CN107818368A - Risk control rule engine system on line - Google Patents
Risk control rule engine system on line Download PDFInfo
- Publication number
- CN107818368A CN107818368A CN201610824252.5A CN201610824252A CN107818368A CN 107818368 A CN107818368 A CN 107818368A CN 201610824252 A CN201610824252 A CN 201610824252A CN 107818368 A CN107818368 A CN 107818368A
- Authority
- CN
- China
- Prior art keywords
- module
- rule
- rule engine
- strategy
- policy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Artificial Intelligence (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides risk control rule engine system on a kind of line, including:Intermediate result module, statistics is provided for rule engine module;Configurable policy module, storage rule list, the input as rule engine module;The list of rules is made up of strategy, and the strategy includes Meta-Policy and federation policies;Rule engine module, the statistics and initial data that intermediate result is provided are matched with the strategy stored in configurable policy module;Regular computing module, initial data is encoded according to the strategy of rule engine module match hit, the coding result of the initial data is subjected to strategy matching;Regular result of calculation output module, the matching result of executing rule computing module hit the decision behavior in strategy specified by federation policies.Rulemaking is more flexible compared with prior art by the present invention, and rule is readable stronger, and the scope of application is wider.
Description
Technical field
The present invention relates to computer realm, more particularly to risk control rule engine system on a kind of line.
Background technology
Regulation engine originates from RBES (expert system CLIPS:Come from NASA in 1984 artificial intelligence
Energy project, has increased income, has been write by C.), and RBES is one of branch of expert system.Expert
System belongs to the category of artificial intelligence, and it imitates the inference mode of the mankind, is made inferences using tentative approach, and user
Its inference conclusion is explained and proved to the term that class is understood that.RBES (RBES) includes three parts:Rule
Base (knowledge base), Working Memory (fact base) and Inference Engine.Their structure is such as
Shown in lower system:
Inference engine (Inference Engine) includes three parts:Pattern matcher (Pattern Matcher), agenda
And enforcement engine (Execution Engine) (Agenda).Inference engine by determining which rule meets true or target,
And rule prioritization is authorized, meet that true or target rule is added into agenda.
1:Pattern matcher determine selection perform which rule, when executing rule;
2:The select regular execution order of agenda management mode adaptation;
3:Enforcement engine is responsible for executing rule and other actions.
Existing regulation engine has following defect:
1:Whole regulation engine does not provide the thinking for recording rule with XML, more without reference to repairing in the process of implementation
Change rule;
2:The data that rule uses do not provide the scope that method strengthens rule all from the initial input of user;
3:Rule lacks flexibility, and code can readability difference.
The content of the invention
The technical problem to be solved in the present invention is to provide one kind, Rulemaking is more flexible compared with prior art, and rule is readable
Stronger, the risk control rule engine system on the wider array of line of the scope of application of property.
In order to solve the above technical problems, risk control rule engine system on line provided by the invention, including:Intermediate result
Module, configurable policy module, rule engine module, regular computing module and regular result of calculation output module;
Intermediate result module, statistics is provided for rule engine module;The statistics refers to configurable policy module
Dimension data where the list of rules stored carries out the data obtained by Classifying Sum by default statistical condition;
Configurable policy module, storage rule list, the input as rule engine module;The list of rules is by tactful structure
Into the strategy includes Meta-Policy and federation policies;
The Meta-Policy provides the rule of coding, specifies the comparison condition of individual data, and coding when meeting condition
Value;
The federation policies provide the coding of rule, specify the coding result of at least one Meta-Policy, and initial data
Specified decision behavior when being matched completely with the matching result of federation policies;
Rule engine module, the statistics and initial data that intermediate result is provided in configurable policy module with storing
Strategy matched;Matching refers to carry out registration according to certain internal relation between data, and the result of matching is that hit is a certain
Strategy (refers to Baidu's known technology noun:Data Matching).
Regular computing module, by initial data, according to the strategy of rule engine module match hit, (" strategy " includes first plan
Slightly and federation policies, its essence are that the Meta-Policy in hit strategy is encoded) encoded, by the initial data
Coding result carries out strategy, and (" strategy " includes Meta-Policy and federation policies, and it is substantially by the coding result and life of initial data
Federation policies in middle strategy are matched) matching;
Regular result of calculation output module, the matching result of executing rule computing module hit federation policies meaning in strategy
Fixed decision behavior.
Further improve, the statistics includes:Black and white lists, the login location of user, user using equipment and/or
User's means of payment.
Further improve, the list of rules is stored with XML file.
Further improve, rule engine module obtains rule in a manner of heat loads and opens monitoring rule, when rule becomes
Rule is reloaded when more.
Further improve, the Meta-Policy is formed by binary-coding.
Further improve, the species of the Meta-Policy includes:Black and white name, odd number value and/or character string member,
Further improve, whether operation corresponding to the Meta-Policy has in list, relational operator and string matching.
Further improve, when rule engine module carries out rule match, after then no longer being matched after one federation policies of hit
Continuous federation policies, the decision behavior that current Joint strategy is specified are exactly the decision behavior finally to be performed.
The technique effect of the present invention is as follows:
1st, configurable strategy stores and is loaded into the form of a file system, and system need not when changing tactful
Restart.
2nd, whether regulation engine extends data source and is added while conventional relational operator is met in list
Neutralize string matching operation;Other dimension datas are provided as tactful basis of formation.
3rd, the result of Meta-Policy, which has carried out binary-coding, makes tactful readability stronger.
4th, the succession of federation policies makes the Rulemaking of strategy execution more flexible.
Brief description of the drawings
The present invention is further detailed explanation with embodiment below in conjunction with the accompanying drawings:
Fig. 1 is the structural representation of existing regulation engine.
Fig. 2 is the principle schematic of risk control rule engine system on line of the present invention.
Fig. 3 is data processing principle schematic diagram of the present invention.
Embodiment
As shown in figure 1, the present invention provides risk control rule engine system on a kind of line provided by the invention, including:In
Between object module, configurable policy module, rule engine module, regular computing module and regular result of calculation output module;
Intermediate result module, statistics is provided for rule engine module;The statistics refers to configurable policy module
Dimension data where the list of rules stored carries out the data obtained by Classifying Sum by default statistical condition;
Configurable policy module, storage rule list, the input as rule engine module;The list of rules is by tactful structure
Into the strategy includes Meta-Policy and federation policies;
The Meta-Policy provides the rule of coding, specifies the comparison condition of individual data, and coding when meeting condition
Value;
The federation policies provide the coding of rule, specify the coding result of at least one Meta-Policy, and initial data
Specified decision behavior when being matched completely with the matching result of federation policies;
Rule engine module, the statistics and initial data that intermediate result is provided in configurable policy module with storing
Strategy matched;
Regular computing module, initial data is encoded according to the strategy of rule engine module match hit, by described in
The coding result of initial data carries out strategy matching;
Regular result of calculation output module, the matching result of executing rule computing module hit federation policies meaning in strategy
Fixed decision behavior.
Further improve, the statistics includes:Black and white lists, the login location of user, user using equipment and/or
User's means of payment.
Further improve, the list of rules is stored with XML file.
Further improve, rule engine module obtains rule in a manner of heat loads and opens monitoring rule, when rule becomes
Rule is reloaded when more.
Further improve, the Meta-Policy is formed by binary-coding.
Further improve, the species of the Meta-Policy includes:Black and white name, odd number value and/or character string member,
Further improve, whether operation corresponding to the Meta-Policy has in list, relational operator and string matching.
Further improve, when rule engine module carries out rule match, after then no longer being matched after one federation policies of hit
Continuous federation policies, the decision behavior that current Joint strategy is specified are exactly the decision behavior finally to be performed.
Prevent that the realization to the present invention illustrates as specific embodiment for steal-number to log in below:
Initial data:User logs in the data (ID provided:UserID;Login time:loginTime;Logon area
Domain:loginArea;Equipment indicates:Imei)
Configurable strategy:
<Policy>
<MetaPolicyList>
<List Key=" A " Describe=" is no more than six with logging in ">$LoginAreaCount<6<List>
<List Key=" B " Describe=" log in more than three ">$LoginAreaCount>3<List>
<List Key=" C " Describe=" user is in blacklist ">$UserID In#BlockList<List>
<List Key=" D " Describe=" being registration equipment ">$ Imei==@RegisterImei<List>
</MetaPolicyList>
<UnionPolicyList>
<List Name=" CheckUserLogin ">$D||!$C||($A&&$B)<List>
</UnionPolicyList>
</Policy>
Intermediate result:Blacklist is stored in redis in the form of Key-Value;The log in history packet of user, which contains, to be stepped on
Record region is stored in mysql databases;The log-on data of user is stored in mysqll databases comprising Imei
Regulation engine loads configurable strategy to internal memory when starting and opens the monitoring to this document, if file
Hash codes change is then loaded into internal memory again
Regulation engine receives user's request, and federation policies $ D are got by CheckUserLogin | | $ C | | ($ A&& $ B)
Pass through the regular $ D of second step | |!$ C | | ($ A&& $ B) obtains Meta-Policy namely $ D, $ C, $ A, $ B
Obtained from MetaPolicyList as shown in table 1 below according to D, C, B, A by the $ D of the 3rd step, $ C, $ A, $ B;
Table 1
Key- operators-Value pattern is all followed in regular expression, can all be deposited in key and Value expression formulas
Placeholder in placeholder, key can be first looked for user with title and input (such as UserID, Imei) and then can combine parsing
Searching intermediate result, ($ LoginAreaCount can be searched user's log in history data by UserID and obtain user's login ground
Sum) key numerical value is finally replaced the key of expression formula, then still search middle database (# if there is placeholder for value
BlockList can obtain blacklist from intermediate result;@Register can search intermediate result by UserID and obtain user's registration
Imel.Assume after key and value is obtained as shown in table 2 below;
Table 2
Then binary conversion treatment, calculation expression simultaneously combine description
Ax is less than six=1 with logging in
Bx log in more than three=0
Cx user is in blacklist=0
Dx is registration equipment=1
Finally by federation policies $ D | |!$ C | | ($ A&& $ B) namely 1 | |!0 | | (1&&0)=1
Namely as long as user has used the equipment (credible equipment) during registration not in blacklist or has logged in region number
All it is verified between 3 to 6.
The present invention is described in detail above by embodiment and embodiment, but these are not composition pair
The limitation of the present invention.Without departing from the principles of the present invention, those skilled in the art can also make many deformations and change
Enter, these also should be regarded as protection scope of the present invention.
Claims (8)
- A kind of 1. risk control rule engine system on line, it is characterised in that including:Intermediate result module, it can configure tactful mould Block, rule engine module, regular computing module and regular result of calculation output module;Intermediate result module, statistics is provided for rule engine module;The statistics refers to configurable policy module and deposited Dimension data where the list of rules of storage carries out the data obtained by Classifying Sum by default statistical condition;Configurable policy module, storage rule list, the input as rule engine module;The list of rules is made up of strategy, The strategy includes Meta-Policy and federation policies;The Meta-Policy provides the rule of coding, specifies the comparison condition of individual data, and encoded radio when meeting condition;The federation policies provide the coding of rule, specify the coding result of at least one Meta-Policy, and initial data and connection Close decision behavior specified when tactful matching result matches completely;Rule engine module, the statistics and initial data that intermediate result is provided and the plan stored in configurable policy module Slightly matched;Regular computing module, initial data is encoded according to the strategy of rule engine module match hit, will be described original The coding result of data carries out strategy matching;Regular result of calculation output module, the matching result of executing rule computing module are hit in strategy specified by federation policies Decision behavior.
- 2. risk control rule engine system on line as claimed in claim 1, it is characterised in that:The statistics includes: Black and white lists, the login location of user, user use equipment and/or user's means of payment.
- 3. risk control rule engine system on line as claimed in claim 1, it is characterised in that:The list of rules is with XML File stores.
- 4. risk control rule engine system on line as claimed in claim 1, it is characterised in that:Rule engine module is added with heat The mode of load obtains rule and opens monitoring rule, and rule is reloaded when rule changes.
- 5. risk control rule engine system on line as claimed in claim 1, it is characterised in that:The Meta-Policy is compiled by two-value Code is formed.
- 6. risk control rule engine system on line as claimed in claim 5, it is characterised in that:The species bag of the Meta-Policy Include:Black and white name, odd number value and/or character string member.
- 7. risk control rule engine system on line as claimed in claim 6, it is characterised in that:Grasped corresponding to the Meta-Policy Whether work has in list, relational operator and string matching.
- 8. risk control rule engine system on line as claimed in claim 1, it is characterised in that:Rule engine module enters professional etiquette When then matching, follow-up federation policies, the decision-making row that current Joint strategy is specified then no longer are matched after hitting a federation policies To be exactly the decision behavior finally to be performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610824252.5A CN107818368A (en) | 2016-09-14 | 2016-09-14 | Risk control rule engine system on line |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610824252.5A CN107818368A (en) | 2016-09-14 | 2016-09-14 | Risk control rule engine system on line |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107818368A true CN107818368A (en) | 2018-03-20 |
Family
ID=61600728
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610824252.5A Pending CN107818368A (en) | 2016-09-14 | 2016-09-14 | Risk control rule engine system on line |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107818368A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108536941A (en) * | 2018-03-29 | 2018-09-14 | 上海嘉银金融科技股份有限公司 | The training of air control model and strategy execution system |
CN110674174A (en) * | 2019-09-24 | 2020-01-10 | 北京九章云极科技有限公司 | Data real-time processing method and data real-time processing system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103092967A (en) * | 2013-01-22 | 2013-05-08 | 交通银行股份有限公司 | Business rule decision-making method and device based on rule engine |
US20130117445A1 (en) * | 2005-06-03 | 2013-05-09 | Good Technology Software, Inc. | System and method for monitoring and maintaining a wireless device |
CN103793223A (en) * | 2013-12-27 | 2014-05-14 | 远光软件股份有限公司 | Rule creating method and system |
CN104915341A (en) * | 2014-03-10 | 2015-09-16 | 中国科学院沈阳自动化研究所 | Visual multi-database ETL integration method and system |
CN105868252A (en) * | 2015-12-22 | 2016-08-17 | 乐视网信息技术(北京)股份有限公司 | User behavior data processing method and apparatus |
-
2016
- 2016-09-14 CN CN201610824252.5A patent/CN107818368A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130117445A1 (en) * | 2005-06-03 | 2013-05-09 | Good Technology Software, Inc. | System and method for monitoring and maintaining a wireless device |
CN103092967A (en) * | 2013-01-22 | 2013-05-08 | 交通银行股份有限公司 | Business rule decision-making method and device based on rule engine |
CN103793223A (en) * | 2013-12-27 | 2014-05-14 | 远光软件股份有限公司 | Rule creating method and system |
CN104915341A (en) * | 2014-03-10 | 2015-09-16 | 中国科学院沈阳自动化研究所 | Visual multi-database ETL integration method and system |
CN105868252A (en) * | 2015-12-22 | 2016-08-17 | 乐视网信息技术(北京)股份有限公司 | User behavior data processing method and apparatus |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108536941A (en) * | 2018-03-29 | 2018-09-14 | 上海嘉银金融科技股份有限公司 | The training of air control model and strategy execution system |
CN110674174A (en) * | 2019-09-24 | 2020-01-10 | 北京九章云极科技有限公司 | Data real-time processing method and data real-time processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chundawat et al. | Zero-shot machine unlearning | |
CN107395430B (en) | Cloud platform dynamic risk access control method | |
Leyva et al. | A set of complexity measures designed for applying meta-learning to instance selection | |
Singh et al. | Dual concepts in fuzzy theory: Entropy and knowledge measure | |
Vagin et al. | Problem of knowledge discovery in noisy databases | |
CN108494750B (en) | Ordering strategy authorization method and system for expanding xacml access control | |
CN111340112B (en) | Classification method, classification device and classification server | |
CN110321430B (en) | Domain name recognition and domain name recognition model generation method, device and storage medium | |
CN107818368A (en) | Risk control rule engine system on line | |
Fu | Computer network intrusion anomaly detection with recurrent neural network | |
CN112822004B (en) | Belief network-based targeted privacy protection data publishing method | |
Kalifullah et al. | Retracted: Graph‐based content matching for web of things through heuristic boost algorithm | |
WO2024120186A1 (en) | Internet of things intrusion detection method and apparatus, device, and storage medium | |
Abu-Soud | A novel approach for dealing with missing values in machine learning datasets with discrete values | |
Batra et al. | Incremental maintenance of abac policies | |
Liang et al. | Optimization of basic clustering for ensemble clustering: an information-theoretic perspective | |
CN110290101B (en) | Deep trust network-based associated attack behavior identification method in smart grid environment | |
US11893121B1 (en) | Apparatus and method for providing cyber security defense in digital environments | |
Xu et al. | An interindividual iterative consensus model for fuzzy preference relations | |
US11816223B1 (en) | Apparatus and method for updating cyber security support based on real-time changes | |
Zhu | [Retracted] Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis | |
CN113742495B (en) | Rating feature weight determining method and device based on prediction model and electronic equipment | |
Przybyła-Kasperek et al. | Stop criterion in building decision trees with bagging method for dispersed data | |
Chen et al. | Lightweight machine unlearning in neural network | |
CN109670339A (en) | The access control method and device towards secret protection based on ontology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180320 |
|
WD01 | Invention patent application deemed withdrawn after publication |