Detailed Description
In order to better understand the technical solutions, the technical solutions of the embodiments of the present specification are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features of the embodiments and embodiments of the present specification are detailed descriptions of the technical solutions of the embodiments of the present specification, and are not limitations of the technical solutions of the present specification, and the technical features of the embodiments and embodiments of the present specification may be combined with each other without conflict.
Please refer to fig. 1, which is a schematic view of a wind control application scenario in the embodiment of the present specification. The first terminal 100 and the second terminal 101 are located at a user side, the first terminal 100 may be a terminal corresponding to a benefit user, and the second terminal 101 may be a terminal corresponding to a transaction subject, and are respectively in communication with the server 200 at the network side. The transaction processing client 102 in the first terminal 100 and the transaction processing client 103 in the second terminal 101 may be an APP or a website for implementing a service based on the internet, provide a transaction interface for a user, and provide risk data to a network side for processing; the wind control system 201 in the server 200 is used to identify risk transactions involved in the transaction processing client 103. In the embodiment of the description, the transaction main body mainly comprises the payment user.
The embodiment of the specification aims at the fraudulent conduct of network transaction platforms such as game platforms, e-commerce platforms and the like. The beneficial users and the payment users carry some risk data, the embodiment of the specification firstly combines the risk data of the beneficial users and the risk information of the transaction main body, and extracts the risk characteristic information; and risk identification is carried out on the current transaction by utilizing the risk characteristics, so that the aim of avoiding telecommunication fraud of the benefited users through a network transaction platform can be fulfilled.
In a first aspect, an embodiment of the present disclosure provides a method for processing wind control, please refer to fig. 2, where the method includes steps S210 to S212.
S210, acquiring first risk information of a transaction main body corresponding to the current transaction and second risk information of a benefit user corresponding to the current transaction;
in an optional implementation manner, based on an account ID of a transaction subject corresponding to a current transaction, first risk information of the transaction subject is acquired by using a payment data subsystem, where the first risk information includes: one or more of the payment amount, the payment time, the merchant name and the account maturity of the payment user, but other information may also be included, which is not illustrated here. The account maturity of the payment user can be determined according to the account registration time of the payment user, the activity degree of the payment user and the like; the longer the registration time is, the higher the activity degree is, the higher the account maturity of the payment user is; the account maturity of the payment user in the embodiment of the specification comprises 1-10 levels.
After the first risk information is acquired, because the data format of the first risk information may not meet the data format requirement of the wind control processing subsystem, the data format of the first risk information needs to be converted into the data format supported by the wind control processing subsystem according to the data format provided by the wind control processing subsystem. In practical applications, the payment data subsystem may include a third party payment mechanism, such as a payment instrument.
In an optional implementation manner, second risk information of the beneficial user is acquired by using the merchant processing subsystem; receiving second risk information of the beneficial users sent by the order receiving merchant through a message transfer function API; the acquiring merchants generally include merchants that utilize third party payment mechanisms for transaction funds acquisition, such as the acquiring merchants may include, but are not limited to: e-commerce platform, game platform, take-away platform or taxi taking platform, etc.
The second risk information includes: one or more of account identification ID, account grade, account registration time, internet protocol IP address of account registration, order generation time, IP address of order generation and biological information identification of the beneficial user, and certainly can also comprise other information; the biometric information identification may include: benefit the user's fingerprint, iris, sclera, and/or voice print, etc. The account number grade of the beneficial user is generally determined according to the payment times, the payment amount and the like of the beneficial user, and the account number grade of the beneficial user is higher when the payment times of the beneficial user is more and the payment amount is larger; the account number grades of the beneficial users in the embodiment of the specification comprise 1-10 grades.
For the same reason, since the data format of the acquired second risk information may not meet the data format requirement of the wind control processing subsystem, the data format of the second risk information needs to be converted into the data format supported by the wind control processing subsystem according to the data format provided by the wind control processing subsystem.
S211, performing risk identification on the current transaction according to the first risk information and the second risk information, and obtaining a risk identification result.
In an optional implementation manner, the "performing risk identification on the current transaction according to the first risk information and the second risk information, and obtaining a risk identification result" includes: merging the first risk information and the second risk information according to a preset risk characteristic standard, and extracting risk characteristic information;
and identifying the current transaction according to a pre-configured anti-fraud model based on the risk characteristic information to obtain a risk identification result.
Here, since the first risk information and the second risk information include a plurality of types and not all risk information have risk characteristics, it is necessary to extract risk characteristic information by merging the first risk information and the second risk information according to a preset risk characteristic standard. The merging process may include screening or filtering.
The risk characteristic information includes: direct risk characteristic information and risk accumulation variables; the direct risk characteristic information represents risk characteristic information that can be directly determined according to a risk characteristic standard. The risk characteristic standard comprises an identifier for describing the transaction risk degree, for example, if an IP address registered by an account number of a beneficial user is registered in overseas high-risk areas, the registered IP address can be considered as risk characteristic information; when the account number grade of the beneficial user and the account number maturity level of the payment user are both low, the account number grade of the beneficial user and the account number maturity of the payment user can be determined to be risk characteristic information and the like. For the same reason, if the account registration IP of the beneficial user is not registered in the overseas high-risk area, the registered IP address is not considered to be the risk characteristic information, and the registered IP address is filtered when the risk characteristic information is determined.
The risk accumulation variable may include a variable having a certain regularity in a certain period of time, for example, if a network trading platform is a gambling platform, due to a strict time law of the platform, when buying and buying are generally traded at a certain point of time or within a certain period of time, the order generation time and the payment time have a certain regularity, so that the order generation time and the payment time can be regarded as the risk accumulation variable.
After extracting the risk characteristic information, configuring an anti-fraud model, wherein the anti-fraud model comprises the following steps: the anti-fraud policy and anti-fraud model algorithm, the anti-fraud model algorithm of the embodiments of the present specification may include, but is not limited to, the following: anti-fraud based recognition trees, convolutional neural networks, BP neural networks, deep neural networks, or the like; the anti-fraud strategy is mainly used for judging whether the registered IP address of the beneficial user account is the IP of the high-risk area and the account grade of the beneficial user; determining a relationship network of the payment user and the benefit user, such as whether the payment user and the benefit user are direct friends or indirect friends (whether a friend node exists between a relationship chain of the payment user and the benefit user); or determining the account grade maturity of the payment user and the risk grade of the beneficiary user.
After the anti-fraud model is configured, based on an anti-fraud strategy, risk identification is carried out on the current transaction by using an anti-fraud model algorithm and risk characteristic information, finally, a risk identification result and relevant case information are predicted and output, and the risk identification result and the case information are sent to the merchant processing subsystem. The risk identification result may include a risk score for the transaction, and generally speaking, the higher the risk score, the higher the risk for the transaction; the case information includes the reason for scoring the risk, so that the merchant processing subsystem can analyze the transaction again according to the risk identification result and the case information. For example, the risk characteristic information of the beneficial user can be utilized to depict the characteristics of a cheater, and when the registration area of the account number registration IP of the beneficial user is determined to be located in an overseas high-risk area, the transaction risk is determined to be higher; or, the account number level of the beneficial user and the account number maturity of the payment user are analyzed at the same time, and if the account number level of the beneficial user and the account number maturity of the payment user are both low, it is determined that the risk of the transaction is very high, and basically, the transaction can be defined as a fraud transaction, so that the corresponding risk score is high.
And S212, judging whether the risk identification result is in a preset risk threshold range, and if so, performing decision processing on the beneficiary user corresponding to the current transaction.
After the risk identification result is obtained, as the merchant processing subsystem may collect more information of the beneficial user, the information is not necessarily all sent to the wind control processing subsystem, before judging whether the risk identification result is within the pre-configured risk threshold range, the risk threshold range of the risk identification result is configured according to the information, the risk threshold range can also be understood as a risk scoring range of the transaction, and the pushing range of the case information can be understood as a screening range of scoring reasons.
For example, the case information sent by the wind control processing subsystem includes analysis of information such as a registration IP address, registration time, and an account level of the beneficial user account, but the merchant processing subsystem considers that there is no reference value in the analysis of the registration time, so that when a push range of the case information is configured, the analysis information of the registration time is filtered, and only analysis of the account registration IP and the account level of the beneficial user is received.
After the risk threshold range is configured, whether the received risk identification result is in the risk threshold range or not is judged, if yes, the current transaction is determined to be a risk transaction, the benefited user is determined to be a risk user, and the account of the benefited user is controlled.
For example, the risk identification result is 20, which represents that the risk score of the transaction is 20, and if the risk threshold range is not less than 15, it is determined that the transaction is a high risk transaction, then decision processing is performed on the benefit user, such as management and control on an account of the benefit user. Here, there is often a certain time for the benefit user to receive the message of successful payment and then remove the account, for example, the account can be removed in 10 to 20 minutes after the fraud is successful, and then in this time, the account of the benefit user can be managed and controlled, for example, frozen, closed or cancelled, so that the loss of the payment user is avoided.
In the embodiment of the specification, risk data of a benefited user and risk data of a transaction main body are combined, risk characteristic information is extracted, and risk identification is performed on the current transaction by using risk characteristics, so that the risk characteristics of the benefited user and the transaction main body are considered at the same time, the coverage rate of the risk characteristics is increased, whether the transaction is a fraudulent transaction can be accurately identified, and the identification accuracy can be improved by at least 20%; and the risk identification result is sent to the merchant processing subsystem, and the merchant processing subsystem can timely and effectively control the account of the fraudster, so that the fraudster behavior of the beneficiary user is controlled from the source, the overall effect of fraud prevention and control is improved, the telecom fraud of the beneficiary user through the network transaction platform is avoided, the payment user is prevented from being subjected to economic loss, and the reliability of the network transaction platform is also improved.
In a second aspect, based on the same inventive concept, an embodiment of the present specification provides a wind control processing system, please refer to fig. 3, where the wind control system includes: a payment data subsystem 31, a wind control processing subsystem 32 and a merchant processing subsystem 33; wherein,
the payment data subsystem 31 is used for acquiring first risk information of a current transaction main body and sending the first risk information to the wind control processing subsystem 32; the first risk information includes: one or more of the payment amount, the payment time, the merchant name and the account maturity of the payment user, but other information may also be included, which is not illustrated here. The account maturity of the payment user can be determined according to the account registration time of the payment user, the activity degree of the payment user and the like; the longer the registration time is, the higher the activity degree is, the higher the account maturity of the payment user is; the account maturity of the payment user in the embodiment of the specification comprises 1-10 levels.
The merchant processing subsystem 33 is configured to obtain second risk information of the benefited user, and the wind control processing subsystem 32 is configured to communicate with the merchant processing subsystem 33 to obtain second risk information of the benefited user corresponding to the current transaction in the merchant processing subsystem 33; identifying the current transaction according to the first risk information and the second risk information to obtain a risk identification result, and sending the risk identification result to a merchant processing subsystem 33, wherein the merchant processing subsystem 33 performs decision processing on the benefited user according to the risk identification result; wherein the current transaction is a transaction between the beneficiary user and the transaction subject.
The second risk information includes: one or more of account identification ID, account grade, account registration time, internet protocol IP address of account registration, order generation time, IP address of order generation and biological information identification of the beneficial user, and certainly can also comprise other information; the biometric information identification may include: benefit the user's fingerprint, iris, sclera, and/or voice print, etc. The account number grade of the beneficial user is generally determined according to the payment times, the payment amount and the like of the beneficial user, and the account number grade of the beneficial user is higher when the payment times of the beneficial user is more and the payment amount is larger; the account number grades of the beneficial users in the embodiment of the specification comprise 1-10 grades.
In an alternative implementation, referring to fig. 4, the payment data subsystem 31 includes: a first data acquisition unit 41, a first data processing unit 42, and a first data transmission unit 43;
the first data acquisition unit 41 is configured to acquire first risk information of the transaction subject according to the account ID of the transaction subject.
Here, the payment data subsystem 31 includes a large amount of transaction data, and therefore first risk information of the transaction subject needs to be acquired according to the account ID of the transaction subject; in practice, the payment data subsystem 31 may include a third party payment mechanism, such as a payment instrument.
Since the data format of the first risk information may not meet the data format requirement of the wind control processing subsystem 32, the first data processing unit 42 is configured to convert the data format of the first risk information into the data format supported by the wind control processing subsystem 32 according to the data format provided by the wind control processing subsystem 32.
The first data sending unit 43 is configured to send the first risk information after data format conversion to the wind control processing subsystem 32.
In an alternative implementation, referring to fig. 5, merchant processing subsystem 33 includes: a second data acquisition unit 51, a second data processing unit 52, a second data transmission unit 53;
the second data obtaining unit 51 is configured to receive second risk information of the beneficiary user sent by the order receiving merchant through the messaging function API; the acquiring merchants generally include merchants that utilize third party payment mechanisms for transaction funds acquisition, such as the acquiring merchants may include, but are not limited to: e-commerce platform, game platform, take-away platform or taxi taking platform, etc.
For the same reason, since the data format of the second risk information acquired by the second data acquiring unit 51 may not meet the data format requirement of the wind control processing subsystem 32, the second data processing unit 52 is configured to convert the data format of the second risk information into the data format supported by the wind control processing subsystem 32 according to the data format provided by the wind control processing subsystem 32.
The second data sending unit 53 is configured to send the second risk information after data format conversion to the wind control processing subsystem 32.
In an alternative implementation, referring to fig. 6, the wind control processing subsystem 32 includes:
a first data receiving unit 61, configured to receive the first risk information and the second risk information. In practical applications, the first data unit 61 may be implemented by a gateway unit for an external interface, and in order to reduce the processing load of the wind control processing subsystem 32, the gateway unit is configured to perform authentication management on the external interface, and issue a communication right for a user meeting a requirement, so that the user meeting the requirement can communicate with the wind control processing subsystem 32 through the gateway unit. The external interface may include an interface corresponding to the merchant processing subsystem 33 and an interface corresponding to the payment data subsystem 31; taking the merchant processing subsystem as an example for explanation, generally, since the acquiring merchant includes many merchants and the corresponding merchant processing subsystems also include many merchants, if the external interface is not authenticated, all merchant processing subsystems can communicate with the wind control processing subsystem 32 through the corresponding interfaces, so that the processing burden of the wind control processing subsystem 32 is increased. Therefore, in order to reduce the processing load of the wind control processing subsystem 32 and improve the processing efficiency, the gateway unit only issues the communication right for the merchant processing subsystem which has been agreed in advance. The pre-existing agreed merchant processing subsystem may include: the merchant processing subsystem of the offline signing agreement or both the default merchant processing subsystem and the wind control processing subsystem 32 belong to the same company; then the user meeting the requirements may also be considered a pre-agreed merchant processing subsystem.
A feature merging unit 62, configured to merge the first risk information and the second risk information according to a preset risk feature standard, and extract risk feature information; the combining treatment mode can comprise screening or filtering and the like.
Because first risk information and second risk information include the multiple, not all risk information all have the risk characteristic, consequently need to carry out the amalgamation processing according to the risk characteristic standard of presetting first risk information and second risk information, extract risk characteristic information, risk characteristic information includes: direct risk characteristic information and risk accumulation variables; the direct risk characteristic information represents risk characteristic information that can be directly determined according to a risk characteristic standard. The risk characteristic standard comprises an identifier for describing the transaction risk degree, for example, if an IP address registered by an account number of a beneficial user is registered in overseas high-risk areas, the registered IP address can be considered as risk characteristic information; when the account number grade of the beneficial user and the account number maturity level of the payment user are both low, the account number grade of the beneficial user and the account number maturity of the payment user can be determined to be risk characteristic information and the like. For the same reason, if the account registration IP of the beneficial user is not registered in the overseas high-risk area, the registered IP address is not considered to be the risk characteristic information, and the registered IP address is filtered when the risk characteristic information is determined.
The risk accumulation variable may include a variable having a certain regularity in a certain period of time, for example, if a network trading platform is a gambling platform, due to a strict time law of the platform, when buying and buying are generally traded at a certain point of time or within a certain period of time, the order generation time and the payment time have a certain regularity, so that the order generation time and the payment time can be regarded as the risk accumulation variable.
A second configuration unit 63, configured to configure an anti-fraud model, where the anti-fraud model includes: the anti-fraud policy and anti-fraud model algorithm, the anti-fraud model algorithm of the embodiments of the present specification may include, but is not limited to, the following: anti-fraud based recognition trees, convolutional neural networks, BP neural networks, deep neural networks, or the like; the anti-fraud strategy is mainly used for judging whether the registered IP address of the beneficial user account is the IP of the high-risk area and the account grade of the beneficial user; determining a relationship network of the payment user and the benefit user, such as whether the payment user and the benefit user are direct friends or indirect friends (whether a friend node exists between a relationship chain of the payment user and the benefit user); or determining the account grade maturity of the payment user and the risk grade of the beneficiary user.
The wind control engine unit 64 may perform risk identification on the current transaction by using an anti-fraud model algorithm and risk characteristic information based on an anti-fraud policy, and finally predict and output a risk identification result and related case information. The risk identification result may include a risk score for the transaction, and generally speaking, the higher the risk score, the higher the risk for the transaction; the case information includes the reason for scoring the risk, so that the merchant processing subsystem 33 can analyze the transaction again according to the risk identification result and the case information. For example, the risk characteristic information of the beneficial user can be utilized to depict the characteristics of a cheater, and when the registration area of the account number registration IP of the beneficial user is determined to be located in an overseas high-risk area, the transaction risk is determined to be higher; or, the account number level of the beneficial user and the account number maturity of the payment user are analyzed at the same time, and if the account number level of the beneficial user and the account number maturity of the payment user are both low, it is determined that the risk of the transaction is very high, and basically, the transaction can be defined as a fraud transaction, so that the corresponding risk score is high.
After the wind control engine unit 64 obtains the risk identification result and the case information, the risk identification result and the case information are sent to the merchant processing subsystem 33. Here, with continued reference to fig. 5, the merchant processing subsystem 33 further includes:
a second data receiving unit 54 for receiving the risk identification result;
the first configuration unit 55 is configured to pre-configure a risk threshold range of the risk identification result and a pushing range of the case information;
since the merchant processing subsystem 33 may collect more information of the benefited user, and the information is not necessarily all sent to the wind control processing subsystem 32, the first configuration unit 55 may also configure a risk threshold range of the risk identification result according to the information, where the risk threshold range may also be understood as a risk scoring range of the transaction, and a pushing range of the case information may be understood as a screening range of the scoring reason.
For example, the case information sent by the wind control processing subsystem 32 includes analysis of information such as a registration IP address, registration time, and an account level of the beneficial user account, but the merchant processing subsystem 33 considers that there is no reference value in the analysis of the registration time, so that when the push range of the case information is configured, the analysis information of the registration time is filtered, and only analysis of the account registration IP and the account level of the beneficial user is received.
The decision unit 56 is configured to determine whether the received risk identification result is within the risk threshold range, and if so, determine that the current transaction is a risk transaction and the beneficial user is a risk user, and manage and control an account of the beneficial user.
For example, the risk identification result is 20, which represents that the risk score of the transaction is 20, and if the risk threshold range is not less than 15, the decision unit 46 determines that the transaction is a high risk transaction, and performs decision processing on the benefit user, such as managing and controlling an account of the benefit user. Here, there is often a certain time for the benefit user to receive the message of successful payment and then remove the account, for example, the account can be removed in 10 to 20 minutes after the fraud is successful, then in this time, the decision unit 56 may manage and control the account of the benefit user, for example, perform freezing, closing or logout, so as to avoid the loss of the payment user.
In the embodiment of the specification, risk data of a benefited user and risk data of a transaction main body are combined, risk characteristic information is extracted, and risk identification is performed on the current transaction by using risk characteristics, so that the risk characteristics of the benefited user and the transaction main body are considered at the same time, the coverage rate of the risk characteristics is increased, whether the transaction is a fraudulent transaction can be accurately identified, and the identification accuracy can be improved by at least 20%; and the risk identification result is sent to the merchant processing subsystem, and the merchant processing subsystem can timely and effectively control the account of the fraudster, so that the fraudster behavior of the beneficiary user is controlled from the source, the overall effect of fraud prevention and control is improved, the telecom fraud of the beneficiary user through the network transaction platform is avoided, the payment user is prevented from being subjected to economic loss, and the reliability of the network transaction platform is also improved.
In a third aspect, based on the same inventive concept, an embodiment of this specification provides a wind control method, please refer to fig. 7, where the method includes: includes steps S710 to S711.
S710, acquiring first risk information of a transaction main body corresponding to the current transaction and second risk information of a benefit user corresponding to the current transaction;
and S711, performing risk identification on the current transaction according to the first risk information and the second risk information to obtain a risk identification result.
And after the risk identification is obtained, sending a risk identification result to a merchant processing subsystem corresponding to the current transaction, wherein the risk identification result is used for the merchant processing subsystem to carry out decision processing on the beneficial users corresponding to the current transaction.
In a fourth aspect, based on the same inventive concept, an embodiment of the present specification provides a wind control system, please refer to fig. 8, where the wind control system includes: a payment data subsystem 31 and a wind control processing subsystem 32; wherein,
the payment data subsystem 31 is configured to acquire first risk information of a transaction main body corresponding to a current transaction, and send the first risk information to the wind control processing subsystem 32;
the wind control processing subsystem 32 is configured to communicate with the merchant processing subsystem 33 provided in the first aspect, and obtain second risk information of a benefited user corresponding to the current transaction in the merchant processing subsystem 33; and performing risk identification on the current transaction according to the first risk information and the second risk information to obtain a risk identification result.
And sending the risk identification result to the merchant processing subsystem 33, wherein the risk identification result is used for the merchant processing subsystem 33 to perform decision processing on the beneficial users according to the risk identification result.
In a fifth aspect, based on the same inventive concept, an embodiment of the present specification further provides a method for performing a wind control process, which is applied to the merchant processing subsystem of the fifth aspect, and with reference to fig. 9, includes: steps S910 to S911;
s910, receiving a risk identification result, wherein the risk identification result is identified by the wind control system based on first risk information of a transaction main body corresponding to the current transaction and second risk information of a benefit user corresponding to the current transaction;
before the wind control system identifies a risk identification result based on first risk information of a transaction main body corresponding to the current transaction and second risk information of a benefit user corresponding to the current transaction, the method further comprises the following steps: and sending second risk information of the beneficial users to the wind control system.
In an alternative implementation, before receiving the risk identification result, the method includes:
receiving second risk information of the beneficiary user sent by the order receiving merchant;
converting the data format of the second risk information into a data format supported by a wind control system;
and sending the second risk information after the data format conversion to a wind control system.
And S911, judging whether the risk identification result is within a preset risk threshold range, and if so, performing decision processing on a benefited user corresponding to the current transaction.
In a sixth aspect, based on the same inventive concept, an embodiment of the present specification further provides a merchant processing subsystem 33 for performing a wind-controlled processing, where the merchant processing subsystem 33 communicates with the wind-controlled system provided in the third aspect, and sends second risk information of a benefited user corresponding to a current transaction to the wind-controlled system, and with continuing reference to fig. 5, the merchant processing subsystem 33 includes:
a second data receiving unit 54, configured to receive a risk identification result, where the risk identification result is identified by the wind control system based on first risk information of a transaction subject corresponding to the current transaction and second risk information of a benefit user corresponding to the current transaction;
a first configuration unit 55, configured to configure a risk threshold range of the risk identification result in advance;
and the decision unit 56 is configured to determine whether the received risk identification result is within the risk threshold range, determine that the current transaction is a risk transaction, determine that a benefited user is a risk user, and perform decision processing on the benefited user if the received risk identification result is within the risk threshold range.
In an optional implementation, the merchant processing subsystem 33 further includes:
a second data obtaining unit 51, configured to receive second risk information of the beneficial user sent by the order receiving merchant;
a second data processing unit 52, configured to convert the data format of the second risk information into a data format supported by the wind control system;
and the second data sending unit 53 is configured to send the second risk information after data format conversion to the wind control system.
In a seventh aspect, based on the same inventive concept as the wind control method in the foregoing embodiments, the present invention further provides a computer device, as shown in fig. 10, including a memory 1004, a processor 1002, and a computer program stored in the memory 1004 and executable on the processor 1002, where the processor 1002 executes the computer program to implement the steps of any one of the wind control methods in the foregoing.
Where in fig. 10 a bus architecture (represented by bus 1000) is shown, bus 1000 may include any number of interconnected buses and bridges, and bus 1000 links together various circuits including one or more processors, represented by processor 1002, and memory, represented by memory 1004. The bus 1000 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. Bus interface 1006 provides an interface between bus 1000 and receiver 1001 and transmitter 1003. The receiver 1001 and the transmitter 1003 may be the same element, i.e., a transceiver, providing a means for communicating with various other apparatus over a transmission medium. The processor 1002 is responsible for managing the bus 1000 and general processing, and the memory 1004 may be used for storing data used by the processor 1002 in performing operations.
In an eighth aspect, based on the inventive concept of the wind control method in the foregoing embodiments, the present invention further provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, realizes the steps of any one of the foregoing wind control method, a method for performing wind control processing, and a wind control processing method.
It should be noted that, in the present specification, all the embodiments are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for other embodiments such as the method, since they are substantially similar to the embodiment of the wind control system of the first aspect, the description is relatively simple, and the relevant points can be referred to the partial description of the embodiment of the wind control processing system of the first aspect.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present specification have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all changes and modifications that fall within the scope of the specification.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present specification without departing from the spirit and scope of the specification. Thus, if such modifications and variations of the present specification fall within the scope of the claims of the present specification and their equivalents, the specification is intended to include such modifications and variations.