CN113743697A - Risk alarm method and device - Google Patents

Risk alarm method and device Download PDF

Info

Publication number
CN113743697A
CN113743697A CN202010851209.4A CN202010851209A CN113743697A CN 113743697 A CN113743697 A CN 113743697A CN 202010851209 A CN202010851209 A CN 202010851209A CN 113743697 A CN113743697 A CN 113743697A
Authority
CN
China
Prior art keywords
risk
information
alarm
database
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010851209.4A
Other languages
Chinese (zh)
Inventor
郝建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Jingxundi Supply Chain Technology Co ltd
Original Assignee
Xi'an Jingxundi Supply Chain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Jingxundi Supply Chain Technology Co ltd filed Critical Xi'an Jingxundi Supply Chain Technology Co ltd
Priority to CN202010851209.4A priority Critical patent/CN113743697A/en
Publication of CN113743697A publication Critical patent/CN113743697A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a risk warning method and device, and relates to the technical field of logistics. One embodiment of the method comprises: according to risk configuration information, acquiring business data corresponding to the risk configuration information from each original business table stored in a business database, and storing the business data into a calculation database; calculating the service data according to risk conditions to obtain risk information; and judging whether the risk information meets the alarm condition, if so, sending a risk alarm and recording the risk alarm. The implementation mode can solve the technical problems that the risk problem is not found timely and the troubleshooting is time-consuming and labor-consuming.

Description

Risk alarm method and device
Technical Field
The invention relates to the technical field of logistics, in particular to a risk warning method and device.
Background
Goods with nearly billions of values are circulated in the logistics distribution link every day, and the logistics express business often has the problems that some funds are receivable and not receivable, abnormal circulation is caused, the goods are lost and receivable, and great loss is caused to companies. At present, some documents and funds are mostly found by people as a risk problem, but when a problem is found, a large loss may already be caused to the company.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
the risk problems are not timely found and lag due to the fact that funds and articles cannot be monitored in place, and time and labor are wasted in troubleshooting when the risk problems are found.
Disclosure of Invention
In view of this, embodiments of the present invention provide a risk warning method and apparatus, so as to solve the technical problems that risk problems are not found in time and troubleshooting is time-consuming and labor-consuming.
In order to achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a risk warning method including:
according to risk configuration information, acquiring business data corresponding to the risk configuration information from each original business table stored in a business database, and storing the business data into a calculation database; the risk configuration information is field information related to fund risk and/or cargo risk in the logistics information circulation process;
calculating the service data according to risk conditions to obtain risk information; wherein the risk information comprises fund information and/or goods information bound with a site and/or a distributor;
and judging whether the risk information meets the alarm condition, if so, sending a risk alarm and recording the risk alarm.
Optionally, the computing database comprises a mysql database cluster and an Elasticsearch database cluster;
calculating the service data according to the risk condition to obtain risk information, wherein the risk information comprises:
based on the risk condition, performing query calculation on the service data stored in the mysql database cluster to obtain risk information;
and performing aggregation calculation on the business data stored in the Elasticissearch database cluster based on the risk condition to obtain risk information.
Optionally, before the business data is calculated according to the risk condition and risk information is obtained, the method further includes:
assembling according to preset risk factors and assembling rules to obtain risk conditions;
wherein the risk factors include at least one of:
abnormal state, time range, goods value amount range and document amount range of the order;
the assembly rule includes: a relationship is, or, a relationship is, or.
Optionally, after storing the service data in the calculation database, the method further includes:
acquiring a change message from a message queue, and consuming the change message to acquire change data; wherein the change message is generated based on a data log of a traffic database;
and updating the service data stored in the calculation database according to the change data.
Optionally, determining whether the risk information meets an alarm condition, if so, sending a risk alarm and recording the risk alarm, including:
classifying each piece of risk information according to a preset risk category;
judging whether the risk information meets the alarm condition corresponding to the risk category or not for each risk information under each risk category;
if so, acquiring risk department information corresponding to the risk information, acquiring information of the concerned person under the risk department information, sending a risk alarm to the risk department and the concerned person in a message notification mode, and recording the risk alarm.
Optionally, the original service table includes at least one of:
a shipping form, a sorting form, a shipping form, an order form, an item form, and a delivery form.
Optionally, the risk configuration information includes at least one of:
risk scenario, category type, risk indicator, and risk anomaly status.
In addition, according to another aspect of the embodiments of the present invention, there is provided a risk alerting device including:
the acquisition module is used for acquiring the business data corresponding to the risk configuration information from each original business table stored in a business database according to the risk configuration information and storing the business data into a calculation database; the risk configuration information is field information related to fund risk and/or cargo risk in the logistics information circulation process;
the calculation module is used for calculating the service data according to risk conditions to obtain risk information; wherein the risk information comprises fund information and/or goods information bound with a site and/or a distributor;
and the alarm module is used for judging whether the risk information meets the alarm condition, if so, sending a risk alarm and recording the risk alarm.
Optionally, the computing database comprises a mysql database cluster and an Elasticsearch database cluster;
the calculation module is further to:
based on the risk condition, performing query calculation on the service data stored in the mysql database cluster to obtain risk information;
and performing aggregation calculation on the business data stored in the Elasticissearch database cluster based on the risk condition to obtain risk information.
Optionally, the system further comprises a configuration module, configured to:
calculating the service data according to risk conditions, and assembling according to preset risk factors and assembly rules to obtain risk conditions before obtaining risk information;
wherein the risk factors include at least one of:
abnormal state, time range, goods value amount range and document amount range of the order;
the assembly rule includes: a relationship is, or, a relationship is, or.
Optionally, the obtaining module is further configured to:
after the business data are stored in a calculation database, obtaining change information from an information queue, and consuming the change information to obtain change data; wherein the change message is generated based on a data log of a traffic database;
and updating the service data stored in the calculation database according to the change data.
Optionally, the alarm module is further configured to:
classifying each piece of risk information according to a preset risk category;
judging whether the risk information meets the alarm condition corresponding to the risk category or not for each risk information under each risk category;
if so, acquiring risk department information corresponding to the risk information, acquiring information of the concerned person under the risk department information, sending a risk alarm to the risk department and the concerned person in a message notification mode, and recording the risk alarm.
Optionally, the original service table includes at least one of:
a shipping form, a sorting form, a shipping form, an order form, an item form, and a delivery form.
Optionally, the risk configuration information includes at least one of:
risk scenario, category type, risk indicator, and risk anomaly status.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the method of any of the embodiments described above.
According to another aspect of the embodiments of the present invention, there is also provided a computer readable medium, on which a computer program is stored, which when executed by a processor implements the method of any of the above embodiments.
One embodiment of the above invention has the following advantages or benefits: the technical means that the business data corresponding to the risk configuration information are obtained from each original business table, the business data are calculated according to the risk conditions to obtain the risk information, and whether the risk information meets the alarm conditions or not is judged, so that the technical problems that in the prior art, the risk problem is not found timely, and troubleshooting is time-consuming and labor-consuming are solved. According to the embodiment of the invention, the business data corresponding to the risk configuration information in the logistics are analyzed and calculated, so that the existing to-be-processed articles and the funds which are receivable can be effectively monitored, and therefore, the risks can be found and controlled in time; moreover, after the risk problem is found, the problem link can be rapidly checked by inquiring the related risk information, so that time and labor are saved.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of a main flow of a risk alerting method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of the main flow of updating business data in a calculation database according to an embodiment of the present invention
FIG. 3 is a schematic view of the main flow of a risk alerting method according to a referential embodiment of the present invention
FIG. 4 is a schematic view of a main flow of a risk alerting method according to another referential embodiment of the present invention;
FIG. 5 is a schematic diagram of the main modules of a risk alert device according to an embodiment of the present invention;
FIG. 6 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 7 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic diagram of a main flow of a risk warning method according to an embodiment of the present invention. As an embodiment of the present invention, as shown in fig. 1, the risk warning method may include:
step 101, according to risk configuration information, obtaining business data corresponding to the risk configuration information from each original business table stored in a business database, and storing the business data into a calculation database.
Risks exist in the logistics industry all the time, in order to avoid the risks, the risks need to be actively avoided and discovered, abnormal conditions of various risks are formulated, including abnormal flow directions of funds and goods and the like, risk setting is well made, and a risk flow is perfected. Therefore, according to the risk configuration information, business data corresponding to the risk configuration information needs to be acquired from each original business table, and the acquired business data needs to be stored in the calculation database. The risk configuration information is field information related to fund risk and/or cargo risk in the logistics information circulation process. Optionally, the original service table includes at least one of: a shipping form, a sorting form, a shipping form, an order form, an item form, and a delivery form. The original business table related to the logistics mainly comprises a shipping table, a sorting table, a transportation table, an order table, an article table, a distribution table and the like, so that the embodiment of the invention acquires the business data corresponding to the risk configuration information from the original business table, effectively acquires the risk data of the logistics information circulation, scans and collects the risks aiming at the existing possible risk scenes, and is beneficial to performing risk monitoring.
In order to accurately acquire the service data corresponding to the risk configuration information, risk configuration needs to be performed in advance. Optionally, the risk configuration information includes at least one of: risk scenario, category type, risk indicator, and risk anomaly status. The types and scenes of risks are too many, the risk configuration needs to be carried out on the business first, core risk points of relevant problems are defined, and the method is favorable for quickly obtaining the relevant problem points of the existing business risks. Generally speaking, there are two main risks: capital risk and cargo risk. The fund risk mainly involves a plurality of conditions such as large fund unremoved, abnormal amount and the like, and the goods risk mainly comprises goods circulation abnormality, goods link loss and the like. The risk configuration is set for all risk scenes, types of products, risk indexes, risk abnormal states and the like. Wherein the risk scene comprises order due delivery, rejection, re-delivery or site inspection and the like; the category type mainly aims at the categories with high value and high money amount, and the risk category can be monitored by setting a key category or sku; the risk index is an index for setting various items to be focused on, including a time interval, a money amount range, and the like. The risk abnormal state is judged according to the abnormal state of each link contained in the risk scene in each business scene. Various factors related to risks can be defined for the risk configurations, and the risk configuration information is stored in a configuration database in a configuration mode. It should be noted that the risk configuration information can be adjusted at any time according to the change of the service.
In step 101, all original business data related to the logistics capital goods need to be collected according to the risk configuration information, valid data is collected, invalid data is filtered out, and then unified analysis, classification and combination are performed. For example, the original business data corresponding to the risk configuration information is obtained from the waybill list, the sorting list, the transportation list, the order list, the item list and the delivery list, and the original business data may include information such as waybill status, waybill related items and waybill amount.
Optionally, after step 101, further comprising: acquiring a change message from a message queue, and consuming the change message to acquire change data; and updating the service data stored in the calculation database according to the change data. Wherein the change message is generated based on a data log of a traffic database. In order to ensure that the original service data stored in the calculation database is synchronous with the data in the service database, the data in the service databases are subjected to data log analysis to obtain changed data, the changed data are converted into changed messages, the changed messages are added into a kafka queue and an mq message queue, and data conversion and consumption are carried out, so that the rapid consumption and the acquisition of the required data are ensured, and the integrity and the timeliness of the required data are ensured.
The kafka queue mainly handles active streaming data and data processing with large data volume, as shown in fig. 2, such as: the kafka queue mainly processes waybill messages, sorting messages and transportation messages; the mq message queue mainly processes order messages and item messages. Optionally, the calculation database includes a mysql database cluster and an Elasticsearch database cluster to facilitate query calculation and aggregation calculation on business data corresponding to risk configuration information.
And 102, calculating the service data according to the risk condition to obtain risk information.
In this step, the business data corresponding to the risk configuration information stored in the calculation database is calculated according to the pre-configured risk condition, so as to obtain the risk information. Wherein the risk information includes fund information and/or goods information bound with a site and/or a distributor. The embodiment of the invention processes the service data in the calculation database according to the risk condition, can combine a plurality of data in a plurality of original service tables by adopting a combination mode to obtain a complete data chain, and can further filter the data irrelevant to the risk condition so as to obtain a total result value. For example, all the re-delivered articles under one station leader are summarized and calculated, and real, effective and available risk information is calculated in a mode of summarizing and accumulating related business data.
Optionally, before step 102, further comprising: and assembling to obtain a risk condition according to preset risk factors and assembly rules. Wherein the risk factors include at least one of: abnormal status of orders, time range, value range of goods and bill range. Wherein the assembly rule comprises: a relationship is, or, a relationship is, or. After the original business data aiming at risks are collected, risk analysis is carried out on the risk data, and which businesses in which the risks exist are analyzed, so that risk conditions are required to be assembled aiming at each risk, and some basic information of the risks can be determined, such as information including an abnormal state (such as a re-putting state) of an order, a time range (such as within 10 days), a goods value amount range (the amount is more than 10 ten thousand), a document amount range and the like, are combined to be assembled to be a necessary condition for judging whether the risks exist. Such as: and taking the current time as a base point, obtaining a receipt with the price of more than 10 ten thousand in 10 days, and obtaining the risk information of the super-value 10w article to be re-thrown under the name of a front-line staff.
Optionally, step 102 may comprise: based on the risk condition, performing query calculation on the service data stored in the mysql database cluster to obtain risk information; and performing aggregation calculation on the business data stored in the Elasticissearch database cluster based on the risk condition to obtain risk information. In embodiments of the present invention, two types of risk information may be obtained by calculation: one is risk information which can be directly obtained through query calculation of the mysql database cluster, and the risk information of the type can be used for risk early warning directly; and the other type of risk information which can be directly used finally is obtained through the aggregation calculation of the Elasticissearch database cluster. Optionally, in the process of aggregation calculation, the business data may be counted first to obtain detail data, and then all the detail data are combined to perform aggregation and summarization again according to the dimensionality of the personnel, the site or the object, so as to obtain the final risk information that can be directly used. For the two types of risk information, mysql database clusters and the Elasticissearch database clusters are respectively adopted for calculation, so that query and calculation are facilitated when specific risk information is collected and scanned.
Optionally, step 102 may be performed in real time, or may be performed at regular time (in an hourly dimension or a daily dimension) through a timing task, and then the calculated risk information is stored in a database, or the calculated risk information may be pushed to a target user.
And 103, judging whether the risk information meets alarm conditions, if so, sending a risk alarm and recording the risk alarm.
In the step, judging whether each piece of risk information meets the alarm condition one by one, if so, sending out a risk alarm, and recording the risk alarm; if not, indicating no risk, ending.
Optionally, step 103 may comprise: classifying each piece of risk information according to a preset risk category; judging whether the risk information meets the alarm condition corresponding to the risk category or not for each risk information under each risk category; if so, acquiring risk department information corresponding to the risk information, acquiring information of the concerned person under the risk department information, sending a risk alarm to the risk department and the concerned person in a message notification mode, and recording the risk alarm. The risk categories, such as fund categories (amount overrun) or goods categories (abnormal document overrun), can be configured in advance, and the category to which each piece of risk information belongs can be judged one by one. Individual alarm conditions may also be configured for each risk category, such as a fund category-greater than 10 ten thousand, and a goods category-greater than 1000. When the value of the capital to be received or the abnormal goods exceeds 10 ten thousand at present, risk control processing is required, and the amount of the overrun can be dynamically adjusted at any time along with different services.
After the known and determined risk information is acquired, risk warning is required according to specific abnormal conditions, corresponding risk department information is required to be acquired, and after relevant information such as attention personnel information is acquired, latest message notification is carried out on relevant departments and personnel, the message notification adopts a mail and short message mode, risk warning recording is carried out simultaneously, and the risk departments and the attention personnel can timely sense the existence of risks and timely process the risks after learning the risk information.
Therefore, the embodiment of the invention can sense the goods and capital risks in time and find business problems, avoid the loss of capital and goods and kill capital safety accidents at the sprouting stage.
According to the various embodiments described above, it can be seen that the technical means of determining whether the risk information meets the alarm condition by acquiring the service data corresponding to the risk configuration information from each original service table and calculating the service data according to the risk condition to obtain the risk information in the embodiments of the present invention solves the technical problems of untimely risk problem discovery and time and labor waste in troubleshooting in the prior art. According to the embodiment of the invention, the business data corresponding to the risk configuration information in the logistics are analyzed and calculated, so that the existing to-be-processed articles and the funds which are receivable can be effectively monitored, and therefore, the risks can be found and controlled in time; moreover, after the risk problem is found, the problem link can be rapidly checked by inquiring the related risk information, so that time and labor are saved.
Fig. 3 is a schematic diagram of a main flow of a risk alerting method according to one referential embodiment of the present invention. As another embodiment of the present invention, as shown in fig. 3, the risk warning method may include:
in step 301, risk configuration information is configured in advance.
Optionally, the configured risk configuration information includes at least one of: risk scenario, category type, risk indicator, and risk anomaly status. The types and scenes of risks are too many, the risk configuration needs to be carried out on the business first, core risk points of relevant problems are defined, and the method is favorable for quickly obtaining the relevant problem points of the existing business risks. Generally speaking, there are two main risks: capital risk and cargo risk. The fund risk mainly involves a plurality of conditions such as large fund unremoved, abnormal amount and the like, and the goods risk mainly comprises goods circulation abnormality, goods link loss and the like. The risk configuration is set for all risk scenes, types of products, risk indexes, risk abnormal states and the like. Wherein the risk scene comprises order due delivery, rejection, re-delivery or site inspection and the like; the category type mainly aims at the categories with high value and high money amount, and the risk category can be monitored by setting a key category or sku; the risk index is an index for setting various items to be focused on, including a time interval, a money amount range, and the like. The risk abnormal state is judged according to the abnormal state of each link contained in the risk scene in each business scene. Various factors related to risks can be defined for the risk configurations, and the risk configuration information is stored in a configuration database in a configuration mode.
Step 302, according to the risk configuration information, obtaining the business data corresponding to the risk configuration information from each original business table stored in a business database, and storing the business data in a calculation database. The risk configuration information is field information related to fund risk and/or cargo risk in the logistics information circulation process.
Optionally, the original service table includes at least one of: a shipping form, a sorting form, a shipping form, an order form, an item form, and a delivery form. The original business table related to the logistics mainly comprises a shipping table, a sorting table, a transportation table, an order table, an article table, a distribution table and the like, so that the embodiment of the invention acquires the business data corresponding to the risk configuration information from the original business table, effectively acquires the risk data of the logistics information circulation, scans and collects the risks aiming at the existing possible risk scenes, and is beneficial to performing risk monitoring.
Step 303, obtaining the change message from the message queue, and consuming the change message to obtain the change data. Wherein the change message is generated based on a data log of a traffic database.
In order to ensure that the original service data stored in the calculation database is synchronous with the data in the service database, the data in the service databases are subjected to data log analysis to obtain changed data, the changed data are converted into changed messages, the changed messages are added into a kafka queue and an mq message queue, and data conversion and consumption are carried out, so that the rapid consumption and the acquisition of the required data are ensured, and the integrity and the timeliness of the required data are ensured.
And 304, updating the service data stored in the calculation database according to the changed data.
And 305, assembling to obtain a risk condition according to preset risk factors and an assembling rule.
After the original business data aiming at risks are collected, risk analysis is carried out on the risk data, and which businesses in which scenes have real risks are analyzed, so that risk conditions need to be assembled aiming at each risk, and some basic information of the risks can be determined, such as information including abnormal states, time ranges, cargo value and bill amount ranges of orders and the like, are combined and assembled to form necessary conditions which can judge whether risks exist.
And step 306, calculating the service data according to the risk condition to obtain risk information.
Optionally, step 306 may include: based on the risk condition, performing query calculation on the service data stored in the mysql database cluster to obtain risk information; and performing aggregation calculation on the business data stored in the Elasticissearch database cluster based on the risk condition to obtain risk information. And the mysql database cluster and the Elasticissearch database cluster are respectively adopted for calculation, so that query and calculation are facilitated when specific risk information is collected and scanned.
Step 307, judging whether the risk information meets an alarm condition; if yes, go to step 308; if not, the process is ended.
And 308, sending a risk alarm and recording the risk alarm.
Judging whether each piece of risk information meets the alarm condition one by one, if so, sending a risk alarm, and recording the risk alarm; if not, indicating no risk, ending.
In addition, in one embodiment of the present invention, the detailed implementation of the risk warning method is described in detail above, so that the repeated content will not be described.
Fig. 4 is a schematic diagram of a main flow of a risk alerting method according to another referential embodiment of the present invention. As another embodiment of the present invention, as shown in fig. 4, the risk warning method may include:
step 401, according to the risk configuration information, obtaining the business data corresponding to the risk configuration information from each original business table stored in the business database, and storing the business data in the calculation database.
And 402, calculating the service data according to the risk condition to obtain risk information.
And 403, classifying each piece of risk information according to a preset risk category.
Step 404, for each risk information under each risk category, judging whether the risk information meets an alarm condition corresponding to the risk category; if yes, go to step 405; if not, the process is ended.
The risk category, such as fund category (amount overrun) or goods category (abnormal document overrun), can be configured in advance, and each piece of risk information is judged to belong to the category one by one. Individual alarm conditions may also be configured for each risk category, such as a fund category-greater than 10 ten thousand, and a goods category-greater than 1000. When the value of the capital to be received or the abnormal goods exceeds 10 ten thousand at present, risk control processing is required, and the amount of the overrun can be dynamically adjusted at any time along with different services.
Step 405, acquiring risk department information corresponding to the risk information, and then acquiring information of the concerned person under the risk department information.
And 406, sending a risk alarm to the risk department and the attention personnel in a message notification mode, and recording the risk alarm.
After the known and determined risk information is acquired, risk warning is required according to specific abnormal conditions, corresponding risk department information is required to be acquired, and after relevant information such as attention personnel information is acquired, latest message notification is carried out on relevant departments and personnel, the message notification adopts a mail and short message mode, risk warning recording is carried out simultaneously, and the risk departments and the attention personnel can timely sense the existence of risks and timely process the risks after learning the risk information.
In addition, in another embodiment of the present invention, the detailed implementation of the risk warning method is described in detail above, so that the repeated content will not be described again.
Fig. 5 is a schematic diagram of main modules of a risk warning device according to an embodiment of the present invention, and as shown in fig. 5, the risk warning device 500 includes an obtaining module 501, a calculating module 502 and a warning module 503; the obtaining module 501 is configured to obtain, according to the risk configuration information, service data corresponding to the risk configuration information from each original service table stored in the service database, and store the service data in the calculation database; the risk configuration information is field information related to fund risk and/or cargo risk in the logistics information circulation process; the calculation module 502 is configured to calculate the service data according to a risk condition to obtain risk information; wherein the risk information comprises fund information and/or goods information bound with a site and/or a distributor; the alarm module 503 is configured to determine whether the risk information meets an alarm condition, and if so, send a risk alarm and record the risk alarm.
Optionally, the computing database comprises a mysql database cluster and an Elasticsearch database cluster;
the calculation module 502 is further configured to:
based on the risk condition, performing query calculation on the service data stored in the mysql database cluster to obtain risk information;
and performing aggregation calculation on the business data stored in the Elasticissearch database cluster based on the risk condition to obtain risk information.
Optionally, the system further comprises a configuration module, configured to:
calculating the service data according to risk conditions, and assembling according to preset risk factors and assembly rules to obtain risk conditions before obtaining risk information;
wherein the risk factors include at least one of:
abnormal state, time range, goods value amount range and document amount range of the order;
the assembly rule includes: a relationship is, or, a relationship is, or.
Optionally, the obtaining module 501 is further configured to:
after the business data are stored in a calculation database, obtaining change information from an information queue, and consuming the change information to obtain change data; wherein the change message is generated based on a data log of a traffic database;
and updating the service data stored in the calculation database according to the change data.
Optionally, the alarm module 503 is further configured to:
classifying each piece of risk information according to a preset risk category;
judging whether the risk information meets the alarm condition corresponding to the risk category or not for each risk information under each risk category;
if so, acquiring risk department information corresponding to the risk information, acquiring information of the concerned person under the risk department information, sending a risk alarm to the risk department and the concerned person in a message notification mode, and recording the risk alarm.
Optionally, the original service table includes at least one of:
a shipping form, a sorting form, a shipping form, an order form, an item form, and a delivery form.
Optionally, the risk configuration information includes at least one of:
risk scenario, category type, risk indicator, and risk anomaly status.
According to the various embodiments described above, it can be seen that the technical means of determining whether the risk information meets the alarm condition by acquiring the service data corresponding to the risk configuration information from each original service table and calculating the service data according to the risk condition to obtain the risk information in the embodiments of the present invention solves the technical problems of untimely risk problem discovery and time and labor waste in troubleshooting in the prior art. According to the embodiment of the invention, the business data corresponding to the risk configuration information in the logistics are analyzed and calculated, so that the existing to-be-processed articles and the funds which are receivable can be effectively monitored, and therefore, the risks can be found and controlled in time; moreover, after the risk problem is found, the problem link can be rapidly checked by inquiring the related risk information, so that time and labor are saved.
It should be noted that, in the implementation of the risk warning device of the present invention, the details of the risk warning method are already described in detail, and therefore, the repeated descriptions herein will not be repeated.
Fig. 6 shows an exemplary system architecture 600 to which the risk alerting method or risk alerting device of embodiments of the present invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 601, 602, 603. The background management server may analyze and otherwise process the received data such as the item information query request, and feed back a processing result (for example, target push information, item information — just an example) to the terminal device.
It should be noted that the risk warning method provided by the embodiment of the present invention is generally executed by the server 605, and accordingly, the risk warning apparatus is generally disposed in the server 605. The risk warning method provided by the embodiment of the present invention may also be executed by the terminal devices 601, 602, 603, and accordingly, the risk warning apparatus may be disposed in the terminal devices 601, 602, 603.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, shown is a block diagram of a computer system 700 suitable for use with a terminal device implementing an embodiment of the present invention. The terminal device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer programs according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes an acquisition module, a calculation module, and an alarm module, where the names of the modules do not in some cases constitute a limitation on the module itself.
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, implement the method of: according to the risk configuration information, acquiring business data corresponding to the risk configuration information from each original business table stored in a business database, and storing the business data into a calculation database; calculating the service data according to risk conditions to obtain risk information; and judging whether the risk information meets the alarm condition, if so, sending a risk alarm and recording the risk alarm.
According to the technical scheme of the embodiment of the invention, the technical means that the business data corresponding to the risk configuration information is obtained from each original business table, and the business data is calculated according to the risk conditions to obtain the risk information, so that whether the risk information meets the alarm conditions is judged, and the technical problems that the risk problem is not found timely and the troubleshooting is time-consuming and labor-consuming in the prior art are solved. According to the embodiment of the invention, the business data corresponding to the risk configuration information in the logistics are analyzed and calculated, so that the existing to-be-processed articles and the funds which are receivable can be effectively monitored, and therefore, the risks can be found and controlled in time; moreover, after the risk problem is found, the problem link can be rapidly checked by inquiring the related risk information, so that time and labor are saved.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A risk alerting method, comprising:
according to risk configuration information, acquiring business data corresponding to the risk configuration information from each original business table stored in a business database, and storing the business data into a calculation database; the risk configuration information is field information related to fund risk and/or cargo risk in the logistics information circulation process;
calculating the service data according to risk conditions to obtain risk information; wherein the risk information comprises fund information and/or goods information bound with a site and/or a distributor;
and judging whether the risk information meets the alarm condition, if so, sending a risk alarm and recording the risk alarm.
2. The method of claim 1, wherein the computation database comprises a mysql database cluster and an Elasticsearch database cluster;
calculating the service data according to the risk condition to obtain risk information, wherein the risk information comprises:
based on the risk condition, performing query calculation on the service data stored in the mysql database cluster to obtain risk information;
and performing aggregation calculation on the business data stored in the Elasticissearch database cluster based on the risk condition to obtain risk information.
3. The method of claim 1, wherein before calculating the business data according to risk conditions and obtaining risk information, the method further comprises:
assembling according to preset risk factors and assembling rules to obtain risk conditions;
wherein the risk factors include at least one of:
abnormal state, time range, goods value amount range and document amount range of the order;
the assembly rule includes: a relationship is, or, a relationship is, or.
4. The method of claim 1, wherein after storing the business data in a calculation database, further comprising:
acquiring a change message from a message queue, and consuming the change message to acquire change data; wherein the change message is generated based on a data log of a traffic database;
and updating the service data stored in the calculation database according to the change data.
5. The method of claim 1, wherein determining whether the risk information satisfies an alarm condition, and if so, sending a risk alarm and recording the risk alarm comprises:
classifying each piece of risk information according to a preset risk category;
judging whether the risk information meets the alarm condition corresponding to the risk category or not for each risk information under each risk category;
if so, acquiring risk department information corresponding to the risk information, acquiring information of the concerned person under the risk department information, sending a risk alarm to the risk department and the concerned person in a message notification mode, and recording the risk alarm.
6. The method of claim 1, wherein the original service table comprises at least one of:
a shipping form, a sorting form, a shipping form, an order form, an item form, and a delivery form.
7. The method of claim 1, wherein the risk configuration information comprises at least one of:
risk scenario, category type, risk indicator, and risk anomaly status.
8. A risk alerting device comprising:
the acquisition module is used for acquiring the business data corresponding to the risk configuration information from each original business table stored in a business database according to the risk configuration information and storing the business data into a calculation database; the risk configuration information is field information related to fund risk and/or cargo risk in the logistics information circulation process;
the calculation module is used for calculating the service data according to risk conditions to obtain risk information; wherein the risk information comprises fund information and/or goods information bound with a site and/or a distributor;
and the alarm module is used for judging whether the risk information meets the alarm condition, if so, sending a risk alarm and recording the risk alarm.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
the one or more programs, when executed by the one or more processors, implement the method of any of claims 1-7.
10. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202010851209.4A 2020-08-21 2020-08-21 Risk alarm method and device Pending CN113743697A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010851209.4A CN113743697A (en) 2020-08-21 2020-08-21 Risk alarm method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010851209.4A CN113743697A (en) 2020-08-21 2020-08-21 Risk alarm method and device

Publications (1)

Publication Number Publication Date
CN113743697A true CN113743697A (en) 2021-12-03

Family

ID=78728028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010851209.4A Pending CN113743697A (en) 2020-08-21 2020-08-21 Risk alarm method and device

Country Status (1)

Country Link
CN (1) CN113743697A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116216075A (en) * 2023-02-02 2023-06-06 山东零度供应链有限公司 Tracking method based on packaging box, system and electronic equipment thereof
CN117557104A (en) * 2023-12-18 2024-02-13 易筑网络科技(苏州)有限公司 Data analysis method, device, equipment and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250543A (en) * 2016-08-10 2016-12-21 深圳市彬讯科技有限公司 A kind of automation data inquiry synchronous storage method
CN107783975A (en) * 2016-08-24 2018-03-09 北京京东尚科信息技术有限公司 The method and apparatus of distributed data base synchronization process
CN109684369A (en) * 2017-10-18 2019-04-26 北京京东尚科信息技术有限公司 Information updating method and device
US20190236541A1 (en) * 2018-01-29 2019-08-01 Wal-Mart Stores, Inc. Automated exception event handler for resolving shipping exceptions
CN110135687A (en) * 2019-04-12 2019-08-16 深圳壹账通智能科技有限公司 Business risk assesses method for early warning, device and computer readable storage medium
CN110175924A (en) * 2019-04-10 2019-08-27 阿里巴巴集团控股有限公司 A kind of risk network establishing method and device
CN110298563A (en) * 2019-06-14 2019-10-01 达疆网络科技(上海)有限公司 A kind of statistical method of discriminant risk order
CN110458695A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 The risk control method and device of cross-border money transfer transactions
CN110992072A (en) * 2018-11-30 2020-04-10 北京嘀嘀无限科技发展有限公司 Abnormal order prediction method and system
CN111553624A (en) * 2020-04-02 2020-08-18 广州市马成信息科技有限公司 Global logistics information comprehensive analysis method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250543A (en) * 2016-08-10 2016-12-21 深圳市彬讯科技有限公司 A kind of automation data inquiry synchronous storage method
CN107783975A (en) * 2016-08-24 2018-03-09 北京京东尚科信息技术有限公司 The method and apparatus of distributed data base synchronization process
CN109684369A (en) * 2017-10-18 2019-04-26 北京京东尚科信息技术有限公司 Information updating method and device
US20190236541A1 (en) * 2018-01-29 2019-08-01 Wal-Mart Stores, Inc. Automated exception event handler for resolving shipping exceptions
CN110992072A (en) * 2018-11-30 2020-04-10 北京嘀嘀无限科技发展有限公司 Abnormal order prediction method and system
CN110175924A (en) * 2019-04-10 2019-08-27 阿里巴巴集团控股有限公司 A kind of risk network establishing method and device
CN110135687A (en) * 2019-04-12 2019-08-16 深圳壹账通智能科技有限公司 Business risk assesses method for early warning, device and computer readable storage medium
CN110298563A (en) * 2019-06-14 2019-10-01 达疆网络科技(上海)有限公司 A kind of statistical method of discriminant risk order
CN110458695A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 The risk control method and device of cross-border money transfer transactions
CN111553624A (en) * 2020-04-02 2020-08-18 广州市马成信息科技有限公司 Global logistics information comprehensive analysis method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116216075A (en) * 2023-02-02 2023-06-06 山东零度供应链有限公司 Tracking method based on packaging box, system and electronic equipment thereof
CN117557104A (en) * 2023-12-18 2024-02-13 易筑网络科技(苏州)有限公司 Data analysis method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN109257200B (en) Method and device for monitoring big data platform
CN109471783B (en) Method and device for predicting task operation parameters
WO2019076001A1 (en) Information updating method and device
CN111414376A (en) Data early warning method and device
CN109446274A (en) The method and apparatus of big data platform BI metadata management
CN113743697A (en) Risk alarm method and device
CN107704357B (en) Log generation method and device
CN110019214A (en) The method and apparatus that data split result is verified
CN112686418A (en) Method and device for predicting performance timeliness
US11645272B2 (en) Method, system, device and medium for querying product history
CN114443437A (en) Alarm root cause output method, apparatus, device, medium, and program product
CN112131292B (en) Structured processing method and device for changed data
CN116450622B (en) Method, apparatus, device and computer readable medium for data warehouse entry
CN112016285B (en) Logistics information processing method and processing system
CN113780915A (en) Service docking method and device
CN113706064A (en) Order processing method and device
CN116777324A (en) Logistics network scheduling method and device
CN107679096B (en) Method and device for sharing indexes among data marts
CN112784212A (en) Method and device for optimizing inventory
CN113762910B (en) Document monitoring method and device
CN115408236A (en) Log data auditing system, method, equipment and medium
CN110688355A (en) Method and device for changing container state
CN110677271B (en) Big data alarm method, device, equipment and storage medium based on ELK
CN110766431A (en) Method and device for judging whether user is sensitive to coupon
CN114491253A (en) Observation information processing method, device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination