CN107818368A - Risk control rule engine system on line - Google Patents

Risk control rule engine system on line Download PDF

Info

Publication number
CN107818368A
CN107818368A CN201610824252.5A CN201610824252A CN107818368A CN 107818368 A CN107818368 A CN 107818368A CN 201610824252 A CN201610824252 A CN 201610824252A CN 107818368 A CN107818368 A CN 107818368A
Authority
CN
China
Prior art keywords
module
rule
rule engine
strategy
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610824252.5A
Other languages
Chinese (zh)
Inventor
李占卫
杨阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wing Yi Internet Financial Information Service Co Ltd
Original Assignee
Shanghai Wing Yi Internet Financial Information Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wing Yi Internet Financial Information Service Co Ltd filed Critical Shanghai Wing Yi Internet Financial Information Service Co Ltd
Priority to CN201610824252.5A priority Critical patent/CN107818368A/en
Publication of CN107818368A publication Critical patent/CN107818368A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/04Inference or reasoning models

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides risk control rule engine system on a kind of line, including:Intermediate result module, statistics is provided for rule engine module;Configurable policy module, storage rule list, the input as rule engine module;The list of rules is made up of strategy, and the strategy includes Meta-Policy and federation policies;Rule engine module, the statistics and initial data that intermediate result is provided are matched with the strategy stored in configurable policy module;Regular computing module, initial data is encoded according to the strategy of rule engine module match hit, the coding result of the initial data is subjected to strategy matching;Regular result of calculation output module, the matching result of executing rule computing module hit the decision behavior in strategy specified by federation policies.Rulemaking is more flexible compared with prior art by the present invention, and rule is readable stronger, and the scope of application is wider.

Description

Risk control rule engine system on line
Technical field
The present invention relates to computer realm, more particularly to risk control rule engine system on a kind of line.
Background technology
Regulation engine originates from RBES (expert system CLIPS:Come from NASA in 1984 artificial intelligence Energy project, has increased income, has been write by C.), and RBES is one of branch of expert system.Expert System belongs to the category of artificial intelligence, and it imitates the inference mode of the mankind, is made inferences using tentative approach, and user Its inference conclusion is explained and proved to the term that class is understood that.RBES (RBES) includes three parts:Rule Base (knowledge base), Working Memory (fact base) and Inference Engine.Their structure is such as Shown in lower system:
Inference engine (Inference Engine) includes three parts:Pattern matcher (Pattern Matcher), agenda And enforcement engine (Execution Engine) (Agenda).Inference engine by determining which rule meets true or target, And rule prioritization is authorized, meet that true or target rule is added into agenda.
1:Pattern matcher determine selection perform which rule, when executing rule;
2:The select regular execution order of agenda management mode adaptation;
3:Enforcement engine is responsible for executing rule and other actions.
Existing regulation engine has following defect:
1:Whole regulation engine does not provide the thinking for recording rule with XML, more without reference to repairing in the process of implementation Change rule;
2:The data that rule uses do not provide the scope that method strengthens rule all from the initial input of user;
3:Rule lacks flexibility, and code can readability difference.
The content of the invention
The technical problem to be solved in the present invention is to provide one kind, Rulemaking is more flexible compared with prior art, and rule is readable Stronger, the risk control rule engine system on the wider array of line of the scope of application of property.
In order to solve the above technical problems, risk control rule engine system on line provided by the invention, including:Intermediate result Module, configurable policy module, rule engine module, regular computing module and regular result of calculation output module;
Intermediate result module, statistics is provided for rule engine module;The statistics refers to configurable policy module Dimension data where the list of rules stored carries out the data obtained by Classifying Sum by default statistical condition;
Configurable policy module, storage rule list, the input as rule engine module;The list of rules is by tactful structure Into the strategy includes Meta-Policy and federation policies;
The Meta-Policy provides the rule of coding, specifies the comparison condition of individual data, and coding when meeting condition Value;
The federation policies provide the coding of rule, specify the coding result of at least one Meta-Policy, and initial data Specified decision behavior when being matched completely with the matching result of federation policies;
Rule engine module, the statistics and initial data that intermediate result is provided in configurable policy module with storing Strategy matched;Matching refers to carry out registration according to certain internal relation between data, and the result of matching is that hit is a certain Strategy (refers to Baidu's known technology noun:Data Matching).
Regular computing module, by initial data, according to the strategy of rule engine module match hit, (" strategy " includes first plan Slightly and federation policies, its essence are that the Meta-Policy in hit strategy is encoded) encoded, by the initial data Coding result carries out strategy, and (" strategy " includes Meta-Policy and federation policies, and it is substantially by the coding result and life of initial data Federation policies in middle strategy are matched) matching;
Regular result of calculation output module, the matching result of executing rule computing module hit federation policies meaning in strategy Fixed decision behavior.
Further improve, the statistics includes:Black and white lists, the login location of user, user using equipment and/or User's means of payment.
Further improve, the list of rules is stored with XML file.
Further improve, rule engine module obtains rule in a manner of heat loads and opens monitoring rule, when rule becomes Rule is reloaded when more.
Further improve, the Meta-Policy is formed by binary-coding.
Further improve, the species of the Meta-Policy includes:Black and white name, odd number value and/or character string member,
Further improve, whether operation corresponding to the Meta-Policy has in list, relational operator and string matching.
Further improve, when rule engine module carries out rule match, after then no longer being matched after one federation policies of hit Continuous federation policies, the decision behavior that current Joint strategy is specified are exactly the decision behavior finally to be performed.
The technique effect of the present invention is as follows:
1st, configurable strategy stores and is loaded into the form of a file system, and system need not when changing tactful Restart.
2nd, whether regulation engine extends data source and is added while conventional relational operator is met in list Neutralize string matching operation;Other dimension datas are provided as tactful basis of formation.
3rd, the result of Meta-Policy, which has carried out binary-coding, makes tactful readability stronger.
4th, the succession of federation policies makes the Rulemaking of strategy execution more flexible.
Brief description of the drawings
The present invention is further detailed explanation with embodiment below in conjunction with the accompanying drawings:
Fig. 1 is the structural representation of existing regulation engine.
Fig. 2 is the principle schematic of risk control rule engine system on line of the present invention.
Fig. 3 is data processing principle schematic diagram of the present invention.
Embodiment
As shown in figure 1, the present invention provides risk control rule engine system on a kind of line provided by the invention, including:In Between object module, configurable policy module, rule engine module, regular computing module and regular result of calculation output module;
Intermediate result module, statistics is provided for rule engine module;The statistics refers to configurable policy module Dimension data where the list of rules stored carries out the data obtained by Classifying Sum by default statistical condition;
Configurable policy module, storage rule list, the input as rule engine module;The list of rules is by tactful structure Into the strategy includes Meta-Policy and federation policies;
The Meta-Policy provides the rule of coding, specifies the comparison condition of individual data, and coding when meeting condition Value;
The federation policies provide the coding of rule, specify the coding result of at least one Meta-Policy, and initial data Specified decision behavior when being matched completely with the matching result of federation policies;
Rule engine module, the statistics and initial data that intermediate result is provided in configurable policy module with storing Strategy matched;
Regular computing module, initial data is encoded according to the strategy of rule engine module match hit, by described in The coding result of initial data carries out strategy matching;
Regular result of calculation output module, the matching result of executing rule computing module hit federation policies meaning in strategy Fixed decision behavior.
Further improve, the statistics includes:Black and white lists, the login location of user, user using equipment and/or User's means of payment.
Further improve, the list of rules is stored with XML file.
Further improve, rule engine module obtains rule in a manner of heat loads and opens monitoring rule, when rule becomes Rule is reloaded when more.
Further improve, the Meta-Policy is formed by binary-coding.
Further improve, the species of the Meta-Policy includes:Black and white name, odd number value and/or character string member,
Further improve, whether operation corresponding to the Meta-Policy has in list, relational operator and string matching.
Further improve, when rule engine module carries out rule match, after then no longer being matched after one federation policies of hit Continuous federation policies, the decision behavior that current Joint strategy is specified are exactly the decision behavior finally to be performed.
Prevent that the realization to the present invention illustrates as specific embodiment for steal-number to log in below:
Initial data:User logs in the data (ID provided:UserID;Login time:loginTime;Logon area Domain:loginArea;Equipment indicates:Imei)
Configurable strategy:
<Policy>
<MetaPolicyList>
<List Key=" A " Describe=" is no more than six with logging in ">$LoginAreaCount<6<List>
<List Key=" B " Describe=" log in more than three ">$LoginAreaCount>3<List>
<List Key=" C " Describe=" user is in blacklist ">$UserID In#BlockList<List>
<List Key=" D " Describe=" being registration equipment ">$ Imei==@RegisterImei<List>
</MetaPolicyList>
<UnionPolicyList>
<List Name=" CheckUserLogin ">$D||!$C||($A&&$B)<List>
</UnionPolicyList>
</Policy>
Intermediate result:Blacklist is stored in redis in the form of Key-Value;The log in history packet of user, which contains, to be stepped on Record region is stored in mysql databases;The log-on data of user is stored in mysqll databases comprising Imei
Regulation engine loads configurable strategy to internal memory when starting and opens the monitoring to this document, if file Hash codes change is then loaded into internal memory again
Regulation engine receives user's request, and federation policies $ D are got by CheckUserLogin | | $ C | | ($ A&& $ B)
Pass through the regular $ D of second step | |!$ C | | ($ A&& $ B) obtains Meta-Policy namely $ D, $ C, $ A, $ B
Obtained from MetaPolicyList as shown in table 1 below according to D, C, B, A by the $ D of the 3rd step, $ C, $ A, $ B;
Table 1
Key- operators-Value pattern is all followed in regular expression, can all be deposited in key and Value expression formulas Placeholder in placeholder, key can be first looked for user with title and input (such as UserID, Imei) and then can combine parsing Searching intermediate result, ($ LoginAreaCount can be searched user's log in history data by UserID and obtain user's login ground Sum) key numerical value is finally replaced the key of expression formula, then still search middle database (# if there is placeholder for value BlockList can obtain blacklist from intermediate result;@Register can search intermediate result by UserID and obtain user's registration Imel.Assume after key and value is obtained as shown in table 2 below;
Table 2
Then binary conversion treatment, calculation expression simultaneously combine description
Ax is less than six=1 with logging in
Bx log in more than three=0
Cx user is in blacklist=0
Dx is registration equipment=1
Finally by federation policies $ D | |!$ C | | ($ A&& $ B) namely 1 | |!0 | | (1&&0)=1
Namely as long as user has used the equipment (credible equipment) during registration not in blacklist or has logged in region number All it is verified between 3 to 6.
The present invention is described in detail above by embodiment and embodiment, but these are not composition pair The limitation of the present invention.Without departing from the principles of the present invention, those skilled in the art can also make many deformations and change Enter, these also should be regarded as protection scope of the present invention.

Claims (8)

  1. A kind of 1. risk control rule engine system on line, it is characterised in that including:Intermediate result module, it can configure tactful mould Block, rule engine module, regular computing module and regular result of calculation output module;
    Intermediate result module, statistics is provided for rule engine module;The statistics refers to configurable policy module and deposited Dimension data where the list of rules of storage carries out the data obtained by Classifying Sum by default statistical condition;
    Configurable policy module, storage rule list, the input as rule engine module;The list of rules is made up of strategy, The strategy includes Meta-Policy and federation policies;
    The Meta-Policy provides the rule of coding, specifies the comparison condition of individual data, and encoded radio when meeting condition;
    The federation policies provide the coding of rule, specify the coding result of at least one Meta-Policy, and initial data and connection Close decision behavior specified when tactful matching result matches completely;
    Rule engine module, the statistics and initial data that intermediate result is provided and the plan stored in configurable policy module Slightly matched;
    Regular computing module, initial data is encoded according to the strategy of rule engine module match hit, will be described original The coding result of data carries out strategy matching;
    Regular result of calculation output module, the matching result of executing rule computing module are hit in strategy specified by federation policies Decision behavior.
  2. 2. risk control rule engine system on line as claimed in claim 1, it is characterised in that:The statistics includes: Black and white lists, the login location of user, user use equipment and/or user's means of payment.
  3. 3. risk control rule engine system on line as claimed in claim 1, it is characterised in that:The list of rules is with XML File stores.
  4. 4. risk control rule engine system on line as claimed in claim 1, it is characterised in that:Rule engine module is added with heat The mode of load obtains rule and opens monitoring rule, and rule is reloaded when rule changes.
  5. 5. risk control rule engine system on line as claimed in claim 1, it is characterised in that:The Meta-Policy is compiled by two-value Code is formed.
  6. 6. risk control rule engine system on line as claimed in claim 5, it is characterised in that:The species bag of the Meta-Policy Include:Black and white name, odd number value and/or character string member.
  7. 7. risk control rule engine system on line as claimed in claim 6, it is characterised in that:Grasped corresponding to the Meta-Policy Whether work has in list, relational operator and string matching.
  8. 8. risk control rule engine system on line as claimed in claim 1, it is characterised in that:Rule engine module enters professional etiquette When then matching, follow-up federation policies, the decision-making row that current Joint strategy is specified then no longer are matched after hitting a federation policies To be exactly the decision behavior finally to be performed.
CN201610824252.5A 2016-09-14 2016-09-14 Risk control rule engine system on line Pending CN107818368A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610824252.5A CN107818368A (en) 2016-09-14 2016-09-14 Risk control rule engine system on line

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610824252.5A CN107818368A (en) 2016-09-14 2016-09-14 Risk control rule engine system on line

Publications (1)

Publication Number Publication Date
CN107818368A true CN107818368A (en) 2018-03-20

Family

ID=61600728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610824252.5A Pending CN107818368A (en) 2016-09-14 2016-09-14 Risk control rule engine system on line

Country Status (1)

Country Link
CN (1) CN107818368A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536941A (en) * 2018-03-29 2018-09-14 上海嘉银金融科技股份有限公司 The training of air control model and strategy execution system
CN110674174A (en) * 2019-09-24 2020-01-10 北京九章云极科技有限公司 Data real-time processing method and data real-time processing system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092967A (en) * 2013-01-22 2013-05-08 交通银行股份有限公司 Business rule decision-making method and device based on rule engine
US20130117445A1 (en) * 2005-06-03 2013-05-09 Good Technology Software, Inc. System and method for monitoring and maintaining a wireless device
CN103793223A (en) * 2013-12-27 2014-05-14 远光软件股份有限公司 Rule creating method and system
CN104915341A (en) * 2014-03-10 2015-09-16 中国科学院沈阳自动化研究所 Visual multi-database ETL integration method and system
CN105868252A (en) * 2015-12-22 2016-08-17 乐视网信息技术(北京)股份有限公司 User behavior data processing method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130117445A1 (en) * 2005-06-03 2013-05-09 Good Technology Software, Inc. System and method for monitoring and maintaining a wireless device
CN103092967A (en) * 2013-01-22 2013-05-08 交通银行股份有限公司 Business rule decision-making method and device based on rule engine
CN103793223A (en) * 2013-12-27 2014-05-14 远光软件股份有限公司 Rule creating method and system
CN104915341A (en) * 2014-03-10 2015-09-16 中国科学院沈阳自动化研究所 Visual multi-database ETL integration method and system
CN105868252A (en) * 2015-12-22 2016-08-17 乐视网信息技术(北京)股份有限公司 User behavior data processing method and apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536941A (en) * 2018-03-29 2018-09-14 上海嘉银金融科技股份有限公司 The training of air control model and strategy execution system
CN110674174A (en) * 2019-09-24 2020-01-10 北京九章云极科技有限公司 Data real-time processing method and data real-time processing system

Similar Documents

Publication Publication Date Title
Chundawat et al. Zero-shot machine unlearning
CN107395430B (en) Cloud platform dynamic risk access control method
Leyva et al. A set of complexity measures designed for applying meta-learning to instance selection
Singh et al. Dual concepts in fuzzy theory: Entropy and knowledge measure
Vagin et al. Problem of knowledge discovery in noisy databases
CN108494750B (en) Ordering strategy authorization method and system for expanding xacml access control
CN111340112B (en) Classification method, classification device and classification server
CN110321430B (en) Domain name recognition and domain name recognition model generation method, device and storage medium
CN107818368A (en) Risk control rule engine system on line
Fu Computer network intrusion anomaly detection with recurrent neural network
CN112822004B (en) Belief network-based targeted privacy protection data publishing method
Kalifullah et al. Retracted: Graph‐based content matching for web of things through heuristic boost algorithm
WO2024120186A1 (en) Internet of things intrusion detection method and apparatus, device, and storage medium
Abu-Soud A novel approach for dealing with missing values in machine learning datasets with discrete values
Batra et al. Incremental maintenance of abac policies
Liang et al. Optimization of basic clustering for ensemble clustering: an information-theoretic perspective
CN110290101B (en) Deep trust network-based associated attack behavior identification method in smart grid environment
US11893121B1 (en) Apparatus and method for providing cyber security defense in digital environments
Xu et al. An interindividual iterative consensus model for fuzzy preference relations
US11816223B1 (en) Apparatus and method for updating cyber security support based on real-time changes
Zhu [Retracted] Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis
CN113742495B (en) Rating feature weight determining method and device based on prediction model and electronic equipment
Przybyła-Kasperek et al. Stop criterion in building decision trees with bagging method for dispersed data
Chen et al. Lightweight machine unlearning in neural network
CN109670339A (en) The access control method and device towards secret protection based on ontology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180320

WD01 Invention patent application deemed withdrawn after publication