CN112149951A - Risk control method and device, computer equipment and storage medium - Google Patents

Risk control method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112149951A
CN112149951A CN202010799028.1A CN202010799028A CN112149951A CN 112149951 A CN112149951 A CN 112149951A CN 202010799028 A CN202010799028 A CN 202010799028A CN 112149951 A CN112149951 A CN 112149951A
Authority
CN
China
Prior art keywords
variable
configuration
risk control
risk
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010799028.1A
Other languages
Chinese (zh)
Inventor
曾科
邬稳
张鹏
韩建
徐杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Merchants Union Consumer Finance Co Ltd
Original Assignee
Merchants Union Consumer Finance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merchants Union Consumer Finance Co Ltd filed Critical Merchants Union Consumer Finance Co Ltd
Priority to CN202010799028.1A priority Critical patent/CN112149951A/en
Publication of CN112149951A publication Critical patent/CN112149951A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computer And Data Communications (AREA)

Abstract

The application relates to a risk control method, a risk control device, computer equipment and a storage medium. The method comprises the following steps: when a risk control node with configuration data is executed according to a risk control process, acquiring a variable identifier configured for the risk control node; acquiring configured variable configuration and variable processing modes from a variable pool according to the variable identification; calling a generalization calling device, and utilizing the generalization calling device to perform generalization calling according to the variable configuration to obtain the risk data of the risk control node; and carrying out risk check on the risk data based on the variable processing mode. By adopting the method, the efficiency can be improved, the influence brought by an external system can be reduced, and the continuity and high availability of the system are ensured.

Description

Risk control method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a risk control method and apparatus, a computer device, and a storage medium.
Background
As computers have evolved, more and more businesses have begun to automate risk control using computers, which typically need to rely on internal or external data to implement the risk control. Generally, data needed by risk control needs to be updated or modified frequently, so that a service background system is changed frequently, and the response speed and the expansibility of the system are reduced. Conventionally, in order to improve response speed and extensibility, new data is obtained by re-developing code each time data needs to be updated or modified.
However, the traditional method for redeveloping the code needs to go through testing and the like after the development is completed. Moreover, the data acquisition of the code calling interface is mostly carried out based on a maven dependence packet mode, and the mode often indirectly introduces a large number of third-party useless jar packets to cause the dependence on the bloated state, and even possibly conflicts with the existing jar packets, so that the efficiency is reduced, and the normal operation of the system can be influenced.
Disclosure of Invention
In view of the above, it is necessary to provide a risk control method, apparatus, computer device and storage medium capable of improving efficiency and reducing system influence in view of the above technical problems.
A method of risk control, the method comprising:
when a risk control node with configuration data is executed according to a risk control process, acquiring a variable identifier configured for the risk control node;
acquiring configured variable configuration and variable processing modes from a variable pool according to the variable identification;
calling a generalization calling device, and utilizing the generalization calling device to perform generalization calling according to the variable configuration to obtain the risk data of the risk control node;
and carrying out risk check on the risk data based on the variable processing mode.
In one embodiment, the obtaining of the configured variable configuration and the variable processing mode from the variable pool according to the variable identifier includes:
inquiring whether the variable identification exists in a variable pool or not;
when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain variable configuration and a variable processing mode;
and when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
In one embodiment, the invoking a generalization invoker, utilizing the generalization invoker to generalize and invoke the risk data obtained from the risk control node according to the variable configuration, includes:
calling a generalization calling device, and transmitting the variable configuration to the generalization calling device;
and the generalization invoker initiates service invocation according to the variable configuration, and acquires the risk data of the risk control node through the service invocation.
In one embodiment, the method for configuring the variable identifier, the variable configuration, and the variable processing manner includes:
receiving a variable identifier, a variable configuration and a variable processing mode submitted by a first user on a variable configuration interface of a terminal;
rechecking the submitted variable identification, the variable configuration and the variable processing mode;
and storing the variable identification, the variable configuration and the variable processing mode which are passed by the rechecking into a variable pool.
In one embodiment, the configuration method of the risk control node includes:
receiving node configuration information and variable identification submitted by a first user on a node configuration interface of a terminal, wherein the variable identification is a variable identification existing in a variable pool;
rechecking the submitted node configuration information and the variable identification;
and adding the risk control node corresponding to the node configuration information and the variable identification which pass the rechecking to a risk control flow.
In one embodiment, reviewing the configuration information submitted by the first user includes:
submitting the variable identification, the variable configuration and the variable processing mode, or the node configuration information and the variable identification to a second user for rechecking;
and determining whether the rechecking is passed or not according to the rechecking result returned by the second user.
In one embodiment, after the risk checking the risk data based on the variable processing manner, the method further includes:
after the risk check is passed, acquiring a next risk control node of the current risk control node;
when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node;
and returning to the step of obtaining the configured variable configuration and the variable processing mode from the configured variable pool according to the variable identification until all the nodes in the risk control flow are executed.
A risk control device, the device comprising:
the identification acquisition module is used for acquiring a variable identification configured for a risk control node when the risk control node with configuration data is executed according to a risk control process;
the configuration acquisition module is used for acquiring the configured variable configuration and the variable processing mode from the configuration variable pool according to the variable identification;
the calling module is used for calling a generalization calling device, and the generalization calling device is utilized to carry out generalization calling according to the variable configuration to obtain the risk data of the risk control node;
and the wind control module is used for carrying out risk check on the risk data based on the variable processing mode.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the risk control method of any preceding claim when the computer program is executed.
A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the risk control method of any of the preceding claims.
According to the risk control method, the risk control device, the computer equipment and the storage medium, when the risk control node with the configuration data is executed according to the risk control process, the variable identification configured for the risk control node is obtained; acquiring configured variable configuration and a variable processing mode from a configuration variable pool according to the variable identifier; calling a generalization calling device, and utilizing the generalization calling device to perform generalization calling according to variable configuration to obtain risk data of the risk control node; and carrying out risk check on the risk data based on the variable processing mode. The method realizes the acquisition of data for the variable configuration of the node configuration in a configuration mode without carrying out code development every time. Moreover, according to the method of adopting the generalized invoker to carry out generalized invocation when the invocation data is configured, the introduction of redundant jar packets can be avoided, the efficiency can be improved, the influence brought by an external system can be reduced, and the continuity and the high availability of the system can be ensured.
Drawings
FIG. 1 is a diagram of an environment in which a risk control method may be applied in one embodiment;
FIG. 2 is a schematic flow chart of a risk control method according to an embodiment;
FIG. 3 is a flowchart illustrating steps of obtaining configured variable configurations and variable processing modes from a variable pool according to variable identifiers in an embodiment;
FIG. 4 is an interface diagram of a variable pool configuration interface in one embodiment;
FIG. 5 is an interface diagram of a node configuration interface in one embodiment;
FIG. 6 is a block diagram of a risk control device in one embodiment;
FIG. 7 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The risk control method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. When the terminal 102 receives the wind control request, the terminal 102 responds to the wind control request to realize the risk control method. Alternatively, the terminal 102 sends the received wind control request to the server 104, and the server 104 implements the risk control method.
Taking the server 104 as an example, specifically, the server 104 performs risk control according to a preset risk control flow, and when a risk control node having configuration data is executed according to the risk control flow, the server 104 acquires a variable identifier configured for the risk control node; the server 104 acquires the configured variable configuration and the variable processing mode from the variable pool according to the variable identifier; the server 104 calls a generalization call device, and the generalization call device is utilized to obtain the risk data of the risk control node according to the variable configuration; the server 104 performs risk check on the risk data based on the variable processing mode. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a risk control method is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step S202, when the risk control node with the configuration data is executed according to the risk control process, the variable identification configured for the risk control node is obtained.
The risk control process refers to wind control logic set in advance according to wind control requirements of different services, and the risk control process comprises at least one risk control node. The configuration data is information configured for the risk control node in advance, and comprises node configuration information and variable identification. The variable identifier is a unique identifier of the variable, and the variable identifier in the configuration data corresponding to the risk control node represents a variable associated with the node, and may be a variable name, a variable ID, or the like. In this embodiment, the variable may be understood as wind control data required for wind control, such as credit score. The node configuration information includes node codes, service scenarios, vin variables/arrays/rule identifiers, processing modes, states, and the like. The vin variable/array/rule identification may be understood as a more subdivided variable or rule that needs to be executed.
Specifically, when the server receives a wind control request of a service, a risk control flow preset for the service is acquired. And the server sequentially executes risk check according to the sequence of each risk control node in the risk control flow. When the server executes a certain risk control node, whether the risk control node has configuration data or not is judged firstly. When the risk control node has configuration data, the execution of the risk control node is indicated to be required to call and obtain certain risk data. Thus, the server obtains the configured variable identification from the configuration data of the risk control node.
And step S204, acquiring the configured variable configuration and variable processing mode from the variable pool according to the variable identification.
The variable pool comprises a plurality of configured variables, including variable configuration and variable processing modes of the variables. The variable configuration comprises factors such as a zero-changing identification, a class name, a method name, parameters, a processing mode and the like. The class name represents the class that already exists and can be used to obtain the variable. And calling and acquiring the risk data containing the variable according to the class name, the method name and the method parameter.
Specifically, after the server acquires the variable identifier configured for the risk control node, the variable configuration and the variable processing mode matched with the variable identifier are acquired from the variable pool according to the variable identifier. For example, according to the variable identifier a, the variable zero configuration and the variable processing mode corresponding to the variable identifier a are obtained from the variable pool.
And step S206, calling a generalization calling device, and utilizing the generalization calling device to generalize and call the risk data acquired from the risk control node according to the variable configuration.
In particular, the generalized invoker is a plug-in for making generalized invocations. And after the server acquires the variable configuration of the variable from the variable pool, calling the generalization invoker. And sending the variable configuration to a generalization calling device, and carrying out generalization calling on the corresponding platform by the generalization calling device according to the variable configuration. And acquiring risk data corresponding to the variables from the corresponding platform through generalization calling. For example, when the variable is a credit score, the acquired risk data is a specific credit score, such as 100, 90, etc.
And step S208, performing risk check on the risk data based on the variable processing mode.
Specifically, after the server obtains the risk data of the variable through generalization call, the risk data is processed according to a variable processing mode configured for the variable, and risk check is completed. The variable processing mode can be understood as processing logic for the acquired data. For example, assume that the credit score is configured to be processed by comparing with a threshold to determine whether the credit requirement is met. I.e. comparing the credit with a threshold. For example, a score of 90 greater than or equal to the threshold indicates a credit requirement is met, and a score of less than 90 indicates a credit requirement is not met.
In addition, in one embodiment, after the current risk control node performs the risk check, it is determined whether there is a next risk control node according to the risk control process. And when the next risk control node does not exist, ending the risk control. And when the next risk control node exists and the next risk control node has configuration data, acquiring the variable identification configured for the next risk control node. Then, the process proceeds to step S204, and the risk check of the next risk control node is started. And the whole risk control process is finished after all the risk control nodes are executed.
According to the risk control method, when a risk control node with configuration data is executed according to a risk control process, a variable identifier configured for the risk control node is obtained; acquiring configured variable configuration and a variable processing mode from a configuration variable pool according to the variable identifier; calling a generalization calling device, and utilizing the generalization calling device to perform generalization calling according to variable configuration to obtain risk data of the risk control node; and carrying out risk check on the risk data based on the variable processing mode. The method acquires the variable configuration configured for the node in a configuration mode to realize data acquisition, and code development is not required to be carried out every time. Moreover, according to the method of adopting the generalized invoker to carry out generalized invocation when the invocation data is configured, the introduction of redundant jar packets can be avoided, the efficiency can be improved, the influence brought by an external system can be reduced, and the continuity and the high availability of the system can be ensured.
In one embodiment, as shown in fig. 3, step S204 includes:
step S302, whether a variable identification exists in the variable pool is inquired.
And step S304, when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain variable configuration and a variable processing mode.
And step S306, when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining the variable configuration and the variable processing mode.
Specifically, since the variables existing in the variable pool are user-configured variables, the variables corresponding to the risk control nodes may not exist in the variable pool due to human configuration errors or abnormal variable pools. Therefore, when the server acquires the variable configuration and the variable processing mode according to the variable configuration, whether the variable identification exists in the variable pool is firstly inquired. When the variable identification exists in the variable pool, the server acquires the configuration information associated with the variable identification, so as to obtain the variable configuration and the variable processing mode. And when the variable identification does not exist in the variable pool, the server generates a variable configuration instruction in order to ensure the normal operation of the risk control process. And the server returns the variable configuration instruction to the terminal, and is used for requesting the user to submit the configuration information corresponding to the variable identification so as to obtain the variable configuration and the variable processing mode.
In the embodiment, when the variable does not exist, the user is requested to perform variable matching in time, so that normal operation of the risk control process is ensured.
In one embodiment, in step S206, invoking a generalization invoker, and utilizing the generalization invoker to generalize and invoke the risk data obtained from the risk control node according to the variable configuration includes: calling a generalization calling device, and transmitting the variable configuration to the generalization calling device; and the generalization invoker initiates service invocation according to the variable configuration, and acquires the risk data of the risk control node through the service invocation.
In particular, when the server invokes the risk data, the variable configuration is passed to the plug-in generalization invoker. After the variable configuration received by the generalization invoker, service invocation is initiated to the corresponding platform according to the class name, the method name and the method parameter in the variable configuration, and risk data returned by the corresponding platform is obtained through the service invocation.
In the embodiment, the generalization calling can be carried out without depending on a packet, so that the introduction of a redundant jar packet can be avoided, the efficiency can be improved, the influence caused by an external system can be reduced, and the continuity and high availability of the system can be ensured.
In one embodiment, the variable identification, the variable configuration and the variable processing mode stored in the variable pool are obtained through configuration. The method for configuring the variable identification, the variable configuration and the variable processing mode comprises the following steps: receiving a variable identifier, a variable configuration and a variable processing mode submitted by a first user on a variable configuration interface of a terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the variable identification, the variable configuration and the variable processing mode which are passed by the rechecking into a variable pool.
Specifically, the server provides a corresponding configuration system, and the first user configures the variables through a variable pool configuration interface displayed on the terminal and provided by the configuration system. The first user inputs information such as a variable identifier, a variable processing mode, and variable configuration including a class name, a method name, and a parameter on the variable pool configuration interface, which specifically refers to the variable pool configuration interface shown in fig. 4. And after the input of the first user is finished, the input variable identification, the variable configuration and the variable processing mode are submitted to the server through terminal click submission. And the server rechecks the variable identification, the variable configuration and the variable processing mode submitted by the first user, and stores the rechecked variable identification, the variable configuration and the variable processing mode into the variable pool. The first user may be understood to be a user of the configuration variable.
In one embodiment, the double-check of the variable identification, the variable configuration and the variable processing mode includes: and the server submits the variable identification, the variable configuration and the variable processing mode submitted by the first user to the second user. Namely, the variable identification, the variable configuration and the variable processing mode are submitted to a terminal corresponding to the second user. And then, the second user rechecks the variable identification, the variable configuration and the variable processing mode submitted by the first user. And the second user submits the rechecking result to the server through the terminal. And when the rechecking result submitted by the second user through the terminal is received by the server as a pass, the server stores the variable identification, the variable configuration and the variable processing mode into the variable pool. And when the rechecking result submitted by the second user is failed, the server returns the variable identification, the variable configuration and the variable processing mode to the first user for modification and reconfiguration. And returning the modification proposal of the second user to the first user while returning the modification configuration. In this embodiment, the accuracy of configuration is further ensured by a double-check method when configuring the variables.
In one embodiment, each risk control node in the risk control process is also obtained through configuration, and all the risk control nodes are configured to obtain a completed risk control process. The configuration method of the risk control node comprises the following steps: receiving node configuration information and variable identification submitted by a first user on a node configuration interface of a terminal, wherein the variable identification is a variable identification existing in a variable pool; rechecking the submitted node configuration information and the variable identification; and adding the risk control node corresponding to the node configuration information and the variable identification which pass the rechecking to the risk control flow.
Specifically, the server provides a corresponding configuration system, and the first user configures the risk control node through a node configuration interface displayed on the terminal and provided by the configuration system. The first user inputs the variable identifier and the node configuration information including the node code, the service scene, the vin variable/array/rule identifier, and the state on the node configuration interface, which specifically refers to the node configuration interface shown in fig. 5. And after the input of the first user is finished, the input variable identification and the node configuration information are submitted to the server through terminal click submission. And the server rechecks the variable identification and the node configuration information submitted by the first user, and adds the corresponding risk control node into the risk control process after rechecking is passed.
In one embodiment, reviewing the variable identification and node configuration information comprises: and the server submits the variable identification and the node configuration information submitted by the first user to the second user. Namely, the variable identifier and the node configuration information are submitted to a terminal corresponding to the second user. And then, the second user rechecks the variable identification and the node configuration information submitted by the first user, and submits a rechecking result to the server through the terminal. And when the rechecking result received by the server and submitted by the second user through the terminal is passed, the server determines that the configuration of the risk control node is successful. And when the rechecking result submitted by the second user is failed, the server returns the variable identification and the node configuration information to the first user for modification and reconfiguration. And returning the modification proposal of the second user to the first user while returning the modification configuration. In this embodiment, the accuracy of configuration is further ensured by a double-check method when configuring the variables.
In one embodiment, the risk control method is explained in detail according to the following steps, including:
step 1, a server receives a variable identification, variable configuration and a variable processing method input by a first user on a variable pool configuration interface. And the configuration information of the variables submitted by the first user is checked by the second user and then takes effect.
And (2) receiving variable identification and node configuration information input by the first user on the node configuration interface by the server. The variable identification is variable identification in the variable pool, and the variable is associated with the node through the variable identification. Meanwhile, the second user rechecks to be effective.
And 3, when the server executes the risk control node, acquiring a variable identifier configured by the risk control node, and reading the configuration of the variable through the variable identifier. And then, the configuration of the variable is sent to a generalization calling device, risk data is obtained through generalization calling, and data processing is carried out according to variable processing to complete risk check.
It should be understood that although the various steps in the flow charts of fig. 2-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 6, there is provided a risk control device comprising: an identity acquisition module 602, a configuration acquisition module 604, a calling module 606, and a wind control module 608, wherein:
an identifier obtaining module 602, configured to obtain a variable identifier configured for a risk control node when the risk control node having configuration data is executed according to a risk control process.
The configuration obtaining module 604 is configured to obtain the configured variable configuration and the variable processing mode from the configuration variable pool according to the variable identifier.
And the calling module 606 is used for calling the generalization caller, and utilizing the generalization caller to generalize and call the risk data acquired from the risk control node according to the variable configuration.
And the wind control module 608 is configured to perform risk check on the risk data based on a variable processing manner.
In one embodiment, the configuration obtaining module 604 is further configured to query whether a variable identifier exists in the variable pool; when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain a variable configuration and variable processing mode; and when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining the variable configuration and the variable processing mode.
In one embodiment, the invoking module 606 is further configured to invoke a generalization invoker, and pass the variable configuration to the generalization invoker; and the generalization invoker initiates service invocation according to the variable configuration, and acquires the risk data of the risk control node through the service invocation.
In one embodiment, the risk control device further includes a configuration module, configured to receive a variable identifier, a variable configuration, and a variable processing mode submitted by a first user on a variable configuration interface of the terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the variable identification, the variable configuration and the variable processing mode which are passed by the rechecking into a variable pool.
In one embodiment, the configuration module is further configured to receive node configuration information and a variable identifier submitted by a first user on a node configuration interface of the terminal, where the variable identifier is an existing variable identifier in a variable pool; rechecking the submitted node configuration information and the variable identification; and adding the risk control node corresponding to the node configuration information and the variable identification which pass the rechecking to the risk control flow.
In one embodiment, the configuration module is further configured to submit the variable identifier, the variable configuration and variable processing manner, or the node configuration information and the variable identifier to a second user for rechecking; and determining whether the rechecking is passed or not according to a rechecking result returned by the second user.
In one embodiment, the risk control apparatus further includes a traversal module, configured to obtain a next risk control node of the current risk control node after the risk check passes; when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node; and returning to the step of acquiring the configured variable configuration and the variable processing mode from the configuration variable pool according to the variable identification until all the nodes in the risk control flow are executed.
For the specific definition of the risk control means, reference may be made to the above definition of the risk control method, which is not described herein again. The various modules in the risk control device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing configuration data of variables and nodes. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a risk control method.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
when a risk control node with configuration data is executed according to a risk control process, acquiring a variable identifier configured for the risk control node;
acquiring configured variable configuration and a variable processing mode from a configuration variable pool according to the variable identifier;
calling a generalization calling device, and utilizing the generalization calling device to perform generalization calling according to variable configuration to obtain risk data of the risk control node;
and carrying out risk check on the risk data based on the variable processing mode.
In one embodiment, the processor, when executing the computer program, further performs the steps of: inquiring whether a variable identification exists in the variable pool; when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain a variable configuration and variable processing mode; and when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining the variable configuration and the variable processing mode.
In one embodiment, the processor, when executing the computer program, further performs the steps of: calling a generalization calling device, and transmitting the variable configuration to the generalization calling device; and the generalization invoker initiates service invocation according to the variable configuration, and acquires the risk data of the risk control node through the service invocation.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving a variable identifier, a variable configuration and a variable processing mode submitted by a first user on a variable configuration interface of a terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the variable identification, the variable configuration and the variable processing mode which are passed by the rechecking into a variable pool.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving node configuration information and variable identification submitted by a first user on a node configuration interface of a terminal, wherein the variable identification is a variable identification existing in a variable pool; rechecking the submitted node configuration information and the variable identification; and adding the risk control node corresponding to the node configuration information and the variable identification which pass the rechecking to the risk control flow.
In one embodiment, the processor, when executing the computer program, further performs the steps of: submitting the variable identification, the variable configuration and variable processing mode, or the node configuration information and the variable identification to a second user for rechecking; and determining whether the rechecking is passed or not according to a rechecking result returned by the second user.
In one embodiment, the processor, when executing the computer program, further performs the steps of: after the risk check is passed, acquiring a next risk control node of the current risk control node; when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node; and returning to the step of acquiring the configured variable configuration and the variable processing mode from the configuration variable pool according to the variable identification until all the nodes in the risk control flow are executed.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
when a risk control node with configuration data is executed according to a risk control process, acquiring a variable identifier configured for the risk control node;
acquiring configured variable configuration and a variable processing mode from a configuration variable pool according to the variable identifier;
calling a generalization calling device, and utilizing the generalization calling device to perform generalization calling according to variable configuration to obtain risk data of the risk control node;
and carrying out risk check on the risk data based on the variable processing mode.
In one embodiment, the computer program when executed by the processor further performs the steps of: inquiring whether a variable identification exists in the variable pool; when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain a variable configuration and variable processing mode; and when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining the variable configuration and the variable processing mode.
In one embodiment, the computer program when executed by the processor further performs the steps of: calling a generalization calling device, and transmitting the variable configuration to the generalization calling device; and the generalization invoker initiates service invocation according to the variable configuration, and acquires the risk data of the risk control node through the service invocation.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving a variable identifier, a variable configuration and a variable processing mode submitted by a first user on a variable configuration interface of a terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the variable identification, the variable configuration and the variable processing mode which are passed by the rechecking into a variable pool.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving node configuration information and variable identification submitted by a first user on a node configuration interface of a terminal, wherein the variable identification is a variable identification existing in a variable pool; rechecking the submitted node configuration information and the variable identification; and adding the risk control node corresponding to the node configuration information and the variable identification which pass the rechecking to the risk control flow.
In one embodiment, the computer program when executed by the processor further performs the steps of: submitting the variable identification, the variable configuration and variable processing mode, or the node configuration information and the variable identification to a second user for rechecking; and determining whether the rechecking is passed or not according to a rechecking result returned by the second user.
In one embodiment, the computer program when executed by the processor further performs the steps of: after the risk check is passed, acquiring a next risk control node of the current risk control node; when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node; and returning to the step of acquiring the configured variable configuration and the variable processing mode from the configuration variable pool according to the variable identification until all the nodes in the risk control flow are executed.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of risk control, the method comprising:
when a risk control node with configuration data is executed according to a risk control process, acquiring a variable identifier configured for the risk control node;
acquiring configured variable configuration and variable processing modes from a variable pool according to the variable identification;
calling a generalization calling device, and utilizing the generalization calling device to perform generalization calling according to the variable configuration to obtain the risk data of the risk control node;
and carrying out risk check on the risk data based on the variable processing mode.
2. The method according to claim 1, wherein the obtaining of the configured variable configuration and the variable processing manner from the variable pool according to the variable identifier comprises:
inquiring whether the variable identification exists in a variable pool or not;
when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain variable configuration and a variable processing mode;
and when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
3. The method according to claim 1, wherein the invoking the generalization invoker, and the utilizing the generalization invoker to generalize and invoke the risk data obtained from the risk control node according to the variable configuration, comprises:
calling a generalization calling device, and transmitting the variable configuration to the generalization calling device;
and the generalization invoker initiates service invocation according to the variable configuration, and acquires the risk data of the risk control node through the service invocation.
4. The method according to claim 1, wherein the method for configuring the variable identifier, the variable configuration and the variable processing manner comprises:
receiving a variable identifier, a variable configuration and a variable processing mode submitted by a first user on a variable configuration interface of a terminal;
rechecking the submitted variable identification, the variable configuration and the variable processing mode;
and storing the variable identification, the variable configuration and the variable processing mode which are passed by the rechecking into a variable pool.
5. The method of claim 1, wherein the method of configuring the risk control node comprises:
receiving node configuration information and variable identification submitted by a first user on a node configuration interface of a terminal, wherein the variable identification is a variable identification existing in a variable pool;
rechecking the submitted node configuration information and the variable identification;
and adding the risk control node corresponding to the node configuration information and the variable identification which pass the rechecking to a risk control flow.
6. The method of claim 4 or 5, wherein reviewing the configuration information submitted by the first user comprises:
submitting the configuration information submitted by the first user to a second user for rechecking;
and determining whether the rechecking is passed or not according to the rechecking result returned by the second user.
7. The method of claim 1, wherein after the risk checking the risk data based on the variable processing manner, further comprising:
after the risk check is passed, acquiring a next risk control node of the current risk control node;
when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node;
and returning to the step of obtaining the configured variable configuration and the variable processing mode from the configured variable pool according to the variable identification until all the nodes in the risk control flow are executed.
8. A risk control device, characterized in that the device comprises:
the identification acquisition module is used for acquiring a variable identification configured for a risk control node when the risk control node with configuration data is executed according to a risk control process;
the configuration acquisition module is used for acquiring the configured variable configuration and the variable processing mode from the configuration variable pool according to the variable identification;
the calling module is used for calling a generalization calling device, and the generalization calling device is utilized to carry out generalization calling according to the variable configuration to obtain the risk data of the risk control node;
and the wind control module is used for carrying out risk check on the risk data based on the variable processing mode.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202010799028.1A 2020-08-11 2020-08-11 Risk control method and device, computer equipment and storage medium Pending CN112149951A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010799028.1A CN112149951A (en) 2020-08-11 2020-08-11 Risk control method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010799028.1A CN112149951A (en) 2020-08-11 2020-08-11 Risk control method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112149951A true CN112149951A (en) 2020-12-29

Family

ID=73888735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010799028.1A Pending CN112149951A (en) 2020-08-11 2020-08-11 Risk control method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112149951A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113419916A (en) * 2021-05-25 2021-09-21 深圳壹账通智能科技有限公司 Wind control inspection program uninterrupted operation method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409892A (en) * 2017-08-15 2019-03-01 凡普互金有限公司 Methods of risk assessment and system
CN110390465A (en) * 2019-06-18 2019-10-29 深圳壹账通智能科技有限公司 Air control analysis and processing method, device and the computer equipment of business datum
CN110659800A (en) * 2019-08-15 2020-01-07 平安科技(深圳)有限公司 Risk monitoring processing method and device, computer equipment and storage medium
CN111258873A (en) * 2018-11-30 2020-06-09 阿里巴巴集团控股有限公司 Test method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409892A (en) * 2017-08-15 2019-03-01 凡普互金有限公司 Methods of risk assessment and system
CN111258873A (en) * 2018-11-30 2020-06-09 阿里巴巴集团控股有限公司 Test method and device
CN110390465A (en) * 2019-06-18 2019-10-29 深圳壹账通智能科技有限公司 Air control analysis and processing method, device and the computer equipment of business datum
CN110659800A (en) * 2019-08-15 2020-01-07 平安科技(深圳)有限公司 Risk monitoring processing method and device, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113419916A (en) * 2021-05-25 2021-09-21 深圳壹账通智能科技有限公司 Wind control inspection program uninterrupted operation method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109474578B (en) Message checking method, device, computer equipment and storage medium
CN109144487B (en) Method, device, computer equipment and storage medium for developing business of parts
CN114531477B (en) Method and device for configuring functional components, computer equipment and storage medium
CN110704177A (en) Computing task processing method and device, computer equipment and storage medium
CN110213250B (en) Data processing method and terminal equipment
CN112699034B (en) Virtual login user construction method, device, equipment and storage medium
CN108389124B (en) Data processing method, data processing device, computer equipment and storage medium
CN112149951A (en) Risk control method and device, computer equipment and storage medium
CN112148351B (en) Cross-version compatibility method and system for application software
CN113191889A (en) Wind control configuration method, configuration system, electronic device and readable storage medium
CN112527416A (en) Task processing method and device, computer equipment and storage medium
CN111026988A (en) Page loading method, device and system and computer equipment
CN110609707B (en) Online data processing system generation method, device and equipment
CN111447136A (en) Message pushing method and device, computer equipment and storage medium
CN114327673B (en) Task starting method and device, electronic equipment and storage medium
CN111159025A (en) Application program interface testing method and device, computer equipment and storage medium
CN112764897B (en) Task request processing method, device and system and computer readable storage medium
CN112783866A (en) Data reading method and device, computer equipment and storage medium
CN111464395B (en) Method and device for creating blockchain and readable storage medium
CN111242778B (en) Data processing method, device, computer equipment and storage medium
CN113868127A (en) Online debugging method and device, computer equipment and storage medium
CN112698932A (en) Industrial application program calling method and device, computer equipment and storage medium
CN113051008A (en) Interface request processing method and device, computer equipment and storage medium
CN111988336A (en) Access request processing method, device and system and computer equipment
CN111552551A (en) User management method and device based on master-slave system, computer equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Zhaolian Consumer Finance Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: MERCHANTS UNION CONSUMER FINANCE Co.,Ltd.

Country or region before: China

CB02 Change of applicant information