CN108564448A - A kind of implementation method of the anti-brush of order - Google Patents
A kind of implementation method of the anti-brush of order Download PDFInfo
- Publication number
- CN108564448A CN108564448A CN201810368361.XA CN201810368361A CN108564448A CN 108564448 A CN108564448 A CN 108564448A CN 201810368361 A CN201810368361 A CN 201810368361A CN 108564448 A CN108564448 A CN 108564448A
- Authority
- CN
- China
- Prior art keywords
- rule
- order
- mono
- same
- purchase
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention discloses a kind of implementation method of the anti-brush of order, includes following steps:A, the single rule list of one brush of system maintenance, rule grouping;B, data acquire:B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and caches order statistical information the end time;When B2, order information audit, order statistical information is cached in real time;C, rule process:Processing method is the audit that places an order, issues audit, manual examination and verification;First matching is white, blacklist, enters back into rule-based filtering chain, successively the every rule of matching, and the rule based on order statistical information is exactly simple comparison threshold values.It by using the method for the present invention, can simply, quickly and efficiently carry out brushing single identification, to solve the behavior of " wool party " malicious sabotage electric business platform activity operation, the consumptive interests of normal users can be protected directly into forbidding placing an order.
Description
Technical field
The present invention relates to e-commerce field technologies, refer in particular to a kind of implementation method of the anti-brush of order.
Background technology
As electric business industry develops rapidly, various venture companies, which spring up like bamboo shoots after a spring rain, to emerge in multitude, and businessman passes through various work
The consumption habit of dynamic form subsidized to obtain user, cultivate user.But any something all has dual character, the benefit of great number
It is patch, preferential while also having expedited the emergence of " wool party "." wool party " behavior distance cheat it is only one step away, they there are tight
Movable purpose is destroyed again, has occupied movable resource so that normal user is without access to movable direct benefit, also makes
It is lost at entreprise cost.
Invention content
In view of this, in view of the deficiencies of the prior art, the present invention aims to provide a kind of anti-brushes of order
Implementation method can effectively solve the problems, such as that " wool party " malicious sabotage electric business platform activity runs behavior.
To achieve the above object, the present invention is using following technical solution:
A kind of implementation method of the anti-brush of order, includes following steps:
A, the single rule list of one brush of system maintenance, rule grouping,
A1, prevent are the audit that places an order, the rule that the audit that places an order is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. address field fills in telephone number and purchase is mono- more than X;
D. same device number purchase is mono- more than X;
A2, default are to issue audit, issue the rule that audit is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. same identity card purchase is mono- more than X;
D. same device number purchase is mono- more than X;
E. same commodity purchasing sum is more than X mono-;
F. same IP address purchase is more than X parts with a commodity;
G. same IP address uses same preferential more than X times;
H. address field fills in telephone number and purchase is mono- more than X;
I. similar ship-to purchase is mono- more than X, is operated after PLSCONFM;
J. the single order amount of money is more than X members;
K. single order commodity purchasing quantity is more than X parts;
L. the same commodity purchasing quantity of single order is more than X parts;
M. mono- more than X with the same IP address purchase in area;
N. same payment accounts purchase is mono- more than X;
B, data acquire:
B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and delays the end time
Deposit order statistical information;
When B2, order information audit, order statistical information is cached in real time;
C, rule process:
Processing method is the audit that places an order, issues audit, manual examination and verification;
White, blacklist is first matched, rule-based filtering chain is entered back into, successively the every rule of matching, based on order statistical information
Rule is exactly simple comparison threshold values;
Ship-to, consignee's name rule are classified, in 24- by NB Algorithm for multiple dimensions
In 48 hours, received using the conversion of preferential ID, geohash algorithm with area commodity ID quantity purchases, with the lower list IP in area, with area
Goods address longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic;The successive value obtained become from
Value is dissipated, the probability in section of converting compares normal probability conversion value, judges whether there is the single risk of brush.
Preferably, the normal probability conversion value is:225, numerical value is bigger, and expression risk is higher, 225=9*5*5*1*1*1
Indicate that list IP, same area are received using the conversion of preferential ID, geohash algorithm under same area commodity ID quantity purchases, with area
In address longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic this 6 dimensions, allow there are one
Dimension is that 9 risks are high, and 2 dimensions are 5 uncertain, and 3 dimensions are that 1 risk is low.
Preferably, the single rule list of the brush is:
,
The threshold values of each rule can be adjusted in table, the control whether rule comes into force, different interventions point can be collected
Data are different, so the rule supported is also different.
The present invention has clear advantage and advantageous effect compared with prior art, specifically, by above-mentioned technical proposal
Known to:
By using the method for the present invention, can simply, quickly and efficiently carry out brushing single identification, to solve " wool party "
The behavior of malicious sabotage electric business platform activity operation can protect the consumptive interests of normal users directly into forbidding placing an order.
More clearly to illustrate the structure feature and effect of the present invention, come below in conjunction with the accompanying drawings to this hair with specific embodiment
It is bright to be described in detail:
Description of the drawings
Fig. 1 is the flow diagram of the preferred embodiments of the invention.
Specific implementation mode
Present invention is disclosed a kind of implementation methods of the anti-brush of order, include following steps:
A, the single rule list of one brush of system maintenance, rule grouping,
A1, prevent are the audit that places an order, the rule that the audit that places an order is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. address field fills in telephone number and purchase is mono- more than X;
D. same device number purchase is mono- more than X;
A2, default are to issue audit, issue the rule that audit is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. same identity card purchase is mono- more than X;
D. same device number purchase is mono- more than X;
E. same commodity purchasing sum is more than X mono-;
F. same IP address purchase is more than X parts with a commodity;
G. same IP address uses same preferential more than X times;
H. address field fills in telephone number and purchase is mono- more than X;
I. similar ship-to purchase is mono- more than X, is operated after PLSCONFM;
J. the single order amount of money is more than X members;
K. single order commodity purchasing quantity is more than X parts;
L. the same commodity purchasing quantity of single order is more than X parts;
M. mono- more than X with the same IP address purchase in area;
N. same payment accounts purchase is mono- more than X;
In the present embodiment, the single rule list of the brush is:
,
The threshold values of each rule can be adjusted in table, the control whether rule comes into force, different interventions point can be collected
Data are different, so the rule supported is also different.
B, data acquire:
B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and delays the end time
Deposit order statistical information;
When B2, order information audit, order statistical information is cached in real time;
C, rule process:
Processing method is the audit that places an order, issues audit, manual examination and verification;
White, blacklist is first matched, rule-based filtering chain is entered back into, successively the every rule of matching, based on order statistical information
Rule is exactly simple comparison threshold values;
Ship-to, consignee's name rule are classified, in 24- by NB Algorithm for multiple dimensions
In 48 hours, received using the conversion of preferential ID, geohash algorithm with area commodity ID quantity purchases, with the lower list IP in area, with area
Goods address longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic;The successive value obtained become from
Value is dissipated, the probability in section of converting compares normal probability conversion value, judges whether there is the single risk of brush.
The normal probability conversion value is:225, numerical value is bigger, and expression risk is higher, and 225=9*5*5*1*1*1 is indicated
It is passed through using preferential ID, geohash algorithm conversion ship-to with area commodity ID quantity purchases, with the lower list IP in area, with area
In latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic this 6 dimensions, allow there are one dimension to be 9
Risk is high, and 2 dimensions are 5 uncertain, and 3 dimensions are that 1 risk is low.
The present invention design focal point be:By using the method for the present invention, can simply, quickly and efficiently carry out brushing single knowledge
Not, can be directly into forbidding placing an order to solve the behavior of " wool party " malicious sabotage electric business platform activity operation, protection is normal
The consumptive interests of user.
The technical principle of the present invention is described above in association with specific embodiment.These descriptions are intended merely to explain the present invention's
Principle, and it cannot be construed to limiting the scope of the invention in any way.Based on the explanation herein, the technology of this field
Personnel would not require any inventive effort the other specific implementation modes that can associate the present invention, these modes are fallen within
Within protection scope of the present invention.
Claims (3)
1. a kind of implementation method of the anti-brush of order, it is characterised in that:Include following steps:
A, the single rule list of one brush of system maintenance, rule grouping,
A1, prevent are the audit that places an order, the rule that the audit that places an order is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. address field fills in telephone number and purchase is mono- more than X;
D. same device number purchase is mono- more than X;
A2, default are to issue audit, issue the rule that audit is supported:
A. same IP address purchase is mono- more than X;
B. same consignee's phone purchase is mono- more than X;
C. same identity card purchase is mono- more than X;
D. same device number purchase is mono- more than X;
E. same commodity purchasing sum is more than X mono-;
F. same IP address purchase is more than X parts with a commodity;
G. same IP address uses same preferential more than X times;
H. address field fills in telephone number and purchase is mono- more than X;
I. similar ship-to purchase is mono- more than X, is operated after PLSCONFM;
J. the single order amount of money is more than X members;
K. single order commodity purchasing quantity is more than X parts;
L. the same commodity purchasing quantity of single order is more than X parts;
M. mono- more than X with the same IP address purchase in area;
N. same payment accounts purchase is mono- more than X;
B, data acquire:
B1, timing task, according to correlated condition, the time started, threshold values, rule, periodically calculates and caches and order the end time
Single statistical information;
When B2, order information audit, order statistical information is cached in real time;
C, rule process:
Processing method is the audit that places an order, issues audit, manual examination and verification;
White, blacklist is first matched, rule-based filtering chain is entered back into, successively the every rule of matching, the rule based on order statistical information
It is exactly simple comparison threshold values;
Ship-to, consignee's name rule are classified by NB Algorithm for multiple dimensions, small in 24-48
When it is interior, with area commodity ID quantity purchases, preferential ID, geohash algorithm conversion place of acceptance is used with the lower list IP in area, with area
Location longitude and latitude, most short editing distance algorithm conversion ship-to, consignee's name phonetic;The successive value obtained is become discrete
The probability of value, section of converting compares normal probability conversion value, judges whether there is the single risk of brush.
2. a kind of implementation method of the anti-brush of order as described in claim 1, it is characterised in that:The normal probability conversion value
For:225, numerical value is bigger, and expression risk is higher, and 225=9*5*5*1*1*1 is indicated in same area commodity ID quantity purchases, with area
Lower list IP, it is received using preferential ID, geohash algorithm conversion ship-to longitude and latitude, most short editing distance algorithm conversion with area
In goods address, consignee's name phonetic this 6 dimensions, allow there are one dimension to be that 9 risks are high, 2 dimensions are 5 uncertain, 3
A dimension is that 1 risk is low.
3. a kind of implementation method of the anti-brush of order as described in claim 1, it is characterised in that:The single rule list of the brush is:
,
The threshold values of each rule can be adjusted in table, the control whether rule comes into force, different interventions point can collected data
Difference, so the rule supported is also different.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810368361.XA CN108564448A (en) | 2018-04-23 | 2018-04-23 | A kind of implementation method of the anti-brush of order |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810368361.XA CN108564448A (en) | 2018-04-23 | 2018-04-23 | A kind of implementation method of the anti-brush of order |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108564448A true CN108564448A (en) | 2018-09-21 |
Family
ID=63536180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810368361.XA Pending CN108564448A (en) | 2018-04-23 | 2018-04-23 | A kind of implementation method of the anti-brush of order |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108564448A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109379361A (en) * | 2018-10-22 | 2019-02-22 | 同盾控股有限公司 | A kind of label of address determines method and apparatus |
CN110288430A (en) * | 2019-06-11 | 2019-09-27 | 达疆网络科技(上海)有限公司 | A kind of method that polyatom feature combines serial statistical rules execution interception risk order |
CN110298563A (en) * | 2019-06-14 | 2019-10-01 | 达疆网络科技(上海)有限公司 | A kind of statistical method of discriminant risk order |
CN110334963A (en) * | 2019-07-11 | 2019-10-15 | 四川亨通网智科技有限公司 | Admission ticket order background management system |
CN110555589A (en) * | 2019-07-31 | 2019-12-10 | 苏宁云计算有限公司 | Risk order identification method and device |
CN111245815A (en) * | 2020-01-07 | 2020-06-05 | 同盾控股有限公司 | Data processing method, data processing device, storage medium and electronic equipment |
CN111507729A (en) * | 2020-04-29 | 2020-08-07 | 广东所能网络有限公司 | Electronic commerce risk control system and method based on mobile internet |
CN112669058A (en) * | 2020-12-21 | 2021-04-16 | 上海多维度网络科技股份有限公司 | Data processing method and device for application program, storage medium and electronic device |
CN113672687A (en) * | 2021-10-25 | 2021-11-19 | 北京值得买科技股份有限公司 | E-commerce big data processing method, device, equipment and storage medium |
CN113689059A (en) * | 2020-05-19 | 2021-11-23 | 江苏物云通物流科技有限公司 | Network freight platform waybill risk monitoring system |
CN113837568A (en) * | 2021-09-08 | 2021-12-24 | 杭州海康威视系统技术有限公司 | Risk order identification method and device, electronic equipment and machine-readable storage medium |
CN113837617A (en) * | 2021-09-26 | 2021-12-24 | 广州新丝路信息科技有限公司 | Anti-bill-swiping risk management method and device |
CN116664238A (en) * | 2023-06-02 | 2023-08-29 | 北京科码先锋互联网技术股份有限公司 | Retail industry risk order auditing management method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2512159A (en) * | 2013-03-15 | 2014-09-24 | Parcelpoke Ltd | Ordering system and text message gifting |
CN105160572A (en) * | 2015-09-30 | 2015-12-16 | 努比亚技术有限公司 | Device and method for controlling order to generate, and seckilling system |
CN107341716A (en) * | 2017-07-11 | 2017-11-10 | 北京奇艺世纪科技有限公司 | A kind of method, apparatus and electronic equipment of the identification of malice order |
-
2018
- 2018-04-23 CN CN201810368361.XA patent/CN108564448A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2512159A (en) * | 2013-03-15 | 2014-09-24 | Parcelpoke Ltd | Ordering system and text message gifting |
CN105160572A (en) * | 2015-09-30 | 2015-12-16 | 努比亚技术有限公司 | Device and method for controlling order to generate, and seckilling system |
CN107341716A (en) * | 2017-07-11 | 2017-11-10 | 北京奇艺世纪科技有限公司 | A kind of method, apparatus and electronic equipment of the identification of malice order |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109379361B (en) * | 2018-10-22 | 2021-09-24 | 同盾控股有限公司 | Address label determination method and device |
CN109379361A (en) * | 2018-10-22 | 2019-02-22 | 同盾控股有限公司 | A kind of label of address determines method and apparatus |
CN110288430A (en) * | 2019-06-11 | 2019-09-27 | 达疆网络科技(上海)有限公司 | A kind of method that polyatom feature combines serial statistical rules execution interception risk order |
CN110298563A (en) * | 2019-06-14 | 2019-10-01 | 达疆网络科技(上海)有限公司 | A kind of statistical method of discriminant risk order |
CN110334963A (en) * | 2019-07-11 | 2019-10-15 | 四川亨通网智科技有限公司 | Admission ticket order background management system |
CN110555589A (en) * | 2019-07-31 | 2019-12-10 | 苏宁云计算有限公司 | Risk order identification method and device |
CN111245815A (en) * | 2020-01-07 | 2020-06-05 | 同盾控股有限公司 | Data processing method, data processing device, storage medium and electronic equipment |
CN111507729A (en) * | 2020-04-29 | 2020-08-07 | 广东所能网络有限公司 | Electronic commerce risk control system and method based on mobile internet |
CN113689059A (en) * | 2020-05-19 | 2021-11-23 | 江苏物云通物流科技有限公司 | Network freight platform waybill risk monitoring system |
CN112669058A (en) * | 2020-12-21 | 2021-04-16 | 上海多维度网络科技股份有限公司 | Data processing method and device for application program, storage medium and electronic device |
CN113837568A (en) * | 2021-09-08 | 2021-12-24 | 杭州海康威视系统技术有限公司 | Risk order identification method and device, electronic equipment and machine-readable storage medium |
CN113837568B (en) * | 2021-09-08 | 2024-03-01 | 杭州海康威视系统技术有限公司 | Risk order identification method, apparatus, electronic device and machine-readable storage medium |
CN113837617A (en) * | 2021-09-26 | 2021-12-24 | 广州新丝路信息科技有限公司 | Anti-bill-swiping risk management method and device |
CN113672687A (en) * | 2021-10-25 | 2021-11-19 | 北京值得买科技股份有限公司 | E-commerce big data processing method, device, equipment and storage medium |
CN116664238A (en) * | 2023-06-02 | 2023-08-29 | 北京科码先锋互联网技术股份有限公司 | Retail industry risk order auditing management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108564448A (en) | A kind of implementation method of the anti-brush of order | |
US10477403B2 (en) | Identifying call characteristics to detect fraudulent call activity and take corrective action without using recording, transcription or caller ID | |
Van Wegberg et al. | Plug and prey? measuring the commoditization of cybercrime via online anonymous markets | |
Anderson et al. | Measuring the cost of cybercrime | |
McCoy et al. | Priceless: The role of payments in abuse-advertised goods | |
CN107133865B (en) | Credit score obtaining and feature vector value output method and device | |
US20170148025A1 (en) | Anomaly detection in groups of transactions | |
US9596356B2 (en) | Analyzing voice characteristics to detect fraudulent call activity and take corrective action without using recording, transcription or caller ID | |
CN108694657A (en) | Client's identification device, method and computer readable storage medium | |
Button et al. | Technology and Fraud: The ‘Fraudogenic’consequences of the Internet revolution | |
US10230851B2 (en) | Identifying call features and associations to detect call traffic pumping and take corrective action | |
US20140365305A1 (en) | Providing geospatial-temporal next-best-action decisions | |
Pickard | The misinformation society | |
CN109947814A (en) | Method and apparatus for the abnormal data group in detection data set | |
CN108346088A (en) | Brand official store malice panic buying preventing control method and system | |
CN109919608A (en) | A kind of recognition methods, device and the server of high-risk transaction agent | |
US10496992B2 (en) | Exclusion of nodes from link analysis | |
WO2017032056A1 (en) | Point-of-sale-based cash-out determining method and apparatus | |
CN106897880A (en) | A kind of account methods of risk assessment and equipment | |
CN109711984B (en) | Pre-loan risk monitoring method and device based on collection urging | |
Parlov et al. | GDPR–impact of general data protection regulation on digital marketing | |
Ennin et al. | Cybercrime in Ghana and victims accounts | |
Koong et al. | An examination of Internet fraud occurrences | |
CN105099993B (en) | A kind of data interactive method based on agent platform, device and system | |
KR20160127920A (en) | Cyber bigdata trade system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180921 |
|
RJ01 | Rejection of invention patent application after publication |