CN110310007A - Risk Identification Method, device, equipment and storage medium - Google Patents
Risk Identification Method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN110310007A CN110310007A CN201910431482.9A CN201910431482A CN110310007A CN 110310007 A CN110310007 A CN 110310007A CN 201910431482 A CN201910431482 A CN 201910431482A CN 110310007 A CN110310007 A CN 110310007A
- Authority
- CN
- China
- Prior art keywords
- risk
- object management
- identification
- logistics object
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
Abstract
The embodiment of the application provides a risk identification method, a risk identification device, equipment and a storage medium, so as to reduce malicious preemption of resources of logistics object providing equipment. The method comprises the following steps: receiving a risk verification request sent by logistics object management equipment, wherein the risk verification request is used for verifying the risk of a storage behavior; acquiring verification parameters from the risk verification request, and calling a risk identification strategy to verify the verification parameters; and generating a corresponding risk verification response according to the verification result and returning the risk verification response so that the logistics object management equipment determines an access result according to the risk verification response. Risk identification can be carried out at the end close to the logistics object management equipment, the real-time performance and the efficiency of identification are high, whether the user is allowed to store or not can be determined based on the risk verification response, and real-time risk prevention and control under the weak network environment are achieved.
Description
Technical field
This application involves field of computer technology, set more particularly to a kind of Risk Identification Method and device, a kind of electronics
Standby and a kind of storage medium.
Background technique
With the development of e-commerce, more and more users do shopping on the net, and shopping online can pass through express delivery etc.
Logistics carries out commodity distribution, so that user, which is in, can receive the commodity of purchase.
But during logistics distribution, delivering goods to the customers is than a relatively time-consuming ring, if user stays out etc. no
The case where facilitating picking, then dispensing may delay.Therefore the logistics Object Management group equipment such as express self-taking cabinet is produced, used
Family stay out etc. inconvenient picking the case where when can be by commodity storage in express self-taking cabinet, user can obtain at a convenient time and deposit
The commodity put.
Currently, You Duojia express self-taking cabinet provider provides express self-taking cabinet service, each express delivery on cell, community and other places
Self-carry cabinet provider is to seize market, often provides and the marketing methods such as freely uses, uses at a low price, but express self-taking cabinet is every
A cell, community etc. still fall within more rare, limited resource.Therefore, there have been a large amount of smallclothes persons to use false package
Malice occupies the phenomenon that express self-taking cabinet, wastes the resource of express self-taking cabinet, and user in need is not available express delivery
Pick up by oneself cabinet.
Summary of the invention
The embodiment of the present application provides a kind of Risk Identification Method, to reduce the money that malice seizes logistics object offer equipment
Source.
Correspondingly, the embodiment of the present application also provides a kind of risk identification device, a kind of electronic equipment and a kind of storage Jie
Matter, to guarantee the implementation and application of the above method.
To solve the above-mentioned problems, the embodiment of the present application discloses a kind of Risk Identification Method, is applied to logistics to orthicon
The Edge Server of reason system, which comprises receive the risk checking request that logistics Object Management group equipment is sent, the wind
Dangerous checking request is used to verify the risk of storage behavior;Certificate parameter is obtained from the risk checking request, and risk is called to know
Strategy does not verify the certificate parameter;Corresponding risk auth response is generated according to verification result and is returned, with toilet
It states logistics Object Management group equipment and determines access results according to the risk auth response.
Optionally, the certificate parameter includes: identification information, the calling risk identification strategy to the certificate parameter into
Row verifying, is comprised at least one of the following: being verified using abnormal behaviour name single pair identification information;Count the identification information pair
The request frequency answered verifies the request frequency according to high frequency behavioral strategy.
Optionally, the calling risk identification strategy verifies the certificate parameter, comprising: passes through the wind of various dimensions
Dangerous recognition strategy verifies corresponding certificate parameter, obtains the corresponding risk score value of multiple dimensions as verification result.
Optionally, described to generate corresponding risk auth response according to verification result, comprising: by the corresponding wind of multiple dimensions
The weight of dangerous score value and corresponding dimension is weighted, and obtains corresponding weighted results;According to weighted results generation pair
The risk auth response answered.
Optionally, further includes: usage behavior information of the acquisition user for logistics Object Management group equipment;Upload the use
Behavioural information is to central server, so that the central server is based on the use information and updates risk identification strategy.
The embodiment of the present application also discloses a kind of risk identification device, the edge service applied to logistics Object Management System
Device, described device include: receiving module, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk
Checking request is used to verify the risk of storage behavior;Authentication module, for obtaining certificate parameter from the risk checking request,
Risk identification strategy is called to verify the certificate parameter;Respond module, for generating corresponding wind according to verification result
Dangerous auth response simultaneously returns, so that the logistics Object Management group equipment determines access results according to the risk auth response.
Optionally, the certificate parameter includes: identification information, the authentication module, for using abnormal behaviour name single pair
Identification information is verified;And/or the corresponding request frequency of the identification information is counted, according to high frequency behavioral strategy to described
The request frequency is verified.
Optionally, the authentication module carries out corresponding certificate parameter for the risk identification strategy by various dimensions
Verifying, obtains the corresponding risk score value of multiple dimensions as verification result.
Optionally, the respond module, for carrying out the weight of the corresponding risk score value of multiple dimensions and corresponding dimension
Weighted calculation obtains corresponding weighted results;Corresponding risk auth response is generated according to the weighted results.
Optionally, further includes: acquisition update module, for acquiring user for the usage behavior of logistics Object Management group equipment
Information;The usage behavior information is uploaded to central server, so that the central server is updated based on the use information
Risk identification strategy.
The embodiment of the present application also discloses a kind of electronic equipment, comprising: processor;And memory, being stored thereon with can hold
Line code, when the executable code is performed, so that the processor is executed as one or more in the embodiment of the present application
The Risk Identification Method.
The embodiment of the present application also discloses one or more machine readable medias, is stored thereon with executable code, works as institute
It states executable code to be performed, so that processor executes the risk identification side as described in one or more in the embodiment of the present application
Method.
Compared with prior art, the embodiment of the present application includes the following advantages:
In the embodiment of the present application, logistics Object Management group equipment can be transmitted risk checking request and give logistics Object Management System
Edge Server, the Edge Server can based on the certificate parameter in request, call risk identification strategy carry out risk verifying,
So as to carry out risk identification close to logistics Object Management group equipment end, real-time, the efficiency of identification are higher, test according to risk
The result of card can be generated risk auth response and return to logistics Object Management group equipment, so as to be based on the risk auth response
It determines whether that user is wanted to store, realizes the real-time risk prevention system under weak net environment.
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of physical object management system of the embodiment of the present application;
Fig. 2 is a kind of step flow chart of Risk Identification Method embodiment of the application;
Fig. 3 is the step flow chart of another Risk Identification Method embodiment of the application;
Fig. 4 is the step flow chart of another Risk Identification Method embodiment of the application;
Fig. 5 is the structural block diagram of another risk identification Installation practice of the application;
Fig. 6 is the structural block diagram of another risk identification Installation practice of the application;
Fig. 7 is the structural schematic diagram for the device that one embodiment of the application provides.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Applying mode, the present application will be further described in detail.
The embodiment of the present application can be applied to logistics Object Management System, the logistics Object Management System may include server and
Logistics Object Management group equipment.Wherein, which is a kind of distributed system, it is possible to provide cloud computing service, clothes
Business device includes central server and Edge Server, so that equipment can improve processing nearby using the resource of Edge Server
Efficiency.
In a kind of example of physical object management system as shown in Figure 1, the logistics Object Management System include in it is genuinely convinced
Business device 10, Edge Server 20 and logistics Object Management group equipment 30, wherein Edge Server 20 includes Edge Server 201, side
Edge server 202 ... Edge Server 20n, logistics Object Management group equipment 30 include logistics Object Management group equipment 301, logistics
Object Management group equipment 302 ... logistics Object Management group equipment 30n, wherein n is the positive integer greater than 2.Logistics pair in this example
As management equipment and Edge Server are one-to-one relationship, in actual treatment, an Edge Server can also correspond to multiple objects
Flow object management equipment, such as an Edge Server correspond to the equipment in certain area, such as are arranged one in a cell
A Edge Server, then the logistics Object Management group equipment of the cell can share the service of an Edge Server.The application is implemented
In example, it can also be to be arranged in logistics Object Management group equipment that Edge Server, which can be an individual physical server equipment,
Software systems, module, device, virtual server etc. can be specifically arranged according to demand.
Wherein, logistics Object Management group equipment refers to the equipment for being able to carry out logistics object and other items access, management, logistics
Object Management group equipment includes logistics object by the cabinet body and controlling terminal, the cabinet body for including reserve flow object and other items
Memory space, which may include the components such as main control chip, display, consequently facilitating based on the controlling terminal control,
Manage the storage and taking-up of logistics object and other items.Logistics Object Management group equipment includes express self-taking cabinet etc., thus by fast
Sending and collecting for express delivery can be carried out by passing self-carry cabinet.Logistics object refer to the object handled in logistics system such as package, cargo,
Commodity etc..
The embodiment of the present application is provided with risk identification device in the server, which can be used in business disliking
The risk prevention system of meaning behavior, such as the risk identification of the behaviors such as malice occupancy is carried out to the storage resource of logistics Object Management group equipment
And processing, wherein may include various risk identification strategies.It wherein, can be genuinely convinced in for convenient for being rapidly performed by risk identification
Risk identification device is respectively set in business device and Edge Server, wherein the risk identification device in Edge Server being capable of base
Risk identification is carried out in risk identification strategy, the risk identification device of central server may include more complicated risk identification mould
Type and risk identification strategy etc., and risk identification strategy can be managed.
By the way that risk identification device is arranged in Edge Server, can be set based on edge calculations technology to logistics Object Management group
It is standby that risk identification service is provided, to realize weak net in the local or proximal end of logistics Object Management group equipment by Edge Server
Real-time risk prevention system under environment.Wherein, edge calculations (Edge computing) refer to close to the one of object or data source header
Side, the open system being integrated using network, calculating, storage, application core ability, provides front end services nearby, applies journey
Sequence is initiated in edge side, and operation is dispersed in the proximal device processing close to data source, shares the workload of central server, and
No longer need very far away the processing of data back central server, real-time is more preferable, more efficient, delay is most short, or even is not having
There is network, can not access under the extreme cases such as central server, " the patch ground " of edge device will not be interfered to calculate, it can be by edge
It calculates and is interpreted as a kind of physically close to the technology of the position that data generate processing data.
Referring to Fig. 2, a kind of step flow chart of Risk Identification Method embodiment of the application is shown.
Step 202, the risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for testing
Demonstrate,prove the risk of storage behavior.
User need in logistics Object Management group equipment store article when, can operate logistics Object Management group equipment or other outside
Portion's equipment, so that logistics Object Management group equipment can receive storage request, determination needs deposit flow object to the logistics object
In management equipment.It usually needs to log in logistics Object Management group equipment in deposit flow object, thus logistics Object Management group
Equipment can get user name, user identifier, the title of affiliated logistics service provider, logistics service provider mark of login user etc.,
The amount of space etc. for needing logistics object store space can also be obtained if batch storage.
The embodiment of the present application can carry out the risk identification that malice occupies resource to all users, can also carry out to certain customers
Malice occupies the risk identification, such as the logistics distribution personnel of logistics service provider etc. of resource.It is received in logistics Object Management group equipment
To after storage request, risk checking request can be generated based on storage request, or regard storage request as risk checking request,
Risk checking request is sent to the Edge Server of the logistics Object Management group equipment.The then verifying ginseng in the risk checking request
Number includes identification information, which can identify for user identifier and/or logistics service provider, and certificate parameter may also include request
The other parameters such as amount of space, can specifically be determined according to risk identification strategy.
Step 204, certificate parameter is obtained from the risk checking request, and risk identification strategy is called to join the verifying
Number is verified.
Risk identification device in Edge Server can obtain risk identification from the risk identification device of central server
Strategy, the risk identification strategy can be understood as a kind of scheme set of the malicious act of identification logistics object storage, and risk is known
Strategy can not carry out the identification of malicious act from multiple dimensions.So as to obtain certificate parameter from risk checking request, so
Risk identification device can call the risk identification strategy of storage to verify the certificate parameter afterwards, be confirmed whether by testing
Card.
Wherein, risk identification strategy may include abnormal behaviour list, high frequency behavioral strategy.The abnormal behaviour list can be seen
Work is a kind of blacklist, is stored with the list for often carrying out the user that malicious act such as malice occupies storage resource behavior, should
It can store user identifier and/or logistics service provider mark etc. in list, can be confirmed as existing hence for the user in list
Risk etc..High frequency behavioral strategy is the strategy specified according to the frequency of abnormal behaviour, can be according to using logistics pair in certain time
As the frequency determination of the storage resource of management equipment, such as such as accumulative frequency threshold value of the settable frequency threshold value of the high frequency behavioral strategy
Deng carrying out the identification of malicious act.For example, by detecting each logistics distribution user such as smallclothes person etc., in some period
The phases for voluntarily fetching how many packages can determine the user there are abnormal behaviours.
The calling risk identification strategy verifies the certificate parameter, comprises at least one of the following: using abnormal
Behavior name single pair identification information is verified;The corresponding request frequency of the identification information is counted, according to high frequency behavioral strategy pair
The request frequency is verified.
Verifying for abnormal behaviour list can be stored with the user for having identified malicious act in the abnormal behaviour list
Identification information, such as include user identifier, alternatively, the logistics service provider mark and user identifier etc. of affiliated logistics service provider can
The identification information of one user of unique identification.It can be using the identification information-enquiry abnormal behaviour list in certificate parameter, if mark
Information is known in the abnormal behaviour list, it is determined that corresponding verification result, such as unacceptable verification result or in abnormal row
For the verification result etc. in list.If identification information can determine corresponding verification result, such as not in the abnormal behaviour list
By verification result or not in abnormal behaviour list it is medium.
Verifying for high frequency behavioral strategy, Edge Server can count the frequency of user request according to identification information,
It is such as based on user identifier, or, carrying out frequency statistics based on logistics service provider mark and user identifier.Wherein, in statistics request frequency
The corresponding frequency in statistics available a period of time when secondary, in 24 hours, in one week etc..Such as statistics available use whithin a period of time
Family occupies the times or frequency that amount of storage space is more than amount threshold, and the logistics of batch store function is for another example carried out for providing
Object Management group equipment, the statistics available user uses the times or frequency etc. of batch store function whithin a period of time, to obtain
The corresponding request frequency is verifying the request frequency according to the high frequency behavioral strategy, whether is determining the request frequency
Corresponding verification result is produced such as if the request frequency is more than frequency threshold value beyond the frequency threshold value in high frequency behavioral strategy
Do not pass through etc., if the request frequency is less than frequency threshold value, produce through equal verification results.
In the embodiment of the present application, when carrying out risk identification using the risk identification strategy of above-mentioned different dimensions, any dimension
Risk identification do not pass through, then can determine the risk there are malicious act.Or the weight of setting different dimensions, by different dimensions
Then each risk score value is weighted meter according to respective weights by verification result of the risk score value of risk identification as the dimension
The risk etc. to determine malicious act is calculated, can specifically be set according to demand.
Risk identification strategy higher for requirement of real-time is stored in the risk identification device of Edge Server, for
The risk identification of logistics Object Management group equipment is requested, and Edge Server, which can be transmitted, gives risk identification device, to be known based on risk
Strategy does not carry out risk identification, carries out the quick prevention and control of malicious act.
In the application other embodiment, risk identification device is also equipped in central server, the risk identification
Device can carry out the management of risk identification strategy, and executable logic is complicated and/or knows to the not high risk of requirement of real-time
Other places reason.Then Edge Server can acquire data during risk identification, then be reported to central server, so that center
The risk identification device of server can carry out identification and the risk identification strategy of complicated malicious act based on the data of acquisition
Update, optimum management etc..Wherein, Edge Server can acquire user and the usage behavior of logistics Object Management group equipment is believed
Breath;The usage behavior information is uploaded to central server, so that the central server is based on the use information more fresh air
Dangerous recognition strategy.
Edge Server can acquire user for the usage behavior information of logistics Object Management group equipment, the usage behavior information
It may include user identifier, logistics service provider mark, interior access times, the usage quantity for logistics memory space of set period of time
Etc. behavioural informations, number and quantity as used memory space in one hour, or the logistics for supporting batch store function
Object Management group equipment uses the number of batch store function and each quantity etc..
To which the risk identification device of central server can be based on the usage behavior information update risk identification strategy,
In, the risk identification device of central server can be used more complicated prevention and control strategy and carry out risk identification, then update risk
Corresponding result can also be fed back to Edge Server by recognition strategy.The risk identification device of central server can also be based on wind
Dangerous identification model calculates usage behavior information, identifies that serious or complicated malice accounts for cabinet behavior user etc. as a result, so
It may be updated risk identification strategy afterwards, such as update abnormal behavior list, so as to the risk identification policy distribution that will update to respectively
Edge Server.Consequently facilitating Edge Server can quickly recognize malicious user based on abnormal behaviour list, in its use
It is intercepted when logistics Object Management group equipment based on the hit to list, improves recognition efficiency.
Step 206, corresponding risk auth response is generated according to verification result and returned, so as to the logistics Object Management group
Equipment determines access results according to the risk auth response.
Corresponding risk auth response is produced according to verification result, such as based on passing through or unacceptable verification result can
Generate the risk auth response used for allowing or intercepting to logistics Object Management group equipment.Each dimension verification result can be for another example based on
Risk score value be weighted according to respective weights, obtained weighted results come determine permission or intercept to logistics to orthicon
Manage the risk auth response of equipment used.
After the received risk auth response of logistics Object Management group equipment, it can be determined whether according to the risk auth response
The user uses the storage resource of logistics Object Management group equipment, so as to identify malicious act, reduces the row that malice occupies
For.
To sum up, risk checking request can be transmitted to the edge service of logistics Object Management System in logistics Object Management group equipment
Device, the Edge Server can based on the certificate parameter in request, call risk identification strategy carry out risk verifying, so as to
Risk identification is carried out close to logistics Object Management group equipment end, real-time, the efficiency of identification are higher, and the result according to risk verifying can
To generate risk auth response and return to logistics Object Management group equipment, so as to determine whether to permit based on the risk auth response
Perhaps it wants user to store, realizes the real-time risk prevention system under weak net environment.
It is some in the prior art, for logistics Object Management group equipment resource carry out risk identification when, logistics is to orthicon
Reason equipment sends the requests to central server, and central server recalls the calculating that air control server carries out value-at-risk, then
The value-at-risk being calculated is sent to central server, central server is handed down to corresponding logistics Object Management group equipment again,
The forwarding by multiple equipment is needed, the path of processing is long, influences recognition efficiency.In contrast, in the embodiment of the present application
The risk identification device that logistics Object Management group equipment can call directly Edge Server carries out risk identification, and path is shorter, knows
Other efficiency is higher.
Also, logistics Object Management group equipment usually use WIFI (WIreless-Fidelity, Wireless Fidelity) technology or
The networking of the wireless communication techniques such as 4G.For using central server forwarding air control server to carry out in the scheme of risk identification, often
, there are prevention and control not in time in the delay that risk identification processing and result may often be caused due to the problem of network, and risk omission is asked
Topic.And such issues that be directed to, the embodiment of the present application are based on edge calculations technology, using Edge Server nearby is logistics to orthicon
It manages equipment and risk identification is provided, network delay can be effectively reduced, improve treatment effeciency, carry out prevention and control in time, something lost of reducing risks
Leakage.
On the basis of the above embodiments, the embodiment of the present application also provides a kind of Risk Identification Method, it can be improved wind
The accuracy and efficiency nearly identified.
Referring to Fig. 3, the step flow chart of another Risk Identification Method embodiment of the application is shown.
Step 302, the risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for testing
Demonstrate,prove the risk of storage behavior.
Step 304, certificate parameter is obtained from the risk checking request.
Step 306, it is verified using abnormal behaviour name single pair identification information.
Step 308, the corresponding request frequency of the identification information is counted, according to high frequency behavioral strategy to the request frequency
It is verified.
Step 310, corresponding risk auth response is generated according to verification result.
Step 312, send risk auth response give logistics Object Management group equipment, so as to the logistics Object Management group equipment according to
Access results are determined according to the risk auth response.
Step 314, usage behavior information of the acquisition user for logistics Object Management group equipment.
Step 316, the usage behavior information is uploaded to central server, so that the central server is based on described make
With information update risk identification strategy.
So as to reduce because under weak net environment data transmission, risk return delay etc. caused by risk prevention system omit or prolong
When the problem of, realize real-time prevention and control for risk.
On the basis of the above embodiments, the embodiment of the present application also provides a kind of Risk Identification Method, it can be improved wind
The accuracy and efficiency nearly identified.
Referring to Fig. 4, the step flow chart of another Risk Identification Method embodiment of the application is shown.
Step 402, the risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for testing
Demonstrate,prove the risk of storage behavior.
Step 404, certificate parameter is obtained from the risk checking request.
Step 406, corresponding certificate parameter is verified by the risk identification strategy of various dimensions, obtains multiple dimensions
Corresponding risk score value is as verification result.
Step 408, the weight of the corresponding risk score value of multiple dimensions and corresponding dimension is weighted, is corresponded to
Weighted results.
Step 410, corresponding risk auth response is generated according to the weighted results.
Step 412, send risk auth response give logistics Object Management group equipment, so as to the logistics Object Management group equipment according to
Access results are determined according to the risk auth response.
Step 414, usage behavior information of the acquisition user for logistics Object Management group equipment.
Step 416, the usage behavior information is uploaded to central server, so that the central server is based on described make
With information update risk identification strategy.
Can reduce because under weak net environment data transmission, risk return delay etc. caused by risk prevention system omit or delay
Problem realizes the real-time prevention and control for risk.And risk prevention system can be carried out based on the strategy of various dimensions, improve the standard of prevention and control
True property.
The embodiment of the present application is logistics Object Management group deployed with devices Edge Server, and by a part of high of risk identification
The risk identifications policy deployments such as the relatively simple index clearing strategy of danger, high frequency strategy, logic can subtract on Edge Server
It is few to be omitted or the problem of delay because the data transmission under weak net environment, risk return to risk prevention system caused by delay etc..And side
Edge server also can be used the data such as user behavior and reach central server progress complex model and risk policy processing, identify
The serious high-risk user list of malice, which pushes on Edge Server, to be stored, and the real-time risk prevention system under weak net environment is reached.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to
According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented
Necessary to example.
On the basis of the above embodiments, the present embodiment additionally provides a kind of risk identification device, is applied to logistics object
In the electronic equipments such as the Edge Server of management system.
Referring to Fig. 5, show a kind of structural block diagram of risk identification Installation practice of the application, can specifically include as
Lower module:
Receiving module 502, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk verifying is asked
Seek the risk for verifying storage behavior.
Authentication module 504 calls risk identification strategy to institute for obtaining certificate parameter from the risk checking request
Certificate parameter is stated to be verified.
Respond module 506, for generating corresponding risk auth response according to verification result and returning, so as to the logistics
Object Management group equipment determines access results according to the risk auth response.
To sum up, risk checking request can be transmitted to the edge service of logistics Object Management System in logistics Object Management group equipment
Device, the Edge Server can based on the certificate parameter in request, call risk identification strategy carry out risk verifying, so as to
Risk identification is carried out close to logistics Object Management group equipment end, real-time, the efficiency of identification are higher, and the result according to risk verifying can
To generate risk auth response and return to logistics Object Management group equipment, so as to determine whether to permit based on the risk auth response
Perhaps it wants user to store, realizes the real-time risk prevention system under weak net environment.
Referring to Fig. 6, the structural block diagram of another risk identification Installation practice of the application is shown, can specifically include
Following module:
Receiving module 502, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk verifying is asked
Seek the risk for verifying storage behavior.
Authentication module 504 calls risk identification strategy to institute for obtaining certificate parameter from the risk checking request
Certificate parameter is stated to be verified.
Respond module 506, for generating corresponding risk auth response according to verification result and returning, so as to the logistics
Object Management group equipment determines access results according to the risk auth response.
Update module 508 is acquired, for acquiring user for the usage behavior information of logistics Object Management group equipment;Upload institute
Usage behavior information is stated to central server, so that the central server is based on the use information and updates risk identification plan
Slightly.
In one alternative embodiment, the certificate parameter includes: identification information, the authentication module 504, for using different
Chang Hangwei single pair identification informations are verified;And/or the corresponding request frequency of the identification information is counted, according to high frequency row
The request frequency is verified for strategy.
The authentication module 504, for being verified by the risk identification strategy of various dimensions to corresponding certificate parameter,
The corresponding risk score value of multiple dimensions is obtained as verification result.
The respond module 506, for the weight of the corresponding risk score value of multiple dimensions and corresponding dimension to be weighted
It calculates, obtains corresponding weighted results;Corresponding risk auth response is generated according to the weighted results.
Compared with the existing technology, logistics Object Management group equipment can call directly the risk of Edge Server to the embodiment of the present application
Identification device carries out risk identification, and path is shorter, and recognition efficiency is higher.And it is based on edge calculations technology, is taken using edge
Business device provides risk identification nearby for logistics Object Management group equipment, can effectively reduce network delay, improves treatment effeciency, in time
Carry out prevention and control, omission of reducing risks.
The embodiment of the present application is logistics Object Management group deployed with devices Edge Server, and by a part of high of risk identification
The risk identifications policy deployments such as the relatively simple index clearing strategy of danger, high frequency strategy, logic can subtract on Edge Server
It is few to be omitted or the problem of delay because the data transmission under weak net environment, risk return to risk prevention system caused by delay etc..And side
Edge server also can be used the data such as user behavior and reach central server progress complex model and risk policy processing, identify
The serious high-risk user list of malice, which pushes on Edge Server, to be stored, and the real-time risk prevention system under weak net environment is reached.
The embodiment of the present application also provides a kind of non-volatile readable storage medium, be stored in the storage medium one or
Multiple modules (programs) when the one or more module is used in equipment, can make the equipment execute the application reality
Apply the instruction (instructions) of various method steps in example.
The embodiment of the present application provides one or more machine readable medias, is stored thereon with instruction, when by one or more
When a processor executes, so that electronic equipment executes the method as described in one or more in above-described embodiment.The application is implemented
In example, the electronic equipment includes that the terminal device of the users such as handheld terminal, mobile phone, tablet computer, server (cluster) etc. are each
The equipment of type.
Embodiment of the disclosure can be implemented as using any suitable hardware, firmware, software, or and any combination thereof into
The device of the desired configuration of row, which may include the electronic equipments such as terminal device, server (cluster).Fig. 7 schematically shows
The exemplary means 700 that can be used for realizing each embodiment described herein are gone out.
For one embodiment, Fig. 7 shows exemplary means 700, the device have one or more processors 702,
It is coupled to the control module (chipset) 704 of at least one of (one or more) processor 702, is coupled to control mould
The memory 706 of block 704, is coupled nonvolatile memory (the NVM)/storage equipment 708 for being coupled to control module 704
To one or more input-output apparatus 710 of control module 704, and it is coupled to the network interface of control module 704
712。
Processor 702 may include one or more single or multiple core processors, processor 702 may include general processor or
Any combination of application specific processor (such as graphics processor, application processor, Baseband processor etc.).In some embodiments,
Device 700 can be as equipment such as terminal device, servers (cluster) described in the embodiment of the present application.
In some embodiments, device 700 may include one or more computer-readable medium (examples with instruction 714
Such as, memory 706 or NVM/ store equipment 708) and mutually merge with the one or more computer-readable medium and be configured as
Execute instruction 714 one or more processors 702 to realize module thereby executing movement described in the disclosure.
For one embodiment, control module 704 may include any suitable interface controller, with to (one or more)
At least one of processor 702 and/or any suitable equipment communicated with control module 704 or component provide any appropriate
Interface.
Control module 704 may include Memory Controller module, to provide interface to memory 706.Memory Controller
Module can be hardware module, software module and/or firmware module.
Memory 706 can be used for for example, load of device 700 and storing data and/or instruction 714.One is implemented
Example, memory 706 may include any suitable volatile memory, for example, DRAM appropriate.In some embodiments, it stores
Device 706 may include four Synchronous Dynamic Random Access Memory of Double Data Rate type (DDR4SDRAM).
For one embodiment, control module 704 may include one or more i/o controllers, to deposit to NVM/
It stores up equipment 708 and (one or more) input-output apparatus 710 provides interface.
For example, NVM/ storage equipment 708 can be used for storing data and/or instruction 714.NVM/ storage equipment 708 can wrap
It includes any suitable nonvolatile memory (for example, flash memory) and/or may include that any suitable (one or more) is non-volatile
Property storage equipment (for example, one or more hard disk drive (HDD), one or more CD (CD) drivers and/or one or
Multiple digital versatile disc (DVD) drivers).
NVM/ storage equipment 708 may include a part for the equipment being physically mounted on as device 700
Storage resource or its a part that the equipment can be not necessarily as by equipment access.For example, NVM/ storage equipment 708 can
It is accessed by network via (one or more) input-output apparatus 710.
(one or more) input-output apparatus 710 can be provided for device 700 interface with other any equipment appropriate
Communication, input-output apparatus 710 may include communication component, audio component, sensor module etc..Network interface 712 can be dress
700 offer interfaces are set with by one or more network communications, device 700 can according to one or more wireless network standards and/
Or arbitrary standards in agreement and/or agreement are carried out wireless communication with the one or more components of wireless network, such as are accessed
Wireless network based on communication standard, such as WiFi, 2G, 3G, 4G, 5G or their combination carry out wireless communication.
For one embodiment, at least one of (one or more) processor 702 can be with one of control module 704
Or the logic of multiple controllers (for example, Memory Controller module) is packaged together.For one embodiment, (one or more
It is a) at least one of processor 702 can be packaged together with the logic of one or more controllers of control module 704 with shape
At system in package (SiP).For one embodiment, at least one of (one or more) processor 702 can be with control mould
The logic of one or more controllers of block 704 is integrated on same mold.For one embodiment, (one or more) processing
At least one of device 702 can be integrated on same mold with the logic of one or more controllers of control module 704 with shape
At system on chip (SoC).
In various embodiments, device 700 can be, but not limited to be: server, desk-top calculating equipment or mobile computing are set
Terminal devices such as standby (for example, lap-top computing devices, handheld computing device, tablet computer, net books etc.).In each embodiment
In, device 700 can have more or fewer components and/or different frameworks.For example, in some embodiments, device 700 wraps
Include one or more video cameras, keyboard, liquid crystal display (LCD) screen (including touch screen displays), nonvolatile memory end
Mouth, mutiple antennas, graphic chips, specific integrated circuit (ASIC) and loudspeaker.
Wherein, main control chip can be used in detection device as processor or control module, sensing data, location information
It is stored in equipment Deng storage to memory or NVM/, sensor group can be used as input-output apparatus, and communication interface may include including
Network interface.
The embodiment of the present application also provides a kind of electronic equipment, comprising: processor;And memory, being stored thereon with can hold
Line code, when the executable code is performed, so that the processor is executed as one or more in the embodiment of the present application
The Risk Identification Method.
The embodiment of the present application also provides one or more machine readable medias, are stored thereon with executable code, work as institute
It states executable code to be performed, so that processor executes the risk identification side as described in one or more in the embodiment of the present application
Method.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
It is situated between above to a kind of Risk Identification Method provided herein and device, a kind of electronic equipment and a kind of storage
Matter is described in detail, and specific examples are used herein to illustrate the principle and implementation manner of the present application, above
The explanation of embodiment is merely used to help understand the present processes and its core concept;Meanwhile for the general skill of this field
Art personnel, according to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion this
Description should not be construed as the limitation to the application.
Claims (12)
1. a kind of Risk Identification Method, which is characterized in that applied to the Edge Server of logistics Object Management System, the method
Include:
The risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for verifying storage behavior
Risk;
Certificate parameter is obtained from the risk checking request, and risk identification strategy is called to verify the certificate parameter;
Corresponding risk auth response is generated according to verification result and is returned, so that the logistics Object Management group equipment is according to described in
Risk auth response determines access results.
2. the method according to claim 1, wherein the certificate parameter includes: identification information, the calling wind
Dangerous recognition strategy verifies the certificate parameter, comprises at least one of the following:
It is verified using abnormal behaviour name single pair identification information;
The corresponding request frequency of the identification information is counted, the request frequency is verified according to high frequency behavioral strategy.
3. the method according to claim 1, wherein the calling risk identification strategy to the certificate parameter into
Row verifying, comprising:
Corresponding certificate parameter is verified by the risk identification strategy of various dimensions, obtains the corresponding risk point of multiple dimensions
Value is used as verification result.
4. according to the method described in claim 3, it is characterized in that, described generate corresponding risk verifying sound according to verification result
It answers, comprising:
The weight of the corresponding risk score value of multiple dimensions and corresponding dimension is weighted, corresponding weighted results are obtained;
Corresponding risk auth response is generated according to the weighted results.
5. the method according to claim 1, wherein further include:
User is acquired for the usage behavior information of logistics Object Management group equipment;
The usage behavior information is uploaded to central server, so that the central server is based on the use information more fresh air
Dangerous recognition strategy.
6. a kind of risk identification device, which is characterized in that applied to the Edge Server of logistics Object Management System, described device
Include:
Receiving module, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk checking request is used for
Verify the risk of storage behavior;
Authentication module calls risk identification strategy to the verifying for obtaining certificate parameter from the risk checking request
Parameter is verified;
Respond module, for generating corresponding risk auth response according to verification result and returning, so that the logistics is to orthicon
It manages equipment and determines access results according to the risk auth response.
7. device according to claim 6, which is characterized in that the certificate parameter includes: identification information,
The authentication module, for being verified using abnormal behaviour name single pair identification information;And/or the statistics mark letter
The corresponding request frequency is ceased, the request frequency is verified according to high frequency behavioral strategy.
8. device according to claim 6, which is characterized in that
The authentication module obtains more for being verified by the risk identification strategy of various dimensions to corresponding certificate parameter
The corresponding risk score value of a dimension is as verification result.
9. device according to claim 8, which is characterized in that
The respond module is obtained for the weight of the corresponding risk score value of multiple dimensions and corresponding dimension to be weighted
To corresponding weighted results;Corresponding risk auth response is generated according to the weighted results.
10. device according to claim 6, which is characterized in that further include:
Update module is acquired, for acquiring user for the usage behavior information of logistics Object Management group equipment;Upload the use
Behavioural information is to central server, so that the central server is based on the use information and updates risk identification strategy.
11. a kind of electronic equipment characterized by comprising processor;With
Memory is stored thereon with executable code, when the executable code is performed, so that the processor executes such as
Risk Identification Method described in one or more in claim 1-5.
12. one or more machine readable medias, are stored thereon with executable code, when the executable code is performed,
So that processor executes the Risk Identification Method as described in one or more in claim 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431482.9A CN110310007A (en) | 2019-05-22 | 2019-05-22 | Risk Identification Method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431482.9A CN110310007A (en) | 2019-05-22 | 2019-05-22 | Risk Identification Method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110310007A true CN110310007A (en) | 2019-10-08 |
Family
ID=68075466
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910431482.9A Pending CN110310007A (en) | 2019-05-22 | 2019-05-22 | Risk Identification Method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110310007A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111263302A (en) * | 2020-01-07 | 2020-06-09 | 北京佰才邦技术有限公司 | Hazardous area auditing method and system based on 5G edge computing network |
CN111967322A (en) * | 2020-07-15 | 2020-11-20 | 菜鸟智能物流控股有限公司 | Data processing method and device, electronic equipment and storage medium |
CN111967321A (en) * | 2020-07-15 | 2020-11-20 | 菜鸟智能物流控股有限公司 | Video data processing method and device, electronic equipment and storage medium |
CN113222306A (en) * | 2020-01-21 | 2021-08-06 | 北京三快在线科技有限公司 | Activity event risk identification method and device, readable storage medium and electronic equipment |
CN113240266A (en) * | 2021-05-11 | 2021-08-10 | 北京沃东天骏信息技术有限公司 | Risk management method and device |
CN111967769B (en) * | 2020-08-18 | 2023-06-30 | 支付宝(杭州)信息技术有限公司 | Risk identification method, apparatus, device and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060107306A1 (en) * | 2004-11-15 | 2006-05-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
CN102479408A (en) * | 2010-11-26 | 2012-05-30 | 王正伟 | Storage box assignment method, storage cabinet control method, system and device |
CN107483500A (en) * | 2017-09-25 | 2017-12-15 | 咪咕文化科技有限公司 | A kind of Risk Identification Method based on user behavior, device and storage medium |
CN107645483A (en) * | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | Risk Identification Method, risk identification device, cloud risk identification apparatus and system |
CN107644340A (en) * | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | Risk Identification Method, client device and risk recognition system |
CN108377241A (en) * | 2018-02-12 | 2018-08-07 | 平安普惠企业管理有限公司 | Monitoring method, device, equipment based on access frequency and computer storage media |
CN108875388A (en) * | 2018-05-31 | 2018-11-23 | 康键信息技术(深圳)有限公司 | Real-time risk control method, device and computer readable storage medium |
-
2019
- 2019-05-22 CN CN201910431482.9A patent/CN110310007A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060107306A1 (en) * | 2004-11-15 | 2006-05-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
CN102479408A (en) * | 2010-11-26 | 2012-05-30 | 王正伟 | Storage box assignment method, storage cabinet control method, system and device |
CN107645483A (en) * | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | Risk Identification Method, risk identification device, cloud risk identification apparatus and system |
CN107644340A (en) * | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | Risk Identification Method, client device and risk recognition system |
CN107483500A (en) * | 2017-09-25 | 2017-12-15 | 咪咕文化科技有限公司 | A kind of Risk Identification Method based on user behavior, device and storage medium |
CN108377241A (en) * | 2018-02-12 | 2018-08-07 | 平安普惠企业管理有限公司 | Monitoring method, device, equipment based on access frequency and computer storage media |
CN108875388A (en) * | 2018-05-31 | 2018-11-23 | 康键信息技术(深圳)有限公司 | Real-time risk control method, device and computer readable storage medium |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111263302A (en) * | 2020-01-07 | 2020-06-09 | 北京佰才邦技术有限公司 | Hazardous area auditing method and system based on 5G edge computing network |
CN113222306A (en) * | 2020-01-21 | 2021-08-06 | 北京三快在线科技有限公司 | Activity event risk identification method and device, readable storage medium and electronic equipment |
CN111967322A (en) * | 2020-07-15 | 2020-11-20 | 菜鸟智能物流控股有限公司 | Data processing method and device, electronic equipment and storage medium |
CN111967321A (en) * | 2020-07-15 | 2020-11-20 | 菜鸟智能物流控股有限公司 | Video data processing method and device, electronic equipment and storage medium |
CN111967322B (en) * | 2020-07-15 | 2023-11-24 | 菜鸟智能物流控股有限公司 | Data processing method, device, electronic equipment and storage medium |
CN111967321B (en) * | 2020-07-15 | 2024-04-05 | 菜鸟智能物流控股有限公司 | Video data processing method, device, electronic equipment and storage medium |
CN111967769B (en) * | 2020-08-18 | 2023-06-30 | 支付宝(杭州)信息技术有限公司 | Risk identification method, apparatus, device and medium |
CN113240266A (en) * | 2021-05-11 | 2021-08-10 | 北京沃东天骏信息技术有限公司 | Risk management method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110310007A (en) | Risk Identification Method, device, equipment and storage medium | |
US11026047B2 (en) | Associating multiple user devices with a single user | |
CN110399307A (en) | A kind of test method, test platform and destination server | |
CN106097057B (en) | Virtual article issuing method and device | |
CN107395659A (en) | A kind of method and device of service handling and common recognition | |
US20160275603A1 (en) | Service processing method, device, and terminal | |
CN109379247A (en) | The method and device that the network delay of a kind of pair of application program is detected | |
CN105991694B (en) | A kind of method and apparatus realizing Distributed Services and calling | |
US20210136432A1 (en) | Method for recharging live streaming account, terminal, and storage medium | |
CN109582452A (en) | A kind of container dispatching method, dispatching device and electronic equipment | |
CN107888717A (en) | A kind of domain name determines method, apparatus and electronic equipment | |
CN113935813A (en) | Information display method and device, electronic equipment and storage medium | |
CN110417888A (en) | Flow control methods, volume control device and electronic equipment | |
CN108022096A (en) | A kind of method of mobile payment, device, terminal and readable storage medium storing program for executing | |
CN110097349A (en) | Method for processing resource, device and storage medium | |
CN109003090A (en) | risk control method and device | |
US11087382B2 (en) | Adapting digital order to venue service queue | |
CN107851292A (en) | Device is provided, device, communication resource transaction system, offer method, Application way and control device are provided | |
CN106331024A (en) | Method and device for accessing cloud data | |
CN110232195A (en) | A kind of method and device for simulating delivery process | |
US10834028B2 (en) | Delayed condition-based email delivery | |
CN106603631A (en) | Distributed message system and expansion method thereof | |
CN109905486A (en) | A kind of application program identification methods of exhibiting and device | |
CN115204706A (en) | Robot distribution method and device | |
CN110413486A (en) | The method, apparatus and medium of monitoring system intrinsic call link |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |