CN108596490A - A kind of air control strategy configuration flow and system in checking information system - Google Patents
A kind of air control strategy configuration flow and system in checking information system Download PDFInfo
- Publication number
- CN108596490A CN108596490A CN201810376749.4A CN201810376749A CN108596490A CN 108596490 A CN108596490 A CN 108596490A CN 201810376749 A CN201810376749 A CN 201810376749A CN 108596490 A CN108596490 A CN 108596490A
- Authority
- CN
- China
- Prior art keywords
- risk
- control
- transaction
- policy
- blocker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Educational Administration (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A kind of air control strategy configuration flow in checking information system includes the following steps:(1) backstage personnel safeguard commodity self-information, high-level information, additional information, market information;(2) transaction request for responding user, opens the flow of marketing system risk control;(3) judge the setting of Transaction Exposure Type and transaction amount threshold value m, the flow of risk of selection control is strong consistency risk control flow or high concurrent risk control flow.
Description
Technical field
The invention belongs to information technology field, the risk policy configuration especially belonged under checking information system is led with management and control
Domain.
Background technology
The currently query function in selling checking information system, the Data Structure Design of generally use list table, by setting
The simple querying condition such as trade name, goods number is set, related trade company sales letter is inquired from trade company's sales information database
Breath, and user is presented to by way of front-end interface.Traditional sales information inquiry often there are problems that in this way, 1, sell
It sells information and shows in the form of a single, show deficiency especially for commodity category level and its relationship between superior and subordinate.2, product is sold
Information shows that dimension is simple, can only generally show some conventional informations (such as ProductName, price etc.) of commodity itself, can not
From channel, content provider, using etc. carry out various dimensions information displaying safeguard, be not suitable with the requirement of current internet development.
In addition, after the information displaying for using a variety of dimensions, a large amount of client's stream is brought, while producing one newly
The problem of:Client trading amount increases, and especially concurrent transaction increases.This is the unique skill that new inquiry, exhibition method are brought
Art problem.At present there are also risk control function is increased in sale information system, usually according to the risk of user configuration
Tactful (such as trading limit), by the way that transaction business data (such as turnover) are calculated and are matched with risk policy, with
Achieve the purpose that control merchandise sales risk.The risk policy and transaction business of system accumulate data, typically store
In the database, by reading transaction business data from database, it is calculated, and is verified with risk policy, is completed
Corresponding risk control.Such processing mode has certain benefit for effective prevention and control transaction risk, but with online trading
Scene becomes increasingly abundant, and the quantity of on-line selling transaction sharply increases, and requirement of the user for customer experience improves further, tradition
Scheme can bring problems with:1, it since risk inspection needs to carry out correlation data calculation and storage, generally at least needs to consume
The time for taking 100ms or more to increase the disposed of in its entirety time entirely merchandised, and then affects client trading experience.2、
Since off-line transaction amount dramatically increases, the concurrent request exponentially grade of backend sales information is improved, it is old based on data
Library carries out the pattern of risk control, it is difficult to which the data undertaken under such large concurrent calculate, in fact it could happen that dirty data problem, in turn
Risk control is caused to be failed.For example, it is 1000 yuan that the risk policy of current system configuration, which is day accumulation trading limit, a transaction
Consumption is 500 yuan, and another transaction consumption is 600 yuan, if two transactions are priorities, when the first transaction occurs, and day
Accumulation turnover is 0+500=500, is less than day accumulation limit 1000, then the transaction is normally carried out.Second transaction occurs
When, upper one turnover 500 adds this transaction amount, and it is 500+600=1100 to accumulate turnover day, then can be due to being more than day
Trading limit is accumulated, and triggers risk management and control.But if two transactions occur (while herein referring to, not only absolutely simultaneously
While in meaning, as long as the transaction that occurred at intervals less than 100ms under this scene, it is believed that be simultaneously), it is passing at this time
Under system pattern, when the first transaction occurs, it is 0+500=500 to accumulate turnover day, is less than day accumulation limit 1000, then the pen
Transaction is normally carried out.When second transaction occurs, do not completed also since the risk limitation of previous pen calculates, Day Trading at this moment is tired
Product value is still calculated since 0, and aggregate-value of merchandising at this time is 0+600=600, similarly less than day accumulation limit 1000, then and second
Transaction can be also normally carried out, and will not trigger risk control, so as to cause the failure of risk control strategy.3, tradition is based on number
According to the risk control of library mode due to the limitation of database, the dynamic expansion of cluster can not be carried out.When magnanimity, which is merchandised, to be occurred, clothes
The system resource accounting of business device can rapidly increase moment, and the occupancy of system resource is excessively high, and the processing time of transaction can be caused to prolong
It is long, the serious delay machine that can lead to business transaction system, and then influence the stability of transaction system.4, existing risk policy is matched
System is set, is all often the independent risk policy of each Self Matching, air control is to the rule risk policy development sequence school when verifying
It tests.There is no hierarchical relationship between risk policy, without cascade connection, cannot be satisfied diversified air control strategy configuration needs.5、
Excessively high safety setting can influence convenience of merchandising, but be arranged that too low there are great risks.
Invention content
Technical scheme of the present invention
To solve the problems, such as that above-mentioned safety and convenience and other are not referred to above-mentioned simultaneously, but it is real in the present invention
The technical issues of matter is recorded, spy propose the present invention, including:
A kind of air control strategy configuration flow in self-service query sale information system includes the following steps:
(1) backstage personnel safeguard commodity self-information, affiliated category and category level;
(2) backstage personnel safeguard the channels of commodity, content provider, application high-level information, and " client buys jointly "
Additional information;And maintenance system market information, include the trading volume into the t times that system update marketing planning personnel predict,
And the concurrent transaction peak period t that marketing planning personnel are estimated;
(3) commodity self-information, high-level information, additional information are shown to user according to the querying condition of user, hides city
Field information;
(4) response user clicks input, to user's displaying high-level information, the particular content of additional information;
(5) transaction request for responding user, opens the flow of marketing system risk control;
(6) judge the setting of Transaction Exposure Type and transaction amount threshold value m, the flow of risk of selection control is strong consistency
Risk control flow or high concurrent risk control flow;
Wherein strong consistency risk control flow includes:
(11) risk control policy store is in vulnerability database;Blocker and deals match relationship are controlled from risk policy
In configuration file, the risk policy control blocker F1 of transaction configuration is inquired;
(12) it if in risk policy controls blocker and the configuration of deals match relationship, searches less than corresponding risk plan
Blocker is slightly controlled, system can then choose default risk policy control blocker F0, match global consumer's risk control strategy
Y0。
(13) risk policy control blocker inquires risk control strategy from vulnerability database, by transaction amount and risk
Control strategy Y1 is verified, if verification does not pass through, the transaction is intercepted.If verification passes through, which can
To execute.Simultaneously by the accumulation business datum of risk control strategy Y1, write back in vulnerability database;
(14) it for risk control strategy Yn, is also verified in the manner described above, and tiring out risk control strategy Yn
Product business datum, writes back to vulnerability database.
(15) during this risk verifies, the subsequent block trade of default is lined up, and is waited pending;Hereafter, second
When block trade occurs, system can inquire the accumulation business datum in last transaction write back data library from vulnerability database, with
Matched risk control strategy Y1 is verified in vulnerability database, if verification does not pass through, the transaction is intercepted, if
Verification passes through, then the transaction is normally carried out;
Wherein high concurrent risk control flow includes:
(21) risk control policy store is in risk policy cache pool;Risk policy cache pool includes:Risk policy control
Business datum is accumulated in blocker and deals match relationship allocating cache module processed, risk control access vector cache module, risk control
Cache module;
(22) it is controlled in blocker and deals match relationship allocating cache from risk policy, inquires the risk of transaction configuration
Policy control blocker F2;
(23) if searched less than corresponding wind in risk policy controls blocker and deals match relationship allocating cache
Dangerous policy control blocker, system can then choose default risk policy control blocker F0, match global consumer's risk control
Tactful Y0;
(24) risk policy control blocker inquires risk control strategy from risk control access vector cache, by transaction amount
It is verified with risk control strategy, if verification does not pass through, the transaction is intercepted;If verification passes through, which hands over
It can easily execute.
(25) it by the accumulation business datum of risk control strategy, writes back in risk control access vector cache;Risk control at this time
The data accumulation of system accumulation business datum caching can be waited in line.
Further, m=a × M+b × W+c × D+d × H+e × L;Wherein a, b, c, d, e are weight coefficient;M is upper January
The transaction amount that is averaged per list within the t times;W is the upper one week transaction amount that is averaged per list within the t times;D is upper one day in t
The transaction amount that is averaged per list in time;H is per list be averaged transaction amount of the previous hour within the t times;L is marketing planning
Trading volume in the t times of personnel's prediction;T is the estimated concurrent transaction peak period of marketing planning personnel.
Further, a=0.08, b=0.12, c=0.38, d=0.57, e=1.47.
Further, risk policy configuration is divided into two stage arrangement, is global air control strategy configuration and blocker air control plan respectively
Slightly configure;Global air control strategy configuration refers to that all risk policy control blockers are required for matching in system global scope
Risk control strategy;Blocker risk policy configures, then refers to the matched risk in single risk policy controls blocker
Control strategy.
Further, specific judgment method is in step (6):If transaction belongs to the transaction of strong consistency requirement type, and hands over
Easy amount of money threshold value is more than or equal to m, then can trigger strong consistency risk control flow;If the risk trade type of transaction is high concurrent
Type of transaction or transaction amount are both less than m, then can trigger high concurrent risk control flow.
Further, further include the processing step of risk policy buffer pool:
(31) initialization of risk policy cache pool;
(32) it is synchronous that data are carried out between risk policy cache pool and local disk file;
(33) in risk policy caching pool server restarting, the data text of this disk preservation can be read automatically
Part, and write data into risk policy cache pool;
(34) data of risk policy cache pool are cleared up.
A kind of air control strategy configuration system for realizing above-mentioned air control strategy configuration flow, including:
Risk trade type checks module, for judging risk trade type and then matching different risk control flows
Module;The flow of risk control can be divided into strong consistency risk control flow and high concurrent risk control flow;Risk trade
Type checks setting of the module according to risk trade type and transaction amount, matches different risk control flows;
Risk policy controls blocking module, is nucleus module verify for risk control, including risk policy is controlled and blocked
Cut device;For judging whether transaction can continue according to the trading situation and risk policy of request, while by risk control
Strategy accumulation business datum writes back to vulnerability database;
Risk policy controls blocker, store transaction matching relationship configuration file is used for, for meeting strong consistency risk
The transaction of control flow, system can be controlled from risk policy in blocker and deals match relation configuration file, inquire the transaction
The risk policy of configuration controls blocker;If in risk policy controls blocker and the configuration of deals match relationship, search not
Blocker is controlled to corresponding risk policy, system can then choose default risk policy control blocker and match global user
Risk control strategy;
Vulnerability database provides risk for storing risk control strategy configuration information to risk policy control blocking module
The tactful configuration information of control;
Risk policy configuration module is to provide and custom-configures risk control strategy, custom-configures transaction and risk plan
Slightly control blocker matching relationship function;
Risk policy cache pool, including risk policy control blocker and deals match relationship allocating cache, risk control
Business datum caching is accumulated in access vector cache, risk control;For storing risk control strategy configuration information, blocked to risk policy control
It cuts module and risk control strategy configuration information is provided.
The inventive point of the present invention:
(1) multidimensional information displaying is increased in traditional marketing system.
(2) risk policy and transaction business accumulation data are stored in database in legacy system, and the present invention is for the first time
It proposes risk policy cache pool, and startup application risk access vector cache pond is chosen whether according to transaction characteristics.
(3) according to marketing system the characteristics of, further devises the persistence of risk policy cache pool, recovery, cleaning, expansion
Modules and the flows such as exhibition,
(4) system can adjust the flow of risk of selection control as strong consistency risk control flow or height using automatic dynamic
Whether coincidence risk control flow starts risk policy cache pool, take into account safety and facility.
(5) risk policy configuration has been innovated, the global air control strategy configuration for more adapting to marketing system is increased and has been intercepted
The multilevel mode of device air control strategy configuration.
It these are only limited list, the preferred embodiment described in the embodiment of the present invention, and it is explicitly described as this
The scheme of invention inventive point similarly solves the technical problem in traditional technology, and the inventive point of the present invention.
The technique effect that the present invention reaches
(1) merchandise news can be neatly provided, customer transaction wish can be especially increased.
(2) it is innovatively provided with risk policy cache pool, and proposes the dynamic select side of different risk control flows
High concurrent transaction, compromise between security and transaction convenience can be setup flexibly in method.
(3) the multistage air control configuration mode for more adapting to commodity sale system is provided, transaction security is further improved
Property and transaction convenience.
(4) it is innovatively provided with the mode of operation of risk policy cache pool, improves the safety of system to work long hours
Property and robustness.
Description of the drawings
Fig. 1 is that self-service query sales information configures system process chart with air control strategy.
Fig. 2 is self-service query sales information illustrative view of functional configuration.
Fig. 3 is risk policy control function structural schematic diagram.
Fig. 4 is that risk policy controls example schematic.
Specific implementation mode
The information inquiry of various dimensions sale information system and risk control method, as shown in Figure 1, including the following steps:
(S1) backstage personnel safeguard commodity self-information, affiliated category and category level.For example, commodity are notebook electricity
Brain, including commodity self-information include price, brand, processor parameter, parameters of video card, screen size etc..Affiliated category is
Personal electric product, category level are C1.Correspondingly, the product of same category level is electronic product, such as mobile phone, tablet
Computer, digital camera etc..Corresponding higher level's category level is C0, for example higher level's category is to sell product to private.Corresponding subordinate
Category level is C2, for example subordinate's category is electronic notebook this product.
(S2) backstage personnel safeguard the channels of commodity, content provider, using etc. various dimensions information.Channel includes electronics canal
Channel, partner's channel etc. under road, line.Content provider, includes sale advertising for the commodity, emotional story, such as
The advertisement of the notebook of certain platform publication, the notebook correlation emotional story etc. that online friend shares.Have using being then the commodity
The APP applications of the correlation such as application software of pass or APP etc., such as the sale of commodity electric business, maintenance platform, user's customer service.After meanwhile
Platform personnel can establish the information of " client buys jointly ".It is required simultaneously according to backstage risk control, backstage personnel's maintenance system
Market information includes that trading volume into the t times that system update marketing planning personnel predict and marketing planning personnel are estimated
Concurrent transaction peak period t.
(S3) user is used as input condition, such as user with certain brand by inputting the conditions such as name of firm, Merchant Category
Laptop as input condition, the sales information of commodity various dimensions can be obtained.Various dimensions sales information is in addition to showing
Other than the general properties information such as commodity price, brand, it can also recommend to show higher level's category information of the commodity, subordinate's category information
Etc. associated merchandise news, at the same show the relevant channel of the commodity, content provider, using etc. relevant Info Link.
And it can show the information of the commodity " client buys jointly ".
(S4) user can then show such as the Commdity advertisement video, online friend and share the commodity by clicking relevant link
Relevant stories and the commodity relative application software introduction and download link etc..Effectively enrich the information inquiry dimension of the commodity
Degree, and the marketing of the commodity ecosphere is extended whereby.Showing for trade company takes the mode of word or picture mostly at present, only shows this
Some relevant static informations of commodity.The present invention program is supplied using the ecosphere information of commodity as multiple dimensions of merchandise news
User's queried access, and by these information dimensions, it is supplied to user more comprehensively, more dynamical more has the merchandise news exhibition of temperature
Show.It this part should be as the inventive point of the present invention program.And in the page of " client buys jointly ", can show with
User is identical to have purchase intention, prepares other clients of payment, improves the purchase intention of client.But it also brings simultaneously
The big problem of concurrent transaction amount.Therefore it needs to carry out special risk control flow.
(S5) after the commodity that user's selection is admired place an order, then the flow of marketing system risk control is opened.
(S6) it is first depending on the setting of risk trade type and transaction amount, the flow of risk control can be divided into strongly consistent
Property risk control flow and high concurrent risk control flow.This system setting strong consistency risk control flow the condition that checks be
Risk trade type is strong consistency requirement, and the risk trade amount of money is more than m.It is greater than or equal to the friendship of m for transaction amount
Easily, and risk trade type is that the transaction that strong consistency requires (such as is related to the transaction of combination clearance class, for example commodity are handed over
Easily, other than paying in cash, also part discount coupon and integral deducts, and such transaction relates to cash, discount coupon, integral etc.
Combination clearance, belong to the transaction of strong consistency requirement.) risk control system matching strong consistency risk control flow.Although
Strongly consistent risk control improves the safety of payment, but can influence payment speed, it is therefore desirable to optimize threshold value m, ensure to take into account
Safety and customer experience.It (calculates according to computation model simulation and real system test and the process of test includes passing through place
Manage device and acquire transaction data, rudimentary model is established, according to transaction data model of fit, more new model), the present invention proposes as follows
Formula:
M=a × M+b × W+c × D+d × H+e × L.
Wherein a, b, c, d, e are weight coefficient;M is per list be averaged transaction amount of the upper January within the t times;W is upper one
Week within the t times per single transaction amount that is averaged;D is per list be averaged transaction amount of upper one day within the t times;H is previous small
When within the t times per single transaction amount that is averaged;L is the trading volume in the t times of marketing planning personnel prediction;T is market
The estimated concurrent transaction peak period of project staff.According to actual test, a=0.08, b=0.12, c=0.38, d=
0.57, e=1.47.System can dynamically adjust threshold value m as a result, and to compromise between security and convenience, this is also the present invention
One of inventive point.If only considering historical data, may cause not in full conformity with this market sale situation, if only examined
Consider this market sale expection, due to the prediction of expected only marketing personal, is also differed with truth.If therefore can incite somebody to action
Historical data is combined with predicted data, then more accurate to threshold definitions.But which historical data and predicted data are used, with
And their weight, then it needs to be determined repeatedly according to mass data and experiment, it could sophisticated model.
Correspondingly, the condition that checks of this system setting high concurrent risk control flow be risk trade type is high concurrent class
Type or transaction amount are less than m (such as ten thousand yuan of m=2), i.e., the transaction for transaction amount less than m (such as ten thousand yuan of m=2) or
Risk trade type be high concurrent type transaction (transaction of high concurrent type be often single channel initiation be not related to combine
Clearance, while the big transaction of concurrent request amount again, such as the transaction etc. of swiping the card initiated of a pos machine), then risk control system
Match high concurrent risk control flow.
(S7) except risk control flow, also risk policy configuration additional flow.In the present invention, risk policy
Configuration information is divided into two stage arrangement, is global air control strategy configuration and the configuration of blocker air control strategy respectively.Global air control strategy
Configuration refers to, all risk policies control blockers are required for matched risk control strategy in system global scope, such as
There are two risk policies to control blocker F1, F2 in current system, then the two risk policy controllers are required for matching this
Global consumer's risk control strategy Y0.Blocker risk policy configure, then refer to single risk policy control blocker in
The risk control strategy matched.For example, system configuration two blocker air control strategies Y1 and Y2.Risk policy control can then be configured
Blocker F1 processed matches Y1, Y2, and configures risk policy control blocker F2 and only match Y1.May be used also between blocker air control strategy
To configure series or parallel relationship, so-called series connection refer to two air control strategies between be the matched relationship of sequence.Such as wind
Dangerous policy control blocker F1 matches Y1, this two air control strategies of Y2, if configuration Y1, Y2 are series connection, risk policy control is blocked
It cuts device F1 to need first to match Y1, then matches Y2, only Y1 matching verifications pass through, then remove matching verification Y2;Opposite, if configuration
Y1, Y2 are parallel connection, risk policy control blocker F1 then can PARALLEL MATCHING Y1 and Y2 simultaneously, if two strategies have one
Pass through with verification, then blocker verification passes through.Furthermore, it is possible to which the matching for configuring risk policy control blocker and transaction is closed
System, such as transaction T1 need to match risk policy control blocker F1, and the T2 that merchandises needs to match risk policy control blocker
F2.Existing risk policy configures system, is all often the independent risk policy of each Self Matching, the present invention provides risk controls
The level of strategy configuration and cascade connection, the configuration of risk control strategy are more flexible and effective, it should as the present invention program
An inventive point.
(S8) for strong consistency risk control flow, risk control policy store is in vulnerability database.For example, transaction
T1 belongs to the transaction of strong consistency requirement type, and transaction amount has been more than M (such as ten thousand yuan of M=2), then systematic risk controlling meeting
Trigger strong consistency risk control flow.
(S9) system is controlled from risk policy in blocker and deals match relation configuration file first, is inquired the transaction and is matched
The risk policy controller (for example it is risk policy control blocker F1 that the transaction T1 that configures before this is matched) set.
(S10) it if in risk policy controls blocker and the configuration of deals match relationship, searches less than corresponding risk
Policy control blocker, system can then choose default risk policy control blocker F0, match global consumer's risk and control plan
Slightly Y0.
(S11) risk policy control blocker inquires risk control strategy (for example, risk control plan from vulnerability database
Slightly Y1 and Y2), transaction amount and risk control strategy Y1 (such as day maximum trading limit) are verified, if verification is obstructed
It crosses, then the transaction is intercepted.If verification passes through, which can execute.Simultaneously by the tired of risk control strategy Y1
Product business datum (for example day accumulates turnover), writes back in vulnerability database.
(S12) it likewise, for risk control strategy Y2, is also verified in the manner described above, and by risk control plan
The slightly accumulation business datum (such as moon accumulation turnover) of Y2, writes back to vulnerability database.And so on, until Yn.
(S13) during this risk verifies, subsequent block trade will be waited in line to handle in system, to avoid
The problem of risk policy failure concurrently brought.Hereafter, when second block trade occurs, system can be from vulnerability database
Inquire the generation of accumulation business datum (such as day accumulation turnover)+this current transaction in last transaction write back data library
Matched risk control strategy Y1 (such as day maximum trading limit) is verified in volume, with vulnerability database, if verification is not
Pass through, then the transaction is intercepted, if verification passes through, which is normally carried out.
(S14) for high concurrent risk control flow, risk control policy store is in risk policy cache pool.For example,
The risk trade type of T2 of merchandising is high concurrent type of transaction, and generally these types of transaction amount is both less than M (such as M=2
Ten thousand yuan), then systematic risk controlling can trigger high concurrent risk control flow.
(S15) risk policy cache pool includes that risk policy controls blocker and deals match relationship allocating cache, risk
Control strategy caches, and several parts such as business datum caching are accumulated in risk control.Data are stored in risk policy cache pool, energy
Effectively improve the efficiency of digital independent.For example, primary data cached reading, time loss are less than 1ms, are cached using risk policy
The processing time of pond progress risk policy control, which adds up, does not exceed 10ms, is taken compared to database processing risk policy
For 100ms, improved efficiency is more than 10 times.Also quickly just because of the data manipulation in risk policy cache pool, general low
In 1ms, the calculating and verification of cache policy are carried out using risk policy cache pool, can effectively be solved in high concurrent,
The dirty data merchandised while occurred when occurring, to ensure risk control strategy validity.Example described earlier, such as
The risk policy of current system configuration is that day accumulation trading limit is 1000 yuan, and transaction consumption is 500 yuan, another transaction
Consumption is 600 yuan, and in high concurrent, this two transaction may occur simultaneously, at this point, when the first transaction occurs, day
Accumulation turnover is 0+500=500, is less than day accumulation limit 1000, then the transaction is normally carried out.Second transaction occurs
When, due to the efficient and instantaneous completion of caching, then the risk limitation calculating of previous pen was completed already under normal circumstances.At this moment
Day Trading accumulated value be updated to 500, aggregate-value of merchandising at this time is 500+600=1100, is more than day accumulation limit 1000,
That is the second transaction triggers risk control strategy, and transaction terminates.Even if in extreme circumstances, a upper transaction is not yet completed,
The data accumulation of the accumulation business datum caching of risk control at this time can be waited in line, until upper one 500 yuan of transaction have counted
Verification is compared to after day accumulation turnover, then with the daily trading limit then in risk control access vector cache.Thus avoid
The dirty data merchandised under big complications in traditional scheme while occurred when occurring, to having ensured risk control strategy
Validity.It this part should be as the inventive point of the present invention program.
(S16) system is controlled from risk policy in blocker and deals match relationship allocating cache first, inquires the transaction
The risk policy controller (for example it is risk policy control blocker F2 that the transaction T2 that configures before this is matched) of configuration.
(S17) if searched less than corresponding wind in risk policy controls blocker and deals match relationship allocating cache
Dangerous policy control blocker, system can then choose default risk policy control blocker F0, match global consumer's risk control
Tactful Y0.
(S18) risk policy control blocker inquires risk control strategy (for example, risk from risk control access vector cache
Control strategy Y2), transaction amount and risk control strategy Y2 (such as moon maximum trading limit) are verified, if verification is not
Pass through, then the transaction is intercepted.If verification passes through, which can execute.
(S19) while by the accumulation business datum of risk control strategy Y2 (such as moon accumulation turnover), risk is write back to
In control strategy caching.The data accumulation of the accumulation business datum caching of risk control at this time can be waited in line, simultaneously to avoid transaction
The problem of risk policy failure that business datum when hair in risk control accumulation business datum caching is inaccurate and brings.With this
Analogize, until Yn.
It is additional, the processing in relation to risk policy buffer pool, including following sub-process,
(S20) initialization of risk policy cache pool.System controls blocker from risk policy and deals match relationship is matched
It sets and reads risk policy control blocker and deals match relationship in file and be loaded into risk policy control blocker and transaction
In matching relationship allocating cache.System reads risk control policy data from vulnerability database, and is loaded into risk control plan
In slightly caching.The accumulation business datum of different risk control strategies is initialised to risk control accumulation business datum caching by system
In.
(S21) persistence of risk policy cache pool.Based on risk policy cache pool, risk control can be greatly improved
Efficiency.But when in extreme circumstances, there is abnormal delay machine in the machine of risk policy cache pool, the data in risk policy cache pool
It can lose extremely, to influence the overall flow of risk control.The present invention program is in risk policy cache pool and local disk text
Data persistence synchronization mechanism is established between part, that is, the number for taking mode either synchronously or asynchronously to store risk policy cache pool
According to being persisted in the data file of local disk in real time.The case where system can be according to resource load, automatic progress data are same
The conversion of step mode.System monitors loading condition (referring mainly to CPU, memory, IO) automatically, when system to be supported on 50% below
In the case of, risk policy cache pool takes synchronous mode that data are synchronized in disk file in real time.And when system load is super
When 50%, then system can then be switched to asynchronous system and carry out data synchronization.Alternately implement according to system load in this way it is synchronous and
The mode of asynchronous data backup, can synchronize the influence to on-line transaction, the ability of lifting system trading processing reaches to avoid data
50% or more.Thus it is possible to prevente effectively from risk policy cache pool loss of data is asked caused by delay machine in abnormal cases
Topic, this part should be as the inventive point of the present invention program.
(S22) data of risk policy cache pool are restored.After the machine exception delay machine of risk policy cache pool, due to wind
The persistence mechanism in dangerous access vector cache pond, complete data can be persisted in the data file of this disk.In risk plan
When slightly caching pool server restarts, system can read the data file of this disk preservation automatically, and write data into
Risk policy cache pool, the automaticdata to reach risk policy cache pool restore, this is also one of the inventive point of the present invention.
(S23) data scrubbing of risk policy cache pool.In general, risk policy control blocker and deals match close
It is allocating cache, with risk control access vector cache, it is to control blocker and friendship from risk policy that this two-part data, which is one,
It reads and loads in easy matching relationship configuration file, the other is reading risk control policy data from vulnerability database and filling
It carries.This two-part data is to be based on user configuration, and data volume is little, and seldom changes.But it is deposited in risk policy cache pool
The accumulation business datum for putting different risk control strategies is then the generation with transaction, frequent updating.Such as risk control plan
Slightly Y1 corresponding day accumulation turnovers and the risk control strategy Y2 corresponding moons accumulate turnover, then real-time update and can need clear
Reason.For example the same day calculates the turnover of accumulation, needs to clear up before tomorrow, day cut.This month, calculates the turnover of accumulation, under
It needs to clear up before cutting month in and month out.The present invention program configures different wind for the accumulation business datum of different risk control strategies
The out-of-service time of dangerous data.For example the out-of-service time of the corresponding day accumulation data cached configurations of turnover of risk control strategy Y1 is
1 day, and the out-of-service time of the corresponding moon accumulation data cached configurations of turnover of risk control strategy Y2 can then remove of that month number of days+1.
System can clear up the accumulation business datum of different risk control strategies the automatic expiration in this way, to ensure the risk in the next period
Control flow it is accurate and effective, this is also one of the inventive point of the present invention.
(S24) extension of risk policy cache pool.Under normal circumstances, risk policy cache pool can successfully manage concurrent transaction
Under risk control.But in special deal day, when magnanimity transaction occurs parallel, the system resource accounting of server can increase moment
The occupancy of height, system resource is excessively high, and the processing time of transaction can be caused to extend, serious to lead to delaying for business transaction system
Machine, and then influence the stability of transaction system.At this moment according to the characteristic extending transversely of risk policy cache pool, strategy can be increased
Pool server is cached, and configures cluster address and starts, newly-increased access vector cache server can be automatically added to cache policy
In cache pool cluster.The system processing power of risk policy cache pool after extending transversely can be at double promotion, this is also this
One of inventive point of invention.
Based on the risk policy configuration flow method in above-mentioned self-service query marketing system, in self-service query marketing system
Risk policy configuration system structural framing such as Fig. 2, shown in Fig. 3, the risk policy control system is by computer hardware
It is realized jointly with program therein.
Fig. 2 illustrates self-service query sales information functional structure chart.It is broadly divided into merchandise news maintenance module, merchandise news
Three modules such as self-service query module and various dimensions merchandise news memory module.The main running background of merchandise news maintenance module
Administrative staff use.Backstage personnel can safeguard the basic informations such as commodity price, brand, institute by merchandise news maintenance module
Belong to category, the commodity category information such as category level.Backstage personnel can also safeguard commodity by merchant information maintenance module simultaneously
Channel, content provider, using etc. various dimensions information.Merchandise news self-service query module, then being available to user can be certainly
Help the function of inquiring and browsing merchandise sales information.User is used as input by conditions such as name of firm, Merchant Categories, inquires commodity
Various dimensions information.In addition to showing the general properties such as the commodity price, brand, it can also recommend the higher level's category for showing the commodity
The associated merchandise newss such as information, subordinate's category information.Show the relevant channel of the commodity, content provider, application simultaneously
Etc. relevant Info Link.User can then show such as the Commdity advertisement video, online friend and share this by clicking relevant link
Commodity relevant stories and the commodity relative application software introduction and download link etc., which effectively enriches the letter of commodity
Breath inquiry dimension, and the marketing of the commodity ecosphere is extended whereby.Various dimensions merchandise news module is then for storing commodity basis
The data such as information, commodity category information, commodity channel information, content provider information, application message, after above-mentioned data are supplied to
Platform personnel safeguard, are also provided to user self-help inquiry.
Fig. 3 illustrates risk policy control function structure chart.
Risk trade type checks module, is for judging risk trade type and then matching different risk control flows
Module.The flow of risk control can be divided into strong consistency risk control flow and high concurrent risk control flow.Risk is handed over
Easy type checks setting of the module according to risk trade type and transaction amount, matches different risk control flows.
Risk policy controls blocker and deals match relation configuration file, is controlled for store transaction and risk policy
The file of blocker matching relationship.For meeting the transaction of strong consistency risk control flow, system can be controlled from risk policy
In blocker and deals match relation configuration file, the risk policy control blocker of transaction configuration is inquired.If in risk
It in policy control blocker and the configuration of deals match relationship, searches and controls blocker less than corresponding risk policy, system then can
It chooses default risk policy control blocker and matches global consumer's risk control strategy.
Vulnerability database is for storing air control strategy configuration information.Risk policy configuration information is divided into two-layer configuration, respectively
It is global air control strategy configuration and the configuration of blocker risk policy.All risk policies control blocker in system global scope
It is exactly global air control strategy configuration to be required for the risk control strategy met.And it is matched in single risk policy controls blocker
Risk control strategy be then blocker risk policy configuration.In addition to air control strategy configuration information itself, vulnerability database is also
The level and cascade connection of the configuration of risk control strategy can be stored.For meeting the transaction of strong consistency risk control flow, it is
System can inquire the corresponding risk control strategy of risk policy control blocker from vulnerability database, calculated for risk control and
Verification.In addition, meeting the transaction of strong consistency risk control flow, different risk policies can be also stored in vulnerability database
Corresponding accumulation business datum can carry out verification comparison when transaction carries out risk verification from data base querying relevant information, when
When transaction risk control is completed, relevant accumulation business datum can be also updated, is verified for the risk control of subsequent transaction.
Risk policy configuration module is to provide and custom-configures risk control strategy, custom-configures transaction and risk plan
The slightly functions such as control blocker matching relationship.When needing to configure new risk control strategy, or there is newly-increased transaction to need to configure
When it controls matching relationship of blocker with risk policy, user can by risk policy configuration module flexibly and effectively into
Row configuration.In addition to configuring air control strategy configuration information itself, risk policy configuration module can also configure risk control strategy
The level and cascade connection of configuration.
Risk policy controls blocking module, then is the nucleus module verified for risk control.This system is arranged risk and hands over
Easy type is strong consistency requirement, and the risk trade amount of money is M (such as ten thousand yuan of M=2).M is greater than or equal to for transaction amount
The transaction of (such as ten thousand yuan of m=2), and risk trade type is the transaction that strong consistency requires, risk policy controls blocking module
Match strong consistency risk control flow.The transaction less than m (such as ten thousand yuan of m=2) or risk trade type for transaction amount
For the transaction of high concurrent type, then risk policy control blocking module matches high concurrent risk control flow.It can in this system
Blocker is controlled to configure multiple and different risk policies, different transaction can then match different risk policy control and intercept
Device, and different risk policy control blockers can include then the configuration of different types of air control strategy.Risk policy control intercepts
Device is inquired risk control strategy from vulnerability database and is verified, if verification does not pass through, the transaction is intercepted.If
Verification passes through, then the transaction can execute.Risk control strategy accumulation business datum is write back in vulnerability database simultaneously.
Risk policy cache pool is then to cope with the risk control under high concurrent scene.For high concurrent risk control
Flow, risk control policy store is in risk policy cache pool.Risk policy cache pool includes that risk policy controls blocker
With deals match relationship allocating cache, risk control access vector cache, several parts such as business datum caching are accumulated in risk control.Number
According to being stored in risk policy cache pool, the efficiency of digital independent can be effectively improved.Also just because of in risk policy cache pool
Interior data reading performance using redundancy is high, and the calculating and verification of cache policy are carried out using risk policy cache pool, can effectively be solved
The dirty data problem merchandised in the case of high concurrent while be likely to occur when occurring, to ensure the effective of risk control strategy
Property.System is controlled from risk policy in blocker and deals match relationship allocating cache, inquires the risk policy of transaction configuration
Controller is searched if in risk policy controls blocker and the configuration of deals match relationship less than corresponding risk policy control
Blocker processed, system can then choose default risk policy control blocker, match global consumer's risk control strategy.Risk plan
Slightly control blocker is inquired risk control strategy from risk control access vector cache and is verified, should if verification does not pass through
Transaction is intercepted.If verification passes through, which can execute.In addition, risk policy buffer pool module also provides wind
The initialization in dangerous access vector cache pond, the persistence of risk policy cache pool, the recovery of the data of risk policy cache pool, risk policy
The functions such as the data of cache pool clear up automatically, the dynamic expansion of risk policy cache pool.
Fig. 4 then illustrates an example of risk policy control flow.As shown, in instances, being configured with one entirely
Office's air control strategy Y0- client blacklist and two blocker risk policy Y1- transaction Day Sum Limiteds, Y2- transaction Monthly Sum Limits.Entirely
Office's air control strategy Y0- client's blacklist indicates if transacting customer is in client breaks one's promise blacklist, the transaction is intercepted.It is real
The Y1- transaction Day Sum Limiteds being arranged in example are 20,000, then it represents that the transaction accumulated amount on the same day is no more than 20,000, the otherwise transaction quilt
It intercepts.The Y2- transaction Monthly Sum Limits being arranged in example are 200,000, then it represents that of that month transaction accumulated amount is no no more than 200,000
Then the transaction is intercepted.
In example, three risk policy control blockers are configured with, wherein air control blocker F0 is the air control of system default
Blocker changes air control blocker and has matched an air control strategy, i.e., global air control strategy Y0- client's blacklist.If in risk
It in policy control blocker and the configuration of deals match relationship, searches and controls blocker less than corresponding risk policy, system then can
Choose default risk policy control blocker F0.
Air control blocker F1 is configured with two blocker risk control strategies, is that Y1- merchandises Day Sum Limited as 20,000 Hes respectively
Y2- transaction Monthly Sum Limits are 200,000.And in the air control blocker, above-mentioned two air control strategies are series relationships, i.e. two risks
It is the matched relationship of sequence between strategy.Air control blocker F2 is then configured with a blocker risk control strategy, is that Y2- is handed over
Easy Monthly Sum Limit is 200,000.As requested, the two risk policy controllers are required for matching this global consumer's risk control plan
Slightly Y0- client's blacklist.
The T1 that merchandises is small amount order transaction, belongs to high frequency transaction, and this time turnover is 2000 yuan, and risk trade type checks
Module judges that the transaction should match high concurrent risk control flow.
System is controlled from risk policy in blocker and deals match relationship allocating cache, inquires the risk of transaction configuration
Strategy controller is F1.Air control blocker F1 carries out matching verification to global air control strategy Y0- client blacklist first, by looking into
The blacklist customer information in risk policy cache pool is ask, client corresponding with this transaction compares, and transacting customer is not in blacklist
In client, this air control policy check passes through.
Due to the Y1- transaction Day Sum Limiteds of air control blocker F1 configuration be 20,000 and Y2- transaction Monthly Sum Limits are 200,000 two block
It is series relationship to cut device air control strategy, then system carries out calculating verification to this two air control strategies successively.The transaction amount of money is
2000 yuan, system obtains the corresponding day of trade limits of air control strategy Y1 in the risk control access vector cache in risk policy cache pool
Volume is 20,000, while it is 3000 yuan to obtain T1 transaction-day accumulation transaction amount from risk control accumulation business datum caching, wind
Control blocker F1 calculates the T1 transaction-day accumulation transaction amount 3000 obtained in this transaction amount 2000+ business datums caching
=5000 are less than the corresponding transaction Day Sum Limiteds 20,000 of air control strategy Y1, then air control strategy Y1 verifications pass through.
Due to being series relationship, system then obtains air control in the risk control access vector cache in risk policy cache pool
The corresponding transaction Monthly Sum Limit of tactful Y2 is 200,000, and obtaining T1 transaction-moon accumulation from risk control accumulation business datum caching hands over
The easy amount of money is 100,000, and it is tired that air control blocker F1 calculates the T1 transaction-moon obtained in this transaction amount 2000+ business datums caching
Product transaction amount 100,000=10.2 ten thousand, is less than the corresponding transaction Monthly Sum Limits 200,000 of air control strategy Y2, then air control strategy Y2 verifications are logical
It crosses.
When the transaction is completed, system can write back to this transaction amount from risk control accumulation business datum caching
In.It is 5000 to update T1 transaction-day accumulation transaction amount, while it is 10.2 ten thousand to update T1 transaction-moon accumulation transaction amount.
The processing time of above-mentioned risk policy verification is less than 10ms.
Under special circumstances, upper transaction T1 is not yet completed, and system accesses a T1 ' transaction amount and is again at this time
16000 yuan, the data accumulation of the accumulation business datum caching of risk control at this time calculates and can wait in line, until upper one 5000 yuan
T1 transaction completed, and business datum caching in day accumulation turnover and the moon accumulation turnover update after, then with risk
Verification is compared in control strategy caching.
Data in risk policy cache pool can be in real time persisted in local disk file, delay machine occur in system exception
When, system can automatically read from local disk file and restore in data to risk policy cache pool.
Due to the out-of-service time provided with risk control strategy Y1 corresponding day accumulation turnover and moon accumulation turnover, it is
System can clear up the accumulation business datum of different risk control strategies the automatic expiration, to ensure the risk control stream in the next period
Journey it is accurate and effective.
Embodiment of above does not constitute the restriction to claims, same or analogous with present inventive concept
Embodiment is among protection scope of the present invention.
Claims (7)
1. a kind of air control strategy configuration flow in checking information system, it is characterised in that include the following steps:
(1) response backstage personnel operation, more new commodity self-information, affiliated category and category level;
(2) response backstage personnel operation, the channel of more new commodity, content provider, application high-level information, and " client is common
Purchase " additional information;And System Market information is updated, wherein System Market information includes pre- to system update marketing planning personnel
The concurrent transaction peak period t that trading volume and marketing planning personnel in the t times of survey are expected;
(3) commodity self-information, high-level information, additional information are shown to user according to the querying condition of user, hides market letter
Breath;
(4) response user clicks input, to user's displaying high-level information, the particular content of additional information;
(5) transaction request for responding user, opens the flow of marketing system risk control;
(6) judge the setting of Transaction Exposure Type and transaction amount threshold value m, the flow of risk of selection control is strong consistency risk
Control flow or high concurrent risk control flow;
Wherein strong consistency risk control flow includes:
(11) risk control policy store is in vulnerability database;Blocker and the configuration of deals match relationship are controlled from risk policy
In file, the risk policy control blocker F1 of transaction configuration is inquired;
(12) it if in risk policy controls blocker and the configuration of deals match relationship, searches less than corresponding risk policy control
Blocker processed, system can then choose default risk policy control blocker F0, match global consumer's risk control strategy Y0.
(13) risk policy control blocker inquires risk control strategy from vulnerability database, by transaction amount and risk control
Tactful Y1 is verified, if verification does not pass through, the transaction is intercepted.If verification passes through, which can hold
Row.Simultaneously by the accumulation business datum of risk control strategy Y1, write back in vulnerability database;
(14) it for risk control strategy Yn, is also verified in the manner described above, and by the accumulation industry of risk control strategy Yn
Business data, write back to vulnerability database.
(15) during this risk verifies, the subsequent block trade of default is lined up, and is waited pending;Hereafter, second wholesale
When transaction occurs, system can inquire the accumulation business datum in last transaction write back data library from vulnerability database, with risk
Matched risk control strategy Y1 is verified in database, if verification does not pass through, the transaction is intercepted, if verification
Pass through, then the transaction is normally carried out;
Wherein high concurrent risk control flow includes:
(21) risk control policy store is in risk policy cache pool;Risk policy cache pool includes:Risk policy control is blocked
Device and deals match relationship allocating cache module, risk control access vector cache module are cut, business datum caching is accumulated in risk control
Module;
(22) it is controlled in blocker and deals match relationship allocating cache from risk policy, inquires the risk policy of transaction configuration
Control blocker F2;
(23) if searched less than corresponding risk plan in risk policy controls blocker and deals match relationship allocating cache
Blocker is slightly controlled, system can then choose default risk policy control blocker F0, match global consumer's risk control strategy
Y0;
(24) risk policy control blocker inquires risk control strategy from risk control access vector cache, by transaction amount and wind
Dangerous control strategy is verified, if verification does not pass through, the transaction is intercepted;If verification passes through, which can
To execute.
(25) it by the accumulation business datum of risk control strategy, writes back in risk control access vector cache;Risk control at this time is tired
The data accumulation of product business datum caching can be waited in line.
2. air control strategy configuration flow as described in claim 1, it is characterised in that:M=a × M+b × W+c × D+d × H+e ×
L;Wherein a, b, c, d, e are weight coefficient;M is per list be averaged transaction amount of the upper January within the t times;W is upper one week in t
The interior transaction amount that is averaged per list;D is per list be averaged transaction amount of upper one day within the t times;H is previous hour in t
The interior transaction amount that is averaged per list;L is the trading volume in the t times of marketing planning personnel prediction;T is marketing planning personnel
It is expected that concurrent transaction peak period.
3. air control strategy configuration flow as described in claim 1, it is characterised in that:The a=0.08, b=0.12, c=
0.38, d=0.57, e=1.47.
4. air control strategy configuration flow as described in claim 1, it is characterised in that:Risk policy configuration is divided into two stage arrangement,
It is global air control strategy configuration and the configuration of blocker air control strategy respectively;Global air control strategy configuration refers to, in system overall situation model
It encloses interior all risk policy control blockers and is required for matched risk control strategy;Blocker risk policy configures, then refers to
The matched risk control strategy in single risk policy controls blocker.
5. air control strategy configuration flow as described in claim 1, it is characterised in that:Specific judgment method is in step (6):If
Transaction belongs to the transaction of strong consistency requirement type, and transaction amount threshold value is more than or equal to m, then can trigger strong consistency risk control
Flow processed;If the risk trade type of transaction, which is high concurrent type of transaction or transaction amount, is both less than m, high concurrent can be triggered
Risk control flow.
6. air control strategy configuration flow as described in claim 1, it is characterised in that:It further include the processing of risk policy buffer pool
Step:
(31) initialization of risk policy cache pool;
(32) it is synchronous that data are carried out between risk policy cache pool and local disk file;
(33) in risk policy caching pool server restarting, the data file of this disk preservation can be read automatically, and
Write data into risk policy cache pool;
(34) data of risk policy cache pool are cleared up.
7. a kind of air control strategy of air control strategy configuration flow realized described in the claims 1-6 configures system, feature
Be include:
Risk trade type checks module, for judging that risk trade type matches the mould of different risk control flows in turn
Block;The flow of risk control can be divided into strong consistency risk control flow and high concurrent risk control flow;Risk trade class
Type checks setting of the module according to risk trade type and transaction amount, matches different risk control flows;
Risk policy controls blocking module, is the nucleus module verified for risk control, including risk policy control blocker;
For judging whether transaction can continue according to the trading situation and risk policy of request, while risk control strategy being tired out
Product business datum writes back to vulnerability database;
Risk policy controls blocker, store transaction matching relationship configuration file is used for, for meeting strong consistency risk control
The transaction of flow, system can be controlled from risk policy in blocker and deals match relation configuration file, inquire transaction configuration
Risk policy control blocker;If in risk policy controls blocker and the configuration of deals match relationship, search less than right
The risk policy control blocker answered, system can then choose default risk policy control blocker and match global consumer's risk
Control strategy;
Vulnerability database provides risk control plan for storing risk control strategy configuration information to risk policy control blocking module
Slightly configuration information;
Risk policy configuration module is to provide and custom-configures risk control strategy, custom-configures transaction and risk policy control
Blocker matching relationship function processed;
Risk policy cache pool, including risk policy control blocker and deals match relationship allocating cache, risk control strategy
Business datum caching is accumulated in caching, risk control;For storing risk control strategy configuration information, mould is intercepted to risk policy control
Block provides risk control strategy configuration information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810376749.4A CN108596490A (en) | 2018-04-25 | 2018-04-25 | A kind of air control strategy configuration flow and system in checking information system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810376749.4A CN108596490A (en) | 2018-04-25 | 2018-04-25 | A kind of air control strategy configuration flow and system in checking information system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108596490A true CN108596490A (en) | 2018-09-28 |
Family
ID=63609609
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810376749.4A Pending CN108596490A (en) | 2018-04-25 | 2018-04-25 | A kind of air control strategy configuration flow and system in checking information system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108596490A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111142743A (en) * | 2019-12-04 | 2020-05-12 | 支付宝(杭州)信息技术有限公司 | Wind control strategy configuration method and device |
CN112465510A (en) * | 2020-11-11 | 2021-03-09 | 中金支付有限公司 | Online transaction malicious bill removal identification method and system |
CN112927076A (en) * | 2021-02-26 | 2021-06-08 | 深圳华锐金融技术股份有限公司 | Securities trading risk control method and device, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070050308A1 (en) * | 2003-03-06 | 2007-03-01 | Comptel Corporation | Method, means and a computer program product for setting rating |
CN102034181A (en) * | 2010-11-09 | 2011-04-27 | 深圳市爱贝信息技术有限公司 | User transaction frequency detection-based transaction security control method and device |
CN102194177A (en) * | 2011-05-13 | 2011-09-21 | 南京柯富锐软件科技有限公司 | System for risk control over online payment |
CN106504088A (en) * | 2015-09-07 | 2017-03-15 | 高庆文 | A kind of method and system that realizes quantifying transaction in removable computing device |
CN107316134A (en) * | 2017-06-16 | 2017-11-03 | 深圳乐信软件技术有限公司 | A kind of risk control method, device, server and storage medium |
CN107886431A (en) * | 2017-10-18 | 2018-04-06 | 上海瀚银信息技术有限公司 | Financial air control system based on big data and artificial intelligence |
-
2018
- 2018-04-25 CN CN201810376749.4A patent/CN108596490A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070050308A1 (en) * | 2003-03-06 | 2007-03-01 | Comptel Corporation | Method, means and a computer program product for setting rating |
CN102034181A (en) * | 2010-11-09 | 2011-04-27 | 深圳市爱贝信息技术有限公司 | User transaction frequency detection-based transaction security control method and device |
CN102194177A (en) * | 2011-05-13 | 2011-09-21 | 南京柯富锐软件科技有限公司 | System for risk control over online payment |
CN106504088A (en) * | 2015-09-07 | 2017-03-15 | 高庆文 | A kind of method and system that realizes quantifying transaction in removable computing device |
CN107316134A (en) * | 2017-06-16 | 2017-11-03 | 深圳乐信软件技术有限公司 | A kind of risk control method, device, server and storage medium |
CN107886431A (en) * | 2017-10-18 | 2018-04-06 | 上海瀚银信息技术有限公司 | Financial air control system based on big data and artificial intelligence |
Non-Patent Citations (1)
Title |
---|
胡佳: "移动支付技术:"增""减"策略各不同", 《中国无线电》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111142743A (en) * | 2019-12-04 | 2020-05-12 | 支付宝(杭州)信息技术有限公司 | Wind control strategy configuration method and device |
CN111142743B (en) * | 2019-12-04 | 2021-11-16 | 支付宝(杭州)信息技术有限公司 | Wind control strategy configuration method and device |
CN112465510A (en) * | 2020-11-11 | 2021-03-09 | 中金支付有限公司 | Online transaction malicious bill removal identification method and system |
CN112465510B (en) * | 2020-11-11 | 2023-09-26 | 中金支付有限公司 | Online transaction malicious form removal identification method and system |
CN112927076A (en) * | 2021-02-26 | 2021-06-08 | 深圳华锐金融技术股份有限公司 | Securities trading risk control method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Balcer et al. | Technological expectations and adoption of improved technology | |
US20070233597A1 (en) | Least cost network routing for electronic transactions | |
Petruzzi et al. | Information and inventory recourse for a two-market, price-setting retailer | |
CN107103548A (en) | The monitoring method and system and risk monitoring and control method and system of network behavior data | |
US20160267509A1 (en) | Automated rules-based pricing | |
US11727352B2 (en) | Predictive financial, inventory and staffing management system | |
CN108596490A (en) | A kind of air control strategy configuration flow and system in checking information system | |
JP2010529535A5 (en) | ||
US20220391830A1 (en) | System and method for advanced inventory management using deep neural networks | |
CN112131305A (en) | Account processing system | |
WO2022132325A1 (en) | Systems and methods for hard deletion of data across systems | |
US20070083521A1 (en) | Routing requests based on synchronization levels | |
CN101122982A (en) | Method and system for controlling commodity sales state in electronic business | |
JP6556969B1 (en) | Sales support device and sales partner list creation device | |
CN110490714A (en) | A kind of Gross Profit from Sales real time updating method and system | |
JP2023162397A (en) | Business support device | |
US20060047560A1 (en) | Methods and systems for integrated market account planning | |
WO2005022309A2 (en) | Manufacturing units of an item in response to demand for the item projected from page-view date | |
CN108765108A (en) | A kind of financial data system and method under industry wealth integration | |
Lin et al. | The cash flows in push and pull supply chains under supply disruptions | |
JP6560477B1 (en) | Sales support device and sales partner list creation device | |
US20140156436A1 (en) | System and Method for Product Deployment and Management | |
KR102639198B1 (en) | Method and system for providing virtual asset trading and investment strategy recommendation services | |
KR102584808B1 (en) | Systems and methods for converting, utilizing, arbitrating, and creating value unit applications for trading instruments | |
JP6936458B1 (en) | Sales support device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180928 |