CN109120429A - A kind of Risk Identification Method and system - Google Patents

A kind of Risk Identification Method and system Download PDF

Info

Publication number
CN109120429A
CN109120429A CN201710497317.4A CN201710497317A CN109120429A CN 109120429 A CN109120429 A CN 109120429A CN 201710497317 A CN201710497317 A CN 201710497317A CN 109120429 A CN109120429 A CN 109120429A
Authority
CN
China
Prior art keywords
risk
data
feature
user terminal
algorithm model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710497317.4A
Other languages
Chinese (zh)
Other versions
CN109120429B (en
Inventor
周斌
吴礼阳
张侦
成敬业
李文海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Xinglian Digital Technology Co.,Ltd.
Original Assignee
Suning Commerce Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suning Commerce Group Co Ltd filed Critical Suning Commerce Group Co Ltd
Priority to CN201710497317.4A priority Critical patent/CN109120429B/en
Publication of CN109120429A publication Critical patent/CN109120429A/en
Application granted granted Critical
Publication of CN109120429B publication Critical patent/CN109120429B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a kind of Risk Identification Method and systems, are related to Internet technical field, the risk analysis scheme in the scene of line combination.The present invention includes: to determine user terminal to be detected according to the risk identification request message, and obtain the behavioral data of corresponding user terminal when receiving risk identification request message;According to the behavioral data to algorithmic system request algorithm model, and according to acquired algorithm model, from feature of risk library, request is transferred and the matched feature of risk data of the algorithm model;According to the algorithm model and with the matched feature of risk data of the algorithm model, risk analysis is carried out to the behavioral data of the corresponding user terminal;The result of risk analysis is sent to the operation system.Risk identification of the present invention suitable for line up and down scene.

