CN110310007A - Risk Identification Method, device, equipment and storage medium - Google Patents

Risk Identification Method, device, equipment and storage medium Download PDF

Info

Publication number
CN110310007A
CN110310007A CN201910431482.9A CN201910431482A CN110310007A CN 110310007 A CN110310007 A CN 110310007A CN 201910431482 A CN201910431482 A CN 201910431482A CN 110310007 A CN110310007 A CN 110310007A
Authority
CN
China
Prior art keywords
risk
object management
identification
logistics object
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910431482.9A
Other languages
Chinese (zh)
Inventor
王莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cainiao Smart Logistics Holding Ltd
Original Assignee
Cainiao Smart Logistics Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cainiao Smart Logistics Holding Ltd filed Critical Cainiao Smart Logistics Holding Ltd
Priority to CN201910431482.9A priority Critical patent/CN110310007A/en
Publication of CN110310007A publication Critical patent/CN110310007A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management

Abstract

The embodiment of the application provides a risk identification method, a risk identification device, equipment and a storage medium, so as to reduce malicious preemption of resources of logistics object providing equipment. The method comprises the following steps: receiving a risk verification request sent by logistics object management equipment, wherein the risk verification request is used for verifying the risk of a storage behavior; acquiring verification parameters from the risk verification request, and calling a risk identification strategy to verify the verification parameters; and generating a corresponding risk verification response according to the verification result and returning the risk verification response so that the logistics object management equipment determines an access result according to the risk verification response. Risk identification can be carried out at the end close to the logistics object management equipment, the real-time performance and the efficiency of identification are high, whether the user is allowed to store or not can be determined based on the risk verification response, and real-time risk prevention and control under the weak network environment are achieved.

Description

Risk Identification Method, device, equipment and storage medium
Technical field
This application involves field of computer technology, set more particularly to a kind of Risk Identification Method and device, a kind of electronics Standby and a kind of storage medium.
Background technique
With the development of e-commerce, more and more users do shopping on the net, and shopping online can pass through express delivery etc. Logistics carries out commodity distribution, so that user, which is in, can receive the commodity of purchase.
But during logistics distribution, delivering goods to the customers is than a relatively time-consuming ring, if user stays out etc. no The case where facilitating picking, then dispensing may delay.Therefore the logistics Object Management group equipment such as express self-taking cabinet is produced, used Family stay out etc. inconvenient picking the case where when can be by commodity storage in express self-taking cabinet, user can obtain at a convenient time and deposit The commodity put.
Currently, You Duojia express self-taking cabinet provider provides express self-taking cabinet service, each express delivery on cell, community and other places Self-carry cabinet provider is to seize market, often provides and the marketing methods such as freely uses, uses at a low price, but express self-taking cabinet is every A cell, community etc. still fall within more rare, limited resource.Therefore, there have been a large amount of smallclothes persons to use false package Malice occupies the phenomenon that express self-taking cabinet, wastes the resource of express self-taking cabinet, and user in need is not available express delivery Pick up by oneself cabinet.
Summary of the invention
The embodiment of the present application provides a kind of Risk Identification Method, to reduce the money that malice seizes logistics object offer equipment Source.
Correspondingly, the embodiment of the present application also provides a kind of risk identification device, a kind of electronic equipment and a kind of storage Jie Matter, to guarantee the implementation and application of the above method.
To solve the above-mentioned problems, the embodiment of the present application discloses a kind of Risk Identification Method, is applied to logistics to orthicon The Edge Server of reason system, which comprises receive the risk checking request that logistics Object Management group equipment is sent, the wind Dangerous checking request is used to verify the risk of storage behavior;Certificate parameter is obtained from the risk checking request, and risk is called to know Strategy does not verify the certificate parameter;Corresponding risk auth response is generated according to verification result and is returned, with toilet It states logistics Object Management group equipment and determines access results according to the risk auth response.
Optionally, the certificate parameter includes: identification information, the calling risk identification strategy to the certificate parameter into Row verifying, is comprised at least one of the following: being verified using abnormal behaviour name single pair identification information;Count the identification information pair The request frequency answered verifies the request frequency according to high frequency behavioral strategy.
Optionally, the calling risk identification strategy verifies the certificate parameter, comprising: passes through the wind of various dimensions Dangerous recognition strategy verifies corresponding certificate parameter, obtains the corresponding risk score value of multiple dimensions as verification result.
Optionally, described to generate corresponding risk auth response according to verification result, comprising: by the corresponding wind of multiple dimensions The weight of dangerous score value and corresponding dimension is weighted, and obtains corresponding weighted results;According to weighted results generation pair The risk auth response answered.
Optionally, further includes: usage behavior information of the acquisition user for logistics Object Management group equipment;Upload the use Behavioural information is to central server, so that the central server is based on the use information and updates risk identification strategy.
The embodiment of the present application also discloses a kind of risk identification device, the edge service applied to logistics Object Management System Device, described device include: receiving module, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk Checking request is used to verify the risk of storage behavior;Authentication module, for obtaining certificate parameter from the risk checking request, Risk identification strategy is called to verify the certificate parameter;Respond module, for generating corresponding wind according to verification result Dangerous auth response simultaneously returns, so that the logistics Object Management group equipment determines access results according to the risk auth response.
Optionally, the certificate parameter includes: identification information, the authentication module, for using abnormal behaviour name single pair Identification information is verified;And/or the corresponding request frequency of the identification information is counted, according to high frequency behavioral strategy to described The request frequency is verified.
Optionally, the authentication module carries out corresponding certificate parameter for the risk identification strategy by various dimensions Verifying, obtains the corresponding risk score value of multiple dimensions as verification result.
Optionally, the respond module, for carrying out the weight of the corresponding risk score value of multiple dimensions and corresponding dimension Weighted calculation obtains corresponding weighted results;Corresponding risk auth response is generated according to the weighted results.
Optionally, further includes: acquisition update module, for acquiring user for the usage behavior of logistics Object Management group equipment Information;The usage behavior information is uploaded to central server, so that the central server is updated based on the use information Risk identification strategy.
The embodiment of the present application also discloses a kind of electronic equipment, comprising: processor;And memory, being stored thereon with can hold Line code, when the executable code is performed, so that the processor is executed as one or more in the embodiment of the present application The Risk Identification Method.
The embodiment of the present application also discloses one or more machine readable medias, is stored thereon with executable code, works as institute It states executable code to be performed, so that processor executes the risk identification side as described in one or more in the embodiment of the present application Method.
Compared with prior art, the embodiment of the present application includes the following advantages:
In the embodiment of the present application, logistics Object Management group equipment can be transmitted risk checking request and give logistics Object Management System Edge Server, the Edge Server can based on the certificate parameter in request, call risk identification strategy carry out risk verifying, So as to carry out risk identification close to logistics Object Management group equipment end, real-time, the efficiency of identification are higher, test according to risk The result of card can be generated risk auth response and return to logistics Object Management group equipment, so as to be based on the risk auth response It determines whether that user is wanted to store, realizes the real-time risk prevention system under weak net environment.
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of physical object management system of the embodiment of the present application;
Fig. 2 is a kind of step flow chart of Risk Identification Method embodiment of the application;
Fig. 3 is the step flow chart of another Risk Identification Method embodiment of the application;
Fig. 4 is the step flow chart of another Risk Identification Method embodiment of the application;
Fig. 5 is the structural block diagram of another risk identification Installation practice of the application;
Fig. 6 is the structural block diagram of another risk identification Installation practice of the application;
Fig. 7 is the structural schematic diagram for the device that one embodiment of the application provides.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.
The embodiment of the present application can be applied to logistics Object Management System, the logistics Object Management System may include server and Logistics Object Management group equipment.Wherein, which is a kind of distributed system, it is possible to provide cloud computing service, clothes Business device includes central server and Edge Server, so that equipment can improve processing nearby using the resource of Edge Server Efficiency.
In a kind of example of physical object management system as shown in Figure 1, the logistics Object Management System include in it is genuinely convinced Business device 10, Edge Server 20 and logistics Object Management group equipment 30, wherein Edge Server 20 includes Edge Server 201, side Edge server 202 ... Edge Server 20n, logistics Object Management group equipment 30 include logistics Object Management group equipment 301, logistics Object Management group equipment 302 ... logistics Object Management group equipment 30n, wherein n is the positive integer greater than 2.Logistics pair in this example As management equipment and Edge Server are one-to-one relationship, in actual treatment, an Edge Server can also correspond to multiple objects Flow object management equipment, such as an Edge Server correspond to the equipment in certain area, such as are arranged one in a cell A Edge Server, then the logistics Object Management group equipment of the cell can share the service of an Edge Server.The application is implemented In example, it can also be to be arranged in logistics Object Management group equipment that Edge Server, which can be an individual physical server equipment, Software systems, module, device, virtual server etc. can be specifically arranged according to demand.
Wherein, logistics Object Management group equipment refers to the equipment for being able to carry out logistics object and other items access, management, logistics Object Management group equipment includes logistics object by the cabinet body and controlling terminal, the cabinet body for including reserve flow object and other items Memory space, which may include the components such as main control chip, display, consequently facilitating based on the controlling terminal control, Manage the storage and taking-up of logistics object and other items.Logistics Object Management group equipment includes express self-taking cabinet etc., thus by fast Sending and collecting for express delivery can be carried out by passing self-carry cabinet.Logistics object refer to the object handled in logistics system such as package, cargo, Commodity etc..
The embodiment of the present application is provided with risk identification device in the server, which can be used in business disliking The risk prevention system of meaning behavior, such as the risk identification of the behaviors such as malice occupancy is carried out to the storage resource of logistics Object Management group equipment And processing, wherein may include various risk identification strategies.It wherein, can be genuinely convinced in for convenient for being rapidly performed by risk identification Risk identification device is respectively set in business device and Edge Server, wherein the risk identification device in Edge Server being capable of base Risk identification is carried out in risk identification strategy, the risk identification device of central server may include more complicated risk identification mould Type and risk identification strategy etc., and risk identification strategy can be managed.
By the way that risk identification device is arranged in Edge Server, can be set based on edge calculations technology to logistics Object Management group It is standby that risk identification service is provided, to realize weak net in the local or proximal end of logistics Object Management group equipment by Edge Server Real-time risk prevention system under environment.Wherein, edge calculations (Edge computing) refer to close to the one of object or data source header Side, the open system being integrated using network, calculating, storage, application core ability, provides front end services nearby, applies journey Sequence is initiated in edge side, and operation is dispersed in the proximal device processing close to data source, shares the workload of central server, and No longer need very far away the processing of data back central server, real-time is more preferable, more efficient, delay is most short, or even is not having There is network, can not access under the extreme cases such as central server, " the patch ground " of edge device will not be interfered to calculate, it can be by edge It calculates and is interpreted as a kind of physically close to the technology of the position that data generate processing data.
Referring to Fig. 2, a kind of step flow chart of Risk Identification Method embodiment of the application is shown.
Step 202, the risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for testing Demonstrate,prove the risk of storage behavior.
User need in logistics Object Management group equipment store article when, can operate logistics Object Management group equipment or other outside Portion's equipment, so that logistics Object Management group equipment can receive storage request, determination needs deposit flow object to the logistics object In management equipment.It usually needs to log in logistics Object Management group equipment in deposit flow object, thus logistics Object Management group Equipment can get user name, user identifier, the title of affiliated logistics service provider, logistics service provider mark of login user etc., The amount of space etc. for needing logistics object store space can also be obtained if batch storage.
The embodiment of the present application can carry out the risk identification that malice occupies resource to all users, can also carry out to certain customers Malice occupies the risk identification, such as the logistics distribution personnel of logistics service provider etc. of resource.It is received in logistics Object Management group equipment To after storage request, risk checking request can be generated based on storage request, or regard storage request as risk checking request, Risk checking request is sent to the Edge Server of the logistics Object Management group equipment.The then verifying ginseng in the risk checking request Number includes identification information, which can identify for user identifier and/or logistics service provider, and certificate parameter may also include request The other parameters such as amount of space, can specifically be determined according to risk identification strategy.
Step 204, certificate parameter is obtained from the risk checking request, and risk identification strategy is called to join the verifying Number is verified.
Risk identification device in Edge Server can obtain risk identification from the risk identification device of central server Strategy, the risk identification strategy can be understood as a kind of scheme set of the malicious act of identification logistics object storage, and risk is known Strategy can not carry out the identification of malicious act from multiple dimensions.So as to obtain certificate parameter from risk checking request, so Risk identification device can call the risk identification strategy of storage to verify the certificate parameter afterwards, be confirmed whether by testing Card.
Wherein, risk identification strategy may include abnormal behaviour list, high frequency behavioral strategy.The abnormal behaviour list can be seen Work is a kind of blacklist, is stored with the list for often carrying out the user that malicious act such as malice occupies storage resource behavior, should It can store user identifier and/or logistics service provider mark etc. in list, can be confirmed as existing hence for the user in list Risk etc..High frequency behavioral strategy is the strategy specified according to the frequency of abnormal behaviour, can be according to using logistics pair in certain time As the frequency determination of the storage resource of management equipment, such as such as accumulative frequency threshold value of the settable frequency threshold value of the high frequency behavioral strategy Deng carrying out the identification of malicious act.For example, by detecting each logistics distribution user such as smallclothes person etc., in some period The phases for voluntarily fetching how many packages can determine the user there are abnormal behaviours.
The calling risk identification strategy verifies the certificate parameter, comprises at least one of the following: using abnormal Behavior name single pair identification information is verified;The corresponding request frequency of the identification information is counted, according to high frequency behavioral strategy pair The request frequency is verified.
Verifying for abnormal behaviour list can be stored with the user for having identified malicious act in the abnormal behaviour list Identification information, such as include user identifier, alternatively, the logistics service provider mark and user identifier etc. of affiliated logistics service provider can The identification information of one user of unique identification.It can be using the identification information-enquiry abnormal behaviour list in certificate parameter, if mark Information is known in the abnormal behaviour list, it is determined that corresponding verification result, such as unacceptable verification result or in abnormal row For the verification result etc. in list.If identification information can determine corresponding verification result, such as not in the abnormal behaviour list By verification result or not in abnormal behaviour list it is medium.
Verifying for high frequency behavioral strategy, Edge Server can count the frequency of user request according to identification information, It is such as based on user identifier, or, carrying out frequency statistics based on logistics service provider mark and user identifier.Wherein, in statistics request frequency The corresponding frequency in statistics available a period of time when secondary, in 24 hours, in one week etc..Such as statistics available use whithin a period of time Family occupies the times or frequency that amount of storage space is more than amount threshold, and the logistics of batch store function is for another example carried out for providing Object Management group equipment, the statistics available user uses the times or frequency etc. of batch store function whithin a period of time, to obtain The corresponding request frequency is verifying the request frequency according to the high frequency behavioral strategy, whether is determining the request frequency Corresponding verification result is produced such as if the request frequency is more than frequency threshold value beyond the frequency threshold value in high frequency behavioral strategy Do not pass through etc., if the request frequency is less than frequency threshold value, produce through equal verification results.
In the embodiment of the present application, when carrying out risk identification using the risk identification strategy of above-mentioned different dimensions, any dimension Risk identification do not pass through, then can determine the risk there are malicious act.Or the weight of setting different dimensions, by different dimensions Then each risk score value is weighted meter according to respective weights by verification result of the risk score value of risk identification as the dimension The risk etc. to determine malicious act is calculated, can specifically be set according to demand.
Risk identification strategy higher for requirement of real-time is stored in the risk identification device of Edge Server, for The risk identification of logistics Object Management group equipment is requested, and Edge Server, which can be transmitted, gives risk identification device, to be known based on risk Strategy does not carry out risk identification, carries out the quick prevention and control of malicious act.
In the application other embodiment, risk identification device is also equipped in central server, the risk identification Device can carry out the management of risk identification strategy, and executable logic is complicated and/or knows to the not high risk of requirement of real-time Other places reason.Then Edge Server can acquire data during risk identification, then be reported to central server, so that center The risk identification device of server can carry out identification and the risk identification strategy of complicated malicious act based on the data of acquisition Update, optimum management etc..Wherein, Edge Server can acquire user and the usage behavior of logistics Object Management group equipment is believed Breath;The usage behavior information is uploaded to central server, so that the central server is based on the use information more fresh air Dangerous recognition strategy.
Edge Server can acquire user for the usage behavior information of logistics Object Management group equipment, the usage behavior information It may include user identifier, logistics service provider mark, interior access times, the usage quantity for logistics memory space of set period of time Etc. behavioural informations, number and quantity as used memory space in one hour, or the logistics for supporting batch store function Object Management group equipment uses the number of batch store function and each quantity etc..
To which the risk identification device of central server can be based on the usage behavior information update risk identification strategy, In, the risk identification device of central server can be used more complicated prevention and control strategy and carry out risk identification, then update risk Corresponding result can also be fed back to Edge Server by recognition strategy.The risk identification device of central server can also be based on wind Dangerous identification model calculates usage behavior information, identifies that serious or complicated malice accounts for cabinet behavior user etc. as a result, so It may be updated risk identification strategy afterwards, such as update abnormal behavior list, so as to the risk identification policy distribution that will update to respectively Edge Server.Consequently facilitating Edge Server can quickly recognize malicious user based on abnormal behaviour list, in its use It is intercepted when logistics Object Management group equipment based on the hit to list, improves recognition efficiency.
Step 206, corresponding risk auth response is generated according to verification result and returned, so as to the logistics Object Management group Equipment determines access results according to the risk auth response.
Corresponding risk auth response is produced according to verification result, such as based on passing through or unacceptable verification result can Generate the risk auth response used for allowing or intercepting to logistics Object Management group equipment.Each dimension verification result can be for another example based on Risk score value be weighted according to respective weights, obtained weighted results come determine permission or intercept to logistics to orthicon Manage the risk auth response of equipment used.
After the received risk auth response of logistics Object Management group equipment, it can be determined whether according to the risk auth response The user uses the storage resource of logistics Object Management group equipment, so as to identify malicious act, reduces the row that malice occupies For.
To sum up, risk checking request can be transmitted to the edge service of logistics Object Management System in logistics Object Management group equipment Device, the Edge Server can based on the certificate parameter in request, call risk identification strategy carry out risk verifying, so as to Risk identification is carried out close to logistics Object Management group equipment end, real-time, the efficiency of identification are higher, and the result according to risk verifying can To generate risk auth response and return to logistics Object Management group equipment, so as to determine whether to permit based on the risk auth response Perhaps it wants user to store, realizes the real-time risk prevention system under weak net environment.
It is some in the prior art, for logistics Object Management group equipment resource carry out risk identification when, logistics is to orthicon Reason equipment sends the requests to central server, and central server recalls the calculating that air control server carries out value-at-risk, then The value-at-risk being calculated is sent to central server, central server is handed down to corresponding logistics Object Management group equipment again, The forwarding by multiple equipment is needed, the path of processing is long, influences recognition efficiency.In contrast, in the embodiment of the present application The risk identification device that logistics Object Management group equipment can call directly Edge Server carries out risk identification, and path is shorter, knows Other efficiency is higher.
Also, logistics Object Management group equipment usually use WIFI (WIreless-Fidelity, Wireless Fidelity) technology or The networking of the wireless communication techniques such as 4G.For using central server forwarding air control server to carry out in the scheme of risk identification, often , there are prevention and control not in time in the delay that risk identification processing and result may often be caused due to the problem of network, and risk omission is asked Topic.And such issues that be directed to, the embodiment of the present application are based on edge calculations technology, using Edge Server nearby is logistics to orthicon It manages equipment and risk identification is provided, network delay can be effectively reduced, improve treatment effeciency, carry out prevention and control in time, something lost of reducing risks Leakage.
On the basis of the above embodiments, the embodiment of the present application also provides a kind of Risk Identification Method, it can be improved wind The accuracy and efficiency nearly identified.
Referring to Fig. 3, the step flow chart of another Risk Identification Method embodiment of the application is shown.
Step 302, the risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for testing Demonstrate,prove the risk of storage behavior.
Step 304, certificate parameter is obtained from the risk checking request.
Step 306, it is verified using abnormal behaviour name single pair identification information.
Step 308, the corresponding request frequency of the identification information is counted, according to high frequency behavioral strategy to the request frequency It is verified.
Step 310, corresponding risk auth response is generated according to verification result.
Step 312, send risk auth response give logistics Object Management group equipment, so as to the logistics Object Management group equipment according to Access results are determined according to the risk auth response.
Step 314, usage behavior information of the acquisition user for logistics Object Management group equipment.
Step 316, the usage behavior information is uploaded to central server, so that the central server is based on described make With information update risk identification strategy.
So as to reduce because under weak net environment data transmission, risk return delay etc. caused by risk prevention system omit or prolong When the problem of, realize real-time prevention and control for risk.
On the basis of the above embodiments, the embodiment of the present application also provides a kind of Risk Identification Method, it can be improved wind The accuracy and efficiency nearly identified.
Referring to Fig. 4, the step flow chart of another Risk Identification Method embodiment of the application is shown.
Step 402, the risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for testing Demonstrate,prove the risk of storage behavior.
Step 404, certificate parameter is obtained from the risk checking request.
Step 406, corresponding certificate parameter is verified by the risk identification strategy of various dimensions, obtains multiple dimensions Corresponding risk score value is as verification result.
Step 408, the weight of the corresponding risk score value of multiple dimensions and corresponding dimension is weighted, is corresponded to Weighted results.
Step 410, corresponding risk auth response is generated according to the weighted results.
Step 412, send risk auth response give logistics Object Management group equipment, so as to the logistics Object Management group equipment according to Access results are determined according to the risk auth response.
Step 414, usage behavior information of the acquisition user for logistics Object Management group equipment.
Step 416, the usage behavior information is uploaded to central server, so that the central server is based on described make With information update risk identification strategy.
Can reduce because under weak net environment data transmission, risk return delay etc. caused by risk prevention system omit or delay Problem realizes the real-time prevention and control for risk.And risk prevention system can be carried out based on the strategy of various dimensions, improve the standard of prevention and control True property.
The embodiment of the present application is logistics Object Management group deployed with devices Edge Server, and by a part of high of risk identification The risk identifications policy deployments such as the relatively simple index clearing strategy of danger, high frequency strategy, logic can subtract on Edge Server It is few to be omitted or the problem of delay because the data transmission under weak net environment, risk return to risk prevention system caused by delay etc..And side Edge server also can be used the data such as user behavior and reach central server progress complex model and risk policy processing, identify The serious high-risk user list of malice, which pushes on Edge Server, to be stored, and the real-time risk prevention system under weak net environment is reached.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
On the basis of the above embodiments, the present embodiment additionally provides a kind of risk identification device, is applied to logistics object In the electronic equipments such as the Edge Server of management system.
Referring to Fig. 5, show a kind of structural block diagram of risk identification Installation practice of the application, can specifically include as Lower module:
Receiving module 502, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk verifying is asked Seek the risk for verifying storage behavior.
Authentication module 504 calls risk identification strategy to institute for obtaining certificate parameter from the risk checking request Certificate parameter is stated to be verified.
Respond module 506, for generating corresponding risk auth response according to verification result and returning, so as to the logistics Object Management group equipment determines access results according to the risk auth response.
To sum up, risk checking request can be transmitted to the edge service of logistics Object Management System in logistics Object Management group equipment Device, the Edge Server can based on the certificate parameter in request, call risk identification strategy carry out risk verifying, so as to Risk identification is carried out close to logistics Object Management group equipment end, real-time, the efficiency of identification are higher, and the result according to risk verifying can To generate risk auth response and return to logistics Object Management group equipment, so as to determine whether to permit based on the risk auth response Perhaps it wants user to store, realizes the real-time risk prevention system under weak net environment.
Referring to Fig. 6, the structural block diagram of another risk identification Installation practice of the application is shown, can specifically include Following module:
Receiving module 502, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk verifying is asked Seek the risk for verifying storage behavior.
Authentication module 504 calls risk identification strategy to institute for obtaining certificate parameter from the risk checking request Certificate parameter is stated to be verified.
Respond module 506, for generating corresponding risk auth response according to verification result and returning, so as to the logistics Object Management group equipment determines access results according to the risk auth response.
Update module 508 is acquired, for acquiring user for the usage behavior information of logistics Object Management group equipment;Upload institute Usage behavior information is stated to central server, so that the central server is based on the use information and updates risk identification plan Slightly.
In one alternative embodiment, the certificate parameter includes: identification information, the authentication module 504, for using different Chang Hangwei single pair identification informations are verified;And/or the corresponding request frequency of the identification information is counted, according to high frequency row The request frequency is verified for strategy.
The authentication module 504, for being verified by the risk identification strategy of various dimensions to corresponding certificate parameter, The corresponding risk score value of multiple dimensions is obtained as verification result.
The respond module 506, for the weight of the corresponding risk score value of multiple dimensions and corresponding dimension to be weighted It calculates, obtains corresponding weighted results;Corresponding risk auth response is generated according to the weighted results.
Compared with the existing technology, logistics Object Management group equipment can call directly the risk of Edge Server to the embodiment of the present application Identification device carries out risk identification, and path is shorter, and recognition efficiency is higher.And it is based on edge calculations technology, is taken using edge Business device provides risk identification nearby for logistics Object Management group equipment, can effectively reduce network delay, improves treatment effeciency, in time Carry out prevention and control, omission of reducing risks.
The embodiment of the present application is logistics Object Management group deployed with devices Edge Server, and by a part of high of risk identification The risk identifications policy deployments such as the relatively simple index clearing strategy of danger, high frequency strategy, logic can subtract on Edge Server It is few to be omitted or the problem of delay because the data transmission under weak net environment, risk return to risk prevention system caused by delay etc..And side Edge server also can be used the data such as user behavior and reach central server progress complex model and risk policy processing, identify The serious high-risk user list of malice, which pushes on Edge Server, to be stored, and the real-time risk prevention system under weak net environment is reached.
The embodiment of the present application also provides a kind of non-volatile readable storage medium, be stored in the storage medium one or Multiple modules (programs) when the one or more module is used in equipment, can make the equipment execute the application reality Apply the instruction (instructions) of various method steps in example.
The embodiment of the present application provides one or more machine readable medias, is stored thereon with instruction, when by one or more When a processor executes, so that electronic equipment executes the method as described in one or more in above-described embodiment.The application is implemented In example, the electronic equipment includes that the terminal device of the users such as handheld terminal, mobile phone, tablet computer, server (cluster) etc. are each The equipment of type.
Embodiment of the disclosure can be implemented as using any suitable hardware, firmware, software, or and any combination thereof into The device of the desired configuration of row, which may include the electronic equipments such as terminal device, server (cluster).Fig. 7 schematically shows The exemplary means 700 that can be used for realizing each embodiment described herein are gone out.
For one embodiment, Fig. 7 shows exemplary means 700, the device have one or more processors 702, It is coupled to the control module (chipset) 704 of at least one of (one or more) processor 702, is coupled to control mould The memory 706 of block 704, is coupled nonvolatile memory (the NVM)/storage equipment 708 for being coupled to control module 704 To one or more input-output apparatus 710 of control module 704, and it is coupled to the network interface of control module 704 712。
Processor 702 may include one or more single or multiple core processors, processor 702 may include general processor or Any combination of application specific processor (such as graphics processor, application processor, Baseband processor etc.).In some embodiments, Device 700 can be as equipment such as terminal device, servers (cluster) described in the embodiment of the present application.
In some embodiments, device 700 may include one or more computer-readable medium (examples with instruction 714 Such as, memory 706 or NVM/ store equipment 708) and mutually merge with the one or more computer-readable medium and be configured as Execute instruction 714 one or more processors 702 to realize module thereby executing movement described in the disclosure.
For one embodiment, control module 704 may include any suitable interface controller, with to (one or more) At least one of processor 702 and/or any suitable equipment communicated with control module 704 or component provide any appropriate Interface.
Control module 704 may include Memory Controller module, to provide interface to memory 706.Memory Controller Module can be hardware module, software module and/or firmware module.
Memory 706 can be used for for example, load of device 700 and storing data and/or instruction 714.One is implemented Example, memory 706 may include any suitable volatile memory, for example, DRAM appropriate.In some embodiments, it stores Device 706 may include four Synchronous Dynamic Random Access Memory of Double Data Rate type (DDR4SDRAM).
For one embodiment, control module 704 may include one or more i/o controllers, to deposit to NVM/ It stores up equipment 708 and (one or more) input-output apparatus 710 provides interface.
For example, NVM/ storage equipment 708 can be used for storing data and/or instruction 714.NVM/ storage equipment 708 can wrap It includes any suitable nonvolatile memory (for example, flash memory) and/or may include that any suitable (one or more) is non-volatile Property storage equipment (for example, one or more hard disk drive (HDD), one or more CD (CD) drivers and/or one or Multiple digital versatile disc (DVD) drivers).
NVM/ storage equipment 708 may include a part for the equipment being physically mounted on as device 700 Storage resource or its a part that the equipment can be not necessarily as by equipment access.For example, NVM/ storage equipment 708 can It is accessed by network via (one or more) input-output apparatus 710.
(one or more) input-output apparatus 710 can be provided for device 700 interface with other any equipment appropriate Communication, input-output apparatus 710 may include communication component, audio component, sensor module etc..Network interface 712 can be dress 700 offer interfaces are set with by one or more network communications, device 700 can according to one or more wireless network standards and/ Or arbitrary standards in agreement and/or agreement are carried out wireless communication with the one or more components of wireless network, such as are accessed Wireless network based on communication standard, such as WiFi, 2G, 3G, 4G, 5G or their combination carry out wireless communication.
For one embodiment, at least one of (one or more) processor 702 can be with one of control module 704 Or the logic of multiple controllers (for example, Memory Controller module) is packaged together.For one embodiment, (one or more It is a) at least one of processor 702 can be packaged together with the logic of one or more controllers of control module 704 with shape At system in package (SiP).For one embodiment, at least one of (one or more) processor 702 can be with control mould The logic of one or more controllers of block 704 is integrated on same mold.For one embodiment, (one or more) processing At least one of device 702 can be integrated on same mold with the logic of one or more controllers of control module 704 with shape At system on chip (SoC).
In various embodiments, device 700 can be, but not limited to be: server, desk-top calculating equipment or mobile computing are set Terminal devices such as standby (for example, lap-top computing devices, handheld computing device, tablet computer, net books etc.).In each embodiment In, device 700 can have more or fewer components and/or different frameworks.For example, in some embodiments, device 700 wraps Include one or more video cameras, keyboard, liquid crystal display (LCD) screen (including touch screen displays), nonvolatile memory end Mouth, mutiple antennas, graphic chips, specific integrated circuit (ASIC) and loudspeaker.
Wherein, main control chip can be used in detection device as processor or control module, sensing data, location information It is stored in equipment Deng storage to memory or NVM/, sensor group can be used as input-output apparatus, and communication interface may include including Network interface.
The embodiment of the present application also provides a kind of electronic equipment, comprising: processor;And memory, being stored thereon with can hold Line code, when the executable code is performed, so that the processor is executed as one or more in the embodiment of the present application The Risk Identification Method.
The embodiment of the present application also provides one or more machine readable medias, are stored thereon with executable code, work as institute It states executable code to be performed, so that processor executes the risk identification side as described in one or more in the embodiment of the present application Method.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
It is situated between above to a kind of Risk Identification Method provided herein and device, a kind of electronic equipment and a kind of storage Matter is described in detail, and specific examples are used herein to illustrate the principle and implementation manner of the present application, above The explanation of embodiment is merely used to help understand the present processes and its core concept;Meanwhile for the general skill of this field Art personnel, according to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion this Description should not be construed as the limitation to the application.

Claims (12)

1. a kind of Risk Identification Method, which is characterized in that applied to the Edge Server of logistics Object Management System, the method Include:
The risk checking request that logistics Object Management group equipment is sent is received, the risk checking request is for verifying storage behavior Risk;
Certificate parameter is obtained from the risk checking request, and risk identification strategy is called to verify the certificate parameter;
Corresponding risk auth response is generated according to verification result and is returned, so that the logistics Object Management group equipment is according to described in Risk auth response determines access results.
2. the method according to claim 1, wherein the certificate parameter includes: identification information, the calling wind Dangerous recognition strategy verifies the certificate parameter, comprises at least one of the following:
It is verified using abnormal behaviour name single pair identification information;
The corresponding request frequency of the identification information is counted, the request frequency is verified according to high frequency behavioral strategy.
3. the method according to claim 1, wherein the calling risk identification strategy to the certificate parameter into Row verifying, comprising:
Corresponding certificate parameter is verified by the risk identification strategy of various dimensions, obtains the corresponding risk point of multiple dimensions Value is used as verification result.
4. according to the method described in claim 3, it is characterized in that, described generate corresponding risk verifying sound according to verification result It answers, comprising:
The weight of the corresponding risk score value of multiple dimensions and corresponding dimension is weighted, corresponding weighted results are obtained;
Corresponding risk auth response is generated according to the weighted results.
5. the method according to claim 1, wherein further include:
User is acquired for the usage behavior information of logistics Object Management group equipment;
The usage behavior information is uploaded to central server, so that the central server is based on the use information more fresh air Dangerous recognition strategy.
6. a kind of risk identification device, which is characterized in that applied to the Edge Server of logistics Object Management System, described device Include:
Receiving module, for receiving the risk checking request of logistics Object Management group equipment transmission, the risk checking request is used for Verify the risk of storage behavior;
Authentication module calls risk identification strategy to the verifying for obtaining certificate parameter from the risk checking request Parameter is verified;
Respond module, for generating corresponding risk auth response according to verification result and returning, so that the logistics is to orthicon It manages equipment and determines access results according to the risk auth response.
7. device according to claim 6, which is characterized in that the certificate parameter includes: identification information,
The authentication module, for being verified using abnormal behaviour name single pair identification information;And/or the statistics mark letter The corresponding request frequency is ceased, the request frequency is verified according to high frequency behavioral strategy.
8. device according to claim 6, which is characterized in that
The authentication module obtains more for being verified by the risk identification strategy of various dimensions to corresponding certificate parameter The corresponding risk score value of a dimension is as verification result.
9. device according to claim 8, which is characterized in that
The respond module is obtained for the weight of the corresponding risk score value of multiple dimensions and corresponding dimension to be weighted To corresponding weighted results;Corresponding risk auth response is generated according to the weighted results.
10. device according to claim 6, which is characterized in that further include:
Update module is acquired, for acquiring user for the usage behavior information of logistics Object Management group equipment;Upload the use Behavioural information is to central server, so that the central server is based on the use information and updates risk identification strategy.
11. a kind of electronic equipment characterized by comprising processor;With
Memory is stored thereon with executable code, when the executable code is performed, so that the processor executes such as Risk Identification Method described in one or more in claim 1-5.
12. one or more machine readable medias, are stored thereon with executable code, when the executable code is performed, So that processor executes the Risk Identification Method as described in one or more in claim 1-5.
CN201910431482.9A 2019-05-22 2019-05-22 Risk Identification Method, device, equipment and storage medium Pending CN110310007A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910431482.9A CN110310007A (en) 2019-05-22 2019-05-22 Risk Identification Method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910431482.9A CN110310007A (en) 2019-05-22 2019-05-22 Risk Identification Method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110310007A true CN110310007A (en) 2019-10-08

Family

ID=68075466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910431482.9A Pending CN110310007A (en) 2019-05-22 2019-05-22 Risk Identification Method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110310007A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111263302A (en) * 2020-01-07 2020-06-09 北京佰才邦技术有限公司 Hazardous area auditing method and system based on 5G edge computing network
CN111967322A (en) * 2020-07-15 2020-11-20 菜鸟智能物流控股有限公司 Data processing method and device, electronic equipment and storage medium
CN111967321A (en) * 2020-07-15 2020-11-20 菜鸟智能物流控股有限公司 Video data processing method and device, electronic equipment and storage medium
CN113222306A (en) * 2020-01-21 2021-08-06 北京三快在线科技有限公司 Activity event risk identification method and device, readable storage medium and electronic equipment
CN113240266A (en) * 2021-05-11 2021-08-10 北京沃东天骏信息技术有限公司 Risk management method and device
CN111967769B (en) * 2020-08-18 2023-06-30 支付宝(杭州)信息技术有限公司 Risk identification method, apparatus, device and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060107306A1 (en) * 2004-11-15 2006-05-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
CN102479408A (en) * 2010-11-26 2012-05-30 王正伟 Storage box assignment method, storage cabinet control method, system and device
CN107483500A (en) * 2017-09-25 2017-12-15 咪咕文化科技有限公司 A kind of Risk Identification Method based on user behavior, device and storage medium
CN107645483A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Risk Identification Method, risk identification device, cloud risk identification apparatus and system
CN107644340A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Risk Identification Method, client device and risk recognition system
CN108377241A (en) * 2018-02-12 2018-08-07 平安普惠企业管理有限公司 Monitoring method, device, equipment based on access frequency and computer storage media
CN108875388A (en) * 2018-05-31 2018-11-23 康键信息技术(深圳)有限公司 Real-time risk control method, device and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060107306A1 (en) * 2004-11-15 2006-05-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
CN102479408A (en) * 2010-11-26 2012-05-30 王正伟 Storage box assignment method, storage cabinet control method, system and device
CN107645483A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Risk Identification Method, risk identification device, cloud risk identification apparatus and system
CN107644340A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Risk Identification Method, client device and risk recognition system
CN107483500A (en) * 2017-09-25 2017-12-15 咪咕文化科技有限公司 A kind of Risk Identification Method based on user behavior, device and storage medium
CN108377241A (en) * 2018-02-12 2018-08-07 平安普惠企业管理有限公司 Monitoring method, device, equipment based on access frequency and computer storage media
CN108875388A (en) * 2018-05-31 2018-11-23 康键信息技术(深圳)有限公司 Real-time risk control method, device and computer readable storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111263302A (en) * 2020-01-07 2020-06-09 北京佰才邦技术有限公司 Hazardous area auditing method and system based on 5G edge computing network
CN113222306A (en) * 2020-01-21 2021-08-06 北京三快在线科技有限公司 Activity event risk identification method and device, readable storage medium and electronic equipment
CN111967322A (en) * 2020-07-15 2020-11-20 菜鸟智能物流控股有限公司 Data processing method and device, electronic equipment and storage medium
CN111967321A (en) * 2020-07-15 2020-11-20 菜鸟智能物流控股有限公司 Video data processing method and device, electronic equipment and storage medium
CN111967322B (en) * 2020-07-15 2023-11-24 菜鸟智能物流控股有限公司 Data processing method, device, electronic equipment and storage medium
CN111967321B (en) * 2020-07-15 2024-04-05 菜鸟智能物流控股有限公司 Video data processing method, device, electronic equipment and storage medium
CN111967769B (en) * 2020-08-18 2023-06-30 支付宝(杭州)信息技术有限公司 Risk identification method, apparatus, device and medium
CN113240266A (en) * 2021-05-11 2021-08-10 北京沃东天骏信息技术有限公司 Risk management method and device

Similar Documents

Publication Publication Date Title
CN110310007A (en) Risk Identification Method, device, equipment and storage medium
US11026047B2 (en) Associating multiple user devices with a single user
CN110399307A (en) A kind of test method, test platform and destination server
CN106097057B (en) Virtual article issuing method and device
CN107395659A (en) A kind of method and device of service handling and common recognition
US20160275603A1 (en) Service processing method, device, and terminal
CN109379247A (en) The method and device that the network delay of a kind of pair of application program is detected
CN105991694B (en) A kind of method and apparatus realizing Distributed Services and calling
US20210136432A1 (en) Method for recharging live streaming account, terminal, and storage medium
CN109582452A (en) A kind of container dispatching method, dispatching device and electronic equipment
CN107888717A (en) A kind of domain name determines method, apparatus and electronic equipment
CN113935813A (en) Information display method and device, electronic equipment and storage medium
CN110417888A (en) Flow control methods, volume control device and electronic equipment
CN108022096A (en) A kind of method of mobile payment, device, terminal and readable storage medium storing program for executing
CN110097349A (en) Method for processing resource, device and storage medium
CN109003090A (en) risk control method and device
US11087382B2 (en) Adapting digital order to venue service queue
CN107851292A (en) Device is provided, device, communication resource transaction system, offer method, Application way and control device are provided
CN106331024A (en) Method and device for accessing cloud data
CN110232195A (en) A kind of method and device for simulating delivery process
US10834028B2 (en) Delayed condition-based email delivery
CN106603631A (en) Distributed message system and expansion method thereof
CN109905486A (en) A kind of application program identification methods of exhibiting and device
CN115204706A (en) Robot distribution method and device
CN110413486A (en) The method, apparatus and medium of monitoring system intrinsic call link

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination