CN109978547A - Risk behavior control method and system, equipment and storage medium - Google Patents
Risk behavior control method and system, equipment and storage medium Download PDFInfo
- Publication number
- CN109978547A CN109978547A CN201711465448.0A CN201711465448A CN109978547A CN 109978547 A CN109978547 A CN 109978547A CN 201711465448 A CN201711465448 A CN 201711465448A CN 109978547 A CN109978547 A CN 109978547A
- Authority
- CN
- China
- Prior art keywords
- risk behavior
- risk
- behavior
- defence
- scoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of risk behavior control method and systems, equipment and storage medium.Wherein risk behavior control method includes risk behavior scoring step, and the risk behavior scoring step includes: the behavioral data of the kinds of risks behavior of S11, acquisition user;S12, user information and characteristic index item in the behavioral data of each risk behavior are extracted;S13, it is scored using at least one Rating Model according to the risk behavior that the characteristic index item calculates each risk behavior.The present invention is to the independent calculation risk behavior scoring of each risk behavior, so as to accurately identify the risk subscribers of each risk behavior, the defence for being also provided with different risk class otherwise for the risk behavior being likely to occur in business scenario acts, and then Real-time defence service being capable of flexible configuration control strategy, and make risk control strategy that more there is specific aim, improve the Real-time defence effect to risk behavior.
Description
Technical field
The present invention relates to Internet technical field more particularly to a kind of risk behavior control method and system, equipment and deposit
Storage media.
Background technique
With developing for internet business platform, breed out largely for the marketing subsidy of internet business platform
Malicious act.Most of fund of internet business platform marketing activity is consumed by malicious user, without bringing really
Customer flow, this affects the normal operation of internet business platform.
For above situation, each internet business platform develops risk recognition & control system all to identify possible influence
The risk behavior that internet business platform operates normally, and then corresponding control strategy is taken to risk behavior.Referring to Fig. 1, pass
The risk recognition & control system of system mainly includes integrated risk grading module, Unified Control Strategy module and defence service mould
Block, wherein integrated risk grading module is used for according to all risk behaviors of user (risk behavior 1, risk behavior 2 ... risk
Behavior N) integrated risk scoring is carried out to the user, Unified Control Strategy module is used to according to integrated risk scoring be the user
Fixed risk control strategy is configured, defence service module is used to the risk control strategy being applied to internet business platform
All business scenarios, to safeguard the normal operation of internet business platform.
Specifically, if user has the risk behavior of lock inventory, after carrying out comprehensive score to the user according to lock inventory,
To the user configuration risk control strategy, and the risk control strategy is applied to and is put down including the internet business except lock inventory
All scenes (being such as of use certificate marketing activity) of platform, so, even if the user does not have the risk that batch brush is of use certificate
Behavior, the user also will receive the limitation of the strategy of risk configuration to the participation for being of use certificate marketing activity.
Therefore, traditional risk behavior identifying system can not accomplish the different business scene for being directed to internet business platform
Precisely defence, seriously affects user experience, it is also possible to can lose validated user.
Summary of the invention
The technical problem to be solved by the present invention is to interconnect to overcome risk recognition system in the prior art that can not be directed to
The different business scene of net transaction platform does the defect precisely defendd, and provides a kind of risk behavior methods of marking and system, sets
Standby and storage medium.
The present invention is to solve above-mentioned technical problem by following technical proposals:
A kind of risk behavior control method, it is characterized in that, including risk behavior scoring step, the risk behavior scoring
Step includes:
The behavioral data of the kinds of risks behavior of S11, acquisition user;
S12, user information and characteristic index item in the behavioral data of each risk behavior are extracted;
S13, the risk for calculating each risk behavior according to the characteristic index item using at least one Rating Model
Behavior scoring.
Preferably, step S11 is specifically included: collecting the behavioral data of user, filtered out from the behavioral data a variety of
Risk behavior acquires the behavioral data of the risk behavior.
Preferably, in step S13, the corresponding Rating Model of the different types of risk behavior is different.
Preferably, the risk behavior control method further includes strategies configuring step, the strategies configuring step includes:
S21, at least one risk behavior is configured for business scenario;
S22, at least one risk class is divided for the risk behavior, the different risk class corresponds to different range
Risk behavior scoring;
S23, at least one defence movement is configured for the risk behavior of each risk class.
The step preferably, risk behavior scores further include: S14, the risk behavior scores, the corresponding use
Family information and the risk behavior are saved to risk behavior score data library;
The strategies configuring step further include: S24, by the business scenario, the corresponding risk behavior, the risk
Grade and defence movement are saved to tactful configuration database.
Preferably, the risk behavior control method further includes Real-time defence step, the Real-time defence step includes:
Behavioral data in S31, real-time capturing service scene, and extract user information;
S32, from the risk row of the behavioral data acquired in real time in obtaining step S31 in risk behavior score data library
For scoring;
S33, being scored from the tactful configuration database according to the risk behavior in step S32 obtains and the reality
When acquire behavioral data defence accordingly movement;
The defence in S34, combination step S33 acts and generates control strategy;
S35, the business scenario being applied to the control strategy in step S31.
A kind of electronic equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, it is characterized in that, the processor realizes risk row described in any of the above embodiments when executing the computer program
For control method.
A kind of computer readable storage medium, is stored thereon with computer program, it is characterized in that, the computer program
Risk behavior control method described in any of the above embodiments is realized when being executed by processor.
A kind of risk behavior control system, it is characterized in that, including risk behavior grading module, the risk behavior scoring
Module includes:
First acquisition unit, the behavioral data of the kinds of risks behavior for acquiring user;
Extraction unit, the user information and characteristic index in the behavioral data for extracting each risk behavior
?;
First scoring unit, for calculating each wind according to the characteristic index item using at least one Rating Model
The risk behavior of dangerous behavior scores.
Preferably, first acquisition unit is specifically used for: collecting the behavioral data of user, sieved from the behavioral data
Kinds of risks behavior is selected, the behavioral data of the risk behavior is acquired.
Preferably, the corresponding Rating Model of the different types of risk behavior is different.
Preferably, the risk behavior control system further includes tactful configuration module, the strategy configuration module includes:
First configuration unit, for configuring at least one risk behavior for business scenario;
Risk class division unit, for dividing at least one risk class, the different wind for the risk behavior
Dangerous grade corresponds to the risk behavior scoring of different range;
Second configuration unit, it is dynamic for configuring at least one defence for the risk behavior of each risk class
Make.
Preferably, the risk behavior grading module further include: the first storage unit, for the risk behavior to be commented
Divide, the corresponding user information and the risk behavior are saved to risk behavior score data library;
The strategy configuration module further include: the second storage unit is used for the business scenario, the corresponding risk
Behavior, the risk class and defence movement are saved to tactful configuration database.
Preferably, the risk behavior control system further includes Real-time defence module, the Real-time defence module includes:
Second acquisition unit for the behavioral data in real-time capturing service scene, and extracts user information;
Second scoring unit, is adopted in real time for obtaining second acquisition unit from risk behavior score data library
The risk behavior of the behavioral data of collection scores;
Third configuration unit, for from the tactful configuration database according to the risk of the second scoring unit
Behavior scoring obtains defence movement corresponding with the behavioral data acquired in real time;
Control strategy generation unit, the defence for combining the third configuration of described dispensing unit act and generate control
Strategy;
Real-time defence unit, for the control strategy to be applied to the applicable business field of second acquisition unit
Scape.
The positive effect of the present invention is that: the present invention is based on the different characteristics of magnanimity behavioral data, are subdivided into
Kinds of risks behavior, and the calculating of risk behavior scoring is individually carried out to each risk behavior, it is every so as to accurately identify
The risk subscribers of one risk behavior improve the Real-time defence to risk behavior so that risk control strategy more has specific aim
Effect.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of traditional risk recognition & control system.
Fig. 2 is the flow chart of the risk behavior control method of the embodiment of the present invention 1.
Fig. 3 is the hardware structural diagram of the electronic equipment of the embodiment of the present invention 2.
Fig. 4 is the flow chart of the risk behavior scoring step of the risk behavior control method of the embodiment of the present invention 4.
Fig. 5 is the flow chart of the strategies configuring step of the risk behavior control method of the embodiment of the present invention 4.
Fig. 6 is the flow chart of the Real-time defence step of the risk behavior control method of the embodiment of the present invention 4.
Fig. 7 is the flow chart of the Real-time defence step of the risk behavior control method of the embodiment of the present invention 7.
Fig. 8 is the structural schematic diagram of the risk behavior control system of the embodiment of the present invention 10.
Fig. 9 is the structural schematic diagram of the risk behavior control system of the embodiment of the present invention 11.
Figure 10 is the structural schematic diagram of the risk behavior control system of the embodiment of the present invention 12.
Specific embodiment
The present invention is further illustrated below by the mode of embodiment, but does not therefore limit the present invention to the reality
It applies among a range.
Embodiment 1
Fig. 2 shows the flow charts of the risk behavior control method of the present embodiment, which includes wind
Dangerous behavior scoring step, specifically includes as shown in Figure 2:
The behavioral data of the kinds of risks behavior of S101, acquisition user;
S102, user information and characteristic index item in the behavioral data of each risk behavior are extracted;
S103, it is commented using at least one Rating Model according to the risk behavior that characteristic index item calculates each risk behavior
Point.
That is, the behavioral data (including off-line data, near-realtime data and real time data) of magnanimity is collected first, it can basis
The behavioral data being collected into is screened in business scenario, user behavior track etc., is screened out from it kinds of risks behavior, such as
Batch registration, batch are logged in, are placed an order in batches, batch neck certificate, malice are rejected, lock inventory, are deceived and given postal, wash sale etc., then are acquired
The behavioral data of each risk behavior;For a certain specific risk behavior, such as lock inventory, collected lock inventory's behavior is extracted
Behavioral data in user information and characteristic index item, be respectively used to be directed toward have lock inventory's behavior user and as calculating
Lock the parameter of the risk behavior scoring of inventory's behavior;Using corresponding to lock inventory's behavior one or a set of Rating Model, according to
The characteristic index item extracted in the behavioral data of acquisition calculates lock inventory's behavior of each user with lock inventory's behavior
Risk behavior scoring (including off-line calculation and calculating in real time), standards of grading can refer to the fraction range of 0-100, wherein 0 table
Show devoid of risk, score higher, indicates that risk is higher.
The risk behavior control method of the present embodiment is subdivided into a variety of based on the different characteristics of magnanimity behavioral data
Risk behavior, and the calculating of risk behavior scoring is individually carried out to each risk behavior, so as to accurately identify each wind
The risk subscribers of dangerous behavior, and then more there is specific aim to the defence of risk behavior, improve protection effect.It is understood that
It is, it is more careful to the division of risk behavior, it is better to the targetedly protection effect of risk behavior.
Embodiment 2
Fig. 3 shows the hardware structural diagram of the electronic equipment 4 of the present embodiment, and electronic equipment 4 can be with general-purpose computations
The form of equipment shows, and such as can be server apparatus.Electronic equipment 4 as shown in Figure 3 specifically includes:
At least one processor 41, at least one processor 42 and for connecting different system components (including processor
41 and memory 42) bus 43, in which:
Bus 43 includes data/address bus, address bus and control bus.
Memory 42 includes volatile memory, such as random access memory (RAM) 421 and/or cache storage
Device 422 can further include read-only memory (ROM) 423.
Memory 42 further includes program/utility 425 with one group of (at least one) program module 424, such
Program module 424 includes but is not limited to: operating system, one or more application program, other program modules and program number
According to the realization that may include network environment in, each of these examples or certain combination.
Processor 41 by the computer program that is stored in memory 42 of operation, thereby executing various function application and
Data processing, such as risk behavior control method provided by the embodiment of the present invention 1.
Electronic equipment 4 may further be communicated with one or more external equipments 44 (such as keyboard, sensing equipment etc.).This
Kind communication can be carried out by input/output (I/O) interface 45.Also, electronic equipment 4 can also by network adapter 46 with
One or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.Net
Network adapter 46 is communicated by bus 43 with other modules of electronic equipment 4.It should be understood that although not shown in the drawings, can tie
It closes electronic equipment 4 and uses other hardware and/or software module, including but not limited to: microcode, device driver, redundancy processing
Device, external disk drive array, RAID (disk array) system, tape drive and data backup storage system etc..
It should be noted that although being referred to several units/modules or subelement/mould of electronic equipment in the above detailed description
Block, but it is this division be only exemplary it is not enforceable.In fact, being retouched above according to presently filed embodiment
The feature and function for two or more units/modules stated can embody in a units/modules.Conversely, above description
A units/modules feature and function can with further division be embodied by multiple units/modules.
Embodiment 3
A kind of computer readable storage medium is present embodiments provided, computer program, described program quilt are stored thereon with
Risk behavior control method provided by embodiment 1 is realized when processor executes.
Embodiment 4
The risk behavior control method of the present embodiment is the further improvement to embodiment 1, including risk behavior scoring step
Suddenly, strategies configuring step and Real-time defence step, wherein risk behavior scoring step and strategies configuring step divide without successive,
Both it can carry out, can also carry out parallel in succession, specifically, Fig. 4 shows the stream of the risk behavior scoring step of the present embodiment
Cheng Tu, Fig. 5 show the flow chart of the strategies configuring step of the present embodiment, and Fig. 6 shows the Real-time defence step of the present embodiment
Flow chart.
As shown in figure 4, the risk behavior scoring step of the present embodiment is compared with Example 1, further includes: S104, by risk
Behavior scoring, corresponding user information and risk behavior are saved to risk behavior score data library, enable subsequent operation fast
Speed obtains related risk behavior score data.
As shown in figure 5, strategies configuring step specifically includes:
S201, at least one risk behavior is configured for business scenario;
S202, at least one risk class is divided for risk behavior, different risk class corresponds to the risk of different range
Behavior scoring;
S203, at least one defence movement is configured for the risk behavior of each risk class;
S204, the business scenario, the corresponding risk behavior, the risk class and defence movement are saved
To tactful configuration database.
On internet business platform include multiple business scenarios, such as register, log in, placing an order, the second kills, rushes to purchase, first
The one or more risk behaviors being likely to occur in the scene are analyzed for the business scenario, such as are needed in the business scenario
Consider risk behavior X, then configures risk behavior X for the business scenario;At least one risk class is divided for risk behavior X, no
With risk class correspond to different range risk behavior scoring, such as [1,25) risk behavior scoring range correspondence the first wind
Dangerous grade, [25,50) corresponding second risk class of risk behavior scoring range, [50,75) risk behavior score range pair
Third risk class is answered, corresponding 4th risk class of risk behavior scoring range of [75,100];Respectively first to fourth wind
The risk behavior X of dangerous grade configures one or more defence movements, the risk behavior X configuration first of for example, the first risk class
Defence movement is that the risk behavior X of the second risk class configures the second defence movement and third defence movement, is third risk etc.
The risk behavior X of grade configures the 4th defence movement, is that the risk behavior X of the 4th risk class configures the 5th defence movement and the 6th
Defence movement;Business scenario, corresponding risk behavior, risk behavior grade and defence movement are saved to tactful configuration data again
Library enables subsequent operation quick obtaining in relation to tactful configuration data.Even the business scenario to newly set, can also root
It is that the business scenario configures risk behavior, and therefore more flexible the risk behavior in business scenario configures defence according to experience
Movement.
As shown in fig. 6, Real-time defence step specifically includes:
Behavioral data in S301, real-time capturing service scenario A, and extract user information;
S302, the risk behavior scoring that the behavioral data acquired in real time is obtained from risk behavior score data library;
S303, from tactful configuration database according to risk behavior scoring obtain it is corresponding with the behavioral data acquired in real time
Defence movement;
S304, combination defence act and generate control strategy;
S305, control strategy is applied to business scenario A.
When Real-time defence service is provided in business scenario A, the behavioral data in capturing service scenario A real-time first, and
Extract user information;Again from the risk behavior scoring of the behavioral data obtained in risk behavior score data library in business scenario A;
It obtains defence corresponding with the behavioral data acquired in real time according to risk behavior scoring from tactful configuration database again to act, example
Such as the first defence movement, the second defence movement and third defence movement;First, second, and third defence movement is combined,
Configuration data duplicate removal including acting to the first, second, and third defence rearranges combination etc., to simplify intermediate data with life
At control strategy;Finally control strategy is applied in business scenario A, to carry out specific aim to business scenario A risk behavior
Real-time defence.
The risk behavior control method of the present embodiment is what risk behavior was individually scored in risk behavior scoring step
On the basis of, also different wind are respectively provided with for the risk behavior being likely to occur in each scene additionally by strategies configuring step
The defence of dangerous grade acts, and is configured flexibly the control strategy of risk behavior, and then carries out in real time in specific business scenario
When defence, the behavioral data in business scenario can be analyzed in time, configuration defence movement, for Real-time defence step
Using and be on the defensive in real time to risk behavior.
Embodiment 5
Present embodiments provide a kind of electronic equipment, including memory, processor and storage on a memory and can located
The computer program run on reason device, the processor realize risk behavior control provided by embodiment 4 when executing described program
Method processed.
Embodiment 6
A kind of computer readable storage medium is present embodiments provided, computer program, described program quilt are stored thereon with
The step of risk behavior control method provided by embodiment 4 is realized when processor executes.
Embodiment 7
The present embodiment risk behavior control method is the further improvement to embodiment 4, more specifically, the reality of the present embodiment
When defence step be to the further refinement in embodiment 4, Fig. 7 shows the flow chart of Real-time defence step.
As shown in fig. 7, the step S302 of Real-time defence step is specifically included:
Whether the risk behavior score data library in S3021, judgment step S104 includes the user information;
If so, going to step 3022;If it is not, then return step S301;
S3022, judge in the risk behavior score data library, the corresponding risk behavior of the user information whether with step
S201 is that the risk behavior of business scenario A configuration is identical;
If so, going to step S3023;If it is not, then return step S301;
S3023, risk row corresponding with the user information, the risk behavior is transferred in the risk behavior score data library
For scoring.
The step S303 of Real-time defence step is specifically included: S3031, being transferred in the tactful configuration database of step S204
Defence corresponding with the user information, the risk behavior acts.
It needs specifically to judge whether the user in business scenario A there is strategies configuring step to configure for business scenario A
Risk behavior, if so, control strategy, which is applied to the user in business scenario A, carries out Real-time defence;If it is not, then continuing pair
Behavioral data in business scenario A is monitored.
Certainly, the risk behavior score data library in the present embodiment and the data in tactful configuration database can it is synchronous more
It is new to caching redis (one write using ANSI C language open source, support network, it is memory-based also can persistence day
Will type, key-value database), guarantee the quick response of data in risk behavior control method.
The risk behavior control method of the present embodiment is the further improvement to embodiment 4, by quilt in each step
Transferring and judge to the data of database and/or caching is saved, the processing speed to data is improved, so as to rapidly
Risk behavior in business scenario is responded.
Embodiment 8
Present embodiments provide a kind of electronic equipment, including memory, processor and storage on a memory and can located
The computer program run on reason device, the processor realize risk behavior control provided by embodiment 7 when executing described program
Method processed.
Embodiment 9
A kind of computer readable storage medium is present embodiments provided, computer program, described program quilt are stored thereon with
The step of risk behavior control method provided by embodiment 7 is realized when processor executes.
Embodiment 10
Fig. 8 shows the structural schematic diagram of the risk behavior control system of the present embodiment, the risk behavior control system packet
Risk behavior grading module 1 is included, is specifically included as shown in Figure 8:
First acquisition unit 11, the behavioral data of the kinds of risks behavior for acquiring user;
Extraction unit 12, the user information and characteristic index item in behavioral data for extracting each risk behavior;
First scoring unit 13, for calculating each risk behavior according to characteristic index item using at least one Rating Model
Risk behavior scoring.
That is, the first acquisition unit 11 first collect magnanimity behavioral data (including off-line data, near-realtime data and in real time
Data), the behavioral data being collected into can be screened according to business scenario, user behavior track etc., be screened out from it more
Kind risk behavior, such as batch registration, batch are logged in, are placed an order in batches, batch neck certificate, malice rejection, lock inventory, are deceived and given postal, void
Vacation transaction etc., then acquire the behavioral data of each risk behavior;For a certain specific risk behavior, such as lock inventory, extract single
Member 12 extracts user information and characteristic index item in the behavioral data of collected lock inventory's behavior, and being respectively used to be directed toward has
The user for locking inventory's behavior and the parameter as the risk behavior scoring for calculating lock inventory's behavior;First scoring unit 13 utilizes phase
One or a set of Rating Model of Ying Yusuo inventory's behavior is calculated according to the characteristic index item extracted in the behavioral data of acquisition
The risk behavior scoring (including off-line calculation and calculating in real time) of each lock inventory's behavior with the user for locking inventory's behavior, is commented
Minute mark, wherein 0 indicates devoid of risk, will definitely be scored higher with the fraction range with reference to 0-100, indicate that risk is higher.
The risk behavior control system of the present embodiment is subdivided into a variety of based on the different characteristics of magnanimity behavioral data
Risk behavior, and the calculating of risk behavior scoring is individually carried out to each risk behavior, so as to accurately identify each wind
The risk subscribers of dangerous behavior, and then more there is specific aim to the defence of risk behavior, improve protection effect.It is understood that
It is, it is more careful to the division of risk behavior, it is better to the targetedly protection effect of risk behavior.
Embodiment 11
The risk behavior control system of the present embodiment is the further improvement to embodiment 10, including risk behavior scoring mould
Block 1, tactful configuration module 2 and Real-time defence module 3, specifically, Fig. 9 has gone out the risk behavior control system of the present embodiment
Structural schematic diagram.
As shown in figure 9, the risk behavior grading module 1 of the present embodiment is compared with Example 10, further includes: the first storage is single
Member 14, for risk behavior to be scored, corresponding user information and risk behavior save to risk behavior score data library so that
Subsequent operation being capable of the related risk behavior score data of quick obtaining.
As shown in figure 9, tactful configuration module 2 specifically includes:
First configuration unit 21, for configuring at least one risk behavior for business scenario;
Risk class division unit 22, for dividing at least one risk class, different risk class for risk behavior
The risk behavior scoring of corresponding different range;
Second configuration unit 23 configures at least one defence movement for the risk behavior for each risk class;
Second storage unit 24 is used for the business scenario, the corresponding risk behavior, the risk class and institute
Defence movement is stated to save to tactful configuration database.
On internet business platform include multiple business scenarios, such as register, log in, placing an order, the second kills, rushes to purchase, first
The one or more risk behaviors being likely to occur in the scene are analyzed for the business scenario, such as are needed in the business scenario
Consider risk behavior X, then the first configuration unit 21 is that the business scenario configures risk behavior X;Risk class division unit 22 is
Risk behavior X divides at least one risk class, and different risk class corresponds to the risk behavior scoring of different range, such as
[1,25) corresponding first risk class of risk behavior scoring range, [25,50) corresponding second wind of risk behavior scoring range
Dangerous grade, [50,75) risk behavior scoring range correspond to third risk class, the risk behavior of [75,100] scoring range pair
Answer the 4th risk class;Second configuration unit 23 is respectively that the risk behavior X of first to fourth risk class configures one or more
A defence movement, the risk behavior X of for example, the first risk class configure the first defence movement, are the risk of the second risk class
Behavior X configures the second defence movement and third defence movement, is that the 4th defence of risk behavior X configuration of third risk class is dynamic
Make, is that the risk behavior X of the 4th risk class configures the 5th defence movement and the 6th defence movement;Again by business scenario, corresponding
Risk behavior, risk behavior grade and defence movement save to tactful configuration database, subsequent operation is quickly obtained
Take related tactful configuration data.Even the business scenario to newly set, business scenario configuration wind can also be empirically for
Dangerous behavior, and therefore more flexible the risk behavior configuration defence movement in business scenario.
As shown in figure 9, Real-time defence module 3 specifically includes:
Second acquisition unit 31 for the behavioral data in real-time capturing service scenario A, and extracts user information;
Second scoring unit 32, for obtaining the risk of the behavioral data acquired in real time from risk behavior score data library
Behavior scoring;
Third configuration unit 33, for what is obtained from tactful configuration database according to risk behavior scoring and acquired in real time
Behavioral data defence accordingly movement;
Control strategy generation unit 34 acts for combining defence and generates control strategy;
Real-time defence unit 35, for control strategy to be applied to business scenario A.
When Real-time defence service is provided in business scenario A, first in the real-time capturing service scenario A of the second acquisition unit 31
Behavioral data, and extract user information;Second scoring unit 32 obtains business scenario A from risk behavior score data library again
In behavioral data risk behavior scoring;Third configuration unit 33 scores from tactful configuration database according to risk behavior again
Defence movement corresponding with the behavioral data acquired in real time is obtained, such as the first defence movement, the second defence movement and third are prevented
Imperial movement;Control strategy generation unit 34 is combined the first, second, and third defence movement, including to the first, second He
The configuration data duplicate removal of third defence movement rearranges combination etc., to simplify intermediate data to generate control strategy;It is last real
When defence unit 35 control strategy is applied in business scenario A, it is targetedly real to be carried out to business scenario A risk behavior
When defend.
The risk behavior control system of the present embodiment is that risk behavior is individually scored in risk behavior grading module 1
On the basis of, also it is respectively provided with not additionally by tactful configuration module 2 for the risk behavior being likely to occur in each scene
Defence with risk class acts, and is configured flexibly the control strategy of risk behavior, and then carry out in specific business scenario
When Real-time defence, the behavioral data in business scenario can be analyzed in time, configuration defence movement, for Real-time defence
Module 3 is used and is on the defensive in real time to risk behavior.
Embodiment 12
The present embodiment risk behavior control method is the further improvement to embodiment 11, more specifically, the present embodiment
Real-time defence module 3 is to the further refinement in embodiment 11, and Figure 10 shows the structural representation of risk behavior control system
Figure.
As shown in Figure 10, the second scoring unit 32 of Real-time defence module 3 specifically includes:
First judging unit 321, for judge the risk behavior score data library in the first storage unit 14 whether include
The user information;
Second judgment unit 322, for when the first judging unit 36 is judged as YES, judging in risk behavior scoring number
According in library, whether the corresponding risk behavior of the user information is the risk behavior of business scenario A configuration with the first configuration unit 21
It is identical;
First transfers unit 323, for when second judgment unit 37 is judged as YES, in the risk behavior score data library
In transfer risk behavior corresponding with the user information, the risk behavior and score.
The third configuration unit 33 of Real-time defence module 3 specifically includes: second transfers unit 331, in the second storage
Defence corresponding with the user information, the risk behavior is transferred in the tactful configuration database of unit 24 to act.
It needs specifically to judge whether the user in business scenario A there is tactful configuration module 2 to configure for business scenario A
Risk behavior, if so, control strategy, which is applied to the user in business scenario A, carries out Real-time defence;If it is not, then continuing pair
Behavioral data in business scenario A is monitored.
Certainly, the risk behavior score data library in the present embodiment and the data in tactful configuration database can it is synchronous more
It is new to caching redis (one write using ANSI C language open source, support network, it is memory-based also can persistence day
Will type, key-value database), guarantee the quick response of data in risk behavior control method.
The risk behavior control system of the present embodiment is the further improvement to embodiment 11, by quilt in modules
Transferring and judge to the data of database and/or caching is saved, the processing speed to data is improved, so as to rapidly
Risk behavior in business scenario is responded.
Although specific embodiments of the present invention have been described above, it will be appreciated by those of skill in the art that this is only
For example, protection scope of the present invention is to be defined by the appended claims.Those skilled in the art without departing substantially from
Under the premise of the principle and substance of the present invention, many changes and modifications may be made, but these change and
Modification each falls within protection scope of the present invention.
Claims (14)
1. a kind of risk behavior control method, which is characterized in that including risk behavior scoring step, the risk behavior scoring step
Suddenly include:
The behavioral data of the kinds of risks behavior of S11, acquisition user;
S12, user information and characteristic index item in the behavioral data of each risk behavior are extracted;
S13, the risk behavior for calculating each risk behavior according to the characteristic index item using at least one Rating Model
Scoring.
2. risk behavior control method as described in claim 1, which is characterized in that step S11 is specifically included:
The behavioral data for collecting user, kinds of risks behavior is filtered out from the behavioral data, acquires the risk behavior
The behavioral data.
3. risk behavior control method as described in claim 1, which is characterized in that in step S13, the different types of wind
The corresponding Rating Model of dangerous behavior is different.
4. risk behavior control method as described in claim 1, which is characterized in that the risk behavior control method further includes
Strategies configuring step, the strategies configuring step include:
S21, at least one risk behavior is configured for business scenario;
S22, at least one risk class is divided for the risk behavior, the different risk class corresponds to the wind of different range
Dangerous behavior scoring;
S23, at least one defence movement is configured for the risk behavior of each risk class.
5. risk behavior control method as claimed in claim 4, which is characterized in that
The risk behavior scores step further include: S14, by risk behavior scoring, the corresponding user information and institute
Risk behavior is stated to save to risk behavior score data library;
The strategies configuring step further include: S24, by the business scenario, the corresponding risk behavior, the risk class
It saves with defence movement to tactful configuration database.
6. risk behavior control method as claimed in claim 5, which is characterized in that the risk behavior control method further includes
Real-time defence step, the Real-time defence step include:
Behavioral data in S31, real-time capturing service scene, and extract user information;
S32, it is commented from the risk behavior of the behavioral data acquired in real time in obtaining step S31 in risk behavior score data library
Point;
S33, it is obtained from the tactful configuration database according to the risk behavior scoring in step S32 and is adopted in real time with described
The behavioral data of collection defence accordingly movement;
The defence in S34, combination step S33 acts and generates control strategy;
S35, the business scenario being applied to the control strategy in step S31.
7. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor is realized as described in any one of claim 1-6 when executing the computer program
Risk behavior control method.
8. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
Such as risk behavior control method of any of claims 1-6 is realized when processor executes.
9. a kind of risk behavior control system, which is characterized in that including risk behavior grading module, the risk behavior scoring mould
Block includes:
First acquisition unit, the behavioral data of the kinds of risks behavior for acquiring user;
Extraction unit, the user information and characteristic index item in the behavioral data for extracting each risk behavior;
First scoring unit, for calculating each risk row according to the characteristic index item using at least one Rating Model
For risk behavior scoring.
10. risk behavior control system as claimed in claim 9, which is characterized in that first acquisition unit is specifically used for:
The behavioral data for collecting user, kinds of risks behavior is filtered out from the behavioral data, acquires the risk behavior
The behavioral data.
11. risk behavior control system as claimed in claim 9, which is characterized in that the different types of risk behavior pair
The Rating Model answered is different.
12. risk behavior control system as claimed in claim 9, which is characterized in that the risk behavior control system is also wrapped
Tactful configuration module is included, the strategy configuration module includes:
First configuration unit, for configuring at least one risk behavior for business scenario;
Risk class division unit, for dividing at least one risk class, the different risks etc. for the risk behavior
The risk behavior scoring of the corresponding different range of grade;
Second configuration unit, for configuring at least one defence movement for the risk behavior of each risk class.
13. risk behavior control system as claimed in claim 12, which is characterized in that
The risk behavior grading module further include: the first storage unit is used to score the risk behavior, is corresponding described
User information and the risk behavior are saved to risk behavior score data library;
The strategy configuration module further include: the second storage unit is used for the business scenario, the corresponding risk row
It saves for, the risk class and defence movement to tactful configuration database.
14. risk behavior control system as claimed in claim 13, which is characterized in that the risk behavior control system is also wrapped
Real-time defence module is included, the Real-time defence module includes:
Second acquisition unit for the behavioral data in real-time capturing service scene, and extracts user information;
Second scoring unit, for obtaining what second acquisition unit acquired in real time from risk behavior score data library
The risk behavior of behavioral data scores;
Third configuration unit, for from the tactful configuration database according to the risk behavior of the second scoring unit
Scoring obtains defence movement corresponding with the behavioral data acquired in real time;
Control strategy generation unit, the defence for combining the third configuration of described dispensing unit act and generate control plan
Slightly;
Real-time defence unit, for the control strategy to be applied to the business scenario of the second acquisition unit application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711465448.0A CN109978547B (en) | 2017-12-28 | 2017-12-28 | Risk behavior control method, risk behavior control system, risk behavior control device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711465448.0A CN109978547B (en) | 2017-12-28 | 2017-12-28 | Risk behavior control method, risk behavior control system, risk behavior control device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109978547A true CN109978547A (en) | 2019-07-05 |
CN109978547B CN109978547B (en) | 2021-08-03 |
Family
ID=67075269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711465448.0A Active CN109978547B (en) | 2017-12-28 | 2017-12-28 | Risk behavior control method, risk behavior control system, risk behavior control device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109978547B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131166A (en) * | 2019-11-28 | 2020-05-08 | 重庆小雨点小额贷款有限公司 | User behavior prejudging method and related equipment |
CN111429145A (en) * | 2020-03-26 | 2020-07-17 | 深圳市腾讯计算机系统有限公司 | Risk control method and device for electronic transaction and electronic equipment |
CN113420941A (en) * | 2021-07-16 | 2021-09-21 | 湖南快乐阳光互动娱乐传媒有限公司 | Risk prediction method and device for user behavior |
CN114881711A (en) * | 2022-07-11 | 2022-08-09 | 荣耀终端有限公司 | Method for carrying out anomaly analysis based on request behavior and electronic equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101022539A (en) * | 2007-02-15 | 2007-08-22 | 华为技术有限公司 | Method, system, interactive EPG and business middleware for realizing business service control |
CN101132300A (en) * | 2007-08-22 | 2008-02-27 | 华为技术有限公司 | Multimedia business implementing system, method and relevant device |
CN102752142A (en) * | 2012-07-05 | 2012-10-24 | 深圳市易聆科信息技术有限公司 | Monitoring method and system based on multidimensional modeled information system |
CN104142970A (en) * | 2013-11-26 | 2014-11-12 | 深圳市雁联计算系统有限公司 | Operation control system and method |
CN106022800A (en) * | 2016-05-16 | 2016-10-12 | 北京百分点信息科技有限公司 | User feature data processing method and device |
US20170124665A1 (en) * | 2012-02-17 | 2017-05-04 | Facebook, Inc. | Social distribution of emergency status |
CN107067157A (en) * | 2017-03-01 | 2017-08-18 | 北京奇艺世纪科技有限公司 | Business risk appraisal procedure, device and air control system |
US20170359220A1 (en) * | 2016-06-02 | 2017-12-14 | Zscaler, Inc. | Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups |
-
2017
- 2017-12-28 CN CN201711465448.0A patent/CN109978547B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101022539A (en) * | 2007-02-15 | 2007-08-22 | 华为技术有限公司 | Method, system, interactive EPG and business middleware for realizing business service control |
CN101132300A (en) * | 2007-08-22 | 2008-02-27 | 华为技术有限公司 | Multimedia business implementing system, method and relevant device |
US20170124665A1 (en) * | 2012-02-17 | 2017-05-04 | Facebook, Inc. | Social distribution of emergency status |
CN102752142A (en) * | 2012-07-05 | 2012-10-24 | 深圳市易聆科信息技术有限公司 | Monitoring method and system based on multidimensional modeled information system |
CN104142970A (en) * | 2013-11-26 | 2014-11-12 | 深圳市雁联计算系统有限公司 | Operation control system and method |
CN106022800A (en) * | 2016-05-16 | 2016-10-12 | 北京百分点信息科技有限公司 | User feature data processing method and device |
US20170359220A1 (en) * | 2016-06-02 | 2017-12-14 | Zscaler, Inc. | Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups |
CN107067157A (en) * | 2017-03-01 | 2017-08-18 | 北京奇艺世纪科技有限公司 | Business risk appraisal procedure, device and air control system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131166A (en) * | 2019-11-28 | 2020-05-08 | 重庆小雨点小额贷款有限公司 | User behavior prejudging method and related equipment |
CN111429145A (en) * | 2020-03-26 | 2020-07-17 | 深圳市腾讯计算机系统有限公司 | Risk control method and device for electronic transaction and electronic equipment |
CN111429145B (en) * | 2020-03-26 | 2022-04-01 | 深圳市腾讯计算机系统有限公司 | Risk control method and device for electronic transaction and electronic equipment |
CN113420941A (en) * | 2021-07-16 | 2021-09-21 | 湖南快乐阳光互动娱乐传媒有限公司 | Risk prediction method and device for user behavior |
CN114881711A (en) * | 2022-07-11 | 2022-08-09 | 荣耀终端有限公司 | Method for carrying out anomaly analysis based on request behavior and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109978547B (en) | 2021-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109978547A (en) | Risk behavior control method and system, equipment and storage medium | |
US20170109657A1 (en) | Machine Learning-Based Model for Identifying Executions of a Business Process | |
CN109120429B (en) | Risk identification method and system | |
CN107273267A (en) | Log analysis method based on elastic components | |
CN109120428B (en) | Method and system for wind control analysis | |
US20170109676A1 (en) | Generation of Candidate Sequences Using Links Between Nonconsecutively Performed Steps of a Business Process | |
CN106844220A (en) | A kind of method of testing and system of simulation computer web application real running environment | |
CN106888106A (en) | The extensive detecting system of IT assets in intelligent grid | |
US20170109667A1 (en) | Automaton-Based Identification of Executions of a Business Process | |
US20160055044A1 (en) | Fault analysis method, fault analysis system, and storage medium | |
CN112003920B (en) | Information sharing system | |
US20170109636A1 (en) | Crowd-Based Model for Identifying Executions of a Business Process | |
CN102073579B (en) | Method for merging and optimizing audit events of Linux file system | |
CN106027406A (en) | NS3 simulation system flow importing method based on Netflow | |
CN110764980A (en) | Log processing method and device | |
CN106209920A (en) | The safety protecting method of a kind of dns server and device | |
CN107409134A (en) | Method card analysis | |
US20170109638A1 (en) | Ensemble-Based Identification of Executions of a Business Process | |
CN105553732B (en) | A kind of distributed network analogy method and system | |
CN106559498A (en) | Air control data collection platform and its collection method | |
CN106067879A (en) | The detection method of information and device | |
CN111612085A (en) | Method and device for detecting abnormal point in peer-to-peer group | |
CN104486337B (en) | Validation of Data method and device | |
CN110071918A (en) | A kind of data communications method and device based on mixed cloud | |
CN108459960A (en) | Method of automatic configuration, device, equipment and the storage medium of test environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |