CN110866681A - Configuration method and device of risk information pushing strategy - Google Patents

Configuration method and device of risk information pushing strategy Download PDF

Info

Publication number
CN110866681A
CN110866681A CN201911042775.4A CN201911042775A CN110866681A CN 110866681 A CN110866681 A CN 110866681A CN 201911042775 A CN201911042775 A CN 201911042775A CN 110866681 A CN110866681 A CN 110866681A
Authority
CN
China
Prior art keywords
rule
risk information
pushing
risk
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911042775.4A
Other languages
Chinese (zh)
Other versions
CN110866681B (en
Inventor
宋成才
陈露佳
熊建
赵文飙
周志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN201911042775.4A priority Critical patent/CN110866681B/en
Publication of CN110866681A publication Critical patent/CN110866681A/en
Application granted granted Critical
Publication of CN110866681B publication Critical patent/CN110866681B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

A configuration method and a device for a risk information push strategy are provided, wherein the method comprises the following steps: displaying an interactive interface, wherein the interactive interface at least comprises a first type of interactive control used for configuring matching rules and a second type of interactive control used for configuring execution rules; obtaining configuration information input by a user through the interactive interface, wherein the configuration information comprises: matching rule configuration information input through the first type of interactive control and execution rule configuration information input through the second type of interactive control; establishing a corresponding relation between the matching rule configuration information and the execution rule configuration information to generate a risk information pushing strategy item; the risk information pushing policy entry is used for expressing: pushing the risk information of which the data characteristics accord with the matching rules according to the corresponding execution rules; and adding the generated risk information pushing strategy item into a risk information pushing strategy set.

Description

Configuration method and device of risk information pushing strategy
Technical Field
The present application relates to the field of risk information control, and in particular, to a method and an apparatus for configuring a risk information push policy, a method and an apparatus for applying the policy to push risk information, a corresponding system, and an electronic device.
Background
Risk control is of great concern in the financial and e-commerce fields. In risk control, pushing of risk information is an important ring. Along with the development of industry, the types and the quantity of the risk information needing to be pushed are increased day by day, different merchants have different requirements on various types of risk information, and a pushing platform needing the risk information has the capacity of carrying out differential pushing on different risk information.
In the traditional scheme, differential push logic and strategies are written into a program for associated mapping during development and update of a push system, but when the scheme is applied, not only is a new strategy added every time, but also code update of the push system is required, so that the platform expansibility is poor, and because the development personnel are required to provide support for each modification, high maintenance cost is brought, and inconvenience is brought.
Disclosure of Invention
In view of the foregoing problems, the present specification discloses a method and an apparatus for configuring a risk information push policy, a method and an apparatus for applying the policy for pushing risk information, a corresponding system, and an electronic device.
According to a first aspect of embodiments of the present specification, there is provided a method for configuring a risk information push policy, including:
displaying an interactive interface, wherein the interactive interface at least comprises a first type of interactive control used for configuring matching rules and a second type of interactive control used for configuring execution rules;
obtaining configuration information input by a user through the interactive interface, wherein the configuration information comprises: matching rule configuration information input through the first type of interactive control and execution rule configuration information input through the second type of interactive control;
establishing a corresponding relation between the matching rule configuration information and the execution rule configuration information to generate a risk information pushing strategy item; the risk information pushing policy entry is used for expressing: pushing the risk information of which the data characteristics accord with the matching rules according to the corresponding execution rules;
and adding the generated risk information pushing strategy item into a risk information pushing strategy set.
According to a second aspect of embodiments of the present specification, there is provided a risk information pushing method, including:
receiving risk information to be pushed from an upstream risk source, and extracting data characteristics of the risk information;
retrieving the matching strategy items of the risk information to be pushed in a pushing strategy set; wherein the matching policy entry satisfies: the extracted data features conform to the matching rules in the entry;
and pushing the risk information to be pushed according to the execution rule in the matching strategy entry.
According to a third aspect of embodiments of the present specification, there is provided a configuration apparatus for a risk information push policy, including:
the interactive interface display module is used for displaying an interactive interface, and the interactive interface at least comprises a first type of interactive control used for configuring a matching rule and a second type of interactive control used for configuring an execution rule;
a configuration information obtaining module, configured to obtain configuration information input by a user through the interactive interface, where the configuration information includes: matching rule configuration information input through the first type of interactive control and execution rule configuration information input through the second type of interactive control;
the strategy item generation module is used for establishing the corresponding relation between the matching rule configuration information and the execution rule configuration information so as to generate a risk information pushing strategy item; the risk information pushing policy entry is used for expressing: pushing the risk information of which the data characteristics accord with the matching rules according to the corresponding execution rules;
and the policy item management module is used for adding the generated risk information pushing policy items into the risk information pushing policy set.
According to a fourth aspect of embodiments herein, there is provided a risk information pushing apparatus including:
the risk information receiving module is used for receiving the risk information to be pushed from an upstream risk source and extracting the data characteristics of the risk information;
the pushing strategy matching module is used for retrieving the matching strategy items of the risk information to be pushed in the pushing strategy set; wherein the matching policy entry satisfies: the extracted data features conform to the matching rules in the entry;
and the pushing strategy executing module is used for pushing the risk information to be pushed according to the executing rule in the matched strategy item.
According to a fifth aspect of embodiments of the present specification, there is provided a risk information pushing system, including the risk information pushing policy configuration apparatus and the risk information pushing apparatus.
The embodiment of the specification enables the logic for processing the push to be independent from the push platform in the form of a policy table, reduces repeated development of platform functions and improves the expansibility of the platform; meanwhile, the embodiment of the specification provides a friendly user interface, simplifies the operation of strategy editing and reduces the maintenance cost of the system.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with this specification and together with the description, serve to explain the principles.
Fig. 1 is a diagram illustrating an exemplary structure of a risk information push system according to the present specification;
fig. 2 is a schematic structural diagram of risk information pushing policy entries and their sets described in this specification;
fig. 3 is a flowchart illustrating a method for configuring a risk information push policy according to the present disclosure;
FIG. 4 is a simplified illustration of an example of an interactive interface described herein;
FIG. 5 is an exemplary diagram of an interaction control described herein;
fig. 6 is a flowchart illustrating a risk information pushing method according to the present specification;
FIG. 7 is a diagram illustrating logic for blacklisting and whitelisting as described herein;
fig. 8 is a diagram illustrating a configuration apparatus of a risk information push policy according to the present specification;
fig. 9 is a view showing an example of the structure of a risk information pushing apparatus according to the present specification;
fig. 10 is a diagram showing an example of the structure of a computer device described in this specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present disclosure, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in one or more embodiments of the present disclosure. It is to be understood that the described embodiments are only a few, and not all embodiments. All other embodiments that can be derived by one of ordinary skill in the art from one or more embodiments of the disclosure without making any creative effort shall fall within the protection scope of the present application.
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of systems and methods consistent with certain aspects of the present description, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The embodiments disclosed in the present specification are explained in detail below.
In view of the above problems of the conventional risk information push system, the present specification provides a new risk information push system, which can perform differential push for different risk information, and a typical embodiment of the system is shown in fig. 1, and specifically includes:
risk information pushing policy configuration means 101, risk information pushing means 103, wherein:
the risk information pushing policy configuration device 101 is configured to create and maintain a risk information pushing policy set 102, and the risk information pushing device 103 is configured to push according to the risk information pushing policy set 103, specifically: risk information push policy configuration device 101:
the device interacts with a manager to generate and maintain the risk information pushing strategy set, and the details of the device are described in the following relevant description.
