CN108564448A - A kind of implementation method of the anti-brush of order - Google Patents

A kind of implementation method of the anti-brush of order Download PDF

Info

Publication number
CN108564448A
CN108564448A CN201810368361.XA CN201810368361A CN108564448A CN 108564448 A CN108564448 A CN 108564448A CN 201810368361 A CN201810368361 A CN 201810368361A CN 108564448 A CN108564448 A CN 108564448A
Authority
CN
China
Prior art keywords
rule
order
mono
same
purchase
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810368361.XA
Other languages
Chinese (zh)
Inventor
张勇
刘�东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Austrian Austrian Buyer Agel Ecommerce Ltd
Original Assignee
Guangdong Austrian Austrian Buyer Agel Ecommerce Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Austrian Austrian Buyer Agel Ecommerce Ltd filed Critical Guangdong Austrian Austrian Buyer Agel Ecommerce Ltd
Priority to CN201810368361.XA priority Critical patent/CN108564448A/en
Publication of CN108564448A publication Critical patent/CN108564448A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a kind of implementation method of the anti-brush of order, includes following steps:A, the single rule list of one brush of system maintenance, rule grouping;B, data acquire:B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and caches order statistical information the end time;When B2, order information audit, order statistical information is cached in real time;C, rule process:Processing method is the audit that places an order, issues audit, manual examination and verification;First matching is white, blacklist, enters back into rule-based filtering chain, successively the every rule of matching, and the rule based on order statistical information is exactly simple comparison threshold values.It by using the method for the present invention, can simply, quickly and efficiently carry out brushing single identification, to solve the behavior of " wool party " malicious sabotage electric business platform activity operation, the consumptive interests of normal users can be protected directly into forbidding placing an order.

Description

A kind of implementation method of the anti-brush of order
Technical field
The present invention relates to e-commerce field technologies, refer in particular to a kind of implementation method of the anti-brush of order.
Background technology
As electric business industry develops rapidly, various venture companies, which spring up like bamboo shoots after a spring rain, to emerge in multitude, and businessman passes through various work The consumption habit of dynamic form subsidized to obtain user, cultivate user.But any something all has dual character, the benefit of great number It is patch, preferential while also having expedited the emergence of " wool party "." wool party " behavior distance cheat it is only one step away, they there are tight Movable purpose is destroyed again, has occupied movable resource so that normal user is without access to movable direct benefit, also makes It is lost at entreprise cost.
Invention content
In view of this, in view of the deficiencies of the prior art, the present invention aims to provide a kind of anti-brushes of order Implementation method can effectively solve the problems, such as that " wool party " malicious sabotage electric business platform activity runs behavior.
To achieve the above object, the present invention is using following technical solution:
A kind of implementation method of the anti-brush of order, includes following steps:
A, the single rule list of one brush of system maintenance, rule grouping,
A1, prevent are the audit that places an order, the rule that the audit that places an order is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. address field fills in telephone number and purchase is mono- more than X;
D. same device number purchase is mono- more than X;
A2, default are to issue audit, issue the rule that audit is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. same identity card purchase is mono- more than X;
D. same device number purchase is mono- more than X;
E. same commodity purchasing sum is more than X mono-;
F. same IP address purchase is more than X parts with a commodity;
G. same IP address uses same preferential more than X times;
H. address field fills in telephone number and purchase is mono- more than X;
I. similar ship-to purchase is mono- more than X, is operated after PLSCONFM;
J. the single order amount of money is more than X members;
K. single order commodity purchasing quantity is more than X parts;
L. the same commodity purchasing quantity of single order is more than X parts;
M. mono- more than X with the same IP address purchase in area;
N. same payment accounts purchase is mono- more than X;
B, data acquire:
B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and delays the end time Deposit order statistical information;
When B2, order information audit, order statistical information is cached in real time;
C, rule process:
Processing method is the audit that places an order, issues audit, manual examination and verification;
White, blacklist is first matched, rule-based filtering chain is entered back into, successively the every rule of matching, based on order statistical information Rule is exactly simple comparison threshold values;
Ship-to, consignee's name rule are classified, in 24- by NB Algorithm for multiple dimensions In 48 hours, received using the conversion of preferential ID, geohash algorithm with area commodity ID quantity purchases, with the lower list IP in area, with area Goods address longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic;The successive value obtained become from Value is dissipated, the probability in section of converting compares normal probability conversion value, judges whether there is the single risk of brush.
Preferably, the normal probability conversion value is:225, numerical value is bigger, and expression risk is higher, 225=9*5*5*1*1*1 Indicate that list IP, same area are received using the conversion of preferential ID, geohash algorithm under same area commodity ID quantity purchases, with area In address longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic this 6 dimensions, allow there are one Dimension is that 9 risks are high, and 2 dimensions are 5 uncertain, and 3 dimensions are that 1 risk is low.
Preferably, the single rule list of the brush is:
,
The threshold values of each rule can be adjusted in table, the control whether rule comes into force, different interventions point can be collected Data are different, so the rule supported is also different.
The present invention has clear advantage and advantageous effect compared with prior art, specifically, by above-mentioned technical proposal Known to:
By using the method for the present invention, can simply, quickly and efficiently carry out brushing single identification, to solve " wool party " The behavior of malicious sabotage electric business platform activity operation can protect the consumptive interests of normal users directly into forbidding placing an order.
More clearly to illustrate the structure feature and effect of the present invention, come below in conjunction with the accompanying drawings to this hair with specific embodiment It is bright to be described in detail:
Description of the drawings
Fig. 1 is the flow diagram of the preferred embodiments of the invention.
Specific implementation mode
Present invention is disclosed a kind of implementation methods of the anti-brush of order, include following steps:
A, the single rule list of one brush of system maintenance, rule grouping,
A1, prevent are the audit that places an order, the rule that the audit that places an order is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. address field fills in telephone number and purchase is mono- more than X;
D. same device number purchase is mono- more than X;
A2, default are to issue audit, issue the rule that audit is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. same identity card purchase is mono- more than X;
D. same device number purchase is mono- more than X;
E. same commodity purchasing sum is more than X mono-;
F. same IP address purchase is more than X parts with a commodity;
G. same IP address uses same preferential more than X times;
H. address field fills in telephone number and purchase is mono- more than X;
I. similar ship-to purchase is mono- more than X, is operated after PLSCONFM;
J. the single order amount of money is more than X members;
K. single order commodity purchasing quantity is more than X parts;
L. the same commodity purchasing quantity of single order is more than X parts;
M. mono- more than X with the same IP address purchase in area;
N. same payment accounts purchase is mono- more than X;
In the present embodiment, the single rule list of the brush is:
,
The threshold values of each rule can be adjusted in table, the control whether rule comes into force, different interventions point can be collected Data are different, so the rule supported is also different.
B, data acquire:
B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and delays the end time Deposit order statistical information;
When B2, order information audit, order statistical information is cached in real time;
C, rule process:
Processing method is the audit that places an order, issues audit, manual examination and verification;
White, blacklist is first matched, rule-based filtering chain is entered back into, successively the every rule of matching, based on order statistical information Rule is exactly simple comparison threshold values;
Ship-to, consignee's name rule are classified, in 24- by NB Algorithm for multiple dimensions In 48 hours, received using the conversion of preferential ID, geohash algorithm with area commodity ID quantity purchases, with the lower list IP in area, with area Goods address longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic;The successive value obtained become from Value is dissipated, the probability in section of converting compares normal probability conversion value, judges whether there is the single risk of brush.
The normal probability conversion value is:225, numerical value is bigger, and expression risk is higher, and 225=9*5*5*1*1*1 is indicated It is passed through using preferential ID, geohash algorithm conversion ship-to with area commodity ID quantity purchases, with the lower list IP in area, with area In latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic this 6 dimensions, allow there are one dimension to be 9 Risk is high, and 2 dimensions are 5 uncertain, and 3 dimensions are that 1 risk is low.
The present invention design focal point be:By using the method for the present invention, can simply, quickly and efficiently carry out brushing single knowledge Not, can be directly into forbidding placing an order to solve the behavior of " wool party " malicious sabotage electric business platform activity operation, protection is normal The consumptive interests of user.
The technical principle of the present invention is described above in association with specific embodiment.These descriptions are intended merely to explain the present invention's Principle, and it cannot be construed to limiting the scope of the invention in any way.Based on the explanation herein, the technology of this field Personnel would not require any inventive effort the other specific implementation modes that can associate the present invention, these modes are fallen within Within protection scope of the present invention.

Claims (3)

1. a kind of implementation method of the anti-brush of order, it is characterised in that:Include following steps:
A, the single rule list of one brush of system maintenance, rule grouping,
A1, prevent are the audit that places an order, the rule that the audit that places an order is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. address field fills in telephone number and purchase is mono- more than X;
D. same device number purchase is mono- more than X;
A2, default are to issue audit, issue the rule that audit is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. same identity card purchase is mono- more than X;
D. same device number purchase is mono- more than X;
E. same commodity purchasing sum is more than X mono-;
F. same IP address purchase is more than X parts with a commodity;
G. same IP address uses same preferential more than X times;
H. address field fills in telephone number and purchase is mono- more than X;
I. similar ship-to purchase is mono- more than X, is operated after PLSCONFM;
J. the single order amount of money is more than X members;
K. single order commodity purchasing quantity is more than X parts;
L. the same commodity purchasing quantity of single order is more than X parts;
M. mono- more than X with the same IP address purchase in area;
N. same payment accounts purchase is mono- more than X;
B, data acquire:
B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and caches and order the end time Single statistical information;
When B2, order information audit, order statistical information is cached in real time;
C, rule process:
Processing method is the audit that places an order, issues audit, manual examination and verification;
White, blacklist is first matched, rule-based filtering chain is entered back into, successively the every rule of matching, the rule based on order statistical information It is exactly simple comparison threshold values;
Ship-to, consignee's name rule are classified by NB Algorithm for multiple dimensions, small in 24-48 When it is interior, with area commodity ID quantity purchases, preferential ID, geohash algorithm conversion place of acceptance is used with the lower list IP in area, with area Location longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic;The successive value obtained is become discrete The probability of value, section of converting compares normal probability conversion value, judges whether there is the single risk of brush.
2. a kind of implementation method of the anti-brush of order as described in claim 1, it is characterised in that:The normal probability conversion value For:225, numerical value is bigger, and expression risk is higher, and 225=9*5*5*1*1*1 is indicated in same area commodity ID quantity purchases, with area Lower list IP, it is received using preferential ID, geohash algorithm conversion ship-to longitude and latitude, most short editing distance algorithm conversion with area In goods address, consignee's name phonetic this 6 dimensions, allow there are one dimension to be that 9 risks are high, 2 dimensions are 5 uncertain, 3 A dimension is that 1 risk is low.
3. a kind of implementation method of the anti-brush of order as described in claim 1, it is characterised in that:The single rule list of the brush is:
,
The threshold values of each rule can be adjusted in table, the control whether rule comes into force, different interventions point can collected data Difference, so the rule supported is also different.
CN201810368361.XA 2018-04-23 2018-04-23 A kind of implementation method of the anti-brush of order Pending CN108564448A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810368361.XA CN108564448A (en) 2018-04-23 2018-04-23 A kind of implementation method of the anti-brush of order

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810368361.XA CN108564448A (en) 2018-04-23 2018-04-23 A kind of implementation method of the anti-brush of order

Publications (1)

Publication Number Publication Date
CN108564448A true CN108564448A (en) 2018-09-21

Family

ID=63536180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810368361.XA Pending CN108564448A (en) 2018-04-23 2018-04-23 A kind of implementation method of the anti-brush of order

Country Status (1)

Country Link
CN (1) CN108564448A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379361A (en) * 2018-10-22 2019-02-22 同盾控股有限公司 A kind of label of address determines method and apparatus
CN110288430A (en) * 2019-06-11 2019-09-27 达疆网络科技(上海)有限公司 A kind of method that polyatom feature combines serial statistical rules execution interception risk order
CN110298563A (en) * 2019-06-14 2019-10-01 达疆网络科技(上海)有限公司 A kind of statistical method of discriminant risk order
CN110334963A (en) * 2019-07-11 2019-10-15 四川亨通网智科技有限公司 Admission ticket order background management system
CN110555589A (en) * 2019-07-31 2019-12-10 苏宁云计算有限公司 Risk order identification method and device
CN111245815A (en) * 2020-01-07 2020-06-05 同盾控股有限公司 Data processing method, data processing device, storage medium and electronic equipment
CN111507729A (en) * 2020-04-29 2020-08-07 广东所能网络有限公司 Electronic commerce risk control system and method based on mobile internet
CN112669058A (en) * 2020-12-21 2021-04-16 上海多维度网络科技股份有限公司 Data processing method and device for application program, storage medium and electronic device
CN113672687A (en) * 2021-10-25 2021-11-19 北京值得买科技股份有限公司 E-commerce big data processing method, device, equipment and storage medium
CN113689059A (en) * 2020-05-19 2021-11-23 江苏物云通物流科技有限公司 Network freight platform waybill risk monitoring system
CN113837568A (en) * 2021-09-08 2021-12-24 杭州海康威视系统技术有限公司 Risk order identification method and device, electronic equipment and machine-readable storage medium
CN113837617A (en) * 2021-09-26 2021-12-24 广州新丝路信息科技有限公司 Anti-bill-swiping risk management method and device
CN116664238A (en) * 2023-06-02 2023-08-29 北京科码先锋互联网技术股份有限公司 Retail industry risk order auditing management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2512159A (en) * 2013-03-15 2014-09-24 Parcelpoke Ltd Ordering system and text message gifting
CN105160572A (en) * 2015-09-30 2015-12-16 努比亚技术有限公司 Device and method for controlling order to generate, and seckilling system
CN107341716A (en) * 2017-07-11 2017-11-10 北京奇艺世纪科技有限公司 A kind of method, apparatus and electronic equipment of the identification of malice order

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2512159A (en) * 2013-03-15 2014-09-24 Parcelpoke Ltd Ordering system and text message gifting
CN105160572A (en) * 2015-09-30 2015-12-16 努比亚技术有限公司 Device and method for controlling order to generate, and seckilling system
CN107341716A (en) * 2017-07-11 2017-11-10 北京奇艺世纪科技有限公司 A kind of method, apparatus and electronic equipment of the identification of malice order

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379361B (en) * 2018-10-22 2021-09-24 同盾控股有限公司 Address label determination method and device
CN109379361A (en) * 2018-10-22 2019-02-22 同盾控股有限公司 A kind of label of address determines method and apparatus
CN110288430A (en) * 2019-06-11 2019-09-27 达疆网络科技(上海)有限公司 A kind of method that polyatom feature combines serial statistical rules execution interception risk order
CN110298563A (en) * 2019-06-14 2019-10-01 达疆网络科技(上海)有限公司 A kind of statistical method of discriminant risk order
CN110334963A (en) * 2019-07-11 2019-10-15 四川亨通网智科技有限公司 Admission ticket order background management system
CN110555589A (en) * 2019-07-31 2019-12-10 苏宁云计算有限公司 Risk order identification method and device
CN111245815A (en) * 2020-01-07 2020-06-05 同盾控股有限公司 Data processing method, data processing device, storage medium and electronic equipment
CN111507729A (en) * 2020-04-29 2020-08-07 广东所能网络有限公司 Electronic commerce risk control system and method based on mobile internet
CN113689059A (en) * 2020-05-19 2021-11-23 江苏物云通物流科技有限公司 Network freight platform waybill risk monitoring system
CN112669058A (en) * 2020-12-21 2021-04-16 上海多维度网络科技股份有限公司 Data processing method and device for application program, storage medium and electronic device
CN113837568A (en) * 2021-09-08 2021-12-24 杭州海康威视系统技术有限公司 Risk order identification method and device, electronic equipment and machine-readable storage medium
CN113837568B (en) * 2021-09-08 2024-03-01 杭州海康威视系统技术有限公司 Risk order identification method, apparatus, electronic device and machine-readable storage medium
CN113837617A (en) * 2021-09-26 2021-12-24 广州新丝路信息科技有限公司 Anti-bill-swiping risk management method and device
CN113672687A (en) * 2021-10-25 2021-11-19 北京值得买科技股份有限公司 E-commerce big data processing method, device, equipment and storage medium
CN116664238A (en) * 2023-06-02 2023-08-29 北京科码先锋互联网技术股份有限公司 Retail industry risk order auditing management method and system

Similar Documents

Publication Publication Date Title
CN108564448A (en) A kind of implementation method of the anti-brush of order
US10477403B2 (en) Identifying call characteristics to detect fraudulent call activity and take corrective action without using recording, transcription or caller ID
Van Wegberg et al. Plug and prey? measuring the commoditization of cybercrime via online anonymous markets
Anderson et al. Measuring the cost of cybercrime
McCoy et al. Priceless: The role of payments in abuse-advertised goods
CN107133865B (en) Credit score obtaining and feature vector value output method and device
US20170148025A1 (en) Anomaly detection in groups of transactions
US9596356B2 (en) Analyzing voice characteristics to detect fraudulent call activity and take corrective action without using recording, transcription or caller ID
CN108694657A (en) Client's identification device, method and computer readable storage medium
Button et al. Technology and Fraud: The ‘Fraudogenic’consequences of the Internet revolution
US10230851B2 (en) Identifying call features and associations to detect call traffic pumping and take corrective action
US20140365305A1 (en) Providing geospatial-temporal next-best-action decisions
Pickard The misinformation society
CN109947814A (en) Method and apparatus for the abnormal data group in detection data set
CN108346088A (en) Brand official store malice panic buying preventing control method and system
CN109919608A (en) A kind of recognition methods, device and the server of high-risk transaction agent
US10496992B2 (en) Exclusion of nodes from link analysis
WO2017032056A1 (en) Point-of-sale-based cash-out determining method and apparatus
CN106897880A (en) A kind of account methods of risk assessment and equipment
CN109711984B (en) Pre-loan risk monitoring method and device based on collection urging
Parlov et al. GDPR–impact of general data protection regulation on digital marketing
Ennin et al. Cybercrime in Ghana and victims accounts
Koong et al. An examination of Internet fraud occurrences
CN105099993B (en) A kind of data interactive method based on agent platform, device and system
KR20160127920A (en) Cyber bigdata trade system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180921

RJ01 Rejection of invention patent application after publication