reaches first certain pre-conditioned in the asynchronous rule base that will be recorded Rule increases in synchronization rules storehouse, and hit situation is pre- less than second in the synchronization rules storehouse that will be recorded If certain rule of condition is rejected from synchronization rules storehouse.
Explanation is needed also exist for, adjustment of the above-mentioned hit situation based on each rule to rule is also only this One preferred embodiment of application, and the adjustment can while current business is processed or after finishing with Shi Jinhang, does not conflict with the risk judgment of current business, it is also possible to after certain process cycle is separated by Unification is carried out, and these belong to the protection domain of the application.
Although additionally, this above embodiments of the present application is proposed according in hit situation adjustment synchronization rules storehouse The scheme of rule, but in addition to monitoring system Automatic dispatching real-time online with offline rule, go back The rule in synchronization rules storehouse can be scheduled by way of artificial setting.Specifically, in this Shen In preferred embodiment please, when technical staff need set certain rule for real time execution it is regular when, can The rule addition request for carrying the rule is sent, when synchronization rules addition request is received, will be described same The rule carried in rule addition request is walked to be added in the synchronization rules storehouse;And receive synchronization working as When rule removes request, the rule for being removed with the synchronization rules and being carried in request are rejected from synchronization rules storehouse Then corresponding rule.
In order to the technological thought of the application is expanded on further, in conjunction with concrete application scene as shown in Figure 3, Technical scheme to the application is illustrated.It is below the explanation of each system in Fig. 3:
Operation system:The system of miscellaneous service, such as payment system, fund management system etc. provide various The system of business.
Risk control system:It is supplied to each operation system to provide and does risk judgment service.
Synchronization rules system:Regular runtime during the business operation higher to requirement of real-time is provided, should The rule of system operation only includes part rule.
Asynchronous algorithm:It is supplied to the regular runtime during business operation without requirement of real-time.Should System operation rule includes all of rule.
Regular monitoring system:For monitoring each regular hit situation, and by the hit situation pair to rule Rule is that scheduling modification is made in synchronous operation or asynchronous operation.
Based on said system, the dynamic adjustment in the specific embodiment for business rule is divided into following two Aspect:
First, the setting of regular monitoring system
The hit situation of each rule is monitored by regular monitoring system.If some rules are when risk occurs, The frequency being hit is higher, then during these rules to increase to the system of synchronous operation.With the hair of business Exhibition, the number of times reduction even 0 that rule is hit in synchronization system, then be moved back into operation in asynchronous system.
2nd, the operation of business rule is set
Rule point is synchronously run with asynchronous two systems:Synchronization system and asynchronous system.When in real time When asking higher, such as payment transaction when then doing risk judgment, only runs synchronous rule.And by synchronous fortune Row result is pulled up a horse and returns to operation system.But asynchronous algorithm operation still is given by the business consultation, For checking whether regular being hit.It is easy to monitoring system to adjusting real time execution according to hit situation Rule.When less demanding to real time execution, then asynchronous system is called.
By the technical scheme using above-described embodiment, synchronous system is divided into by by whole risk judgment system System and asynchronous system, the business rule in only running synchronization system when the task of risk judgment is received, So as to solve the problems, such as that business rule is excessively brought.
To reach above technical purpose, the application also proposed a kind of business risk control device, such as Fig. 4 It is shown, the equipment application in risk control system, including:
First performing module 410, the rule in synchronization rules storehouse performs risk judgment to current business, The hit situation of each rule in output Risk Results, and recording synchronism rule base;
Second performing module 420, the rule in asynchronous rule base performs risk judgment to current business, The hit situation of each rule in asynchronous rule base is recorded, the rule in the asynchronous rule base is execution risk The complete rule set for judging;
Add module 430, when certain the regular hit situation in the asynchronous rule base of the record reaches first When pre-conditioned, during the rule increased into synchronization rules storehouse;
Module 440 is rejected, when certain the regular hit situation in the synchronization rules storehouse of the record is less than second When pre-conditioned, the rule is rejected from synchronization rules storehouse.
In specific application scenarios, the rule in synchronization rules storehouse performs the current industry of risk judgment Business is the business with high real-time requires.
In specific application scenarios, if the business of current pending risk judgment is low for requirement of real-time Business, then in asynchronous rule base rule to current business perform risk judgment, export risk knot Really.
In specific application scenarios, the hit situation is specially the rule and is used to carry out risk to be sentenced The ratio of disconnected number of times and the number of times of the risk judgment for currently performing altogether.
In specific application scenarios, also include:
When the add module receives synchronization rules addition request, the add module is by the synchronization The rule carried in rule addition request is added in the synchronization rules storehouse;
When the rejecting module receives synchronization rules removes request, the rejecting module is from synchronization rules The rule corresponding to the rule for being removed with the synchronization rules and being carried in request is rejected in storehouse.
By the above-mentioned technical proposal of application the application, except the rule in synchronization rules storehouse is to current Each regular hit feelings in recording synchronism rule base while business performs risk and judges to export Risk Results Outside condition, risk judgment is performed to current business always according to the rule in asynchronous rule base, and record asynchronous The hit situation of each rule, certain the regular hit situation in the asynchronous rule base when record in rule base Reach first it is pre-conditioned when the rule is increased into synchronization rules storehouse, and when the synchronous rule of record The rule is picked from synchronization rules storehouse when then certain the regular hit situation in storehouse is pre-conditioned less than second Remove.So as on the premise of ensureing that risk is controllable, improve the treatment effeciency of business risk judgement, and have Reduce to effect the cost of labor and hardware resource required for carrying out business rule adjustment.
Through the above description of the embodiments, those skilled in the art can be understood that this Shen Please be realized by hardware, it is also possible to realized by the mode of software plus necessary general hardware platform. Based on such understanding, the technical scheme of the application can be embodied in the form of software product, and this is soft It (can be CD-ROM, USB flash disk is mobile hard that part product can be stored in a non-volatile memory medium Disk etc.) in, including some instructions are used to so that a computer equipment (can be personal computer, take Business device, or the network equipment etc.) perform method described in the application each implement scene.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, in accompanying drawing Module or necessary to flow not necessarily implements the application.
It will be appreciated by those skilled in the art that the module in device in implement scene can be according to implement scene Description be distributed in the device of implement scene, it is also possible to is carried out respective change and is disposed other than this implementation In one or more devices of scene.The module of above-mentioned implement scene can merge into a module, also may be used To be further split into multiple submodule.
Above-mentioned the application sequence number is for illustration only, and the quality of implement scene is not represented.
Disclosed above is only several specific implementation scenes of the application, but, the application is not limited to This, the changes that any person skilled in the art can think of should all fall into the protection domain of the application.

Claims (10)

1. a kind of business risk control method, is applied in risk control system, it is characterised in that the party Method includes:
Rule in synchronization rules storehouse performs risk judgment to current business, exports Risk Results, and The hit situation of each rule in recording synchronism rule base;
Rule in asynchronous rule base performs risk judgment to current business, in recording asynchronous rule base The hit situation of each rule, the rule in the asynchronous rule base is the complete rule set for performing risk judgment;
When certain the regular hit situation in the asynchronous rule base of the record reach first it is pre-conditioned when, During the rule increased into synchronization rules storehouse;
When certain the regular hit situation in the synchronization rules storehouse of the record is pre-conditioned less than second, The rule is rejected from synchronization rules storehouse.
2. the method for claim 1, it is characterised in that the rule in synchronization rules storehouse is held The current business of row risk judgment is the business with high real-time requires.
3. the method for claim 1, it is characterised in that if current pending risk judgment Business is the low business of requirement of real-time, then the rule in asynchronous rule base performs wind to current business Danger judgement, exports Risk Results.
4. method as claimed in claim 3, it is characterised in that the hit situation is specially the rule Then it is used to carry out the number of times of risk judgment and the ratio of the number of times of the risk judgment for currently performing altogether.
5. the method for claim 1, it is characterised in that also include:
When synchronization rules addition request is received, the rule that will be carried in synchronization rules addition request Added in the synchronization rules storehouse;
When synchronization rules removal request is received, rejected from synchronization rules storehouse and the synchronization rules are moved Except the rule corresponding to the rule of carrying in request.
6. a kind of business risk control device, is applied in risk control system, it is characterised in that this sets It is standby to include:
First performing module, the rule in synchronization rules storehouse performs risk judgment to current business, defeated Go out the hit situation of each rule in Risk Results, and recording synchronism rule base;
Second performing module, the rule in asynchronous rule base performs risk judgment, note to current business The hit situation of each rule in asynchronous rule base is recorded, the rule in the asynchronous rule base is sentenced to perform risk Disconnected complete rule set;
Add module, when certain the regular hit situation in the asynchronous rule base of the record, to reach first pre- If during condition, during the rule increased into synchronization rules storehouse;
Module is rejected, when certain the regular hit situation in the synchronization rules storehouse of the record is pre- less than second If during condition, the rule is rejected from synchronization rules storehouse.
7. equipment as claimed in claim 6, it is characterised in that the rule in synchronization rules storehouse is held The current business of row risk judgment is the business with high real-time requires.
8. equipment as claimed in claim 6, it is characterised in that if current pending risk judgment Business is the low business of requirement of real-time, then the rule in asynchronous rule base performs wind to current business Danger judgement, exports Risk Results.
9. equipment as claimed in claim 8, it is characterised in that the hit situation is specially the rule Then it is used to carry out the number of times of risk judgment and the ratio of the number of times of the risk judgment for currently performing altogether.
10. the method for claim 1, it is characterised in that also include:
When the add module receives synchronization rules addition request, the add module is by the synchronization The rule carried in rule addition request is added in the synchronization rules storehouse;
When the rejecting module receives synchronization rules removes request, the rejecting module is from synchronization rules The rule corresponding to the rule for being removed with the synchronization rules and being carried in request is rejected in storehouse.
CN201510958421.XA 2015-12-18 2015-12-18 Business risk control method and equipment Active CN106897807B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510958421.XA CN106897807B (en) 2015-12-18 2015-12-18 Business risk control method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510958421.XA CN106897807B (en) 2015-12-18 2015-12-18 Business risk control method and equipment

Publications (2)

Publication Number Publication Date
CN106897807A true CN106897807A (en) 2017-06-27
CN106897807B CN106897807B (en) 2021-01-26

Family

ID=59189826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510958421.XA Active CN106897807B (en) 2015-12-18 2015-12-18 Business risk control method and equipment

Country Status (1)

Country Link
CN (1) CN106897807B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107886431A (en) * 2017-10-18 2018-04-06 上海瀚银信息技术有限公司 Financial air control system based on big data and artificial intelligence
CN108985559A (en) * 2018-06-08 2018-12-11 平安科技(深圳)有限公司 Air control data processing method, device, computer equipment and storage medium
CN110728436A (en) * 2019-09-24 2020-01-24 支付宝(杭州)信息技术有限公司 Risk identification method and device, electronic equipment and system
CN110798427A (en) * 2018-08-01 2020-02-14 深信服科技股份有限公司 Anomaly detection method, device and equipment in network security defense

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504745A (en) * 2008-12-04 2009-08-12 阿里巴巴集团控股有限公司 Risk regulation/model establishing and optimizing system and method based on network on-line service
CN101976419A (en) * 2010-10-19 2011-02-16 中国工商银行股份有限公司 Processing method and system for risk monitoring and controlling of transaction data
US20120226563A1 (en) * 2008-10-02 2012-09-06 Quan Lu Segment optimization for targeted advertising
CN104376365A (en) * 2014-11-28 2015-02-25 国家电网公司 Method for constructing information system running rule libraries on basis of association rule mining

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120226563A1 (en) * 2008-10-02 2012-09-06 Quan Lu Segment optimization for targeted advertising
CN101504745A (en) * 2008-12-04 2009-08-12 阿里巴巴集团控股有限公司 Risk regulation/model establishing and optimizing system and method based on network on-line service
CN101976419A (en) * 2010-10-19 2011-02-16 中国工商银行股份有限公司 Processing method and system for risk monitoring and controlling of transaction data
CN104376365A (en) * 2014-11-28 2015-02-25 国家电网公司 Method for constructing information system running rule libraries on basis of association rule mining

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107886431A (en) * 2017-10-18 2018-04-06 上海瀚银信息技术有限公司 Financial air control system based on big data and artificial intelligence
CN108985559A (en) * 2018-06-08 2018-12-11 平安科技(深圳)有限公司 Air control data processing method, device, computer equipment and storage medium
CN110798427A (en) * 2018-08-01 2020-02-14 深信服科技股份有限公司 Anomaly detection method, device and equipment in network security defense
CN110728436A (en) * 2019-09-24 2020-01-24 支付宝(杭州)信息技术有限公司 Risk identification method and device, electronic equipment and system
CN110728436B (en) * 2019-09-24 2022-06-10 支付宝(杭州)信息技术有限公司 Risk identification method and device, electronic equipment and system

Also Published As

Publication number Publication date
CN106897807B (en) 2021-01-26

Similar Documents

Publication Publication Date Title
CN106897807A (en) A kind of business risk control method and equipment
WO2019001126A1 (en) Task management method and device, computer device and storage medium
CN107018091A (en) The dispatching method and device of resource request
CN111553576B (en) Data verification method, device and system suitable for electric power spot market
CN105357199B (en) A kind of cloud computing cognitive resources manage system and method
CN107968802A (en) The method, apparatus and filtering type scheduler of a kind of scheduling of resource
CN105740063A (en) Data processing method and apparatus
CN113179222A (en) Current-limiting control method, device and equipment for hotspot data and storage medium
CN106713375A (en) Method and device for allocating cloud resources
CN109040489B (en) Method and device for distributing telecommunication customer service
CN111835790B (en) Risk identification method, device and system
CN105657471A (en) Account management method and device
CN105224289A (en) A kind of action message matching process and equipment
CN104657207A (en) Remote authorization request scheduling method, service server and scheduling system
CN106802864A (en) A kind of method of testing and device based on financial sector
WO2019200762A1 (en) Insurance platform data processing method, electronic device and computer-readable storage medium
CN110830307B (en) Network capacity expansion method and device
CN114462849A (en) Task balanced distribution method and task balanced distribution device
CN107967650A (en) A kind of batch accounting data processing method and processing device of core banking system
CN107305548A (en) Control the method for allocating tasks and device of web crawlers
CN108268605B (en) Shared space resource management method and system
CN107666508A (en) Programming method, system and the storage medium of terminal device MAC Address
CN107612882B (en) User behavior identification method and device based on intermediate log
CN109120706A (en) Business scheduling method and system
US11023863B2 (en) Machine learning risk assessment utilizing calendar data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200918

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200918

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant