CN108596490A - A kind of air control strategy configuration flow and system in checking information system - Google Patents

A kind of air control strategy configuration flow and system in checking information system Download PDF

Info

Publication number
CN108596490A
CN108596490A CN201810376749.4A CN201810376749A CN108596490A CN 108596490 A CN108596490 A CN 108596490A CN 201810376749 A CN201810376749 A CN 201810376749A CN 108596490 A CN108596490 A CN 108596490A
Authority
CN
China
Prior art keywords
risk
control
transaction
policy
blocker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810376749.4A
Other languages
Chinese (zh)
Inventor
沈立涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING SILVER SHELL TECHNOLOGY Co Ltd
Original Assignee
BEIJING SILVER SHELL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING SILVER SHELL TECHNOLOGY Co Ltd filed Critical BEIJING SILVER SHELL TECHNOLOGY Co Ltd
Priority to CN201810376749.4A priority Critical patent/CN108596490A/en
Publication of CN108596490A publication Critical patent/CN108596490A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A kind of air control strategy configuration flow in checking information system includes the following steps:(1) backstage personnel safeguard commodity self-information, high-level information, additional information, market information;(2) transaction request for responding user, opens the flow of marketing system risk control;(3) judge the setting of Transaction Exposure Type and transaction amount threshold value m, the flow of risk of selection control is strong consistency risk control flow or high concurrent risk control flow.

Description

A kind of air control strategy configuration flow and system in checking information system
Technical field
The invention belongs to information technology field, the risk policy configuration especially belonged under checking information system is led with management and control Domain.
Background technology
The currently query function in selling checking information system, the Data Structure Design of generally use list table, by setting The simple querying condition such as trade name, goods number is set, related trade company sales letter is inquired from trade company's sales information database Breath, and user is presented to by way of front-end interface.Traditional sales information inquiry often there are problems that in this way, 1, sell It sells information and shows in the form of a single, show deficiency especially for commodity category level and its relationship between superior and subordinate.2, product is sold Information shows that dimension is simple, can only generally show some conventional informations (such as ProductName, price etc.) of commodity itself, can not From channel, content provider, using etc. carry out various dimensions information displaying safeguard, be not suitable with the requirement of current internet development.
In addition, after the information displaying for using a variety of dimensions, a large amount of client's stream is brought, while producing one newly The problem of:Client trading amount increases, and especially concurrent transaction increases.This is the unique skill that new inquiry, exhibition method are brought Art problem.At present there are also risk control function is increased in sale information system, usually according to the risk of user configuration Tactful (such as trading limit), by the way that transaction business data (such as turnover) are calculated and are matched with risk policy, with Achieve the purpose that control merchandise sales risk.The risk policy and transaction business of system accumulate data, typically store In the database, by reading transaction business data from database, it is calculated, and is verified with risk policy, is completed Corresponding risk control.Such processing mode has certain benefit for effective prevention and control transaction risk, but with online trading Scene becomes increasingly abundant, and the quantity of on-line selling transaction sharply increases, and requirement of the user for customer experience improves further, tradition Scheme can bring problems with:1, it since risk inspection needs to carry out correlation data calculation and storage, generally at least needs to consume The time for taking 100ms or more to increase the disposed of in its entirety time entirely merchandised, and then affects client trading experience.2、 Since off-line transaction amount dramatically increases, the concurrent request exponentially grade of backend sales information is improved, it is old based on data Library carries out the pattern of risk control, it is difficult to which the data undertaken under such large concurrent calculate, in fact it could happen that dirty data problem, in turn Risk control is caused to be failed.For example, it is 1000 yuan that the risk policy of current system configuration, which is day accumulation trading limit, a transaction Consumption is 500 yuan, and another transaction consumption is 600 yuan, if two transactions are priorities, when the first transaction occurs, and day Accumulation turnover is 0+500=500, is less than day accumulation limit 1000, then the transaction is normally carried out.Second transaction occurs When, upper one turnover 500 adds this transaction amount, and it is 500+600=1100 to accumulate turnover day, then can be due to being more than day Trading limit is accumulated, and triggers risk management and control.But if two transactions occur (while herein referring to, not only absolutely simultaneously While in meaning, as long as the transaction that occurred at intervals less than 100ms under this scene, it is believed that be simultaneously), it is passing at this time Under system pattern, when the first transaction occurs, it is 0+500=500 to accumulate turnover day, is less than day accumulation limit 1000, then the pen Transaction is normally carried out.When second transaction occurs, do not completed also since the risk limitation of previous pen calculates, Day Trading at this moment is tired Product value is still calculated since 0, and aggregate-value of merchandising at this time is 0+600=600, similarly less than day accumulation limit 1000, then and second Transaction can be also normally carried out, and will not trigger risk control, so as to cause the failure of risk control strategy.3, tradition is based on number According to the risk control of library mode due to the limitation of database, the dynamic expansion of cluster can not be carried out.When magnanimity, which is merchandised, to be occurred, clothes The system resource accounting of business device can rapidly increase moment, and the occupancy of system resource is excessively high, and the processing time of transaction can be caused to prolong It is long, the serious delay machine that can lead to business transaction system, and then influence the stability of transaction system.4, existing risk policy is matched System is set, is all often the independent risk policy of each Self Matching, air control is to the rule risk policy development sequence school when verifying It tests.There is no hierarchical relationship between risk policy, without cascade connection, cannot be satisfied diversified air control strategy configuration needs.5、 Excessively high safety setting can influence convenience of merchandising, but be arranged that too low there are great risks.
Invention content
Technical scheme of the present invention
To solve the problems, such as that above-mentioned safety and convenience and other are not referred to above-mentioned simultaneously, but it is real in the present invention The technical issues of matter is recorded, spy propose the present invention, including:
A kind of air control strategy configuration flow in self-service query sale information system includes the following steps:
(1) backstage personnel safeguard commodity self-information, affiliated category and category level;
(2) backstage personnel safeguard the channels of commodity, content provider, application high-level information, and " client buys jointly " Additional information;And maintenance system market information, include the trading volume into the t times that system update marketing planning personnel predict, And the concurrent transaction peak period t that marketing planning personnel are estimated;
(3) commodity self-information, high-level information, additional information are shown to user according to the querying condition of user, hides city Field information;
(4) response user clicks input, to user's displaying high-level information, the particular content of additional information;
(5) transaction request for responding user, opens the flow of marketing system risk control;
(6) judge the setting of Transaction Exposure Type and transaction amount threshold value m, the flow of risk of selection control is strong consistency Risk control flow or high concurrent risk control flow;
Wherein strong consistency risk control flow includes:
(11) risk control policy store is in vulnerability database;Blocker and deals match relationship are controlled from risk policy In configuration file, the risk policy control blocker F1 of transaction configuration is inquired;
(12) it if in risk policy controls blocker and the configuration of deals match relationship, searches less than corresponding risk plan Blocker is slightly controlled, system can then choose default risk policy control blocker F0, match global consumer's risk control strategy Y0。
(13) risk policy control blocker inquires risk control strategy from vulnerability database, by transaction amount and risk Control strategy Y1 is verified, if verification does not pass through, the transaction is intercepted.If verification passes through, which can To execute.Simultaneously by the accumulation business datum of risk control strategy Y1, write back in vulnerability database;
(14) it for risk control strategy Yn, is also verified in the manner described above, and tiring out risk control strategy Yn Product business datum, writes back to vulnerability database.
(15) during this risk verifies, the subsequent block trade of default is lined up, and is waited pending;Hereafter, second When block trade occurs, system can inquire the accumulation business datum in last transaction write back data library from vulnerability database, with Matched risk control strategy Y1 is verified in vulnerability database, if verification does not pass through, the transaction is intercepted, if Verification passes through, then the transaction is normally carried out;
Wherein high concurrent risk control flow includes:
(21) risk control policy store is in risk policy cache pool;Risk policy cache pool includes:Risk policy control Business datum is accumulated in blocker and deals match relationship allocating cache module processed, risk control access vector cache module, risk control Cache module;
(22) it is controlled in blocker and deals match relationship allocating cache from risk policy, inquires the risk of transaction configuration Policy control blocker F2;
(23) if searched less than corresponding wind in risk policy controls blocker and deals match relationship allocating cache Dangerous policy control blocker, system can then choose default risk policy control blocker F0, match global consumer's risk control Tactful Y0;
(24) risk policy control blocker inquires risk control strategy from risk control access vector cache, by transaction amount It is verified with risk control strategy, if verification does not pass through, the transaction is intercepted;If verification passes through, which hands over It can easily execute.
(25) it by the accumulation business datum of risk control strategy, writes back in risk control access vector cache;Risk control at this time The data accumulation of system accumulation business datum caching can be waited in line.
Further, m=a × M+b × W+c × D+d × H+e × L;Wherein a, b, c, d, e are weight coefficient;M is upper January The transaction amount that is averaged per list within the t times;W is the upper one week transaction amount that is averaged per list within the t times;D is upper one day in t The transaction amount that is averaged per list in time;H is per list be averaged transaction amount of the previous hour within the t times;L is marketing planning Trading volume in the t times of personnel's prediction;T is the estimated concurrent transaction peak period of marketing planning personnel.
Further, a=0.08, b=0.12, c=0.38, d=0.57, e=1.47.
Further, risk policy configuration is divided into two stage arrangement, is global air control strategy configuration and blocker air control plan respectively Slightly configure;Global air control strategy configuration refers to that all risk policy control blockers are required for matching in system global scope Risk control strategy;Blocker risk policy configures, then refers to the matched risk in single risk policy controls blocker Control strategy.
Further, specific judgment method is in step (6):If transaction belongs to the transaction of strong consistency requirement type, and hands over Easy amount of money threshold value is more than or equal to m, then can trigger strong consistency risk control flow;If the risk trade type of transaction is high concurrent Type of transaction or transaction amount are both less than m, then can trigger high concurrent risk control flow.
Further, further include the processing step of risk policy buffer pool:
(31) initialization of risk policy cache pool;
(32) it is synchronous that data are carried out between risk policy cache pool and local disk file;
(33) in risk policy caching pool server restarting, the data text of this disk preservation can be read automatically Part, and write data into risk policy cache pool;
(34) data of risk policy cache pool are cleared up.
A kind of air control strategy configuration system for realizing above-mentioned air control strategy configuration flow, including:
Risk trade type checks module, for judging risk trade type and then matching different risk control flows Module;The flow of risk control can be divided into strong consistency risk control flow and high concurrent risk control flow;Risk trade Type checks setting of the module according to risk trade type and transaction amount, matches different risk control flows;
Risk policy controls blocking module, is nucleus module verify for risk control, including risk policy is controlled and blocked Cut device;For judging whether transaction can continue according to the trading situation and risk policy of request, while by risk control Strategy accumulation business datum writes back to vulnerability database;
Risk policy controls blocker, store transaction matching relationship configuration file is used for, for meeting strong consistency risk The transaction of control flow, system can be controlled from risk policy in blocker and deals match relation configuration file, inquire the transaction The risk policy of configuration controls blocker;If in risk policy controls blocker and the configuration of deals match relationship, search not Blocker is controlled to corresponding risk policy, system can then choose default risk policy control blocker and match global user Risk control strategy;
Vulnerability database provides risk for storing risk control strategy configuration information to risk policy control blocking module The tactful configuration information of control;
Risk policy configuration module is to provide and custom-configures risk control strategy, custom-configures transaction and risk plan Slightly control blocker matching relationship function;
Risk policy cache pool, including risk policy control blocker and deals match relationship allocating cache, risk control Business datum caching is accumulated in access vector cache, risk control;For storing risk control strategy configuration information, blocked to risk policy control It cuts module and risk control strategy configuration information is provided.
The inventive point of the present invention:
(1) multidimensional information displaying is increased in traditional marketing system.
(2) risk policy and transaction business accumulation data are stored in database in legacy system, and the present invention is for the first time It proposes risk policy cache pool, and startup application risk access vector cache pond is chosen whether according to transaction characteristics.
(3) according to marketing system the characteristics of, further devises the persistence of risk policy cache pool, recovery, cleaning, expansion Modules and the flows such as exhibition,
(4) system can adjust the flow of risk of selection control as strong consistency risk control flow or height using automatic dynamic Whether coincidence risk control flow starts risk policy cache pool, take into account safety and facility.
(5) risk policy configuration has been innovated, the global air control strategy configuration for more adapting to marketing system is increased and has been intercepted The multilevel mode of device air control strategy configuration.
It these are only limited list, the preferred embodiment described in the embodiment of the present invention, and it is explicitly described as this The scheme of invention inventive point similarly solves the technical problem in traditional technology, and the inventive point of the present invention.
The technique effect that the present invention reaches
(1) merchandise news can be neatly provided, customer transaction wish can be especially increased.
(2) it is innovatively provided with risk policy cache pool, and proposes the dynamic select side of different risk control flows High concurrent transaction, compromise between security and transaction convenience can be setup flexibly in method.
(3) the multistage air control configuration mode for more adapting to commodity sale system is provided, transaction security is further improved Property and transaction convenience.
(4) it is innovatively provided with the mode of operation of risk policy cache pool, improves the safety of system to work long hours Property and robustness.
Description of the drawings
Fig. 1 is that self-service query sales information configures system process chart with air control strategy.
Fig. 2 is self-service query sales information illustrative view of functional configuration.
Fig. 3 is risk policy control function structural schematic diagram.
Fig. 4 is that risk policy controls example schematic.
Specific implementation mode
The information inquiry of various dimensions sale information system and risk control method, as shown in Figure 1, including the following steps:
(S1) backstage personnel safeguard commodity self-information, affiliated category and category level.For example, commodity are notebook electricity Brain, including commodity self-information include price, brand, processor parameter, parameters of video card, screen size etc..Affiliated category is Personal electric product, category level are C1.Correspondingly, the product of same category level is electronic product, such as mobile phone, tablet Computer, digital camera etc..Corresponding higher level's category level is C0, for example higher level's category is to sell product to private.Corresponding subordinate Category level is C2, for example subordinate's category is electronic notebook this product.
(S2) backstage personnel safeguard the channels of commodity, content provider, using etc. various dimensions information.Channel includes electronics canal Channel, partner's channel etc. under road, line.Content provider, includes sale advertising for the commodity, emotional story, such as The advertisement of the notebook of certain platform publication, the notebook correlation emotional story etc. that online friend shares.Have using being then the commodity The APP applications of the correlation such as application software of pass or APP etc., such as the sale of commodity electric business, maintenance platform, user's customer service.After meanwhile Platform personnel can establish the information of " client buys jointly ".It is required simultaneously according to backstage risk control, backstage personnel's maintenance system Market information includes that trading volume into the t times that system update marketing planning personnel predict and marketing planning personnel are estimated Concurrent transaction peak period t.
(S3) user is used as input condition, such as user with certain brand by inputting the conditions such as name of firm, Merchant Category Laptop as input condition, the sales information of commodity various dimensions can be obtained.Various dimensions sales information is in addition to showing Other than the general properties information such as commodity price, brand, it can also recommend to show higher level's category information of the commodity, subordinate's category information Etc. associated merchandise news, at the same show the relevant channel of the commodity, content provider, using etc. relevant Info Link. And it can show the information of the commodity " client buys jointly ".
(S4) user can then show such as the Commdity advertisement video, online friend and share the commodity by clicking relevant link Relevant stories and the commodity relative application software introduction and download link etc..Effectively enrich the information inquiry dimension of the commodity Degree, and the marketing of the commodity ecosphere is extended whereby.Showing for trade company takes the mode of word or picture mostly at present, only shows this Some relevant static informations of commodity.The present invention program is supplied using the ecosphere information of commodity as multiple dimensions of merchandise news User's queried access, and by these information dimensions, it is supplied to user more comprehensively, more dynamical more has the merchandise news exhibition of temperature Show.It this part should be as the inventive point of the present invention program.And in the page of " client buys jointly ", can show with User is identical to have purchase intention, prepares other clients of payment, improves the purchase intention of client.But it also brings simultaneously The big problem of concurrent transaction amount.Therefore it needs to carry out special risk control flow.
(S5) after the commodity that user's selection is admired place an order, then the flow of marketing system risk control is opened.
(S6) it is first depending on the setting of risk trade type and transaction amount, the flow of risk control can be divided into strongly consistent Property risk control flow and high concurrent risk control flow.This system setting strong consistency risk control flow the condition that checks be Risk trade type is strong consistency requirement, and the risk trade amount of money is more than m.It is greater than or equal to the friendship of m for transaction amount Easily, and risk trade type is that the transaction that strong consistency requires (such as is related to the transaction of combination clearance class, for example commodity are handed over Easily, other than paying in cash, also part discount coupon and integral deducts, and such transaction relates to cash, discount coupon, integral etc. Combination clearance, belong to the transaction of strong consistency requirement.) risk control system matching strong consistency risk control flow.Although Strongly consistent risk control improves the safety of payment, but can influence payment speed, it is therefore desirable to optimize threshold value m, ensure to take into account Safety and customer experience.It (calculates according to computation model simulation and real system test and the process of test includes passing through place Manage device and acquire transaction data, rudimentary model is established, according to transaction data model of fit, more new model), the present invention proposes as follows Formula:
