CN109978547A - Risk behavior control method and system, equipment and storage medium - Google Patents

Risk behavior control method and system, equipment and storage medium Download PDF

Info

Publication number
CN109978547A
CN109978547A CN201711465448.0A CN201711465448A CN109978547A CN 109978547 A CN109978547 A CN 109978547A CN 201711465448 A CN201711465448 A CN 201711465448A CN 109978547 A CN109978547 A CN 109978547A
Authority
CN
China
Prior art keywords
risk behavior
risk
behavior
defence
scoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711465448.0A
Other languages
Chinese (zh)
Other versions
CN109978547B (en
Inventor
靳小威
许晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201711465448.0A priority Critical patent/CN109978547B/en
Publication of CN109978547A publication Critical patent/CN109978547A/en
Application granted granted Critical
Publication of CN109978547B publication Critical patent/CN109978547B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of risk behavior control method and systems, equipment and storage medium.Wherein risk behavior control method includes risk behavior scoring step, and the risk behavior scoring step includes: the behavioral data of the kinds of risks behavior of S11, acquisition user;S12, user information and characteristic index item in the behavioral data of each risk behavior are extracted;S13, it is scored using at least one Rating Model according to the risk behavior that the characteristic index item calculates each risk behavior.The present invention is to the independent calculation risk behavior scoring of each risk behavior, so as to accurately identify the risk subscribers of each risk behavior, the defence for being also provided with different risk class otherwise for the risk behavior being likely to occur in business scenario acts, and then Real-time defence service being capable of flexible configuration control strategy, and make risk control strategy that more there is specific aim, improve the Real-time defence effect to risk behavior.

Description

Risk behavior control method and system, equipment and storage medium
Technical field
The present invention relates to Internet technical field more particularly to a kind of risk behavior control method and system, equipment and deposit Storage media.
Background technique
With developing for internet business platform, breed out largely for the marketing subsidy of internet business platform Malicious act.Most of fund of internet business platform marketing activity is consumed by malicious user, without bringing really Customer flow, this affects the normal operation of internet business platform.
For above situation, each internet business platform develops risk recognition & control system all to identify possible influence The risk behavior that internet business platform operates normally, and then corresponding control strategy is taken to risk behavior.Referring to Fig. 1, pass The risk recognition & control system of system mainly includes integrated risk grading module, Unified Control Strategy module and defence service mould Block, wherein integrated risk grading module is used for according to all risk behaviors of user (risk behavior 1, risk behavior 2 ... risk Behavior N) integrated risk scoring is carried out to the user, Unified Control Strategy module is used to according to integrated risk scoring be the user Fixed risk control strategy is configured, defence service module is used to the risk control strategy being applied to internet business platform All business scenarios, to safeguard the normal operation of internet business platform.
Specifically, if user has the risk behavior of lock inventory, after carrying out comprehensive score to the user according to lock inventory, To the user configuration risk control strategy, and the risk control strategy is applied to and is put down including the internet business except lock inventory All scenes (being such as of use certificate marketing activity) of platform, so, even if the user does not have the risk that batch brush is of use certificate Behavior, the user also will receive the limitation of the strategy of risk configuration to the participation for being of use certificate marketing activity.
Therefore, traditional risk behavior identifying system can not accomplish the different business scene for being directed to internet business platform Precisely defence, seriously affects user experience, it is also possible to can lose validated user.
Summary of the invention
The technical problem to be solved by the present invention is to interconnect to overcome risk recognition system in the prior art that can not be directed to The different business scene of net transaction platform does the defect precisely defendd, and provides a kind of risk behavior methods of marking and system, sets Standby and storage medium.
The present invention is to solve above-mentioned technical problem by following technical proposals:
A kind of risk behavior control method, it is characterized in that, including risk behavior scoring step, the risk behavior scoring Step includes:
The behavioral data of the kinds of risks behavior of S11, acquisition user;
S12, user information and characteristic index item in the behavioral data of each risk behavior are extracted;
S13, the risk for calculating each risk behavior according to the characteristic index item using at least one Rating Model Behavior scoring.
Preferably, step S11 is specifically included: collecting the behavioral data of user, filtered out from the behavioral data a variety of Risk behavior acquires the behavioral data of the risk behavior.
Preferably, in step S13, the corresponding Rating Model of the different types of risk behavior is different.
Preferably, the risk behavior control method further includes strategies configuring step, the strategies configuring step includes:
S21, at least one risk behavior is configured for business scenario;
S22, at least one risk class is divided for the risk behavior, the different risk class corresponds to different range Risk behavior scoring;
S23, at least one defence movement is configured for the risk behavior of each risk class.
The step preferably, risk behavior scores further include: S14, the risk behavior scores, the corresponding use Family information and the risk behavior are saved to risk behavior score data library;
The strategies configuring step further include: S24, by the business scenario, the corresponding risk behavior, the risk Grade and defence movement are saved to tactful configuration database.
Preferably, the risk behavior control method further includes Real-time defence step, the Real-time defence step includes:
Behavioral data in S31, real-time capturing service scene, and extract user information;
S32, from the risk row of the behavioral data acquired in real time in obtaining step S31 in risk behavior score data library For scoring;
S33, being scored from the tactful configuration database according to the risk behavior in step S32 obtains and the reality When acquire behavioral data defence accordingly movement;
The defence in S34, combination step S33 acts and generates control strategy;
S35, the business scenario being applied to the control strategy in step S31.
A kind of electronic equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, it is characterized in that, the processor realizes risk row described in any of the above embodiments when executing the computer program For control method.
A kind of computer readable storage medium, is stored thereon with computer program, it is characterized in that, the computer program Risk behavior control method described in any of the above embodiments is realized when being executed by processor.
A kind of risk behavior control system, it is characterized in that, including risk behavior grading module, the risk behavior scoring Module includes:
First acquisition unit, the behavioral data of the kinds of risks behavior for acquiring user;
Extraction unit, the user information and characteristic index in the behavioral data for extracting each risk behavior ?;
First scoring unit, for calculating each wind according to the characteristic index item using at least one Rating Model The risk behavior of dangerous behavior scores.
Preferably, first acquisition unit is specifically used for: collecting the behavioral data of user, sieved from the behavioral data Kinds of risks behavior is selected, the behavioral data of the risk behavior is acquired.
Preferably, the corresponding Rating Model of the different types of risk behavior is different.
Preferably, the risk behavior control system further includes tactful configuration module, the strategy configuration module includes:
First configuration unit, for configuring at least one risk behavior for business scenario;
Risk class division unit, for dividing at least one risk class, the different wind for the risk behavior Dangerous grade corresponds to the risk behavior scoring of different range;
Second configuration unit, it is dynamic for configuring at least one defence for the risk behavior of each risk class Make.
Preferably, the risk behavior grading module further include: the first storage unit, for the risk behavior to be commented Divide, the corresponding user information and the risk behavior are saved to risk behavior score data library;
The strategy configuration module further include: the second storage unit is used for the business scenario, the corresponding risk Behavior, the risk class and defence movement are saved to tactful configuration database.
Preferably, the risk behavior control system further includes Real-time defence module, the Real-time defence module includes:
Second acquisition unit for the behavioral data in real-time capturing service scene, and extracts user information;
Second scoring unit, is adopted in real time for obtaining second acquisition unit from risk behavior score data library The risk behavior of the behavioral data of collection scores;
Third configuration unit, for from the tactful configuration database according to the risk of the second scoring unit Behavior scoring obtains defence movement corresponding with the behavioral data acquired in real time;
Control strategy generation unit, the defence for combining the third configuration of described dispensing unit act and generate control Strategy;
Real-time defence unit, for the control strategy to be applied to the applicable business field of second acquisition unit Scape.
The positive effect of the present invention is that: the present invention is based on the different characteristics of magnanimity behavioral data, are subdivided into Kinds of risks behavior, and the calculating of risk behavior scoring is individually carried out to each risk behavior, it is every so as to accurately identify The risk subscribers of one risk behavior improve the Real-time defence to risk behavior so that risk control strategy more has specific aim Effect.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of traditional risk recognition & control system.
Fig. 2 is the flow chart of the risk behavior control method of the embodiment of the present invention 1.
Fig. 3 is the hardware structural diagram of the electronic equipment of the embodiment of the present invention 2.
Fig. 4 is the flow chart of the risk behavior scoring step of the risk behavior control method of the embodiment of the present invention 4.
Fig. 5 is the flow chart of the strategies configuring step of the risk behavior control method of the embodiment of the present invention 4.
Fig. 6 is the flow chart of the Real-time defence step of the risk behavior control method of the embodiment of the present invention 4.
Fig. 7 is the flow chart of the Real-time defence step of the risk behavior control method of the embodiment of the present invention 7.
Fig. 8 is the structural schematic diagram of the risk behavior control system of the embodiment of the present invention 10.
Fig. 9 is the structural schematic diagram of the risk behavior control system of the embodiment of the present invention 11.
Figure 10 is the structural schematic diagram of the risk behavior control system of the embodiment of the present invention 12.
Specific embodiment
The present invention is further illustrated below by the mode of embodiment, but does not therefore limit the present invention to the reality It applies among a range.
Embodiment 1
Fig. 2 shows the flow charts of the risk behavior control method of the present embodiment, which includes wind Dangerous behavior scoring step, specifically includes as shown in Figure 2:
The behavioral data of the kinds of risks behavior of S101, acquisition user;
S102, user information and characteristic index item in the behavioral data of each risk behavior are extracted;
S103, it is commented using at least one Rating Model according to the risk behavior that characteristic index item calculates each risk behavior Point.
That is, the behavioral data (including off-line data, near-realtime data and real time data) of magnanimity is collected first, it can basis The behavioral data being collected into is screened in business scenario, user behavior track etc., is screened out from it kinds of risks behavior, such as Batch registration, batch are logged in, are placed an order in batches, batch neck certificate, malice are rejected, lock inventory, are deceived and given postal, wash sale etc., then are acquired The behavioral data of each risk behavior;For a certain specific risk behavior, such as lock inventory, collected lock inventory's behavior is extracted Behavioral data in user information and characteristic index item, be respectively used to be directed toward have lock inventory's behavior user and as calculating Lock the parameter of the risk behavior scoring of inventory's behavior;Using corresponding to lock inventory's behavior one or a set of Rating Model, according to The characteristic index item extracted in the behavioral data of acquisition calculates lock inventory's behavior of each user with lock inventory's behavior Risk behavior scoring (including off-line calculation and calculating in real time), standards of grading can refer to the fraction range of 0-100, wherein 0 table Show devoid of risk, score higher, indicates that risk is higher.
The risk behavior control method of the present embodiment is subdivided into a variety of based on the different characteristics of magnanimity behavioral data Risk behavior, and the calculating of risk behavior scoring is individually carried out to each risk behavior, so as to accurately identify each wind The risk subscribers of dangerous behavior, and then more there is specific aim to the defence of risk behavior, improve protection effect.It is understood that It is, it is more careful to the division of risk behavior, it is better to the targetedly protection effect of risk behavior.
Embodiment 2
Fig. 3 shows the hardware structural diagram of the electronic equipment 4 of the present embodiment, and electronic equipment 4 can be with general-purpose computations The form of equipment shows, and such as can be server apparatus.Electronic equipment 4 as shown in Figure 3 specifically includes:
At least one processor 41, at least one processor 42 and for connecting different system components (including processor 41 and memory 42) bus 43, in which:
Bus 43 includes data/address bus, address bus and control bus.
Memory 42 includes volatile memory, such as random access memory (RAM) 421 and/or cache storage Device 422 can further include read-only memory (ROM) 423.
Memory 42 further includes program/utility 425 with one group of (at least one) program module 424, such Program module 424 includes but is not limited to: operating system, one or more application program, other program modules and program number According to the realization that may include network environment in, each of these examples or certain combination.
Processor 41 by the computer program that is stored in memory 42 of operation, thereby executing various function application and Data processing, such as risk behavior control method provided by the embodiment of the present invention 1.
Electronic equipment 4 may further be communicated with one or more external equipments 44 (such as keyboard, sensing equipment etc.).This Kind communication can be carried out by input/output (I/O) interface 45.Also, electronic equipment 4 can also by network adapter 46 with One or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.Net Network adapter 46 is communicated by bus 43 with other modules of electronic equipment 4.It should be understood that although not shown in the drawings, can tie It closes electronic equipment 4 and uses other hardware and/or software module, including but not limited to: microcode, device driver, redundancy processing Device, external disk drive array, RAID (disk array) system, tape drive and data backup storage system etc..
It should be noted that although being referred to several units/modules or subelement/mould of electronic equipment in the above detailed description Block, but it is this division be only exemplary it is not enforceable.In fact, being retouched above according to presently filed embodiment The feature and function for two or more units/modules stated can embody in a units/modules.Conversely, above description A units/modules feature and function can with further division be embodied by multiple units/modules.
Embodiment 3
A kind of computer readable storage medium is present embodiments provided, computer program, described program quilt are stored thereon with Risk behavior control method provided by embodiment 1 is realized when processor executes.
Embodiment 4
The risk behavior control method of the present embodiment is the further improvement to embodiment 1, including risk behavior scoring step Suddenly, strategies configuring step and Real-time defence step, wherein risk behavior scoring step and strategies configuring step divide without successive, Both it can carry out, can also carry out parallel in succession, specifically, Fig. 4 shows the stream of the risk behavior scoring step of the present embodiment Cheng Tu, Fig. 5 show the flow chart of the strategies configuring step of the present embodiment, and Fig. 6 shows the Real-time defence step of the present embodiment Flow chart.
As shown in figure 4, the risk behavior scoring step of the present embodiment is compared with Example 1, further includes: S104, by risk Behavior scoring, corresponding user information and risk behavior are saved to risk behavior score data library, enable subsequent operation fast Speed obtains related risk behavior score data.
As shown in figure 5, strategies configuring step specifically includes:
S201, at least one risk behavior is configured for business scenario;
S202, at least one risk class is divided for risk behavior, different risk class corresponds to the risk of different range Behavior scoring;
S203, at least one defence movement is configured for the risk behavior of each risk class;
S204, the business scenario, the corresponding risk behavior, the risk class and defence movement are saved To tactful configuration database.
On internet business platform include multiple business scenarios, such as register, log in, placing an order, the second kills, rushes to purchase, first The one or more risk behaviors being likely to occur in the scene are analyzed for the business scenario, such as are needed in the business scenario Consider risk behavior X, then configures risk behavior X for the business scenario;At least one risk class is divided for risk behavior X, no With risk class correspond to different range risk behavior scoring, such as [1,25) risk behavior scoring range correspondence the first wind Dangerous grade, [25,50) corresponding second risk class of risk behavior scoring range, [50,75) risk behavior score range pair Third risk class is answered, corresponding 4th risk class of risk behavior scoring range of [75,100];Respectively first to fourth wind The risk behavior X of dangerous grade configures one or more defence movements, the risk behavior X configuration first of for example, the first risk class Defence movement is that the risk behavior X of the second risk class configures the second defence movement and third defence movement, is third risk etc. The risk behavior X of grade configures the 4th defence movement, is that the risk behavior X of the 4th risk class configures the 5th defence movement and the 6th Defence movement;Business scenario, corresponding risk behavior, risk behavior grade and defence movement are saved to tactful configuration data again Library enables subsequent operation quick obtaining in relation to tactful configuration data.Even the business scenario to newly set, can also root It is that the business scenario configures risk behavior, and therefore more flexible the risk behavior in business scenario configures defence according to experience Movement.
As shown in fig. 6, Real-time defence step specifically includes:
Behavioral data in S301, real-time capturing service scenario A, and extract user information;
S302, the risk behavior scoring that the behavioral data acquired in real time is obtained from risk behavior score data library;
S303, from tactful configuration database according to risk behavior scoring obtain it is corresponding with the behavioral data acquired in real time Defence movement;
S304, combination defence act and generate control strategy;
S305, control strategy is applied to business scenario A.
When Real-time defence service is provided in business scenario A, the behavioral data in capturing service scenario A real-time first, and Extract user information;Again from the risk behavior scoring of the behavioral data obtained in risk behavior score data library in business scenario A; It obtains defence corresponding with the behavioral data acquired in real time according to risk behavior scoring from tactful configuration database again to act, example Such as the first defence movement, the second defence movement and third defence movement;First, second, and third defence movement is combined, Configuration data duplicate removal including acting to the first, second, and third defence rearranges combination etc., to simplify intermediate data with life At control strategy;Finally control strategy is applied in business scenario A, to carry out specific aim to business scenario A risk behavior Real-time defence.
The risk behavior control method of the present embodiment is what risk behavior was individually scored in risk behavior scoring step On the basis of, also different wind are respectively provided with for the risk behavior being likely to occur in each scene additionally by strategies configuring step The defence of dangerous grade acts, and is configured flexibly the control strategy of risk behavior, and then carries out in real time in specific business scenario When defence, the behavioral data in business scenario can be analyzed in time, configuration defence movement, for Real-time defence step Using and be on the defensive in real time to risk behavior.
Embodiment 5
Present embodiments provide a kind of electronic equipment, including memory, processor and storage on a memory and can located The computer program run on reason device, the processor realize risk behavior control provided by embodiment 4 when executing described program Method processed.
Embodiment 6
A kind of computer readable storage medium is present embodiments provided, computer program, described program quilt are stored thereon with The step of risk behavior control method provided by embodiment 4 is realized when processor executes.
Embodiment 7
The present embodiment risk behavior control method is the further improvement to embodiment 4, more specifically, the reality of the present embodiment When defence step be to the further refinement in embodiment 4, Fig. 7 shows the flow chart of Real-time defence step.
As shown in fig. 7, the step S302 of Real-time defence step is specifically included:
Whether the risk behavior score data library in S3021, judgment step S104 includes the user information;
If so, going to step 3022;If it is not, then return step S301;
S3022, judge in the risk behavior score data library, the corresponding risk behavior of the user information whether with step S201 is that the risk behavior of business scenario A configuration is identical;
If so, going to step S3023;If it is not, then return step S301;
S3023, risk row corresponding with the user information, the risk behavior is transferred in the risk behavior score data library For scoring.
The step S303 of Real-time defence step is specifically included: S3031, being transferred in the tactful configuration database of step S204 Defence corresponding with the user information, the risk behavior acts.
It needs specifically to judge whether the user in business scenario A there is strategies configuring step to configure for business scenario A Risk behavior, if so, control strategy, which is applied to the user in business scenario A, carries out Real-time defence;If it is not, then continuing pair Behavioral data in business scenario A is monitored.
Certainly, the risk behavior score data library in the present embodiment and the data in tactful configuration database can it is synchronous more It is new to caching redis (one write using ANSI C language open source, support network, it is memory-based also can persistence day Will type, key-value database), guarantee the quick response of data in risk behavior control method.
The risk behavior control method of the present embodiment is the further improvement to embodiment 4, by quilt in each step Transferring and judge to the data of database and/or caching is saved, the processing speed to data is improved, so as to rapidly Risk behavior in business scenario is responded.
Embodiment 8
Present embodiments provide a kind of electronic equipment, including memory, processor and storage on a memory and can located The computer program run on reason device, the processor realize risk behavior control provided by embodiment 7 when executing described program Method processed.
Embodiment 9
A kind of computer readable storage medium is present embodiments provided, computer program, described program quilt are stored thereon with The step of risk behavior control method provided by embodiment 7 is realized when processor executes.
Embodiment 10
Fig. 8 shows the structural schematic diagram of the risk behavior control system of the present embodiment, the risk behavior control system packet Risk behavior grading module 1 is included, is specifically included as shown in Figure 8:
First acquisition unit 11, the behavioral data of the kinds of risks behavior for acquiring user;
Extraction unit 12, the user information and characteristic index item in behavioral data for extracting each risk behavior;
First scoring unit 13, for calculating each risk behavior according to characteristic index item using at least one Rating Model Risk behavior scoring.
That is, the first acquisition unit 11 first collect magnanimity behavioral data (including off-line data, near-realtime data and in real time Data), the behavioral data being collected into can be screened according to business scenario, user behavior track etc., be screened out from it more Kind risk behavior, such as batch registration, batch are logged in, are placed an order in batches, batch neck certificate, malice rejection, lock inventory, are deceived and given postal, void Vacation transaction etc., then acquire the behavioral data of each risk behavior;For a certain specific risk behavior, such as lock inventory, extract single Member 12 extracts user information and characteristic index item in the behavioral data of collected lock inventory's behavior, and being respectively used to be directed toward has The user for locking inventory's behavior and the parameter as the risk behavior scoring for calculating lock inventory's behavior;First scoring unit 13 utilizes phase One or a set of Rating Model of Ying Yusuo inventory's behavior is calculated according to the characteristic index item extracted in the behavioral data of acquisition The risk behavior scoring (including off-line calculation and calculating in real time) of each lock inventory's behavior with the user for locking inventory's behavior, is commented Minute mark, wherein 0 indicates devoid of risk, will definitely be scored higher with the fraction range with reference to 0-100, indicate that risk is higher.
The risk behavior control system of the present embodiment is subdivided into a variety of based on the different characteristics of magnanimity behavioral data Risk behavior, and the calculating of risk behavior scoring is individually carried out to each risk behavior, so as to accurately identify each wind The risk subscribers of dangerous behavior, and then more there is specific aim to the defence of risk behavior, improve protection effect.It is understood that It is, it is more careful to the division of risk behavior, it is better to the targetedly protection effect of risk behavior.
Embodiment 11
The risk behavior control system of the present embodiment is the further improvement to embodiment 10, including risk behavior scoring mould Block 1, tactful configuration module 2 and Real-time defence module 3, specifically, Fig. 9 has gone out the risk behavior control system of the present embodiment Structural schematic diagram.
As shown in figure 9, the risk behavior grading module 1 of the present embodiment is compared with Example 10, further includes: the first storage is single Member 14, for risk behavior to be scored, corresponding user information and risk behavior save to risk behavior score data library so that Subsequent operation being capable of the related risk behavior score data of quick obtaining.
As shown in figure 9, tactful configuration module 2 specifically includes:
First configuration unit 21, for configuring at least one risk behavior for business scenario;
Risk class division unit 22, for dividing at least one risk class, different risk class for risk behavior The risk behavior scoring of corresponding different range;
Second configuration unit 23 configures at least one defence movement for the risk behavior for each risk class;
Second storage unit 24 is used for the business scenario, the corresponding risk behavior, the risk class and institute Defence movement is stated to save to tactful configuration database.
On internet business platform include multiple business scenarios, such as register, log in, placing an order, the second kills, rushes to purchase, first The one or more risk behaviors being likely to occur in the scene are analyzed for the business scenario, such as are needed in the business scenario Consider risk behavior X, then the first configuration unit 21 is that the business scenario configures risk behavior X;Risk class division unit 22 is Risk behavior X divides at least one risk class, and different risk class corresponds to the risk behavior scoring of different range, such as [1,25) corresponding first risk class of risk behavior scoring range, [25,50) corresponding second wind of risk behavior scoring range Dangerous grade, [50,75) risk behavior scoring range correspond to third risk class, the risk behavior of [75,100] scoring range pair Answer the 4th risk class;Second configuration unit 23 is respectively that the risk behavior X of first to fourth risk class configures one or more A defence movement, the risk behavior X of for example, the first risk class configure the first defence movement, are the risk of the second risk class Behavior X configures the second defence movement and third defence movement, is that the 4th defence of risk behavior X configuration of third risk class is dynamic Make, is that the risk behavior X of the 4th risk class configures the 5th defence movement and the 6th defence movement;Again by business scenario, corresponding Risk behavior, risk behavior grade and defence movement save to tactful configuration database, subsequent operation is quickly obtained Take related tactful configuration data.Even the business scenario to newly set, business scenario configuration wind can also be empirically for Dangerous behavior, and therefore more flexible the risk behavior configuration defence movement in business scenario.
As shown in figure 9, Real-time defence module 3 specifically includes:
Second acquisition unit 31 for the behavioral data in real-time capturing service scenario A, and extracts user information;
Second scoring unit 32, for obtaining the risk of the behavioral data acquired in real time from risk behavior score data library Behavior scoring;
Third configuration unit 33, for what is obtained from tactful configuration database according to risk behavior scoring and acquired in real time Behavioral data defence accordingly movement;
Control strategy generation unit 34 acts for combining defence and generates control strategy;
Real-time defence unit 35, for control strategy to be applied to business scenario A.
When Real-time defence service is provided in business scenario A, first in the real-time capturing service scenario A of the second acquisition unit 31 Behavioral data, and extract user information;Second scoring unit 32 obtains business scenario A from risk behavior score data library again In behavioral data risk behavior scoring;Third configuration unit 33 scores from tactful configuration database according to risk behavior again Defence movement corresponding with the behavioral data acquired in real time is obtained, such as the first defence movement, the second defence movement and third are prevented Imperial movement;Control strategy generation unit 34 is combined the first, second, and third defence movement, including to the first, second He The configuration data duplicate removal of third defence movement rearranges combination etc., to simplify intermediate data to generate control strategy;It is last real When defence unit 35 control strategy is applied in business scenario A, it is targetedly real to be carried out to business scenario A risk behavior When defend.
The risk behavior control system of the present embodiment is that risk behavior is individually scored in risk behavior grading module 1 On the basis of, also it is respectively provided with not additionally by tactful configuration module 2 for the risk behavior being likely to occur in each scene Defence with risk class acts, and is configured flexibly the control strategy of risk behavior, and then carry out in specific business scenario When Real-time defence, the behavioral data in business scenario can be analyzed in time, configuration defence movement, for Real-time defence Module 3 is used and is on the defensive in real time to risk behavior.
Embodiment 12
The present embodiment risk behavior control method is the further improvement to embodiment 11, more specifically, the present embodiment Real-time defence module 3 is to the further refinement in embodiment 11, and Figure 10 shows the structural representation of risk behavior control system Figure.
As shown in Figure 10, the second scoring unit 32 of Real-time defence module 3 specifically includes:
First judging unit 321, for judge the risk behavior score data library in the first storage unit 14 whether include The user information;
Second judgment unit 322, for when the first judging unit 36 is judged as YES, judging in risk behavior scoring number According in library, whether the corresponding risk behavior of the user information is the risk behavior of business scenario A configuration with the first configuration unit 21 It is identical;
First transfers unit 323, for when second judgment unit 37 is judged as YES, in the risk behavior score data library In transfer risk behavior corresponding with the user information, the risk behavior and score.
The third configuration unit 33 of Real-time defence module 3 specifically includes: second transfers unit 331, in the second storage Defence corresponding with the user information, the risk behavior is transferred in the tactful configuration database of unit 24 to act.
It needs specifically to judge whether the user in business scenario A there is tactful configuration module 2 to configure for business scenario A Risk behavior, if so, control strategy, which is applied to the user in business scenario A, carries out Real-time defence;If it is not, then continuing pair Behavioral data in business scenario A is monitored.
Certainly, the risk behavior score data library in the present embodiment and the data in tactful configuration database can it is synchronous more It is new to caching redis (one write using ANSI C language open source, support network, it is memory-based also can persistence day Will type, key-value database), guarantee the quick response of data in risk behavior control method.
The risk behavior control system of the present embodiment is the further improvement to embodiment 11, by quilt in modules Transferring and judge to the data of database and/or caching is saved, the processing speed to data is improved, so as to rapidly Risk behavior in business scenario is responded.
Although specific embodiments of the present invention have been described above, it will be appreciated by those of skill in the art that this is only For example, protection scope of the present invention is to be defined by the appended claims.Those skilled in the art without departing substantially from Under the premise of the principle and substance of the present invention, many changes and modifications may be made, but these change and Modification each falls within protection scope of the present invention.

Claims (14)

1. a kind of risk behavior control method, which is characterized in that including risk behavior scoring step, the risk behavior scoring step Suddenly include:
The behavioral data of the kinds of risks behavior of S11, acquisition user;
S12, user information and characteristic index item in the behavioral data of each risk behavior are extracted;
S13, the risk behavior for calculating each risk behavior according to the characteristic index item using at least one Rating Model Scoring.
2. risk behavior control method as described in claim 1, which is characterized in that step S11 is specifically included:
The behavioral data for collecting user, kinds of risks behavior is filtered out from the behavioral data, acquires the risk behavior The behavioral data.
3. risk behavior control method as described in claim 1, which is characterized in that in step S13, the different types of wind The corresponding Rating Model of dangerous behavior is different.
4. risk behavior control method as described in claim 1, which is characterized in that the risk behavior control method further includes Strategies configuring step, the strategies configuring step include:
S21, at least one risk behavior is configured for business scenario;
S22, at least one risk class is divided for the risk behavior, the different risk class corresponds to the wind of different range Dangerous behavior scoring;
S23, at least one defence movement is configured for the risk behavior of each risk class.
5. risk behavior control method as claimed in claim 4, which is characterized in that
The risk behavior scores step further include: S14, by risk behavior scoring, the corresponding user information and institute Risk behavior is stated to save to risk behavior score data library;
The strategies configuring step further include: S24, by the business scenario, the corresponding risk behavior, the risk class It saves with defence movement to tactful configuration database.
6. risk behavior control method as claimed in claim 5, which is characterized in that the risk behavior control method further includes Real-time defence step, the Real-time defence step include:
Behavioral data in S31, real-time capturing service scene, and extract user information;
S32, it is commented from the risk behavior of the behavioral data acquired in real time in obtaining step S31 in risk behavior score data library Point;
S33, it is obtained from the tactful configuration database according to the risk behavior scoring in step S32 and is adopted in real time with described The behavioral data of collection defence accordingly movement;
The defence in S34, combination step S33 acts and generates control strategy;
S35, the business scenario being applied to the control strategy in step S31.
7. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor is realized as described in any one of claim 1-6 when executing the computer program Risk behavior control method.
8. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt Such as risk behavior control method of any of claims 1-6 is realized when processor executes.
9. a kind of risk behavior control system, which is characterized in that including risk behavior grading module, the risk behavior scoring mould Block includes:
First acquisition unit, the behavioral data of the kinds of risks behavior for acquiring user;
Extraction unit, the user information and characteristic index item in the behavioral data for extracting each risk behavior;
First scoring unit, for calculating each risk row according to the characteristic index item using at least one Rating Model For risk behavior scoring.
10. risk behavior control system as claimed in claim 9, which is characterized in that first acquisition unit is specifically used for:
The behavioral data for collecting user, kinds of risks behavior is filtered out from the behavioral data, acquires the risk behavior The behavioral data.
11. risk behavior control system as claimed in claim 9, which is characterized in that the different types of risk behavior pair The Rating Model answered is different.
12. risk behavior control system as claimed in claim 9, which is characterized in that the risk behavior control system is also wrapped Tactful configuration module is included, the strategy configuration module includes:
First configuration unit, for configuring at least one risk behavior for business scenario;
Risk class division unit, for dividing at least one risk class, the different risks etc. for the risk behavior The risk behavior scoring of the corresponding different range of grade;
Second configuration unit, for configuring at least one defence movement for the risk behavior of each risk class.
13. risk behavior control system as claimed in claim 12, which is characterized in that
The risk behavior grading module further include: the first storage unit is used to score the risk behavior, is corresponding described User information and the risk behavior are saved to risk behavior score data library;
The strategy configuration module further include: the second storage unit is used for the business scenario, the corresponding risk row It saves for, the risk class and defence movement to tactful configuration database.
14. risk behavior control system as claimed in claim 13, which is characterized in that the risk behavior control system is also wrapped Real-time defence module is included, the Real-time defence module includes:
Second acquisition unit for the behavioral data in real-time capturing service scene, and extracts user information;
Second scoring unit, for obtaining what second acquisition unit acquired in real time from risk behavior score data library The risk behavior of behavioral data scores;
Third configuration unit, for from the tactful configuration database according to the risk behavior of the second scoring unit Scoring obtains defence movement corresponding with the behavioral data acquired in real time;
Control strategy generation unit, the defence for combining the third configuration of described dispensing unit act and generate control plan Slightly;
Real-time defence unit, for the control strategy to be applied to the business scenario of the second acquisition unit application.
CN201711465448.0A 2017-12-28 2017-12-28 Risk behavior control method, risk behavior control system, risk behavior control device and storage medium Active CN109978547B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711465448.0A CN109978547B (en) 2017-12-28 2017-12-28 Risk behavior control method, risk behavior control system, risk behavior control device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711465448.0A CN109978547B (en) 2017-12-28 2017-12-28 Risk behavior control method, risk behavior control system, risk behavior control device and storage medium

Publications (2)

Publication Number Publication Date
CN109978547A true CN109978547A (en) 2019-07-05
CN109978547B CN109978547B (en) 2021-08-03

Family

ID=67075269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711465448.0A Active CN109978547B (en) 2017-12-28 2017-12-28 Risk behavior control method, risk behavior control system, risk behavior control device and storage medium

Country Status (1)

Country Link
CN (1) CN109978547B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131166A (en) * 2019-11-28 2020-05-08 重庆小雨点小额贷款有限公司 User behavior prejudging method and related equipment
CN111429145A (en) * 2020-03-26 2020-07-17 深圳市腾讯计算机系统有限公司 Risk control method and device for electronic transaction and electronic equipment
CN113420941A (en) * 2021-07-16 2021-09-21 湖南快乐阳光互动娱乐传媒有限公司 Risk prediction method and device for user behavior
CN114881711A (en) * 2022-07-11 2022-08-09 荣耀终端有限公司 Method for carrying out anomaly analysis based on request behavior and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022539A (en) * 2007-02-15 2007-08-22 华为技术有限公司 Method, system, interactive EPG and business middleware for realizing business service control
CN101132300A (en) * 2007-08-22 2008-02-27 华为技术有限公司 Multimedia business implementing system, method and relevant device
CN102752142A (en) * 2012-07-05 2012-10-24 深圳市易聆科信息技术有限公司 Monitoring method and system based on multidimensional modeled information system
CN104142970A (en) * 2013-11-26 2014-11-12 深圳市雁联计算系统有限公司 Operation control system and method
CN106022800A (en) * 2016-05-16 2016-10-12 北京百分点信息科技有限公司 User feature data processing method and device
US20170124665A1 (en) * 2012-02-17 2017-05-04 Facebook, Inc. Social distribution of emergency status
CN107067157A (en) * 2017-03-01 2017-08-18 北京奇艺世纪科技有限公司 Business risk appraisal procedure, device and air control system
US20170359220A1 (en) * 2016-06-02 2017-12-14 Zscaler, Inc. Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022539A (en) * 2007-02-15 2007-08-22 华为技术有限公司 Method, system, interactive EPG and business middleware for realizing business service control
CN101132300A (en) * 2007-08-22 2008-02-27 华为技术有限公司 Multimedia business implementing system, method and relevant device
US20170124665A1 (en) * 2012-02-17 2017-05-04 Facebook, Inc. Social distribution of emergency status
CN102752142A (en) * 2012-07-05 2012-10-24 深圳市易聆科信息技术有限公司 Monitoring method and system based on multidimensional modeled information system
CN104142970A (en) * 2013-11-26 2014-11-12 深圳市雁联计算系统有限公司 Operation control system and method
CN106022800A (en) * 2016-05-16 2016-10-12 北京百分点信息科技有限公司 User feature data processing method and device
US20170359220A1 (en) * 2016-06-02 2017-12-14 Zscaler, Inc. Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups
CN107067157A (en) * 2017-03-01 2017-08-18 北京奇艺世纪科技有限公司 Business risk appraisal procedure, device and air control system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131166A (en) * 2019-11-28 2020-05-08 重庆小雨点小额贷款有限公司 User behavior prejudging method and related equipment
CN111429145A (en) * 2020-03-26 2020-07-17 深圳市腾讯计算机系统有限公司 Risk control method and device for electronic transaction and electronic equipment
CN111429145B (en) * 2020-03-26 2022-04-01 深圳市腾讯计算机系统有限公司 Risk control method and device for electronic transaction and electronic equipment
CN113420941A (en) * 2021-07-16 2021-09-21 湖南快乐阳光互动娱乐传媒有限公司 Risk prediction method and device for user behavior
CN114881711A (en) * 2022-07-11 2022-08-09 荣耀终端有限公司 Method for carrying out anomaly analysis based on request behavior and electronic equipment

Also Published As

Publication number Publication date
CN109978547B (en) 2021-08-03

Similar Documents

Publication Publication Date Title
CN109978547A (en) Risk behavior control method and system, equipment and storage medium
US20170109657A1 (en) Machine Learning-Based Model for Identifying Executions of a Business Process
CN109120429B (en) Risk identification method and system
CN107273267A (en) Log analysis method based on elastic components
CN109120428B (en) Method and system for wind control analysis
US20170109676A1 (en) Generation of Candidate Sequences Using Links Between Nonconsecutively Performed Steps of a Business Process
CN106844220A (en) A kind of method of testing and system of simulation computer web application real running environment
CN106888106A (en) The extensive detecting system of IT assets in intelligent grid
US20170109667A1 (en) Automaton-Based Identification of Executions of a Business Process
US20160055044A1 (en) Fault analysis method, fault analysis system, and storage medium
CN112003920B (en) Information sharing system
US20170109636A1 (en) Crowd-Based Model for Identifying Executions of a Business Process
CN102073579B (en) Method for merging and optimizing audit events of Linux file system
CN106027406A (en) NS3 simulation system flow importing method based on Netflow
CN110764980A (en) Log processing method and device
CN106209920A (en) The safety protecting method of a kind of dns server and device
CN107409134A (en) Method card analysis
US20170109638A1 (en) Ensemble-Based Identification of Executions of a Business Process
CN105553732B (en) A kind of distributed network analogy method and system
CN106559498A (en) Air control data collection platform and its collection method
CN106067879A (en) The detection method of information and device
CN111612085A (en) Method and device for detecting abnormal point in peer-to-peer group
CN104486337B (en) Validation of Data method and device
CN110071918A (en) A kind of data communications method and device based on mixed cloud
CN108459960A (en) Method of automatic configuration, device, equipment and the storage medium of test environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant