The content of the invention
In view of this, the application provides a kind of method and dress that e commerce transactions air control is realized based on distributed data source framework
Put.
Specifically, the application is achieved by the following technical solution:
A kind of method that e commerce transactions air control is realized based on distributed data source framework, methods described is included:
After Client-initiated service request is received, the air control attribute information of user is obtained;
Inquiry request is sent to N number of primary sources source according to the air control attribute information respectively, for i-th of first kind
Data source, if query hit, default constant a is set to by the Query Result Ri in the primary sources source, if query missed,
The Query Result Ri in the primary sources source is then set to default constant b, wherein, N is the natural number more than 1, and i is no more than
N natural number;
Inquiry request is sent to M secondary sources source according to the air control attribute information respectively, for j-th of Equations of The Second Kind
Data source, if query hit, default constant c is set to by the Query Result Rj in the secondary sources source, if query missed,
The Query Result Rj in the secondary sources source is then set to default constant d, wherein, M is the natural number more than 1, and j is no more than
N natural number;
The Query Result in the primary sources source is weighted according to the weight Xi in i-th of primary sources source and asked
With summed result
The Query Result in the secondary sources source is weighted according to the weight Yj in j-th of secondary sources source and asked
With summed result
The service request according to Rsum1 and Rsum2 determine whether to receive Client-initiated.
A kind of device that e commerce transactions air control is realized based on distributed data source framework, described device is included:
Attribute acquiring unit, after Client-initiated service request is received, obtains the air control attribute information of user;
First query unit, inquiry request, pin are sent according to the air control attribute information to N number of primary sources source respectively
To i-th of primary sources source, if query hit, the Query Result Ri in the primary sources source is set to default constant a,
If query missed, the Query Result Ri in the primary sources source is set to default constant b, wherein, N is oneself more than 1
So count, i is no more than N natural number;
Second query unit, inquiry request, pin are sent according to the air control attribute information to M secondary sources source respectively
To j-th of secondary sources source, if query hit, the Query Result Rj in the secondary sources source is set to default constant c,
If query missed, the Query Result Rj in the secondary sources source is set to default constant d, wherein, M is oneself more than 1
So count, j is no more than N natural number;
First sum unit, according to inquiry knots of the weight Xi in i-th of primary sources source to the primary sources source
Fruit is weighted summation, summed result
Second sum unit, according to inquiry knots of the weight Yj in j-th of secondary sources source to the secondary sources source
Fruit is weighted summation, summed result
As a result determining unit, the service request according to Rsum1 and Rsum2 determine whether to receive Client-initiated.
The e commerce transactions air control scheme provided it can be seen from above description using the application, can integrate fraud class number
The risk of service request is weighed according to the Query Result of source and credit class data source, service provider can be according to business focus
For the fraud class data source weight different with the setting of credit class data source, targetedly risk assessment is realized.In addition, using this
The e commerce transactions air control scheme provided is provided, when increasing data source, weight, favorable expandability, and configuration letter is reset
It is single.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the application.
It is the purpose only merely for description specific embodiment in term used in this application, and is not intended to be limiting the application.
" one kind ", " described " and "the" of singulative used in the application and appended claims are also intended to including majority
Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped
It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application
A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, not departing from
In the case of the application scope, the first information can also be referred to as the second information, similarly, and the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
Fig. 1 is that one kind shown in the exemplary embodiment of the application one realizes e commerce transactions wind based on distributed data source framework
The schematic flow sheet of the method for control.
Fig. 1 is refer to, it is described to realize that the method for e commerce transactions air control is applied in industry based on distributed data source framework
It is engaged in the server or server cluster of provider's deployment, includes following steps:
Step 101, after Client-initiated service request is received, the air control attribute information of user is obtained.
In the present embodiment, e commerce transactions are provided by service provider, and user can initiate business by corresponding channel
Request.So that service provider is operator as an example, the service request can be preferential purchase machine request etc..Using service provider as
Exemplified by lending side, the service request can be loan requests etc..
In the present embodiment, the air control attribute information can in advance be set according to service conditions by service provider
Put, in air control scene, it is however generally that, the air control attribute information includes:Name, ID card No. etc. can recognize user
The information of identity.Certainly, the air control attribute information can also include:Telephone number is (such as:Phone number), account ID etc..
In this step, after the service request is received, the air control attribute information for initiating user can be obtained, it is described
Air control attribute information may be carried in the service request, and the air control attribute information may also be stored in default database
In, such as:Server can obtain corresponding air control attribute information, the application based on information such as account ID from Relational database
This is not particularly limited.
Step 102, inquiry request is sent to N number of primary sources source according to the air control attribute information respectively, for i-th
Individual primary sources source, if query hit, default constant a is set to by the Query Result Ri in the primary sources source, if looking into
Ask miss, then the Query Result Ri in the primary sources source is set to default constant b, wherein, N is the natural number more than 1,
I is no more than N natural number.
Step 103, inquiry request is sent to M secondary sources source according to the air control attribute information respectively, for jth
Individual secondary sources source, if query hit, default constant c is set to by the Query Result Rj in the secondary sources source, if looking into
Ask miss, then the Query Result Rj in the secondary sources source is set to default constant d, wherein, M is the natural number more than 1,
J is no more than N natural number.
In the present embodiment, data source framework is distributed, can specifically be divided into two classes, and a class is related to fraud, separately
One class is related to credit.Such as:Primary sources source can be fraud class data source, the related letter for the user for being accused of fraud that is stored with
Breath, secondary sources source can be credit class data source, store the relevant information of creditable poor user.
In the present embodiment, the primary sources source and the secondary sources source are usually constructed with multiple.Specifically, institute
Stating primary sources source has N number of, can be respectively from different mechanisms, for example, primary sources source 1 comes from China Mobile,
It is stored with and once carried out the relevant information of the user of fraud in China Mobile, such as:Once emitted in conventional preferential purchase machine activity
Validated user is filled to gain the user of mobile phone by cheating.Primary sources source 2 comes from certain network lending platforms, is stored with once flat in the credit
Platform carried out the relevant information of the user of fraud, such as:Once the user cheated loan with deceptive information.There is M in the secondary sources source
It is individual, can also be respectively from different mechanisms, for example, secondary sources source 1 comes from Bank of China, and be stored with Bank of China
The relevant information of the bad user of credit of record, such as:The user for not going back housing loan on time in continuous three months.Secondary sources source 2
The relevant information of the bad user of credit recorded from China Telecom, the China Telecom that is stored with, such as:Continuous three default calls
User taken etc..
In the present embodiment, stored in each data source be accused of fraud or the relevant information of the bad user of credit is generally wrapped
The air control attribute information of the user got containing server, such as:It is stored with data source and is accused of fraud or the bad user of credit
The information such as name, identification card number, phone number.Server can use this after the air control attribute information of user is got
Air control attribute sends inquiry request to each data source successively, to inquire about whether the air control attribute information hits corresponding data source
In a certain bar user information, if query hit, can by this inquiry result be set to default numerical value, if looked into
Ask miss, then the result of this inquiry can be set to another default numerical value.
In one example, different Query Result quantized values can be set for this two classes data source.Specifically, for
The Query Result of query hit, can be set to default constant a, such as by primary sources source:1, can be by query missed
Query Result be set to default constant b, such as:0.That is,, can be by if query hit for i-th of primary sources source
Query Result Ri is set to a, if query missed, Query Result Ri can be set into b.Similar, for secondary sources source,
The Query Result of query hit can be set to default constant c, c value can be identical with a, such as:Can be taking for 1, c
Value can also be differed with a.The Query Result of query missed can also be set to default constant d, d value can and b
It is identical, such as:Can be that 0, d value can also be differed with b, the application is not particularly limited to this.
In the present embodiment, constant a, b, c and d value can by service provider according to oneself the need for set
Put, such as:When service provider more pays close attention to risk of fraud, constant a can be set to larger numerical value, work as service provider
When more paying close attention to credit risk, constant c can be set to larger numerical value etc..
It should be noted that the application is not intended to limit the execution sequence of abovementioned steps 102 and 103, step can be first carried out
102, step 103, or parallel execution of steps 102 and 103 can also be first carried out.
Step 104, the Query Result in the primary sources source is carried out according to the weight Xi in i-th of primary sources source
Weighted sum, summed result
Step 105, the Query Result in the secondary sources source is carried out according to the weight Yj in j-th of secondary sources source
Weighted sum, summed result
In the present embodiment, can be right according to the weight in corresponding data source after the numerical value after Query Result quantifies is obtained
Of a sort data source is weighted summation.Specifically, the weight in primary sources source can represent that Xi can be represented with X
The weight in i-th of primary sources source, the weight in secondary sources source can represent that Yj can represent j-th of Equations of The Second Kind with Y
The weight of data source.Wherein,Value can be 1, it is similar,Value can also be 1.Service provider
Different weights can be set for different data sources according to the focus of business risk, flexibility ratio is higher.
Equally, the application does not limit the execution sequence of abovementioned steps 104 and 105 yet, can first carry out step 105, may be used yet
To perform parallel in 104 and 105.
Step 106, the service request according to Rsum1 and Rsum2 determine whether to receive Client-initiated.
Based on abovementioned steps 104 and 105, in this step, it can be asked according to the weighting of the Query Result in primary sources source
It is to determine Client-initiated service request with value Rsum1 and the Query Result weighted sum value Rsum2 in secondary sources source
No have a risk, and determines whether to receive the service request of user according to risk result of determination.
In one example, service provider can determine whether to receive Client-initiated only in accordance with Rsum1 or Rsum2
Service request, such as:When the weighted sum value Rsum1 for cheating class data source reaches default first threshold, it may be determined that this
Secondary business is risky, and then determines the refusal service request.When Rsum1 is not up to the first threshold, it may be determined that this
Secondary business does not have risk, and then can determine to receive service request described in Client-initiated.
In another example, service provider can also use laddering judgment mode, such as:When Rsum1 does not reach
During to default first threshold, it can also determine whether whether Rsum2 reaches default Second Threshold, if reached,
It can determine that this business is risky, and then determine the refusal service request.If Rsum2 is not up to the Second Threshold,
It can then determine that this business does not have risk, and then can determine to receive service request described in Client-initiated.
In another example, service provider can according to the focus of business risk for whole fraud class data source and
Whole credit class data source sets different weights, such as:Settable fraud weight P, credit weight Q, P and Q's and can be
1, it then can calculate comprehensive assessment the result S, S=P × Rsum1+Q × Rsum2 of fraud class data source and credit class data source.
It if S reaches default three threshold value, can determine that this business is risky, and then can determine to refuse Client-initiated
The service request, if S is not up to the 3rd threshold value, can determine that this business does not have risk, and then can determine
Receive service request described in Client-initiated.
The e commerce transactions air control scheme provided it can be seen from above description using the application, can integrate fraud class number
The risk of service request is weighed according to the Query Result of source and credit class data source, service provider can be according to business focus
For the fraud class data source weight different with the setting of credit class data source, targetedly risk assessment is realized.In addition, using this
The e commerce transactions air control scheme provided is provided, when increasing data source, weight, favorable expandability, and configuration letter is reset
It is single.
The implementation process of the application is described with reference to specific example.
It is assumed that service provider is China Mobile, China Mobile provides the user the business of preferential purchase machine.Passed through according to history
Test, in preferential purchase machine business, it is larger to the loss that China Mobile brings to gain mobile phone in the way of fraud by cheating, therefore China Mobile will
The focus of preferential purchase machine business air control is set to fraud.
In one example, after the preferential purchase machine application of Client-initiated is received, the air control attribute of user can be obtained
Information, the air control attribute information can include:Real Name, identification card number, phone number.Fig. 2 is refer to, getting
State after air control attribute information, first inquiry request can be sent to N number of fraud class data source, if query hit, by Query Result
1 is set to, if query missed, Query Result is set to 0, the weight Xi of each fraud class data source is then based on, inquiry is tied
Fruit is weighted summation, to obtain Rsum1, if Rsum1 is more than N/2, can determine there is risk, and refusal user's is preferential
Purchase machine is asked, to carry out risk averse.
Then, if Rsum1 is less than or equal to N/2, it can continue to send inquiry request to M credit class data source, if
Query hit, then also can be set to 1 by Query Result, if query missed, also Query Result can be set into 0, be then based on each
The weight Yj of credit class data source, can be weighted summation to Query Result, to obtain Rsum2, if this Rsum2 is more than M/2,
It can then determine there is risk, the preferential purchase machine request of refusal user, to avoid risk, if Rsum2 is less than or equal to M/2,
It can determine that risk is not present, receive the preferential purchase machine request of user.
Subsequently, if China Mobile is found in preferential purchase machine business, the loss that the bad user of credit of repudiation of the contract brings
It is bigger, then the focus of preferential purchase machine business air control can be set to credit.Server is believed in the air control attribute for getting user
After breath, inquiry request first can be sent to M credit class data source, if query hit, Query Result can be also set to 1, if
Query missed, then also can be set to 0 by Query Result, be then based on the weight Yj of each credit class data source, can be to Query Result
Summation is weighted, to obtain Rsum2, if Rsum2 is more than M/2, can determine there is risk, refuse the preferential purchase of user
Machine is asked, to avoid risk.If Rsum2 is less than or equal to M/2, inquiry request can be sent to N number of fraud class data source again,
Judgment mechanism may be referred to description above, and this is no longer going to repeat them by the application.
In another example, Fig. 3 is refer to, can be both to N number of fraud after the air control attribute information of user is got
Class data source sends inquiry request, and sends inquiry request to M credit class data source, and comprehensive inquiry result is to fraud class number
Summation is weighted according to the result in source and credit class data source, synthesis result S, S=P × Rsum1+Q × Rsum2 is obtained.When S reaches
During to default three threshold value, it is determined that the refusal preferential purchase machine request, when S is not up to three threshold value, it is determined that receiving
Preferential purchase machine request.If the focus of current preferential purchase machine business air control is set to fraud, P can be set greater than 0.5
Numerical value, Q is set smaller than 0.5 numerical value, P+Q=1.If the focus of current preferential purchase machine business air control is set to credit,
P can be set smaller than to 0.5 numerical value, Q is set greater than to 0.5 numerical value, P+Q=1.
The preferential purchase machine air control scheme provided it can be seen from above description using the application, operator can according to work as
The focus of preceding preferential purchase machine risk voluntarily sets the weight and judgment mode of data source, and flexibility ratio is high, with strong points.
Embodiment with the foregoing method that e commerce transactions air control is realized based on distributed data source framework is corresponding, the application
Additionally provide the embodiment for the device that e commerce transactions air control is realized based on distributed data source framework.
The application realizes that the embodiment of the device of e commerce transactions air control can be applied in clothes based on distributed data source framework
It is engaged on device.Device embodiment can be realized by software, can also be realized by way of hardware or software and hardware combining.With soft
It is by non-volatile memories by the processor of server where it as the device on a logical meaning exemplified by part is realized
Corresponding computer program instructions read what operation in internal memory was formed in device.For hardware view, as shown in figure 4, being this
Apply for a kind of hardware structure diagram of server where the device of e commerce transactions air control is realized based on distributed data source framework, except
Outside processor, internal memory, network interface and nonvolatile memory shown in Fig. 4, the server in embodiment where device
Generally according to the actual functional capability of the server, other hardware can also be included, this is repeated no more.
Fig. 5 is that one kind shown in the exemplary embodiment of the application one realizes e commerce transactions wind based on distributed data source framework
The block diagram of the device of control.
Fig. 5 is refer to, it is described to realize that the device 400 of e commerce transactions air control be applied based on distributed data source framework
In server shown in earlier figures 4, include:Attribute acquiring unit 401, the first query unit 402, the second query unit 403,
First sum unit 404, the second sum unit 405 and result determining unit 406.
Wherein, attribute acquiring unit 401, after Client-initiated service request is received, obtains the air control attribute of user
Information;
First query unit 402, sending inquiry to N number of primary sources source respectively according to the air control attribute information please
Ask, for i-th of primary sources source, if query hit, the Query Result Ri in the primary sources source is set to default
Constant a, if query missed, default constant b is set to by the Query Result Ri in the primary sources source, wherein, N be more than
1 natural number, i is no more than N natural number;
Second query unit 403, sending inquiry to M secondary sources source respectively according to the air control attribute information please
Ask, for j-th of secondary sources source, if query hit, the Query Result Rj in the secondary sources source is set to default
Constant c, if query missed, default constant d is set to by the Query Result Rj in the secondary sources source, wherein, M be more than
1 natural number, j is no more than N natural number;
First sum unit 404, the inquiry according to the weight Xi in i-th of primary sources source to the primary sources source
As a result summation, summed result are weighted
Second sum unit 405, the inquiry according to the weight Yj in j-th of secondary sources source to the secondary sources source
As a result summation, summed result are weighted
As a result determining unit 406, the service request according to Rsum1 and Rsum2 determine whether to receive Client-initiated.
Optionally, the primary sources source is fraud class data source;
The result determining unit 406, when Rsum1 reaches default first threshold, it is determined that refusing the service request.
Optionally, the secondary sources source is credit class data source;
The result determining unit 406, when Rsum1 is not up to the first threshold, and Rsum2 is not up to default second
During threshold value, it is determined that receiving the service request.
Optionally, the primary sources source is fraud class data source, and the secondary sources source is credit class data source;
The result determining unit 406, according to fraud weight P and credit weight Q, is added to Rsum1 and Rsum2
Power summation, summed result S=P × Rsum1+Q × Rsum2;
When S reaches default three threshold value, it is determined that refusing the service request.
Optionally, the service request is the preferential purchase machine request that operator carries out;
The air control attribute information includes:Name, ID card No., telephone number.
The function of unit and the implementation process of effect specifically refer to correspondence step in the above method in said apparatus
Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method
Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component
The unit of explanation can be or may not be physically separate, and the part shown as unit can be or can also
It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality
Selection some or all of module therein is needed to realize the purpose of application scheme.Those of ordinary skill in the art are not paying
In the case of going out creative work, you can to understand and implement.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity,
Or realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can
To be personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play
In device, navigation equipment, E-mail receiver/send equipment, game console, tablet PC, wearable device or these equipment
The combination of any several equipment.
The preferred embodiment of the application is the foregoing is only, not to limit the application, all essences in the application
God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of the application protection.