CN106878236A - A kind of user's request processing method and equipment - Google Patents

A kind of user's request processing method and equipment Download PDF

Info

Publication number
CN106878236A
CN106878236A CN201510920923.3A CN201510920923A CN106878236A CN 106878236 A CN106878236 A CN 106878236A CN 201510920923 A CN201510920923 A CN 201510920923A CN 106878236 A CN106878236 A CN 106878236A
Authority
CN
China
Prior art keywords
request
risk
terminal device
user
user data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510920923.3A
Other languages
Chinese (zh)
Inventor
孙宏发
雷鑫
沈涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510920923.3A priority Critical patent/CN106878236A/en
Publication of CN106878236A publication Critical patent/CN106878236A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of user's request processing method and equipment, the method is applied to the terminal device of default risk control rule and user data, and the method includes:The terminal device receives the first request that user sends;The terminal device is based on that the risk control is regular and the user data determines first request with the presence or absence of risk;If there is risk, terminal device refusal first request in first request, or the described first request is processed according to default risk request treatment strategy;If first request does not exist risk, the terminal device performs first request.In the embodiment of the present invention, during for the request for needing quick treatment reaction, in risk control rule and user data defaulted in into terminal device, request treatment can be rapidly completed on the premise of security risk is ensured, treatment effeciency is effectively increased, while improving the experience of user.

Description

A kind of user's request processing method and equipment
Technical field
The present invention relates to communication technical field, more particularly to a kind of user's request processing method and equipment.
Background technology
With the continuous development of network technology, people are more and more by process of exchange that internet is completed. Process of exchange based on real-time performance is very easy to each side of the work, life and study of people Face, but many potential safety hazards such as risk trade and wash sale are there is also simultaneously.In current network In process of exchange, interact to judge to hand between the risk prevention system system that user terminal passes through service end Easy process whether there is risk.
In the prior art, the risk rule and transaction data of risk prevention system system use relation data stock Put and dispose on a different server, carried out using schemes such as database trigger, message queue events Event is triggered.Risk prevention system system by run business transaction real-time analysis, thing in and ex-post analysis, The automation of risk of fraud early warning is realized in tracking and treatment, its object is to by the monitoring to concluding the business, know Other high-risk transactions, and anticipation fraud, and take the precautionary measures to reduce what transaction brought in time Loss.
With the development of O2O business under line, barcode scanning pays the means of payment for progressively having developed into main flow, In order to solve the payment success rate of O2O under line, barcode scanning pays the solution for using offline electronic payment.
During the application is realized, inventor has found prior art, and at least there are the following problems:
(1) need to carry out offline electronic payment in the environment of user terminal is in weak net or without net, user terminal cannot be with clothes Judge to whether there is risk in process of exchange by online interaction between the risk prevention system system at end of being engaged in, give Process of exchange brings potential safety hazard;
(2) under traditional on-line payment scene, user terminal is handed between the risk prevention system system of service end In mutual deterministic process, user terminal needs to wait certain lock in time, and this process generally needs to continue 500ms or so so that the experience of user declines;
(3) risk judgment process needs the carrying out in service end centralization to calculate, in the payment transaction system of magnanimity , it is necessary to put into substantial amounts of hardware resource to do the Risk Calculation of service end in system, particularly there is marketing to live Under dynamic scene, in order to support the risk judgment of the transaction payment of moment, generally require to carry out substantial amounts of wind The dilatation of control system.In addition, during user terminal quantity is ever-increasing, the risk of service end is prevented Control system is also required to continuous dilatation to increase with adapting to user terminal quantity, and these can cause risk prevention system Cost increase.
Therefore, prior art pays this class under for such as O2O payments, line needs quick treatment anti- During the request answered, it is impossible to be rapidly completed request treatment, treatment effeciency and timeliness under the premise that security is guaranteed In the presence of delay, the experience of user is reduced.
The content of the invention
The invention provides a kind of user's request processing method, by by risk control rule and number of users According to the mode defaulted in terminal device, the two can not with request treatment is rapidly completed to solve guarantee safety The problem taken into account.
The method is applied to the terminal device of default risk control rule and user data, and the method includes:
The terminal device receives the first request that user sends;
The terminal device is based on that the risk control is regular and the user data determines that described first please Ask with the presence or absence of risk;
If first request has risk, the terminal device refusal described first is asked, or according to pre- If risk request treatment strategy to described first request process;
If first request does not exist risk, the terminal device performs first request.
Preferably, the terminal device according to default risk request treatment strategy ask described first into Row treatment, specially:
Described first request is sent most preassigned server by the terminal device, and according to described Result refusal or perform first request that server is returned;
Or, the terminal device points out the user input checking information, and taken by the checking information Band is sent to the server in being asked second, according to the result refusal that the server is returned Or perform second request.
Preferably, the terminal device is based on the default risk control rule and user data judges institute State the first request and whether there is risk, specially:
The terminal device reads the risk control rule;
User's letter that the terminal device is carried in the first request according to the risk control rule judgment Whether breath matches with the user data;
If matching, the terminal device judges that first request has risk;If mismatching, the end End equipment judges first request in the absence of risk.
Preferably, after the terminal device performs first request, also include:
The number of users that the terminal device is stored according to the user profile carried in the described first request to itself According to being updated, and by the user data upload after renewal to the server after the completion of the renewal.
Preferably, when arrival default update cycle at the corresponding moment, the terminal device obtains described The currently stored risk control rule of server and user data, and according to the risk control rule for getting Then and user data to itself store risk control rule and user data be updated.
Correspondingly, the application also proposed a kind of terminal device, and the terminal device is preset with risk control rule Then and user data, the terminal device includes:
Receiver module, receives the first request that user sends;
Determining module, it is regular based on the risk control and the user data determines first request With the presence or absence of risk;
, there is risk in processing module, refuse first request in the described first request, or according to default Risk request treatment strategy to described first request process;
Performing module, does not exist risk in the described first request, performs first request.
Preferably, the processing module specifically for:
Described first request is sent into most preassigned server, and returned according to the server First request is refused or performed to result;
Or, pointing out the user input checking information, and carried in the second request by the checking information It is middle to send to the result refusal for after the server, being returned according to the server or perform described the Two requests.
Preferably, the determining module specifically for:
Read the risk control rule;
According to the risk control rule judgment first request in carry user profile whether with it is described User data is matched;
If matching, judge that first request has risk;If mismatching, first request is judged not There is risk.
Preferably, the terminal device also includes:
First update module, according to the user that the user profile carried in the described first request is stored to itself Data are updated, and by the user data upload after renewal to the server after the completion of the renewal.
Preferably, the terminal device is further included:
Second update module, when arrival default update cycle at the corresponding moment, obtains the server Currently stored risk control rule and user data, and according to the risk control rule for getting and User data is updated to the risk control rule and user data that itself store.
As can be seen here, by the technical scheme of application the application, by the way that wind is preset in terminal device in advance Danger control rule and user data, receive user transmission request when according to risk control rule with And user data determines whether there is risk, and request is performed in the case of in the absence of risk, there is wind Refuse request in the case of danger, or request is processed according to default risk request treatment strategy.From And request treatment can be under the premise that security is guaranteed rapidly completed, treatment effeciency is effectively increased, while Improve the experience of user.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet of user's request processing method that the application is proposed;
A kind of offline electronic payment processing method schematic diagram that Fig. 2 is proposed by the specific embodiment of the application;
A kind of on-line payment processing method schematic diagram that Fig. 3 is proposed by the specific embodiment of the application;
Fig. 4 is a kind of structural representation of terminal device that the application is proposed.
Specific embodiment
In view of the problems of the prior art, present applicant proposes a kind of user's request processing method, pass through Risk control rule and user data are preset in terminal device in advance, when for the quick treatment of needs During the request of reaction, terminal device can be in advance judged the risk of user's request.Due to most users Request just can complete risk judgment in terminal device, can so save between terminal device and server Interaction time, so as to reduce user's request treatment average time, effectively improve the use of user Experience.
Wherein, risk control rule and user data are respectively stored in its corresponding private data memory block Interior, private data memory block includes:
A) risk rule memory block:For storing risk judgment logic, risk judgment logic is used to be defined on When meeting logic of propositions condition, the judgement that there is risk is made.Risk judgment logic is based on risk control Operation demand is packed in the form of rules, and management end can carry out real-time adjustment to risk rule online, And corresponding data is issued in terminal device by the passage that issues between service end and terminal device.
B) risk data memory block:For the behavioral data of the user's history request of storage terminal device, bag Include but be not limited to be stored in the information such as believable user list, list of locations on terminal device.
As shown in figure 1, the schematic flow sheet of the user's request processing method for the application proposition, including with Lower step:
S101, the terminal device receives the first request that user sends.
In the embodiment of the present invention, the terminal device receives the process of the request that user sends, and specifically includes But following manner is not limited to, terminal device receives user by defaulting in taking for the application transmission of terminal device Request.Wherein, terminal device includes but is not limited to mobile terminal, personal computer, server and network Equipment etc..
S102, the terminal device is based on that the risk control is regular and the user data determine it is described First request whether there is risk.
In order to provide risk judgment foundation to risk control rule, first request of the application has Carry user profile, terminal device can be compared based on user profile with default user data, with to The risk control rule provides risk judgment foundation.Based on the user that the first request described in S101 is carried Information, proposes corresponding determination mode in this application in preferred embodiment, specific as follows:
Step a) the terminal devices read the risk control rule;
What the step b) terminal devices were carried in the first request according to the risk control rule judgment Whether user profile matches with the user data;
If step c) is matched, the terminal device judges that first request has risk;If mismatching, The terminal device judges first request in the absence of risk.
Specifically, when " the request list of locations of user includes position A, position B and position in user data Put C, and the request position of the user in first request is position D " and " user in user data Request species include species A, species B and species C, and it is described first request in user request species It is species D " while when occurring, then corresponding to described first and asking the probability that there is risk generally higher. In the specific embodiment of the application, the user profile of first request that the terminal device is received is at least Including following one or more:The personal information of user, the request content of user, the request position of user Put the request species with user.
It should be noted that the content of above user profile is only the example that the application preferred embodiment is proposed, Can also be on this basis to include more contents, so that risk judgment is more accurate, these change Enter to belong to protection scope of the present invention.
S103, if first request has risk, the terminal device refusal described first is asked, or The described first request is processed according to default risk request treatment strategy.
The request that the application is intended to be sent for user carries out risk judgment by terminal device, and is judging Request is processed according to treatment strategy when there is risk, it is correspondingly, preferred in this application to implement Corresponding treatment strategy is proposed in example, it is specific as follows:
Described first request is sent most preassigned server by the terminal device, and according to described Result refusal or perform first request that server is returned;
Or, the terminal device points out the user input checking information, and taken by the checking information Band is sent to the server in being asked second, according to the result refusal that the server is returned Or perform second request.
Herein it should be noted that second request in the application refers in particular to carry the described of checking information First request, other names mode on this basis belongs to protection scope of the present invention.
S104, if first request does not exist risk, the terminal device performs first request.
In specific application scenarios, most users request just can complete risk judgment in terminal device, this Sample can save the interaction time between terminal device and server, only exist a few users request needs defeated Enter checking information to be verified or judged again by way of sending to server and being processed.Always For body, the average time of user's request treatment is reduced, and no matter in offline environment or or in wire loop In border, request treatment can be rapidly completed on the premise of security risk is ensured.
In the preferred embodiment of the application, the terminal device is performed after first request, described Terminal device is carried out more according to the user profile carried in the described first request to the user data for itself storing Newly, by the user data upload after renewal to the server and after the completion of the renewal.The terminal Equipment is updated to the user data that itself is stored, and can be effectively increased the accurate of terminal device risk judgment Property, by the user data upload after renewal to the server, increased the accurate of risk server judgement Property, while also reducing the consumption for updating push time and data traffic.
Further, it is also provided with the preferred embodiment of the application for risk control rule and user The renewal push-mechanism of data, when arrival default update cycle at the corresponding moment, the terminal device The currently stored risk control rule of the server and user data are obtained, and according to the wind for getting Danger control rule and user data are carried out more to the risk control rule and user data that itself store Newly.
In the embodiment of the present invention, risk control rule and user data are regularly updated and pushed to by server Terminal device is based primarily upon following two reasons:
(1) increasing with terminal device treatment user's request number of times, carries the user profile in request Quantity increase therewith, and user profile as terminal device judge user's request with the presence or absence of risk weight Will foundation, the integrality of its data has conclusive shadow to the risk judgment accuracy of hereafter user's request Ring, therefore need for user data update to push to terminal device;
(2) with the diversification of risk category, server also needs to enter risk control rule by management end Row adjustment, risk control rule is regularly updated and pushes to terminal device, is conducive to raising terminal device to sentence The accuracy of disconnected risk.
As can be seen here, by application above technical scheme, default risk control rule and user are applied to The terminal device of data, in risk control rule and user data defaulted in into terminal device, when When for the request for needing quick treatment reaction, terminal device can give the risk of user's request in advance Judge.Because most users request just can complete risk judgment in terminal device, can so save end Interaction time between end equipment and server, so as to reduce the average time of user's request treatment, and No matter offline environment or or in thread environment, can be quick complete on the premise of security risk is ensured Into request treatment, the experience of user is effectively improved.Further, since most users request is in terminal Just risk judgment can be completed in equipment, the demand to server end hardware resource and capacity is reduced, is saved About cost.
In order to the technological thought of the application is expanded on further, in conjunction with the specific application scenarios shown in Fig. 3, Technical scheme to the application is illustrated.
Herein in specific application scenarios, due to the limitation of network condition, by the way of offline electronic payment. Mobile phone wallet is run in terminal device, when mobile phone wallet receives payment request, mould is paid into barcode scanning Formula, while terminal device judges to pay request with the presence or absence of risk according to user profile.
If paying request does not exist risk, terminal device is performed by mobile phone wallet and pays request, specifically , mobile phone wallet is generated and shows payment code, beneficiary scanning payment code while obtain user account and Authorization code, completes user and withholds by request protocol, and terminal device shows to the state of withholing.
If paying request has risk, can be processed by following two modes:
A) terminal device directly refuses to pay request by mobile phone wallet.
B) terminal device points out the user input checking information by mobile phone wallet, and by checking information Carry and sent to server in being asked second, the result returned according to server is refused or performed Pay request.If specifically, server return result determine pay request there is risk, eventually Only pay request;If the result that server is returned determines that paying request does not exist risk, terminal device Performed by mobile phone wallet and pay request, specifically, mobile phone wallet is generated and shows payment code, beneficiary User account and authorization code are obtained while scanning payment code, completing user by request protocol withholds, eventually End equipment shows to the state of withholing.
In traditional offline electronic payment, terminal device cannot be between server by way of online interaction To judge with the presence or absence of risk paying request, therefore various safety can be faced during offline electronic payment Hidden danger.And in this application scene, default in terminal and set by by risk control rule and user data In standby, when when for the request for needing quick treatment reaction, terminal device can be to the risk of user's request Judged, it is ensured that the safety in payment process.Meanwhile, please be seek survival for payment in this application scene Other processing modes are additionally provided in the case of risk with the smooth of the process of guaranteeing payment.
In order to the technological thought of the application is expanded on further, in conjunction with the specific application scenarios shown in Fig. 4, Technical scheme to the application is illustrated.
The processing mode that this application scene is directed to the payment request of traditional on-line payment makes improvement.
Mobile phone wallet is run in terminal device, when mobile phone wallet receives payment request, into barcode scanning branch The pattern of paying, while terminal device judges to pay request with the presence or absence of risk according to user profile.
If paying request does not exist risk, terminal device is performed by mobile phone wallet and pays request, specifically , mobile phone wallet is generated and shows payment code, beneficiary scanning payment code while obtain user account and Authorization code, completes user and withholds by request protocol, and terminal device shows to the state of withholing.
If paying request has risk, can be processed by following two modes:
A) terminal device directly refuses to pay request by mobile phone wallet.
B) terminal device will pay request and sends most preassigned server, service by mobile phone wallet Risk control of the device based on server end is regular and user data is judged the risk for paying request, The result refusal or execution returned according to the server pay request.If specifically, server is returned The result returned determines that paying request has risk, then terminate paying request;If the place that server is returned Reason result determines that paying request does not exist risk, and terminal device is performed by mobile phone wallet and pays request, tool Body, mobile phone wallet is generated and shows payment code, and user account is obtained while beneficiary scanning payment code And authorization code, user being completed by request protocol and is withholdd, terminal device shows to the state of withholing.
In traditional on-line payment, terminal device is handed between the risk prevention system system of service end , it is necessary to wait treatment lock in time more long in mutual deterministic process so that the experience of user declines. And in this application scene, in risk control rule and user data defaulted in into terminal device, When for the request for needing quick treatment reaction, terminal device can give elder generation to the risk of user's request Row judges.Because most users request just can complete risk judgment in terminal device, can so save Interaction time between terminal device and server, so as to reduce the average time of user's request treatment, Request treatment is rapidly completed on the premise of security risk is ensured, while effectively improving the use body of user Test.
As can be seen here, by application above technical scheme, default risk control rule and user are applied to The terminal device of data, in risk control rule and user data defaulted in into terminal device, when When for the request for needing quick treatment reaction, terminal device can give the risk of user's request in advance Judge.Because most users request just can complete risk judgment in terminal device, can so save end Interaction time between end equipment and server, so as to reduce the average time of user's request treatment, and No matter offline environment or or in thread environment, can be quick complete on the premise of security risk is ensured Into request treatment, the experience of user is effectively improved.Further, since most users request is in terminal Just risk judgment can be completed in equipment, the demand to server end hardware resource and capacity is reduced, is saved About cost.
Herein it should be noted that the content of specific application scenarios is only the application preferred embodiment above The example of proposition, can also include more application fields, so that the technical program on this basis With widely application, these improvement belong to protection scope of the present invention.
To reach above technical purpose, the application also proposed a kind of terminal device, as shown in figure 4, should Terminal device includes risk control rule and user data, and the terminal device includes:
Receiver module 210, receives the first request that user sends;
Determining module 220, it is regular based on the risk control and the user data determines that described first please Ask with the presence or absence of risk;
, there is risk in processing module 230, refuse first request in the described first request, or according to pre- If risk request treatment strategy to described first request process;
Performing module 240, does not exist risk in the described first request, performs first request.
Preferably, the processing module specifically for:
Described first request is sent into most preassigned server, and returned according to the server First request is refused or performed to result;
Or, pointing out the user input checking information, and carried in the second request by the checking information It is middle to send to the result refusal for after the server, being returned according to the server or perform described the Two requests.
In specific application scenarios, the determining module specifically for:
Read the risk control rule;
According to the risk control rule judgment first request in carry user profile whether with it is described User data is matched;
If matching, judge that first request has risk;If mismatching, first request is judged not There is risk.
In specific application scenarios, the terminal device also includes:
First update module, according to the user that the user profile carried in the described first request is stored to itself Data are updated, and by the user data upload after renewal to the server after the completion of the renewal.
In specific application scenarios, the terminal device is further included:
Second update module, when arrival default update cycle at the corresponding moment, obtains the server Currently stored risk control rule and user data, and according to the risk control rule for getting and User data is updated to the risk control rule and user data that itself store.
Through the above description of the embodiments, those skilled in the art can be understood that this hair It is bright to be realized by hardware, it is also possible to be realized by the mode of software plus necessary general hardware platform. Based on such understanding, technical scheme can be embodied in the form of software product, and this is soft It (can be CD-ROM, USB flash disk is mobile hard that part product can be stored in a non-volatile memory medium Disk etc.) in, including some instructions are used to so that a computer equipment (can be personal computer, take Business device, or the network equipment etc.) perform method described in each implement scene of the invention.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, in accompanying drawing Module or necessary to flow not necessarily implements the present invention.
It will be appreciated by those skilled in the art that the module in device in implement scene can be according to implement scene Description be distributed in the device of implement scene, it is also possible to is carried out respective change and is disposed other than this implementation In one or more devices of scene.The module of above-mentioned implement scene can merge into a module, also may be used To be further split into multiple submodule.
The invention described above sequence number is for illustration only, and the quality of implement scene is not represented.
Disclosed above is only several specific implementation scenes of the invention, but, the present invention is not limited to This, the changes that any person skilled in the art can think of should all fall into protection scope of the present invention.

Claims (10)

1. a kind of user's request processing method, it is characterised in that methods described is applied to default risk control The terminal device of rule and user data, methods described includes:
The terminal device receives the first request that user sends;
The terminal device is based on that the risk control is regular and the user data determines that described first please Ask with the presence or absence of risk;
If first request has risk, the terminal device refusal described first is asked, or according to pre- If risk request treatment strategy to described first request process;
If first request does not exist risk, the terminal device performs first request.
2. the method for claim 1, it is characterised in that the terminal device is according to default wind Danger request treatment strategy is processed the described first request, specially:
Described first request is sent most preassigned server by the terminal device, and according to described Result refusal or perform first request that server is returned;
Or, the terminal device points out the user input checking information, and taken by the checking information Band is sent to the server in being asked second, according to the result refusal that the server is returned Or perform second request.
3. the method for claim 1, it is characterised in that the terminal device is based on described default Risk control rule and user data judge that first request whether there is risk, specially:
The terminal device reads the risk control rule;
User's letter that the terminal device is carried in the first request according to the risk control rule judgment Whether breath matches with the user data;
If matching, the terminal device judges that first request has risk;If mismatching, the end End equipment judges first request in the absence of risk.
4. the method for claim 1, it is characterised in that perform described the in the terminal device After one request, also include:
The number of users that the terminal device is stored according to the user profile carried in the described first request to itself According to being updated, and by the user data upload after renewal to the server after the completion of the renewal.
5. method as claimed in claim 4, it is characterised in that
When arrival default update cycle at the corresponding moment, the terminal device obtains the server and works as The risk control rule and user data of preceding storage, and according to the risk control rule for getting and use User data is updated to the risk control rule and user data that itself store.
6. a kind of terminal device, it is characterised in that the terminal device is comprising risk control rule and uses User data, the terminal device includes:
Receiver module, receives the first request that user sends;
Determining module, it is regular based on the risk control and the user data determines first request With the presence or absence of risk;
, there is risk in processing module, refuse first request in the described first request, or according to default Risk request treatment strategy to described first request process;
Performing module, does not exist risk in the described first request, performs first request.
7. terminal device as claimed in claim 6, it is characterised in that the processing module specifically for:
Described first request is sent into most preassigned server, and returned according to the server First request is refused or performed to result;
Or, pointing out the user input checking information, and carried in the second request by the checking information It is middle to send to the result refusal for after the server, being returned according to the server or perform described the Two requests.
8. terminal device as claimed in claim 6, it is characterised in that the determining module specifically for:
Read the risk control rule;
According to the risk control rule judgment first request in carry user profile whether with it is described User data is matched;
If matching, judge that first request has risk;If mismatching, first request is judged not There is risk.
9. terminal device as claimed in claim 6, it is characterised in that also include:
First update module, according to the user that the user profile carried in the described first request is stored to itself Data are updated, and by the user data upload after renewal to the server after the completion of the renewal.
10. terminal device as claimed in claim 9, it is characterised in that also include:
Second update module, when arrival default update cycle at the corresponding moment, obtains the server Currently stored risk control rule and user data, and according to the risk control rule for getting and User data is updated to the risk control rule and user data that itself store.
CN201510920923.3A 2015-12-11 2015-12-11 A kind of user's request processing method and equipment Pending CN106878236A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510920923.3A CN106878236A (en) 2015-12-11 2015-12-11 A kind of user's request processing method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510920923.3A CN106878236A (en) 2015-12-11 2015-12-11 A kind of user's request processing method and equipment

Publications (1)

Publication Number Publication Date
CN106878236A true CN106878236A (en) 2017-06-20

Family

ID=59177368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510920923.3A Pending CN106878236A (en) 2015-12-11 2015-12-11 A kind of user's request processing method and equipment

Country Status (1)

Country Link
CN (1) CN106878236A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018014789A1 (en) * 2016-07-22 2018-01-25 阿里巴巴集团控股有限公司 Method and device for controlling service operation risk
CN109063952A (en) * 2018-06-15 2018-12-21 阿里巴巴集团控股有限公司 Strategy generating and risk control method and device
CN109214632A (en) * 2017-07-05 2019-01-15 阿里巴巴集团控股有限公司 A kind of risk control method and equipment
CN110781500A (en) * 2019-09-30 2020-02-11 口碑(上海)信息技术有限公司 Data wind control system and method
CN111428971A (en) * 2020-03-05 2020-07-17 支付宝(杭州)信息技术有限公司 Service data processing method and device and server
CN111582771A (en) * 2020-06-16 2020-08-25 深圳前海微众银行股份有限公司 Risk assessment method, device, equipment and computer readable storage medium
CN112417418A (en) * 2020-11-19 2021-02-26 刘一方 Verification method based on novel verification code
WO2021249526A1 (en) * 2020-06-12 2021-12-16 支付宝(杭州)信息技术有限公司 Risk prevention and control information processing method, apparatus and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964126A (en) * 2010-09-13 2011-02-02 中兴通讯股份有限公司 Mobile terminal payment method and mobile terminal
CN102034181A (en) * 2010-11-09 2011-04-27 深圳市爱贝信息技术有限公司 User transaction frequency detection-based transaction security control method and device
CN102915513A (en) * 2012-09-29 2013-02-06 上海市电力公司 Typhoon risk information processing method for power grid equipment
CN103746979A (en) * 2013-12-30 2014-04-23 飞天诚信科技股份有限公司 Data processing method and system
CN104168293A (en) * 2014-09-05 2014-11-26 北京奇虎科技有限公司 Method and system for recognizing suspicious phishing web page in combination with local content rule base
US8978104B1 (en) * 2008-07-23 2015-03-10 United Services Automobile Association (Usaa) Access control center workflow and approval
CN104867011A (en) * 2014-02-21 2015-08-26 中国电信股份有限公司 Method and device for carrying out safety control on mobile payment
US20150348031A1 (en) * 2014-05-28 2015-12-03 Isys US, Inc. Switch Server System Interoperable with Mobile Devices Providing Secure Communications

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8978104B1 (en) * 2008-07-23 2015-03-10 United Services Automobile Association (Usaa) Access control center workflow and approval
CN101964126A (en) * 2010-09-13 2011-02-02 中兴通讯股份有限公司 Mobile terminal payment method and mobile terminal
CN102034181A (en) * 2010-11-09 2011-04-27 深圳市爱贝信息技术有限公司 User transaction frequency detection-based transaction security control method and device
CN102915513A (en) * 2012-09-29 2013-02-06 上海市电力公司 Typhoon risk information processing method for power grid equipment
CN103746979A (en) * 2013-12-30 2014-04-23 飞天诚信科技股份有限公司 Data processing method and system
CN104867011A (en) * 2014-02-21 2015-08-26 中国电信股份有限公司 Method and device for carrying out safety control on mobile payment
US20150348031A1 (en) * 2014-05-28 2015-12-03 Isys US, Inc. Switch Server System Interoperable with Mobile Devices Providing Secure Communications
CN104168293A (en) * 2014-09-05 2014-11-26 北京奇虎科技有限公司 Method and system for recognizing suspicious phishing web page in combination with local content rule base

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018014789A1 (en) * 2016-07-22 2018-01-25 阿里巴巴集团控股有限公司 Method and device for controlling service operation risk
CN109214632A (en) * 2017-07-05 2019-01-15 阿里巴巴集团控股有限公司 A kind of risk control method and equipment
CN109214632B (en) * 2017-07-05 2022-01-28 创新先进技术有限公司 Risk control method and equipment
CN109063952A (en) * 2018-06-15 2018-12-21 阿里巴巴集团控股有限公司 Strategy generating and risk control method and device
CN110781500A (en) * 2019-09-30 2020-02-11 口碑(上海)信息技术有限公司 Data wind control system and method
CN111428971A (en) * 2020-03-05 2020-07-17 支付宝(杭州)信息技术有限公司 Service data processing method and device and server
WO2021249526A1 (en) * 2020-06-12 2021-12-16 支付宝(杭州)信息技术有限公司 Risk prevention and control information processing method, apparatus and device
CN111582771A (en) * 2020-06-16 2020-08-25 深圳前海微众银行股份有限公司 Risk assessment method, device, equipment and computer readable storage medium
CN112417418A (en) * 2020-11-19 2021-02-26 刘一方 Verification method based on novel verification code

Similar Documents

Publication Publication Date Title
CN106878236A (en) A kind of user's request processing method and equipment
CN110232565B (en) Resource clearing method, device, computer equipment and storage medium
CN107093141B (en) Product object processing method and device
CN110148017A (en) Equity distribution method and device, electronic equipment, storage medium based on block chain
US20150019428A1 (en) Systems and methods for dynamic transaction-payment routing
CN107609848A (en) A kind of IPR licensing method and system based on Internet of Things
CN107871232A (en) A kind of generation method and its terminal of customer visit plan
CN109360101A (en) A kind of block chain transaction processing method, device, equipment and medium
TWI605396B (en) Return resource processing method and device
CN111612453A (en) Decentralized transaction method and device based on block chain and electronic equipment
CN109472574A (en) Method of payment, device, computer equipment and storage medium
CN111680968B (en) Building rights management system and method based on block chain
CN109493041A (en) Distributed bookkeeping methods and transaction platform based on regional field chain
CN107909468A (en) A kind of tax silver credit investigation system and method
CN114757497A (en) Technology trust-increasing method for science and technology enterprise, device, equipment and medium thereof
CN110245959A (en) The treating method and apparatus of specific aim request
US11216797B2 (en) Systems and methods for managing transactions by consolidating associated transactions
CN108446905A (en) A kind of method of payment, device and electronic equipment
CN106209731A (en) Session service processing method and processing device
CN110570189B (en) Account risk prevention and control method and system
CN112184429A (en) User information processing method and block chain link point
CN107730259A (en) Fingerprint payment method and device and user terminal
CN114331446B (en) Method, device, equipment and medium for realizing out-of-chain service of block chain
CN115731028A (en) Early warning method, early warning device, electronic equipment and computer readable medium
CN114819820A (en) Intelligent supply chain management method, device, system and medium based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620