Description

A kind of Risk Identification Method and system
Technical field
The present invention relates to Internet technical field more particularly to a kind of Risk Identification Method and systems.
Background technique
With the application and development of Internet technology, the especially development of development of Mobile Internet technology, daily in real time using mutual The user of working application is hundreds of millions of, and how disparate networks are using safety in the process, and to the network of user The problem of behavior carries out risk control, is referred to as badly in need of research.
Currently used scheme mainly accumulates the network behavior data of a large number of users whithin a period of time, shape At black sample improper network behavior data such as (such as) cheating, usurp and white sample (i.e. normal network behavior data); And risk identification model is regularly updated based on black/white sample, risk knowledge is carried out to network behavior data by risk identification model Not.
But this mode needs periodically to safeguard risk identification model, it is past since the latitude of rule is relatively single Toward that can only be identified to some main risk behaviors, for some special or emergent network behavior, such as In the scene of online combination, for example pass through online payment tool and shops is descended to do shopping online, lacks suitable risk analysis side Case often will appear erroneous judgement.
Summary of the invention
The embodiment of the present invention provides a kind of Risk Identification Method and system, in the scene for providing a kind of line combination Risk analysis scheme.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the method that the embodiment of the present invention provides, comprising:
When receiving risk identification request message, determine that user to be detected is whole according to the risk identification request message End, and obtains the behavioral data of corresponding user terminal, wherein receive time of the risk identification request message it is described to The user terminal triggering operation system of detection starts before executing operation flow, and the behavioral data acquisition of the corresponding user terminal is certainly The specified services link of the operation system;
According to the behavioral data to algorithmic system request algorithm model, and according to acquired algorithm model, from The request of feature of risk library is transferred and the matched feature of risk data of the algorithm model, wherein the feature of risk data are gathered At least one of class is simultaneously stored in the feature of risk library, and the feature tag of the cluster of each feature of risk data is corresponding Algorithm model;
According to the algorithm model and with the matched feature of risk data of the algorithm model, to the corresponding user terminal Behavioral data carry out risk analysis;
The result of risk analysis is sent to the operation system.
With reference to first aspect, in the first possible implementation of the first aspect, further includes:
The risk identification request message that the user terminal to be detected is sent is received, the risk identification request disappears Breath is sent from the user terminal to be detected when sending service trigger request to the operation system.
With reference to first aspect, in the second possible implementation of the first aspect, further includes:
The risk identification request message that the operation system is sent is received, the risk identification request message is by institute State what operation system was sent when receiving service trigger request, the service trigger request is by the user terminal to be detected It is sent to the operation system.
First with reference to first aspect or two kind of possible implementation, it is in the third possible implementation, described According to the behavioral data to algorithmic system request algorithm model, comprising:
Determine that business scenario identifies according to the behavioral data;
Business scenario mark is obtained, the business scenario mark includes the mark and the operation system of the operation system Specified services link mark at least one of;
The algorithm model identified to the corresponding business scenario of algorithmic system inquiry.
With reference to first aspect, in a fourth possible implementation of the first aspect, described according to the behavioral data Include: to algorithmic system request algorithm model
Model identification is determined according to the behavioral data;
Inquiry request is sent to the algorithmic system according to the model identification, the inquiry request is used for the algorithm system System inquiry meets the algorithm model of the model identification.
The 4th kind of possible implementation with reference to first aspect, in a fifth possible implementation, the basis The behavioral data determines model identification, comprising:
Detection obtains the user terminal and generates the operation system accessed when the behavioral data, and identifies that the user is whole When end generates the behavioral data, the service link of the operation system execution;
Obtain the service link mark of the corresponding system banner of operation system of the access and the service link of the execution Know, and as the model identification.
First or two kind of possible implementation with reference to first aspect is also wrapped in a sixth possible implementation Include: when cashier system receives the order information of the corresponding user terminal to be detected, using the order information as The service trigger request;The cashier system sends service crosswind danger before calling online payment tool, to detecting platform Identify request message;Alternatively, after the user terminal to be detected sends the order information to the cashier system, to detecing It surveys platform and sends user side risk identification request message.
Second aspect, the system that the embodiment of the present invention provides, comprising: detecting platform receives risk identification for working as When request message, user terminal to be detected is determined according to the risk identification request message, obtains the row of corresponding user terminal For data, and according to the behavioral data to algorithmic system request algorithm model, wherein receive the risk identification and ask Ask the time of message before the user terminal triggering operation system to be detected starts to execute operation flow, the corresponding user Specified services link of the behavioral data acquisition of terminal from the operation system;
The algorithmic system provides algorithm model for storing algorithm model, and according to the request of the detecting platform;
The detecting platform, is also used to according to acquired algorithm model, and from feature of risk library, request is transferred and the calculation The feature of risk data of method Model Matching, wherein the feature of risk data are clustered and are stored in the feature of risk library, At least one corresponding algorithm model of the feature tag of the cluster of each feature of risk data;
The feature of risk library, for clustering and storing the feature of risk data, and according to the algorithm model and with The matched feature of risk data of algorithm model carry out risk analysis to the behavioral data of the corresponding user terminal;Again to The operation system sends the result of risk analysis, wherein the feature tag pair of the cluster of each feature of risk data Answer at least one algorithm model.
In conjunction with second aspect, in the first possible implementation of the second aspect, the user terminal to be detected, For sending the risk identification request message when sending service trigger request to the operation system;The detecting platform, It is also used to receive the risk identification request message that the user terminal to be detected is sent;
Alternatively, the operation system, for when receiving the user terminal to be detected and sending service trigger request, The risk identification request message is sent to the detecting platform;The detecting platform is also used to receive the operation system hair The risk identification request message sent.
In conjunction with second aspect, in a second possible implementation of the second aspect, the feature of risk library is specific to use The operation system accessed when the user terminal generates the behavioral data is obtained in detection, and identifies that the user terminal generates When the behavioral data, the service link of the operation system execution;And the corresponding system of operation system for obtaining the access The service link of mark and the service link of execution mark, and as the model identification;
Inquiry request is sent to the algorithmic system further according to the model identification, the inquiry request is used for the algorithm System queries meet the algorithm model of the model identification;
The algorithmic system is also used to the feature of risk library transmission algorithm update notification, the algorithm update notification Include with updated algorithm model matched feature of risk data type;
The feature of risk library is also used to send request of data to big data platform, and the request of data is directed toward business system System is alternatively, be directed toward the service link of operation system;
The feature of risk library is also used to generate request of data, and to described in big data platform transmission according to feature tag Request of data, then feature of risk data are updated according to the daily record data that the big data platform is sent by the feature of risk library, And updated feature of risk data are updated into feature tag;
The big data platform, for according to the request of data extract the request of data pointed by operation system or The daily record data of person's service link, and data cleansing carried out to acquired daily record data according to data cleansing rule, and will be through The daily record data of over cleaning is sent to the feature of risk library;
The algorithmic system, is also used to extract the intermediate parameters collection of corresponding each algorithm model, and by the intermediate parameters collection It is sent to the big data platform, wherein the intermediate parameters collection of an algorithm model includes the algorithmic system operation and/instruction Practice the associated intermediate parameters arrived when this algorithm model;
The big data platform is also used to update the data cleansing rule using the intermediate parameters collection.
Risk Identification Method provided in an embodiment of the present invention and system, it is real by deployment feature of risk library and algorithmic system Real-time calling deployment, can dispose beta version trial operation and change in real time, to finally realize on the line of existing algorithm model Real-time modeling set is disposed on line, the risk analysis scheme in a kind of scene of line combination is provided, to extenuate risk identification mould The deployment of type is difficult to the problem of keeping up with increasing network behavior, can reduce operator backstage carry out risk analysis at This.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 a is system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 1 b is the schematic diagram of specific example provided in an embodiment of the present invention;
Fig. 2 is method flow schematic diagram provided in an embodiment of the present invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, with reference to the accompanying drawing and specific embodiment party Present invention is further described in detail for formula.Embodiments of the present invention are described in more detail below, the embodiment is shown Example is shown in the accompanying drawings, and in which the same or similar labels are throughly indicated same or similar element or has identical or class Like the element of function.It is exemplary below with reference to the embodiment of attached drawing description, for explaining only the invention, and cannot It is construed to limitation of the present invention.Those skilled in the art of the present technique are appreciated that unless expressly stated, odd number shape used herein Formula " one ", "one", " described " and "the" may also comprise plural form.It is to be further understood that specification of the invention Used in wording " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that In the presence of or add other one or more features, integer, step, operation, element, component and/or their group.It should be understood that When we say that an element is " connected " or " coupled " to another element, it can be directly connected or coupled to other elements, or There may also be intermediary elements.In addition, " connection " used herein or " coupling " may include being wirelessly connected or coupling.Here make Wording "and/or" includes one or more associated any cells for listing item and all combinations.The art Technical staff is appreciated that unless otherwise defined all terms (including technical terms and scientific terms) used herein have Meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.It should also be understood that such as general Those terms, which should be understood that, defined in dictionary has a meaning that is consistent with the meaning in the context of the prior art, and Unless defined as here, it will not be explained in an idealized or overly formal meaning.
Method flow in the present embodiment can specifically execute in a kind of system as shown in Figure 1a, which includes: Detect platform, algorithmic system, feature of risk library, big data platform and user terminal.Wherein:
Detecting platform can integrate in the application server, or with multiple application servers (in practical applications, if one A application server is used for the operation of a certain operation system, which needs in the process of running using arriving and user's phase Data of pass, such as account information, order information, logistics information, inventory information etc. can also then be substituted with " operation system " " application server ", the i.e. application server are to carry the operation system to run the hardware device for being) it is connected, and detecting real-time passes through The behavioral data sent by the user terminal that application server obtains, application server are mainly used for: (wherein, to user terminal Often operation has the program or APP that visualized operation is carried out for trade company on the subscriber terminal, this kind of for being visualized Perhaps APP is properly termed as the use in user terminal program the present embodiment for having run this class method or APP to the program of operation Family terminal is referred to as user terminal) visual interface is provided, such as: trade company (is into the quotient for residing in e-commerce platform Family) by operation user terminal, access in E-commerce platform system some operation systems (such as: freight charges, timeliness, object Flow order, inventory system, declaration system etc.), and browser interface provided by the detecting platform for passing through the operation system carries out quotient Product inquiry, file download, the operation such as importing/export report.
Algorithmic system, is specifically used for storage and more New Algorithm Model, these algorithm models can be the technology by operator Personnel input algorithmic system, are also possible to through network share tool, by third party technology, personnel are uploaded to algorithmic system.
Feature of risk library is specifically used for storage feature of risk data, wherein the feature of risk data are clustered and store In the feature of risk library, at least one of the feature tag of the cluster of each feature of risk data is corresponding algorithm mould Type.
Big data platform is specifically used for the data to acquisition from types of applications server (or operation system), and is based on Preset cleaning rule cleans data collected, then is clustered into feature of risk data.
Detecting platform, algorithmic system disclosed in the present embodiment, feature of risk library and big data platform, in hardware view On specifically can be the equipment such as operation system, work station, supercomputer, or a kind of use being made of multiple hardware devices In the operation system group system of data processing.
User terminal disclosed in the present embodiment can specifically be made into an independent device in fact, or be integrated in various differences Media data playing device in, such as mobile phone, tablet computer (Tablet Personal Computer), electricity on knee Brain (Laptop Computer), personal digital assistant (personal digital assistant, abbreviation PDA) etc..
The embodiment of the present invention provides a kind of Risk Identification Method, as shown in Figure 2, comprising:
S1, when receiving risk identification request message, use to be detected is determined according to the risk identification request message Family terminal, and obtain the behavioral data of corresponding user terminal.
Wherein, the time of the risk identification request message is received in the user terminal triggering to be detected business system System starts before executing operation flow, and the behavioral data of the corresponding user terminal acquires the specified services ring from the operation system Section.Such as: behavioral data can specifically include: each operating process (or be service link) of the user in a business operation The data of upper generation, such as: include log in, register, placing an order, paying etc. indicate user behavior data, and including the time, The data of the expression User Status such as account, ID, bank's card number etc., IP address, device number.
Can specifically include in algorithm model: at least one algorithm model (is referred to as algorithm, model or algorithm And model), algorithm model described in the present embodiment can according to function classification, such as:
Data mining model: such as decision tree, neural network etc..Each model is with independent component individualism.Data point Analyse engineer use decision Tree algorithms or neural network algorithm, modeling generate can judge transaction whether risky algorithm. In decision tree, comprising N tree, the leaf node of tree sets final result as this, and algorithm is according to each tree as a result, carrying out It calculates, to obtain algorithm final result.
S2, according to the behavioral data to algorithmic system request algorithm model, and according to acquired algorithm model, From feature of risk library, request is transferred and the matched feature of risk data of the algorithm model.
Wherein, the feature of risk data are clustered and are stored in the feature of risk library, each described risk is special Levy at least one corresponding algorithm model of feature tag of the cluster of data.Such as: feature of risk data refer to various types of The general designation of data pointed by risk labeling includes basic data, behavioral data, environmental data, statistical data, black name It is single, white list, credible equipment, machine fingerprint, ox etc..Such as: transaction total amount of the user at nearest one day, transaction count Deng.
Feature of risk data are clustered and are stored in the feature of risk library, each feature of risk data is gathered At least one corresponding algorithm model of the feature tag of class.And it can constantly update, increase, checking under the feature tag of same cluster Dangerous characteristic, so that feature of risk data keep dynamic to update, and synchronous with the update of algorithm model holding.
S3, according to the algorithm model and with the matched feature of risk data of the algorithm model, to the corresponding user The behavioral data of terminal carries out risk analysis.
In the present embodiment, the concrete mode of risk analysis may include:
It in payment transaction, all kinds of service links such as places an order, purchase in advance, in thing, execute corresponding risk rule afterwards It is analyzed, the specific engine tool for executing analysis architecturally includes feature tag, feature tag library, algorithm model, algorithm Model version management, publication, deployment, trial operation, measurement, business check and accept and go into operation;And include risk rule, risk rule version This management, publication, deployment, trial operation, measurement, business check and accept and go into operation;
Channel of the algorithmic system as detecting platform, detecting platform call algorithmic system to execute called system, detecting Platform provides corresponding algorithm title to algorithmic system.Wherein, obtained arithmetic result is only one of the factor determined, may be used also To include the parameter of other dimensions, for example possible dimension includes: arithmetic result, detecting rule, blacklist.
S4, the result that risk analysis is sent to the operation system.
Such as: to the user terminal execute feedback strategy include: limit user account access right, freeze account, The operation system accessed to user terminal sends alarm information etc., sends a warning message to user terminal.
During anti-fraud, by constantly collecting behavioral data and storing data to big data platform, put down in big data Feature of risk library is continued to optimize by off-line algorithm logic processing feature of risk library on platform and with the behavioral data of user habit And risk rule and intelligent algorithm component, then it is outside by way of rule+algorithm combination real-time air control system More good air control ability is provided.Such as: mobile phone is logged in the non-normal use time of the users such as morning, can then be called at this time Algorithm detection risk;And algorithm detection risk is called in the case where consumption great number commodity suddenly.Since algorithm model needs The feature of risk data volume used is big, for example a truthful data (is obtained, and this data can by first analysis up and down more than 100 Gradually to extend, so that providing one kind for certain primary transaction or other business conducts more accurately tests and analyzes model).This In embodiment, by deployment feature of risk library, real-time calling deployment (existing needs) on the line of algorithm model is realized, it can portion Administration's beta version trial operation simultaneously changes in real time, disposes to finally realize Real-time modeling set on line.And algorithm model operation Effect data (such as intermediate parameters, result statistical data etc.) realizes reflux big data platform, so that feedback optimized big data is flat The data cleansing rule of platform.
General service system needs to remodify system code logic after understanding business demand, by withdrawing business publication Mode, update service logic again, the period is long, updates slow;And artificial intelligence system, after business change demand, Ke Yitong Cross the mode for not restarting application, the new service logic of Dynamical Deployment can effectively shorten the development cycle, and can quickly more Newly.
In the present embodiment, the risk identification request message is from the user terminal to be detected to the business system It is sent when system transmission service trigger request, detecting platform receives the risk identification that the user terminal to be detected is sent Request message.
Alternatively, the risk identification request message is the transmission when receiving service trigger request by the operation system , the service trigger request is sent from the user terminal to be detected to the operation system, described in detecting platform reception The risk identification request message that operation system is sent.
Specifically, it is described according to the behavioral data to algorithmic system request algorithm model, comprising:
Determine that business scenario identifies according to the behavioral data;And business scenario mark is obtained, then to the algorithmic system The algorithm model of the corresponding business scenario mark of inquiry.
Wherein, the business scenario mark includes the mark of the operation system and the specified services ring of the operation system At least one of in the mark of section.
For example, when cashier system receives the order information of the corresponding user terminal to be detected, by institute Order information is stated as the service trigger request;The cashier system is before calling online payment tool, to detecting platform Send service side risk identification request message;Alternatively, the user terminal to be detected is to described in cashier system transmission After order information, user side risk identification request message is sent to detecting platform.Specifically, cashier is calling on-line payment work Counsel requests are sent to detecting platform before tool, carry out anti-risk of fraud consulting, detecting platform calls the intelligent algorithm of bottom System request acquisition algorithm model.
Detecting platform (also referred to as detecting system) places an order as platform of the payment transaction there are risk is judged in user Link is paid with user, risk rule is executed and judges this order with the presence or absence of risk.Wherein, detecting platform obtains dependency number According to, including order data;Wherein, the user behavior that event center (EPC) is collected from each operation system (logs in, registration, modification Password, real-time geographical locations, time, the behavioral data of PC, the behavioral data of APP, purchase commodity, the payment request amount of money, consumption Record etc.) after, the data of statistics;And process data is obtained from big data platform and real time data processing platform.
Algorithmic system detects the business conduct data and feature of risk data that platform provides, and the corresponding intelligent algorithm of operation is simultaneously Return decision in the face of risk result is supplied to cashier and judges whether it is fraudulent trading.Feature of risk number is transferred according to algorithm model request According to.
Feature of risk data in feature of risk library are classified at predetermined regular and stamp respective labels.
Big data platform obtains platform data from each dimension and is cleaned, trains to data, and the data cleaned are write Enter risk feature database;Big data processed offline platform can collect more inside and outsides, multidimensional various data simultaneously, and be added Work processing forms the distinctive feature of risk library for being directed to the means of payment.
Such as: user buys a household electrical appliances in shops, and submits to pay to the cashier of shops;
At user terminal (such as on smart phone of user), the password of personal account is inputted, smart phone is acknowledged a debt a Number password be sent to the background system (undertaking the operation system of payment function) of cashier, and start call detecting platform; Detecting platform obtains algorithm title, transmission algorithm title and pay invoice data according to request is received, according to business scenario, and Call algorithmic system;Algorithmic system receives detecting platform call request, obtains algorithm title and pay invoice data, starts to adjust Use algorithm;According to application risk feature is needed in algorithm, specific feature of risk is obtained from feature of risk library;Obtain feature of risk Afterwards, algorithm is formally called;Algorithm implementing result is obtained, detecting platform is returned;Platform is detected according to arithmetic result, judges that transaction is It is no that there are risks;Platform is detected by transaction risk judging result, and judging result is returned to the backstage of user equipment and cashier System.
Risk Identification Method provided in an embodiment of the present invention realizes algorithm by deployment feature of risk library and algorithmic system Real-time calling is disposed on the line of model, can be disposed beta version trial operation and be changed in real time, to finally realize real on line Shi Jianmo deployment, provides the risk analysis scheme in a kind of scene of line combination, to extenuate the portion of risk identification model Administration is difficult to the problem of keeping up with increasing network behavior, can reduce operator on backstage and carry out the cost of risk analysis.
In the present embodiment, it is described according to the behavioral data to algorithmic system request algorithm model include: basis The behavioral data determines model identification, and sends inquiry request to the algorithmic system according to the model identification.
Specifically, described determine model identification according to the behavioral data, comprising:
Detection obtains the user terminal and generates the operation system accessed when the behavioral data, and identifies that the user is whole When end generates the behavioral data, the service link of the operation system execution;
Obtain the service link mark of the corresponding system banner of operation system of the access and the service link of the execution Know, and as the model identification.
Wherein, the inquiry request meets the algorithm model of the model identification for algorithmic system inquiry.
When underlying algorithm updates, generally require according to new risk by algorithm engineering Shi Chongxin modeling algorithm.If new New feature of risk has been used in modeling, then also to update corresponding feature of risk data.The present embodiment also provides a kind of based on calculation The mode of the update synchronized update feature of risk of method, specifically include: the algorithmic system is to feature of risk library transmission algorithm Update notification, the algorithm update notification include with updated algorithm model matched feature of risk data type;
The feature of risk library sends request of data to the big data platform, the request of data be directed toward operation system or Person is directed toward the service link of operation system.
Further, further includes:
The feature of risk library generates request of data according to feature tag, and sends the data to big data platform and ask It asks;
The big data platform according to the request of data extract the request of data pointed by operation system or industry The daily record data for link of being engaged in, and data cleansing is carried out to acquired daily record data according to data cleansing rule, and will be by clear The daily record data washed is sent to the feature of risk library;
The feature of risk library updates feature of risk data according to the daily record data that the big data platform is sent, and will more Feature of risk data after new update feature tag.
Feature of risk data be calculated as a result, calculate be based on original basic data etc., wind is calculated The value of dangerous feature, cleaning rule obtain these basic datas for screening.In the present embodiment, it also provides and a kind of improves big data The concrete mode of the cleaning rule of platform:
The algorithmic system extracts the intermediate parameters collection of corresponding each algorithm model, and by the intermediate parameters collection to described big Data platform is sent, wherein the intermediate parameters collection of an algorithm model include algorithmic system operation and/training this The associated intermediate parameters arrived when algorithm model;
The big data platform updates the data cleansing rule using the intermediate parameters collection.
In practical applications, it usually needs technical staff (such as algorithm engineering teacher) is according to the maintenance need of current business system Want algorithm for design.And testing algorithm effect in corresponding system is deployed under line after designing good algorithm, having collected enough surveys After trying data, then debugging algorithm again in disconnection mode.Again due to the differentiation of External Funtions means and technology, air control data The limitation of not perfect and new business rapid development and existing anti-fake system, the offline design of algorithm model, debugging It has been difficult to meet the development of new business in time.Experience is paid to affect certain customers, air control is finally brought and manually examines Core cost and risk behavior in advance cannot effectively be intercepted.
At present in the same trade, air control system mainly all uses the scheme of artificial intelligence.The air control engine of artificial intelligence at present It is only applied to the full-range risk management and control of risk of fraud, such as account, transaction, ox;Future can be using wind such as credit risks Control related fields and scene, it is established that the risk management and control of whole process whole scene.
During anti-fraud, constantly collects behavioral data and store data to big data platform, in big data platform By off-line algorithm logic process feature of risk library and with the behavioral data of user habit continue to optimize feature of risk library and Risk rule and intelligent algorithm component, then be provided out by way of rule+algorithm combination real-time air control system More good air control ability.Such as: mobile phone is logged in the non-normal use time of the users such as morning, can then call algorithm at this time Detection risk;And algorithm detection risk is called in the case where consumption great number commodity suddenly.Since algorithm model needs are used Feature of risk data volume it is big, for example (by the way that first analysis obtains up and down, and this data can be by for a truthful data more than 100 Step extension, to be directed to certain, once transaction or other business conducts provide a kind of more accurately detection and analysis model).This implementation In example, by disposing feature of risk library, realizes real-time calling deployment (existing needs) on the line of algorithm model, survey can be disposed This trial operation of test run simultaneously changes in real time, disposes to finally realize Real-time modeling set on line.And the effect of algorithm model operation Data (such as intermediate parameters, result statistical data etc.) realize reflux big data platform, thus feedback optimized big data platform Data cleansing rule.
General service system needs to remodify system code logic after understanding business demand, by withdrawing business publication Mode, update service logic again, the period is long, updates slow;And artificial intelligence system, after business change demand, Ke Yitong Cross the mode for not restarting application, the new service logic of Dynamical Deployment can effectively shorten the development cycle, and can quickly more Newly.
The embodiment of the present invention also provides a kind of system as shown in Figure 1a, and respectively the interactive process between end can be in the system With reference to Fig. 1 b, this includes:
Platform is detected, for being determined according to the risk identification request message when receiving risk identification request message User terminal to be detected obtains the behavioral data of corresponding user terminal, and is requested according to the behavioral data to algorithmic system Acquisition algorithm model, wherein the time for receiving the risk identification request message triggers in the user terminal to be detected Operation system starts before executing operation flow, behavioral data acquisition the specifying from the operation system of the corresponding user terminal Service link;
The algorithmic system provides algorithm model for storing algorithm model, and according to the request of the detecting platform;
The detecting platform, is also used to according to acquired algorithm model, and from feature of risk library, request is transferred and the calculation The feature of risk data of method Model Matching, wherein the feature of risk data are clustered and are stored in the feature of risk library, At least one corresponding algorithm model of the feature tag of the cluster of each feature of risk data;
The feature of risk library, for clustering and storing the feature of risk data, and according to the algorithm model and with The matched feature of risk data of algorithm model carry out risk analysis to the behavioral data of the corresponding user terminal;Again to The operation system sends the result of risk analysis, wherein the feature tag pair of the cluster of each feature of risk data Answer at least one algorithm model.
The user terminal to be detected is used for when sending service trigger request to the operation system, described in transmission Risk identification request message;The detecting platform is also used to receive the risk that the user terminal to be detected is sent and knows Other request message;
Alternatively, the operation system, for when receiving the user terminal to be detected and sending service trigger request, The risk identification request message is sent to the detecting platform;The detecting platform is also used to receive the operation system hair The risk identification request message sent.
Specifically, the feature of risk library, when obtaining the user terminal generation behavioral data specifically for detection The operation system of access, and when identifying that the user terminal generates the behavioral data, the business ring that the operation system executes Section;And the service link of the corresponding system banner of operation system for obtaining the access and the service link of the execution identifies, And as the model identification;
Inquiry request is sent to the algorithmic system further according to the model identification, the inquiry request is used for the algorithm System queries meet the algorithm model of the model identification;
The algorithmic system is also used to the feature of risk library transmission algorithm update notification, the algorithm update notification Include with updated algorithm model matched feature of risk data type;
The feature of risk library is also used to send request of data to big data platform, and the request of data is directed toward business system System is alternatively, be directed toward the service link of operation system;
The feature of risk library is also used to generate request of data, and to described in big data platform transmission according to feature tag Request of data, then feature of risk data are updated according to the daily record data that the big data platform is sent by the feature of risk library, And updated feature of risk data are updated into feature tag;
The big data platform, for according to the request of data extract the request of data pointed by operation system or The daily record data of person's service link, and data cleansing carried out to acquired daily record data according to data cleansing rule, and will be through The daily record data of over cleaning is sent to the feature of risk library;
The algorithmic system, is also used to extract the intermediate parameters collection of corresponding each algorithm model, and by the intermediate parameters collection It is sent to the big data platform, wherein the intermediate parameters collection of an algorithm model includes the algorithmic system operation and/instruction Practice the associated intermediate parameters arrived when this algorithm model;
The big data platform is also used to update the data cleansing rule using the intermediate parameters collection.
In practical applications, it usually needs technical staff (such as algorithm engineering teacher) is according to the maintenance need of current business system Want algorithm for design.And testing algorithm effect in corresponding system is deployed under line after designing good algorithm, having collected enough surveys After trying data, then debugging algorithm again in disconnection mode.Again due to the differentiation of External Funtions means and technology, air control data The limitation of not perfect and new business rapid development and existing anti-fake system, the offline design of algorithm model, debugging It has been difficult to meet the development of new business in time.Experience is paid to affect certain customers, air control is finally brought and manually examines Core cost and risk behavior in advance cannot effectively be intercepted.
At present in the same trade, air control system mainly all uses the scheme of artificial intelligence.The air control engine of artificial intelligence at present It is only applied to the full-range risk management and control of risk of fraud, such as account, transaction, ox;Future can be using wind such as credit risks Control related fields and scene, it is established that the risk management and control of whole process whole scene.
During anti-fraud, constantly collects behavioral data and store data to big data platform, in big data platform By off-line algorithm logic process feature of risk library and with the behavioral data of user habit continue to optimize feature of risk library and Risk rule and intelligent algorithm component, then be provided out by way of rule+algorithm combination real-time air control system More good air control ability.Such as: mobile phone is logged in the non-normal use time of the users such as morning, can then call algorithm at this time Detection risk;And algorithm detection risk is called in the case where consumption great number commodity suddenly.Since algorithm model needs are used Feature of risk data volume it is big, for example (by the way that first analysis obtains up and down, and this data can be by for a truthful data more than 100 Step extension, to be directed to certain, once transaction or other business conducts provide a kind of more accurately detection and analysis model).This implementation In example, by disposing feature of risk library, realizes real-time calling deployment (existing needs) on the line of algorithm model, survey can be disposed This trial operation of test run simultaneously changes in real time, disposes to finally realize Real-time modeling set on line.And the effect of algorithm model operation Data (such as intermediate parameters, result statistical data etc.) realize reflux big data platform, thus feedback optimized big data platform Data cleansing rule.
General service system needs to remodify system code logic after understanding business demand, by withdrawing business publication Mode, update service logic again, the period is long, updates slow;And artificial intelligence system, after business change demand, Ke Yitong Cross the mode for not restarting application, the new service logic of Dynamical Deployment can effectively shorten the development cycle, and can quickly more Newly.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.The above description is merely a specific embodiment, but protection scope of the present invention is not limited to This, anyone skilled in the art in the technical scope disclosed by the present invention, the variation that can readily occur in or replaces It changes, should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claim Subject to enclosing.

Claims (10)

1. a kind of Risk Identification Method characterized by comprising
When receiving risk identification request message, user terminal to be detected is determined according to the risk identification request message, And obtain the behavioral data of corresponding user terminal, wherein receive the time of the risk identification request message described to be checked The user terminal triggering operation system of survey starts before executing operation flow, and the behavioral data of the corresponding user terminal is acquired from institute State the specified services link of operation system;
According to the behavioral data to algorithmic system request algorithm model, and according to acquired algorithm model, from risk Feature database request is transferred and the matched feature of risk data of the algorithm model, wherein the feature of risk data are clustered simultaneously It is stored in the feature of risk library, at least one corresponding algorithm of the feature tag of the cluster of each feature of risk data Model;
According to the algorithm model and with the matched feature of risk data of the algorithm model, to the row of the corresponding user terminal Risk analysis is carried out for data;
The result of risk analysis is sent to the operation system.
2. the method according to claim 1, wherein further include:
Receive the risk identification request message that the user terminal to be detected is sent, the risk identification request message by What the user terminal to be detected was sent when sending service trigger request to the operation system.
3. the method according to claim 1, wherein further include:
The risk identification request message that the operation system is sent is received, the risk identification request message is by the industry Business system is sent when receiving service trigger request, and the service trigger request is from the user terminal to be detected to institute State operation system transmission.
4. according to the method in claim 2 or 3, which is characterized in that described to be asked according to the behavioral data to algorithmic system Seek acquisition algorithm model, comprising:
Determine that business scenario identifies according to the behavioral data;
Business scenario mark is obtained, the business scenario mark includes the mark of the operation system and the finger of the operation system Determine at least one in the mark of service link;
The algorithm model identified to the corresponding business scenario of algorithmic system inquiry.
5. according to the method in claim 2 or 3, which is characterized in that further include:
When cashier system receives the order information of the corresponding user terminal to be detected, using the order information as The service trigger request;
The cashier system sends service side risk identification request message before calling online payment tool, to detecting platform;
Alternatively, after the user terminal to be detected sends the order information to the cashier system, to detecting platform hair Send user side risk identification request message.
6. the method according to claim 1, wherein described obtain according to the behavioral data to algorithmic system request The algorithm model is taken to include:
Model identification is determined according to the behavioral data;
Inquiry request is sent to the algorithmic system according to the model identification, the inquiry request is looked into for the algorithmic system Ask the algorithm model for meeting the model identification.
7. according to the method described in claim 6, it is characterized in that, described determine model identification according to the behavioral data, packet It includes:
Detection obtains the user terminal and generates the operation system accessed when the behavioral data, and identifies that the user terminal produces When the raw behavioral data, the service link of the operation system execution;
The service link mark of the corresponding system banner of operation system of the access and the service link of the execution is obtained, and As the model identification.
8. a kind of risk recognition system characterized by comprising
Platform is detected, for determining according to the risk identification request message to be checked when receiving risk identification request message The user terminal of survey, obtains the behavioral data of corresponding user terminal, and according to the behavioral data to algorithmic system request Algorithm model, wherein receive the time of the risk identification request message in the user terminal triggering business to be detected System starts before executing operation flow, and the behavioral data of the corresponding user terminal acquires the specified services from the operation system Link;
The algorithmic system provides algorithm model for storing algorithm model, and according to the request of the detecting platform;
The detecting platform, is also used to according to acquired algorithm model, and from feature of risk library, request is transferred and the algorithm mould The matched feature of risk data of type, wherein the feature of risk data are clustered and are stored in the feature of risk library, each At least one corresponding algorithm model of the feature tag of the cluster of the kind feature of risk data;
The feature of risk library, for clustering and storing the feature of risk data, and according to the algorithm model and with it is described The matched feature of risk data of algorithm model carry out risk analysis to the behavioral data of the corresponding user terminal;Again to described The result of operation system transmission risk analysis, wherein the feature tag of the cluster of each feature of risk data is corresponding extremely One item missing algorithm model.
9. according to the method described in claim 8, it is characterized in that, the user terminal to be detected, for the industry When business system sends service trigger request, the risk identification request message is sent;The detecting platform is also used to receive described The risk identification request message that user terminal to be detected is sent;
Alternatively, the operation system, for when receiving the user terminal to be detected and sending service trigger request, to institute It states detecting platform and sends the risk identification request message;The detecting platform is also used to receive what the operation system was sent The risk identification request message.
10. system according to claim 8, which is characterized in that the feature of risk library obtains described specifically for detection User terminal generates the operation system accessed when the behavioral data, and identifies that the user terminal generates the behavioral data When, the service link of the operation system execution;And it the corresponding system banner of operation system that obtains the access and described holds The service link of capable service link identifies, and as the model identification;
Inquiry request is sent to the algorithmic system further according to the model identification, the inquiry request is used for the algorithmic system Inquiry meets the algorithm model of the model identification;
The algorithmic system is also used to the feature of risk library transmission algorithm update notification, and the algorithm update notification includes With updated algorithm model matched feature of risk data type;
The feature of risk library, is also used to send request of data to big data platform, the request of data be directed toward operation system or Person is directed toward the service link of operation system;
The feature of risk library is also used to generate request of data, and send the data to big data platform according to feature tag Request, then feature of risk data are updated according to the daily record data that the big data platform is sent by the feature of risk library, and will Updated feature of risk data update feature tag;
The big data platform, for according to the request of data extract the request of data pointed by operation system or industry The daily record data for link of being engaged in, and data cleansing is carried out to acquired daily record data according to data cleansing rule, and will be by clear The daily record data washed is sent to the feature of risk library;
The algorithmic system, is also used to extract the intermediate parameters collection of corresponding each algorithm model, and by the intermediate parameters collection to institute State big data platform transmission, wherein the intermediate parameters collection of an algorithm model include algorithmic system operation and/training this The associated intermediate parameters arrived when one algorithm model;
The big data platform is also used to update the data cleansing rule using the intermediate parameters collection.
CN201710497317.4A 2017-06-26 2017-06-26 Risk identification method and system Active CN109120429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710497317.4A CN109120429B (en) 2017-06-26 2017-06-26 Risk identification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710497317.4A CN109120429B (en) 2017-06-26 2017-06-26 Risk identification method and system

Publications (2)

Publication Number Publication Date
CN109120429A true CN109120429A (en) 2019-01-01
CN109120429B CN109120429B (en) 2022-04-15

Family

ID=64822585

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710497317.4A Active CN109120429B (en) 2017-06-26 2017-06-26 Risk identification method and system

Country Status (1)

Country Link
CN (1) CN109120429B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741065A (en) * 2019-01-28 2019-05-10 广州虎牙信息科技有限公司 A kind of payment risk recognition methods, device, equipment and storage medium
CN110147997A (en) * 2019-04-16 2019-08-20 深圳壹账通智能科技有限公司 Data processing method, device, equipment and storage medium
CN110543506A (en) * 2019-09-10 2019-12-06 百度在线网络技术(北京)有限公司 Data analysis method and device, electronic equipment and storage medium
CN111275348A (en) * 2020-02-05 2020-06-12 张�浩 Electronic order information processing method, server and electronic order information processing system
CN111325557A (en) * 2020-02-25 2020-06-23 支付宝(杭州)信息技术有限公司 Detection method, device and equipment for merchant risk
WO2021057130A1 (en) * 2019-09-26 2021-04-01 支付宝(杭州)信息技术有限公司 Intelligent risk control decision-making method and system, service processing method and system
CN112734177A (en) * 2020-12-28 2021-04-30 四川新网银行股份有限公司 Wind control system and method for intelligent shunting automatic decision
CN112766977A (en) * 2021-01-27 2021-05-07 支付宝(杭州)信息技术有限公司 Risk identification method, device and system
CN113570468A (en) * 2021-07-06 2021-10-29 猪八戒股份有限公司 Enterprise payment wind control service platform
CN114119037A (en) * 2022-01-24 2022-03-01 深圳尚米网络技术有限公司 Marketing anti-cheating system based on big data

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120197802A1 (en) * 2011-01-28 2012-08-02 Janet Smith Method and system for determining fraud in a card-not-present transaction
KR20140115430A (en) * 2013-03-19 2014-10-01 주식회사 다나와 Method for providing evaluation of online seller
CN104392381A (en) * 2014-10-29 2015-03-04 中国建设银行股份有限公司 Risk monitoring method of transaction data and system thereof
CN104408610A (en) * 2014-12-03 2015-03-11 苏州贝多环保技术有限公司 Third-party payment platform business processing method based on risk assessment
CN105556552A (en) * 2013-03-13 2016-05-04 加迪安分析有限公司 Fraud detection and analysis
CN105590158A (en) * 2014-12-30 2016-05-18 中国银联股份有限公司 Transaction risk real-time control system
CN105989441A (en) * 2015-02-11 2016-10-05 阿里巴巴集团控股有限公司 Model parameter adjustment method and device
CN106067088A (en) * 2016-05-30 2016-11-02 中国邮政储蓄银行股份有限公司 E-bank accesses detection method and the device of behavior
US20170048216A1 (en) * 2015-08-13 2017-02-16 TD Bank Group Document tracking on a distributed ledger
CN106815754A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The charging method and air control system server of a kind of risk control system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120197802A1 (en) * 2011-01-28 2012-08-02 Janet Smith Method and system for determining fraud in a card-not-present transaction
CN105556552A (en) * 2013-03-13 2016-05-04 加迪安分析有限公司 Fraud detection and analysis
KR20140115430A (en) * 2013-03-19 2014-10-01 주식회사 다나와 Method for providing evaluation of online seller
CN104392381A (en) * 2014-10-29 2015-03-04 中国建设银行股份有限公司 Risk monitoring method of transaction data and system thereof
CN104408610A (en) * 2014-12-03 2015-03-11 苏州贝多环保技术有限公司 Third-party payment platform business processing method based on risk assessment
CN105590158A (en) * 2014-12-30 2016-05-18 中国银联股份有限公司 Transaction risk real-time control system
CN105989441A (en) * 2015-02-11 2016-10-05 阿里巴巴集团控股有限公司 Model parameter adjustment method and device
US20170048216A1 (en) * 2015-08-13 2017-02-16 TD Bank Group Document tracking on a distributed ledger
CN106815754A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The charging method and air control system server of a kind of risk control system
CN106067088A (en) * 2016-05-30 2016-11-02 中国邮政储蓄银行股份有限公司 E-bank accesses detection method and the device of behavior

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741065A (en) * 2019-01-28 2019-05-10 广州虎牙信息科技有限公司 A kind of payment risk recognition methods, device, equipment and storage medium
CN110147997A (en) * 2019-04-16 2019-08-20 深圳壹账通智能科技有限公司 Data processing method, device, equipment and storage medium
CN110543506A (en) * 2019-09-10 2019-12-06 百度在线网络技术(北京)有限公司 Data analysis method and device, electronic equipment and storage medium
TWI739432B (en) * 2019-09-26 2021-09-11 大陸商支付寶(杭州)信息技術有限公司 Intelligent risk control decision-making method and system, business processing method and system
WO2021057130A1 (en) * 2019-09-26 2021-04-01 支付宝(杭州)信息技术有限公司 Intelligent risk control decision-making method and system, service processing method and system
CN111275348A (en) * 2020-02-05 2020-06-12 张�浩 Electronic order information processing method, server and electronic order information processing system
CN111325557A (en) * 2020-02-25 2020-06-23 支付宝(杭州)信息技术有限公司 Detection method, device and equipment for merchant risk
CN112734177A (en) * 2020-12-28 2021-04-30 四川新网银行股份有限公司 Wind control system and method for intelligent shunting automatic decision
CN112734177B (en) * 2020-12-28 2023-07-21 四川新网银行股份有限公司 Wind control method for intelligent diversion automatic decision
CN112766977A (en) * 2021-01-27 2021-05-07 支付宝(杭州)信息技术有限公司 Risk identification method, device and system
CN112766977B (en) * 2021-01-27 2022-06-28 支付宝(杭州)信息技术有限公司 Risk identification method, device and system
CN113570468A (en) * 2021-07-06 2021-10-29 猪八戒股份有限公司 Enterprise payment wind control service platform
CN114119037A (en) * 2022-01-24 2022-03-01 深圳尚米网络技术有限公司 Marketing anti-cheating system based on big data

Also Published As

Publication number Publication date
CN109120429B (en) 2022-04-15

Similar Documents

Publication Publication Date Title
CN109120429A (en) A kind of Risk Identification Method and system
CN109120428A (en) A kind of method and system for air control analysis
Angelos et al. Detection and identification of abnormalities in customer consumptions in power distribution systems
CN112559361A (en) Flow playback method, device, equipment and computer readable medium
CN110223146B (en) System and method for monitoring whole process of electricity purchasing service of customer
US20170109676A1 (en) Generation of Candidate Sequences Using Links Between Nonconsecutively Performed Steps of a Business Process
CN106656536A (en) Method and device for processing service invocation information
CN108780479A (en) For to the abnormal system and method for being detected and scoring
US20170109667A1 (en) Automaton-Based Identification of Executions of a Business Process
GB2321362A (en) Generic processing capability
EP0897566A1 (en) Monitoring and retraining neural network
CN102714713A (en) Video stream processing
CN103765820A (en) Systems and methods for evaluation of events based on a reference baseline according to temporal position in a sequence of events
GB2321363A (en) Telecommunications
US20170109636A1 (en) Crowd-Based Model for Identifying Executions of a Business Process
CN115511501A (en) Data processing method, computer equipment and readable storage medium
US20170109639A1 (en) General Model for Linking Between Nonconsecutively Performed Steps in Business Processes
CN112199276B (en) Method, device, server and storage medium for detecting change of micro-service architecture
CN112330355B (en) Method, device, equipment and storage medium for processing consumption coupon transaction data
Püschel et al. Unblackboxing smart things—A multilayer taxonomy and clusters of nontechnical smart thing characteristics
CN115001934A (en) Industrial control safety risk analysis system and method
Qi et al. A cloud-based triage log analysis and recovery framework
Min et al. Behavior language processing with graph based feature generation for fraud detection in online lending
Jena et al. An ensemble classifier based scheme for detection of false data attacks aiming at disruption of electricity market operation
US20170109670A1 (en) Crowd-Based Patterns for Identifying Executions of Business Processes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 210000, 1-5 story, Jinshan building, 8 Shanxi Road, Nanjing, Jiangsu.

Applicant after: SUNING.COM Co.,Ltd.

Address before: 210042 Suning Headquarters, No. 1 Suning Avenue, Xuanwu District, Nanjing City, Jiangsu Province

Applicant before: SUNING COMMERCE GROUP Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210728

Address after: Room 834, Yingying building, 99 Tuanjie Road, yanchuangyuan, Jiangbei new district, Nanjing, Jiangsu 210000

Applicant after: Nanjing Xingyun Digital Technology Co.,Ltd.

Address before: 210000, 1-5 story, Jinshan building, 8 Shanxi Road, Nanjing, Jiangsu.

Applicant before: SUNING.COM Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230302

Address after: 210000 building 4, No.5 Hengsheng Road, economic development zone, Gaochun District, Nanjing City, Jiangsu Province

Patentee after: Nanjing Xinglian Digital Technology Co.,Ltd.

Address before: Room 834, Yingying building, 99 Tuanjie Road, yanchuangyuan, Jiangbei new district, Nanjing, Jiangsu 210000

Patentee before: Nanjing Xingyun Digital Technology Co.,Ltd.