M=a × M+b × W+c × D+d × H+e × L.
Wherein a, b, c, d, e are weight coefficient;M is per list be averaged transaction amount of the upper January within the t times;W is upper one Week within the t times per single transaction amount that is averaged;D is per list be averaged transaction amount of upper one day within the t times;H is previous small When within the t times per single transaction amount that is averaged;L is the trading volume in the t times of marketing planning personnel prediction;T is market The estimated concurrent transaction peak period of project staff.According to actual test, a=0.08, b=0.12, c=0.38, d= 0.57, e=1.47.System can dynamically adjust threshold value m as a result, and to compromise between security and convenience, this is also the present invention One of inventive point.If only considering historical data, may cause not in full conformity with this market sale situation, if only examined Consider this market sale expection, due to the prediction of expected only marketing personal, is also differed with truth.If therefore can incite somebody to action Historical data is combined with predicted data, then more accurate to threshold definitions.But which historical data and predicted data are used, with And their weight, then it needs to be determined repeatedly according to mass data and experiment, it could sophisticated model.
Correspondingly, the condition that checks of this system setting high concurrent risk control flow be risk trade type is high concurrent class Type or transaction amount are less than m (such as ten thousand yuan of m=2), i.e., the transaction for transaction amount less than m (such as ten thousand yuan of m=2) or Risk trade type be high concurrent type transaction (transaction of high concurrent type be often single channel initiation be not related to combine Clearance, while the big transaction of concurrent request amount again, such as the transaction etc. of swiping the card initiated of a pos machine), then risk control system Match high concurrent risk control flow.
(S7) except risk control flow, also risk policy configuration additional flow.In the present invention, risk policy Configuration information is divided into two stage arrangement, is global air control strategy configuration and the configuration of blocker air control strategy respectively.Global air control strategy Configuration refers to, all risk policies control blockers are required for matched risk control strategy in system global scope, such as There are two risk policies to control blocker F1, F2 in current system, then the two risk policy controllers are required for matching this Global consumer's risk control strategy Y0.Blocker risk policy configure, then refer to single risk policy control blocker in The risk control strategy matched.For example, system configuration two blocker air control strategies Y1 and Y2.Risk policy control can then be configured Blocker F1 processed matches Y1, Y2, and configures risk policy control blocker F2 and only match Y1.May be used also between blocker air control strategy To configure series or parallel relationship, so-called series connection refer to two air control strategies between be the matched relationship of sequence.Such as wind Dangerous policy control blocker F1 matches Y1, this two air control strategies of Y2, if configuration Y1, Y2 are series connection, risk policy control is blocked It cuts device F1 to need first to match Y1, then matches Y2, only Y1 matching verifications pass through, then remove matching verification Y2;Opposite, if configuration Y1, Y2 are parallel connection, risk policy control blocker F1 then can PARALLEL MATCHING Y1 and Y2 simultaneously, if two strategies have one Pass through with verification, then blocker verification passes through.Furthermore, it is possible to which the matching for configuring risk policy control blocker and transaction is closed System, such as transaction T1 need to match risk policy control blocker F1, and the T2 that merchandises needs to match risk policy control blocker F2.Existing risk policy configures system, is all often the independent risk policy of each Self Matching, the present invention provides risk controls The level of strategy configuration and cascade connection, the configuration of risk control strategy are more flexible and effective, it should as the present invention program An inventive point.
(S8) for strong consistency risk control flow, risk control policy store is in vulnerability database.For example, transaction T1 belongs to the transaction of strong consistency requirement type, and transaction amount has been more than M (such as ten thousand yuan of M=2), then systematic risk controlling meeting Trigger strong consistency risk control flow.
(S9) system is controlled from risk policy in blocker and deals match relation configuration file first, is inquired the transaction and is matched The risk policy controller (for example it is risk policy control blocker F1 that the transaction T1 that configures before this is matched) set.
(S10) it if in risk policy controls blocker and the configuration of deals match relationship, searches less than corresponding risk Policy control blocker, system can then choose default risk policy control blocker F0, match global consumer's risk and control plan Slightly Y0.
(S11) risk policy control blocker inquires risk control strategy (for example, risk control plan from vulnerability database Slightly Y1 and Y2), transaction amount and risk control strategy Y1 (such as day maximum trading limit) are verified, if verification is obstructed It crosses, then the transaction is intercepted.If verification passes through, which can execute.Simultaneously by the tired of risk control strategy Y1 Product business datum (for example day accumulates turnover), writes back in vulnerability database.
(S12) it likewise, for risk control strategy Y2, is also verified in the manner described above, and by risk control plan The slightly accumulation business datum (such as moon accumulation turnover) of Y2, writes back to vulnerability database.And so on, until Yn.
(S13) during this risk verifies, subsequent block trade will be waited in line to handle in system, to avoid The problem of risk policy failure concurrently brought.Hereafter, when second block trade occurs, system can be from vulnerability database Inquire the generation of accumulation business datum (such as day accumulation turnover)+this current transaction in last transaction write back data library Matched risk control strategy Y1 (such as day maximum trading limit) is verified in volume, with vulnerability database, if verification is not Pass through, then the transaction is intercepted, if verification passes through, which is normally carried out.
(S14) for high concurrent risk control flow, risk control policy store is in risk policy cache pool.For example, The risk trade type of T2 of merchandising is high concurrent type of transaction, and generally these types of transaction amount is both less than M (such as M=2 Ten thousand yuan), then systematic risk controlling can trigger high concurrent risk control flow.
(S15) risk policy cache pool includes that risk policy controls blocker and deals match relationship allocating cache, risk Control strategy caches, and several parts such as business datum caching are accumulated in risk control.Data are stored in risk policy cache pool, energy Effectively improve the efficiency of digital independent.For example, primary data cached reading, time loss are less than 1ms, are cached using risk policy The processing time of pond progress risk policy control, which adds up, does not exceed 10ms, is taken compared to database processing risk policy For 100ms, improved efficiency is more than 10 times.Also quickly just because of the data manipulation in risk policy cache pool, general low In 1ms, the calculating and verification of cache policy are carried out using risk policy cache pool, can effectively be solved in high concurrent, The dirty data merchandised while occurred when occurring, to ensure risk control strategy validity.Example described earlier, such as The risk policy of current system configuration is that day accumulation trading limit is 1000 yuan, and transaction consumption is 500 yuan, another transaction Consumption is 600 yuan, and in high concurrent, this two transaction may occur simultaneously, at this point, when the first transaction occurs, day Accumulation turnover is 0+500=500, is less than day accumulation limit 1000, then the transaction is normally carried out.Second transaction occurs When, due to the efficient and instantaneous completion of caching, then the risk limitation calculating of previous pen was completed already under normal circumstances.At this moment Day Trading accumulated value be updated to 500, aggregate-value of merchandising at this time is 500+600=1100, is more than day accumulation limit 1000, That is the second transaction triggers risk control strategy, and transaction terminates.Even if in extreme circumstances, a upper transaction is not yet completed, The data accumulation of the accumulation business datum caching of risk control at this time can be waited in line, until upper one 500 yuan of transaction have counted Verification is compared to after day accumulation turnover, then with the daily trading limit then in risk control access vector cache.Thus avoid The dirty data merchandised under big complications in traditional scheme while occurred when occurring, to having ensured risk control strategy Validity.It this part should be as the inventive point of the present invention program.
(S16) system is controlled from risk policy in blocker and deals match relationship allocating cache first, inquires the transaction The risk policy controller (for example it is risk policy control blocker F2 that the transaction T2 that configures before this is matched) of configuration.
(S17) if searched less than corresponding wind in risk policy controls blocker and deals match relationship allocating cache Dangerous policy control blocker, system can then choose default risk policy control blocker F0, match global consumer's risk control Tactful Y0.
(S18) risk policy control blocker inquires risk control strategy (for example, risk from risk control access vector cache Control strategy Y2), transaction amount and risk control strategy Y2 (such as moon maximum trading limit) are verified, if verification is not Pass through, then the transaction is intercepted.If verification passes through, which can execute.
(S19) while by the accumulation business datum of risk control strategy Y2 (such as moon accumulation turnover), risk is write back to In control strategy caching.The data accumulation of the accumulation business datum caching of risk control at this time can be waited in line, simultaneously to avoid transaction The problem of risk policy failure that business datum when hair in risk control accumulation business datum caching is inaccurate and brings.With this Analogize, until Yn.
It is additional, the processing in relation to risk policy buffer pool, including following sub-process,
(S20) initialization of risk policy cache pool.System controls blocker from risk policy and deals match relationship is matched It sets and reads risk policy control blocker and deals match relationship in file and be loaded into risk policy control blocker and transaction In matching relationship allocating cache.System reads risk control policy data from vulnerability database, and is loaded into risk control plan In slightly caching.The accumulation business datum of different risk control strategies is initialised to risk control accumulation business datum caching by system In.
(S21) persistence of risk policy cache pool.Based on risk policy cache pool, risk control can be greatly improved Efficiency.But when in extreme circumstances, there is abnormal delay machine in the machine of risk policy cache pool, the data in risk policy cache pool It can lose extremely, to influence the overall flow of risk control.The present invention program is in risk policy cache pool and local disk text Data persistence synchronization mechanism is established between part, that is, the number for taking mode either synchronously or asynchronously to store risk policy cache pool According to being persisted in the data file of local disk in real time.The case where system can be according to resource load, automatic progress data are same The conversion of step mode.System monitors loading condition (referring mainly to CPU, memory, IO) automatically, when system to be supported on 50% below In the case of, risk policy cache pool takes synchronous mode that data are synchronized in disk file in real time.And when system load is super When 50%, then system can then be switched to asynchronous system and carry out data synchronization.Alternately implement according to system load in this way it is synchronous and The mode of asynchronous data backup, can synchronize the influence to on-line transaction, the ability of lifting system trading processing reaches to avoid data 50% or more.Thus it is possible to prevente effectively from risk policy cache pool loss of data is asked caused by delay machine in abnormal cases Topic, this part should be as the inventive point of the present invention program.
(S22) data of risk policy cache pool are restored.After the machine exception delay machine of risk policy cache pool, due to wind The persistence mechanism in dangerous access vector cache pond, complete data can be persisted in the data file of this disk.In risk plan When slightly caching pool server restarts, system can read the data file of this disk preservation automatically, and write data into Risk policy cache pool, the automaticdata to reach risk policy cache pool restore, this is also one of the inventive point of the present invention.
(S23) data scrubbing of risk policy cache pool.In general, risk policy control blocker and deals match close It is allocating cache, with risk control access vector cache, it is to control blocker and friendship from risk policy that this two-part data, which is one, It reads and loads in easy matching relationship configuration file, the other is reading risk control policy data from vulnerability database and filling It carries.This two-part data is to be based on user configuration, and data volume is little, and seldom changes.But it is deposited in risk policy cache pool The accumulation business datum for putting different risk control strategies is then the generation with transaction, frequent updating.Such as risk control plan Slightly Y1 corresponding day accumulation turnovers and the risk control strategy Y2 corresponding moons accumulate turnover, then real-time update and can need clear Reason.For example the same day calculates the turnover of accumulation, needs to clear up before tomorrow, day cut.This month, calculates the turnover of accumulation, under It needs to clear up before cutting month in and month out.The present invention program configures different wind for the accumulation business datum of different risk control strategies The out-of-service time of dangerous data.For example the out-of-service time of the corresponding day accumulation data cached configurations of turnover of risk control strategy Y1 is 1 day, and the out-of-service time of the corresponding moon accumulation data cached configurations of turnover of risk control strategy Y2 can then remove of that month number of days+1. System can clear up the accumulation business datum of different risk control strategies the automatic expiration in this way, to ensure the risk in the next period Control flow it is accurate and effective, this is also one of the inventive point of the present invention.
(S24) extension of risk policy cache pool.Under normal circumstances, risk policy cache pool can successfully manage concurrent transaction Under risk control.But in special deal day, when magnanimity transaction occurs parallel, the system resource accounting of server can increase moment The occupancy of height, system resource is excessively high, and the processing time of transaction can be caused to extend, serious to lead to delaying for business transaction system Machine, and then influence the stability of transaction system.At this moment according to the characteristic extending transversely of risk policy cache pool, strategy can be increased Pool server is cached, and configures cluster address and starts, newly-increased access vector cache server can be automatically added to cache policy In cache pool cluster.The system processing power of risk policy cache pool after extending transversely can be at double promotion, this is also this One of inventive point of invention.
Based on the risk policy configuration flow method in above-mentioned self-service query marketing system, in self-service query marketing system Risk policy configuration system structural framing such as Fig. 2, shown in Fig. 3, the risk policy control system is by computer hardware It is realized jointly with program therein.
Fig. 2 illustrates self-service query sales information functional structure chart.It is broadly divided into merchandise news maintenance module, merchandise news Three modules such as self-service query module and various dimensions merchandise news memory module.The main running background of merchandise news maintenance module Administrative staff use.Backstage personnel can safeguard the basic informations such as commodity price, brand, institute by merchandise news maintenance module Belong to category, the commodity category information such as category level.Backstage personnel can also safeguard commodity by merchant information maintenance module simultaneously Channel, content provider, using etc. various dimensions information.Merchandise news self-service query module, then being available to user can be certainly Help the function of inquiring and browsing merchandise sales information.User is used as input by conditions such as name of firm, Merchant Categories, inquires commodity Various dimensions information.In addition to showing the general properties such as the commodity price, brand, it can also recommend the higher level's category for showing the commodity The associated merchandise newss such as information, subordinate's category information.Show the relevant channel of the commodity, content provider, application simultaneously Etc. relevant Info Link.User can then show such as the Commdity advertisement video, online friend and share this by clicking relevant link Commodity relevant stories and the commodity relative application software introduction and download link etc., which effectively enriches the letter of commodity Breath inquiry dimension, and the marketing of the commodity ecosphere is extended whereby.Various dimensions merchandise news module is then for storing commodity basis The data such as information, commodity category information, commodity channel information, content provider information, application message, after above-mentioned data are supplied to Platform personnel safeguard, are also provided to user self-help inquiry.
Fig. 3 illustrates risk policy control function structure chart.
Risk trade type checks module, is for judging risk trade type and then matching different risk control flows Module.The flow of risk control can be divided into strong consistency risk control flow and high concurrent risk control flow.Risk is handed over Easy type checks setting of the module according to risk trade type and transaction amount, matches different risk control flows.
Risk policy controls blocker and deals match relation configuration file, is controlled for store transaction and risk policy The file of blocker matching relationship.For meeting the transaction of strong consistency risk control flow, system can be controlled from risk policy In blocker and deals match relation configuration file, the risk policy control blocker of transaction configuration is inquired.If in risk It in policy control blocker and the configuration of deals match relationship, searches and controls blocker less than corresponding risk policy, system then can It chooses default risk policy control blocker and matches global consumer's risk control strategy.
Vulnerability database is for storing air control strategy configuration information.Risk policy configuration information is divided into two-layer configuration, respectively It is global air control strategy configuration and the configuration of blocker risk policy.All risk policies control blocker in system global scope It is exactly global air control strategy configuration to be required for the risk control strategy met.And it is matched in single risk policy controls blocker Risk control strategy be then blocker risk policy configuration.In addition to air control strategy configuration information itself, vulnerability database is also The level and cascade connection of the configuration of risk control strategy can be stored.For meeting the transaction of strong consistency risk control flow, it is System can inquire the corresponding risk control strategy of risk policy control blocker from vulnerability database, calculated for risk control and Verification.In addition, meeting the transaction of strong consistency risk control flow, different risk policies can be also stored in vulnerability database Corresponding accumulation business datum can carry out verification comparison when transaction carries out risk verification from data base querying relevant information, when When transaction risk control is completed, relevant accumulation business datum can be also updated, is verified for the risk control of subsequent transaction.
Risk policy configuration module is to provide and custom-configures risk control strategy, custom-configures transaction and risk plan The slightly functions such as control blocker matching relationship.When needing to configure new risk control strategy, or there is newly-increased transaction to need to configure When it controls matching relationship of blocker with risk policy, user can by risk policy configuration module flexibly and effectively into Row configuration.In addition to configuring air control strategy configuration information itself, risk policy configuration module can also configure risk control strategy The level and cascade connection of configuration.
Risk policy controls blocking module, then is the nucleus module verified for risk control.This system is arranged risk and hands over Easy type is strong consistency requirement, and the risk trade amount of money is M (such as ten thousand yuan of M=2).M is greater than or equal to for transaction amount The transaction of (such as ten thousand yuan of m=2), and risk trade type is the transaction that strong consistency requires, risk policy controls blocking module Match strong consistency risk control flow.The transaction less than m (such as ten thousand yuan of m=2) or risk trade type for transaction amount For the transaction of high concurrent type, then risk policy control blocking module matches high concurrent risk control flow.It can in this system Blocker is controlled to configure multiple and different risk policies, different transaction can then match different risk policy control and intercept Device, and different risk policy control blockers can include then the configuration of different types of air control strategy.Risk policy control intercepts Device is inquired risk control strategy from vulnerability database and is verified, if verification does not pass through, the transaction is intercepted.If Verification passes through, then the transaction can execute.Risk control strategy accumulation business datum is write back in vulnerability database simultaneously.
Risk policy cache pool is then to cope with the risk control under high concurrent scene.For high concurrent risk control Flow, risk control policy store is in risk policy cache pool.Risk policy cache pool includes that risk policy controls blocker With deals match relationship allocating cache, risk control access vector cache, several parts such as business datum caching are accumulated in risk control.Number According to being stored in risk policy cache pool, the efficiency of digital independent can be effectively improved.Also just because of in risk policy cache pool Interior data reading performance using redundancy is high, and the calculating and verification of cache policy are carried out using risk policy cache pool, can effectively be solved The dirty data problem merchandised in the case of high concurrent while be likely to occur when occurring, to ensure the effective of risk control strategy Property.System is controlled from risk policy in blocker and deals match relationship allocating cache, inquires the risk policy of transaction configuration Controller is searched if in risk policy controls blocker and the configuration of deals match relationship less than corresponding risk policy control Blocker processed, system can then choose default risk policy control blocker, match global consumer's risk control strategy.Risk plan Slightly control blocker is inquired risk control strategy from risk control access vector cache and is verified, should if verification does not pass through Transaction is intercepted.If verification passes through, which can execute.In addition, risk policy buffer pool module also provides wind The initialization in dangerous access vector cache pond, the persistence of risk policy cache pool, the recovery of the data of risk policy cache pool, risk policy The functions such as the data of cache pool clear up automatically, the dynamic expansion of risk policy cache pool.
Fig. 4 then illustrates an example of risk policy control flow.As shown, in instances, being configured with one entirely Office's air control strategy Y0- client blacklist and two blocker risk policy Y1- transaction Day Sum Limiteds, Y2- transaction Monthly Sum Limits.Entirely Office's air control strategy Y0- client's blacklist indicates if transacting customer is in client breaks one's promise blacklist, the transaction is intercepted.It is real The Y1- transaction Day Sum Limiteds being arranged in example are 20,000, then it represents that the transaction accumulated amount on the same day is no more than 20,000, the otherwise transaction quilt It intercepts.The Y2- transaction Monthly Sum Limits being arranged in example are 200,000, then it represents that of that month transaction accumulated amount is no no more than 200,000 Then the transaction is intercepted.
In example, three risk policy control blockers are configured with, wherein air control blocker F0 is the air control of system default Blocker changes air control blocker and has matched an air control strategy, i.e., global air control strategy Y0- client's blacklist.If in risk It in policy control blocker and the configuration of deals match relationship, searches and controls blocker less than corresponding risk policy, system then can Choose default risk policy control blocker F0.
Air control blocker F1 is configured with two blocker risk control strategies, is that Y1- merchandises Day Sum Limited as 20,000 Hes respectively Y2- transaction Monthly Sum Limits are 200,000.And in the air control blocker, above-mentioned two air control strategies are series relationships, i.e. two risks It is the matched relationship of sequence between strategy.Air control blocker F2 is then configured with a blocker risk control strategy, is that Y2- is handed over Easy Monthly Sum Limit is 200,000.As requested, the two risk policy controllers are required for matching this global consumer's risk control plan Slightly Y0- client's blacklist.
The T1 that merchandises is small amount order transaction, belongs to high frequency transaction, and this time turnover is 2000 yuan, and risk trade type checks Module judges that the transaction should match high concurrent risk control flow.
System is controlled from risk policy in blocker and deals match relationship allocating cache, inquires the risk of transaction configuration Strategy controller is F1.Air control blocker F1 carries out matching verification to global air control strategy Y0- client blacklist first, by looking into The blacklist customer information in risk policy cache pool is ask, client corresponding with this transaction compares, and transacting customer is not in blacklist In client, this air control policy check passes through.
Due to the Y1- transaction Day Sum Limiteds of air control blocker F1 configuration be 20,000 and Y2- transaction Monthly Sum Limits are 200,000 two block It is series relationship to cut device air control strategy, then system carries out calculating verification to this two air control strategies successively.The transaction amount of money is 2000 yuan, system obtains the corresponding day of trade limits of air control strategy Y1 in the risk control access vector cache in risk policy cache pool Volume is 20,000, while it is 3000 yuan to obtain T1 transaction-day accumulation transaction amount from risk control accumulation business datum caching, wind Control blocker F1 calculates the T1 transaction-day accumulation transaction amount 3000 obtained in this transaction amount 2000+ business datums caching =5000 are less than the corresponding transaction Day Sum Limiteds 20,000 of air control strategy Y1, then air control strategy Y1 verifications pass through.
Due to being series relationship, system then obtains air control in the risk control access vector cache in risk policy cache pool The corresponding transaction Monthly Sum Limit of tactful Y2 is 200,000, and obtaining T1 transaction-moon accumulation from risk control accumulation business datum caching hands over The easy amount of money is 100,000, and it is tired that air control blocker F1 calculates the T1 transaction-moon obtained in this transaction amount 2000+ business datums caching Product transaction amount 100,000=10.2 ten thousand, is less than the corresponding transaction Monthly Sum Limits 200,000 of air control strategy Y2, then air control strategy Y2 verifications are logical It crosses.
When the transaction is completed, system can write back to this transaction amount from risk control accumulation business datum caching In.It is 5000 to update T1 transaction-day accumulation transaction amount, while it is 10.2 ten thousand to update T1 transaction-moon accumulation transaction amount.
The processing time of above-mentioned risk policy verification is less than 10ms.
Under special circumstances, upper transaction T1 is not yet completed, and system accesses a T1 ' transaction amount and is again at this time 16000 yuan, the data accumulation of the accumulation business datum caching of risk control at this time calculates and can wait in line, until upper one 5000 yuan T1 transaction completed, and business datum caching in day accumulation turnover and the moon accumulation turnover update after, then with risk Verification is compared in control strategy caching.
Data in risk policy cache pool can be in real time persisted in local disk file, delay machine occur in system exception When, system can automatically read from local disk file and restore in data to risk policy cache pool.
Due to the out-of-service time provided with risk control strategy Y1 corresponding day accumulation turnover and moon accumulation turnover, it is System can clear up the accumulation business datum of different risk control strategies the automatic expiration, to ensure the risk control stream in the next period Journey it is accurate and effective.
Embodiment of above does not constitute the restriction to claims, same or analogous with present inventive concept Embodiment is among protection scope of the present invention.

Claims (7)

1. a kind of air control strategy configuration flow in checking information system, it is characterised in that include the following steps:
(1) response backstage personnel operation, more new commodity self-information, affiliated category and category level;
(2) response backstage personnel operation, the channel of more new commodity, content provider, application high-level information, and " client is common Purchase " additional information;And System Market information is updated, wherein System Market information includes pre- to system update marketing planning personnel The concurrent transaction peak period t that trading volume and marketing planning personnel in the t times of survey are expected;
(3) commodity self-information, high-level information, additional information are shown to user according to the querying condition of user, hides market letter Breath;
(4) response user clicks input, to user's displaying high-level information, the particular content of additional information;
(5) transaction request for responding user, opens the flow of marketing system risk control;
(6) judge the setting of Transaction Exposure Type and transaction amount threshold value m, the flow of risk of selection control is strong consistency risk Control flow or high concurrent risk control flow;
Wherein strong consistency risk control flow includes:
(11) risk control policy store is in vulnerability database;Blocker and the configuration of deals match relationship are controlled from risk policy In file, the risk policy control blocker F1 of transaction configuration is inquired;
(12) it if in risk policy controls blocker and the configuration of deals match relationship, searches less than corresponding risk policy control Blocker processed, system can then choose default risk policy control blocker F0, match global consumer's risk control strategy Y0.
(13) risk policy control blocker inquires risk control strategy from vulnerability database, by transaction amount and risk control Tactful Y1 is verified, if verification does not pass through, the transaction is intercepted.If verification passes through, which can hold Row.Simultaneously by the accumulation business datum of risk control strategy Y1, write back in vulnerability database;
(14) it for risk control strategy Yn, is also verified in the manner described above, and by the accumulation industry of risk control strategy Yn Business data, write back to vulnerability database.
(15) during this risk verifies, the subsequent block trade of default is lined up, and is waited pending;Hereafter, second wholesale When transaction occurs, system can inquire the accumulation business datum in last transaction write back data library from vulnerability database, with risk Matched risk control strategy Y1 is verified in database, if verification does not pass through, the transaction is intercepted, if verification Pass through, then the transaction is normally carried out;
Wherein high concurrent risk control flow includes:
(21) risk control policy store is in risk policy cache pool;Risk policy cache pool includes:Risk policy control is blocked Device and deals match relationship allocating cache module, risk control access vector cache module are cut, business datum caching is accumulated in risk control Module;
(22) it is controlled in blocker and deals match relationship allocating cache from risk policy, inquires the risk policy of transaction configuration Control blocker F2;
(23) if searched less than corresponding risk plan in risk policy controls blocker and deals match relationship allocating cache Blocker is slightly controlled, system can then choose default risk policy control blocker F0, match global consumer's risk control strategy Y0;
(24) risk policy control blocker inquires risk control strategy from risk control access vector cache, by transaction amount and wind Dangerous control strategy is verified, if verification does not pass through, the transaction is intercepted;If verification passes through, which can To execute.
(25) it by the accumulation business datum of risk control strategy, writes back in risk control access vector cache;Risk control at this time is tired The data accumulation of product business datum caching can be waited in line.
2. air control strategy configuration flow as described in claim 1, it is characterised in that:M=a × M+b × W+c × D+d × H+e × L;Wherein a, b, c, d, e are weight coefficient;M is per list be averaged transaction amount of the upper January within the t times;W is upper one week in t The interior transaction amount that is averaged per list;D is per list be averaged transaction amount of upper one day within the t times;H is previous hour in t The interior transaction amount that is averaged per list;L is the trading volume in the t times of marketing planning personnel prediction;T is marketing planning personnel It is expected that concurrent transaction peak period.
3. air control strategy configuration flow as described in claim 1, it is characterised in that:The a=0.08, b=0.12, c= 0.38, d=0.57, e=1.47.
4. air control strategy configuration flow as described in claim 1, it is characterised in that:Risk policy configuration is divided into two stage arrangement, It is global air control strategy configuration and the configuration of blocker air control strategy respectively;Global air control strategy configuration refers to, in system overall situation model It encloses interior all risk policy control blockers and is required for matched risk control strategy;Blocker risk policy configures, then refers to The matched risk control strategy in single risk policy controls blocker.
5. air control strategy configuration flow as described in claim 1, it is characterised in that:Specific judgment method is in step (6):If Transaction belongs to the transaction of strong consistency requirement type, and transaction amount threshold value is more than or equal to m, then can trigger strong consistency risk control Flow processed;If the risk trade type of transaction, which is high concurrent type of transaction or transaction amount, is both less than m, high concurrent can be triggered Risk control flow.
6. air control strategy configuration flow as described in claim 1, it is characterised in that:It further include the processing of risk policy buffer pool Step:
(31) initialization of risk policy cache pool;
(32) it is synchronous that data are carried out between risk policy cache pool and local disk file;
(33) in risk policy caching pool server restarting, the data file of this disk preservation can be read automatically, and Write data into risk policy cache pool;
(34) data of risk policy cache pool are cleared up.
7. a kind of air control strategy of air control strategy configuration flow realized described in the claims 1-6 configures system, feature Be include:
Risk trade type checks module, for judging that risk trade type matches the mould of different risk control flows in turn Block;The flow of risk control can be divided into strong consistency risk control flow and high concurrent risk control flow;Risk trade class Type checks setting of the module according to risk trade type and transaction amount, matches different risk control flows;
Risk policy controls blocking module, is the nucleus module verified for risk control, including risk policy control blocker; For judging whether transaction can continue according to the trading situation and risk policy of request, while risk control strategy being tired out Product business datum writes back to vulnerability database;
Risk policy controls blocker, store transaction matching relationship configuration file is used for, for meeting strong consistency risk control The transaction of flow, system can be controlled from risk policy in blocker and deals match relation configuration file, inquire transaction configuration Risk policy control blocker;If in risk policy controls blocker and the configuration of deals match relationship, search less than right The risk policy control blocker answered, system can then choose default risk policy control blocker and match global consumer's risk Control strategy;
Vulnerability database provides risk control plan for storing risk control strategy configuration information to risk policy control blocking module Slightly configuration information;
Risk policy configuration module is to provide and custom-configures risk control strategy, custom-configures transaction and risk policy control Blocker matching relationship function processed;
Risk policy cache pool, including risk policy control blocker and deals match relationship allocating cache, risk control strategy Business datum caching is accumulated in caching, risk control;For storing risk control strategy configuration information, mould is intercepted to risk policy control Block provides risk control strategy configuration information.
CN201810376749.4A 2018-04-25 2018-04-25 A kind of air control strategy configuration flow and system in checking information system Pending CN108596490A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810376749.4A CN108596490A (en) 2018-04-25 2018-04-25 A kind of air control strategy configuration flow and system in checking information system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810376749.4A CN108596490A (en) 2018-04-25 2018-04-25 A kind of air control strategy configuration flow and system in checking information system

Publications (1)

Publication Number Publication Date
CN108596490A true CN108596490A (en) 2018-09-28

Family

ID=63609609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810376749.4A Pending CN108596490A (en) 2018-04-25 2018-04-25 A kind of air control strategy configuration flow and system in checking information system

Country Status (1)

Country Link
CN (1) CN108596490A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111142743A (en) * 2019-12-04 2020-05-12 支付宝(杭州)信息技术有限公司 Wind control strategy configuration method and device
CN112465510A (en) * 2020-11-11 2021-03-09 中金支付有限公司 Online transaction malicious bill removal identification method and system
CN112927076A (en) * 2021-02-26 2021-06-08 深圳华锐金融技术股份有限公司 Securities trading risk control method and device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070050308A1 (en) * 2003-03-06 2007-03-01 Comptel Corporation Method, means and a computer program product for setting rating
CN102034181A (en) * 2010-11-09 2011-04-27 深圳市爱贝信息技术有限公司 User transaction frequency detection-based transaction security control method and device
CN102194177A (en) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 System for risk control over online payment
CN106504088A (en) * 2015-09-07 2017-03-15 高庆文 A kind of method and system that realizes quantifying transaction in removable computing device
CN107316134A (en) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 A kind of risk control method, device, server and storage medium
CN107886431A (en) * 2017-10-18 2018-04-06 上海瀚银信息技术有限公司 Financial air control system based on big data and artificial intelligence

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070050308A1 (en) * 2003-03-06 2007-03-01 Comptel Corporation Method, means and a computer program product for setting rating
CN102034181A (en) * 2010-11-09 2011-04-27 深圳市爱贝信息技术有限公司 User transaction frequency detection-based transaction security control method and device
CN102194177A (en) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 System for risk control over online payment
CN106504088A (en) * 2015-09-07 2017-03-15 高庆文 A kind of method and system that realizes quantifying transaction in removable computing device
CN107316134A (en) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 A kind of risk control method, device, server and storage medium
CN107886431A (en) * 2017-10-18 2018-04-06 上海瀚银信息技术有限公司 Financial air control system based on big data and artificial intelligence

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡佳: "移动支付技术:"增""减"策略各不同", 《中国无线电》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111142743A (en) * 2019-12-04 2020-05-12 支付宝(杭州)信息技术有限公司 Wind control strategy configuration method and device
CN111142743B (en) * 2019-12-04 2021-11-16 支付宝(杭州)信息技术有限公司 Wind control strategy configuration method and device
CN112465510A (en) * 2020-11-11 2021-03-09 中金支付有限公司 Online transaction malicious bill removal identification method and system
CN112465510B (en) * 2020-11-11 2023-09-26 中金支付有限公司 Online transaction malicious form removal identification method and system
CN112927076A (en) * 2021-02-26 2021-06-08 深圳华锐金融技术股份有限公司 Securities trading risk control method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
Balcer et al. Technological expectations and adoption of improved technology
US20070233597A1 (en) Least cost network routing for electronic transactions
Petruzzi et al. Information and inventory recourse for a two-market, price-setting retailer
CN107103548A (en) The monitoring method and system and risk monitoring and control method and system of network behavior data
US20160267509A1 (en) Automated rules-based pricing
US11727352B2 (en) Predictive financial, inventory and staffing management system
CN108596490A (en) A kind of air control strategy configuration flow and system in checking information system
JP2010529535A5 (en)
US20220391830A1 (en) System and method for advanced inventory management using deep neural networks
CN112131305A (en) Account processing system
WO2022132325A1 (en) Systems and methods for hard deletion of data across systems
US20070083521A1 (en) Routing requests based on synchronization levels
CN101122982A (en) Method and system for controlling commodity sales state in electronic business
JP6556969B1 (en) Sales support device and sales partner list creation device
CN110490714A (en) A kind of Gross Profit from Sales real time updating method and system
JP2023162397A (en) Business support device
US20060047560A1 (en) Methods and systems for integrated market account planning
WO2005022309A2 (en) Manufacturing units of an item in response to demand for the item projected from page-view date
CN108765108A (en) A kind of financial data system and method under industry wealth integration
Lin et al. The cash flows in push and pull supply chains under supply disruptions
JP6560477B1 (en) Sales support device and sales partner list creation device
US20140156436A1 (en) System and Method for Product Deployment and Management
KR102639198B1 (en) Method and system for providing virtual asset trading and investment strategy recommendation services
KR102584808B1 (en) Systems and methods for converting, utilizing, arbitrating, and creating value unit applications for trading instruments
JP6936458B1 (en) Sales support device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180928