Risk information pushing policy set 102:
the expression form of the risk information pushing policy entry required by the risk information pushing device stored in the set may be data at a specific position in a storage medium, an independently stored file, a database, or the like, and a person skilled in the art may select the entry according to specific requirements, which need not be limited in this specification, and details of the inside thereof are described below;
risk information pushing device 103:
the device is connected with an upstream risk information source, determines execution operation aiming at different risk information according to different risk information pushing strategy items, and finally completes the task of carrying out differential pushing on the different risk information, wherein the internal details are described in the following relevant description;
it should be noted that the risk information push policy configuration apparatus 101 and the risk information push apparatus 103 in the above system may be configured and function independently from each other, and do not necessarily exist in the same system at the same time, and for example, the risk information push apparatus 103 does not concern itself with the source or generation method of the push policy set, and thus the risk information push policy set used by the risk information push apparatus is not necessarily generated by the push policy configuration apparatus 101.
The thin arrows in fig. 1 indicate the interaction between the system and the outside, and the wide arrows indicate the data flow inside the system, which is specifically defined in the above summary and the following detailed description of the embodiments of each device.
It is to be understood that the risk information pushing system is not limited to a single physical computer, and may be distributed, and the computer used may be dedicated or multiplexed with other functions, and the present specification is not limited thereto, and those skilled in the art may select a suitable configuration according to the specific implementation environment.
For convenience of understanding, the risk information pushing policy items used by the system and the set thereof will be described first, and then a configuration method of the risk information pushing policy, a risk information pushing method using the policy, and corresponding devices of the two will be described respectively.
For the pushing policy and the set of the risk information, a schematic structural diagram is shown in fig. 2:
the push strategy set comprises a plurality of push strategy items, the push strategy item of the risk information comprises a matching strategy and an execution strategy, and the item means that the risk information hit by the matching strategy of the item is pushed according to the execution strategy.
As can be seen from the above, the actual application of the risk information pushing policy is divided into two stages, namely, a matching stage and an execution stage, and then, the present specification analyzes the scene requirement of the risk information pushing according to the sequence of the matching stage and the execution stage, so as to obtain the characteristics required by the risk information pushing policy in the specific implementation process.
In view of the fact that the system needs to differentially push the risk information from the upstream risk source and needs to identify different risk information according to the matching rule in the risk information pushing policy, in a specific embodiment, the matching rule in the risk information pushing policy may include the key feature and the constraint condition of the value of the key feature.
Further, considering the actual situation of the wind control scenario, for a piece of risk information, what kind of risk information pushing policy should be used for determining it, may generally be a key item such as a risk source, a risk type, a risk level, a merchant cooperation manner, and so on, so in a specific embodiment, the key feature in the matching rule may include one or more of the following: risk sources, risk types, risk levels, merchant collaboration, etc.
After the matching is completed, an execution stage is entered, and considering that the system needs to push various risk information, different upstream risk sources may provide risk information with different forms, and different downstream clients may have different forms required for the risk information, so that the system may need to perform content conversion and then push the risk information.
Further, considering the specific form of the risk information in the wind control scenario, the content transformation is generally performed by field filtering, correspondence and escape, and may also be performed by content desensitization or encryption, so in an embodiment, the content transformation rule in the risk information pushing policy includes: a field correspondence rule, a field screening rule, a field escape rule, a content desensitization rule, and/or a content encryption rule for risk information hit by the matching policy of the entry.
In the execution stage, the system not only needs to perform content conversion for the risk information, but also needs to determine where the risk information is to be pushed, i.e. determine the pushing target, so in a specific embodiment, the execution rule in the risk information pushing policy may include a pushing target rule.
In particular, blacklists are a convenient and efficient method of targeting, which can be applied in the system, and then the blacklists should be recorded in the corresponding risk information push policy, i.e. in a specific embodiment, the push targeting rule includes the blacklists.
Further, although the black list is convenient to use, the situation of 'accidental injury' may occur in use, and a certain remedial measure is needed, so that a white list with higher priority can be adopted to be combined with the black list to be used for determining the target.
For the above various specific embodiments of the risk information pushing policy itself, the following risk information pushing method and risk information pushing policy configuration method have corresponding solutions.
The following describes the technical solutions provided in this specification from two aspects of "push policy generation" and "push policy use", respectively:
fig. 3 is a flowchart illustrating a configuration method of the risk information pushing policy, where the configuration method includes the following steps:
s301, displaying an interactive interface:
in order to facilitate the manager to configure the risk information pushing strategy more quickly and comfortably, an interactive interface which is convenient to operate is obviously necessary. In this step, an interactive interface is presented, the interactive interface includes at least a first type of interactive control and a second type of interactive control, the first type of interactive control is used for configuring the matching rule, and the second type of interactive control is used for configuring the execution rule. It is to be understood that the number of the first type of interactive control and the second type of interactive control is not absolutely limited, but can be adjusted according to specific requirements. An exemplary embodiment of this interactive interface is shown in fig. 6, a specific alternative implementation of which is described below.
S302, obtaining input configuration information:
the interactive interface needs to be displayed and needs to be acquired, and after a user sees the interactive interface displayed in the last step, the user obtains a prompt and enters a strategy configuration stage; specifically, configuration information of the matching rule input by the user can be received through the first type of interactive control in the interactive interface, and similarly, configuration information of the execution rule input by the user can be received through the second type of interactive control in the interactive interface. The configuration information is obtained in what form as follows in the following embodiments.
S303, generating a risk information pushing strategy entry:
after the matching rule configuration information and the execution rule configuration information are obtained, the corresponding relation between the matching rule configuration information and the execution rule configuration information can be established, so that a risk information pushing strategy entry is generated, and the risk information pushing strategy entry is expressed as follows: and pushing the risk information of which the data characteristics accord with the matching rules according to the corresponding execution rules.
S304, adding to a policy set:
and adding the generated risk information pushing strategy item into a risk information pushing strategy set.
The characteristics of the risk information pushing policy entry and the risk information pushing policy set generated by the method are detailed in the above corresponding specific embodiments.
After the basic flow of the strategy configuration stage is defined, the specific design can be carried out by combining the requirement analysis. The above steps are described in a general way, and the following description will use specific examples:
according to the foregoing analysis, the matching rule in the risk information pushing policy may include the key feature and the constraint condition of the value of the key feature. In one scenario, the foregoing interactive interface may provide a configuration control for a constraint condition of a specific key feature, that is, a user can set a constraint condition for a default displayed value of one or more key features to complete configuration of a matching rule.
In the above process, the key features displayed by default are generally items that can significantly reflect the characteristics of risk information, and there are the following items: risk sources, risk types, risk levels, and merchant partnerships, among others. Under the configuration conditions, the user can configure rules such as that the risk type of the risk information is cash register, the risk level of the risk information is to be filed investigation, the merchant cooperation mode involved by the risk information is direct cooperation, and the like, and the user only needs to input constraint conditions because the system is preset with common key characteristics.
Further, it can be understood that several preset key feature items may not satisfy the increasingly expanded services, and may need to be added or deleted, which requires the user to configure the key features autonomously. Correspondingly, the first type of interaction control also includes a control for configuring the key features, so that the key features can be added, deleted, modified and the like according to the configuration information of the user, for example: the user finds that the strategy needs to be matched with a specific strategy for old clients with the cooperation age exceeding 5 years, and then key characteristics of the cooperation age need to be added manually, and the constraint conditions of the characteristic values of the key characteristics are configured by combining the control.
In the execution rules section, there is also a corresponding solution. According to the analysis, the execution rule in the risk information pushing policy may include a content conversion rule; correspondingly, the second type of interactive control in the interactive interface comprises a control for configuring the content conversion rule, and is used for receiving user-defined information of the content conversion rule.
Specifically, the present specification provides several optional target conversion schemes, including a field correspondence rule, a field screening rule, a field escape rule, a content desensitization rule, and a content encryption rule, for example, if a variable name of a certain key ID of the upstream risk information is taskid, and an acceptable variable name of the key ID by a downstream client is tid, the user is required to add the correspondence rules of the upstream risk information and the key ID in the execution rule part of the policy, for example, if the upstream risk information includes partial sensitive information of a victim, and the partial sensitive information cannot be directly exposed to the downstream client, the user is required to configure a desensitization rule in the execution rule part of the policy, so that the system performs desensitization processing on the partial sensitive information.
Obviously, the risk information pushing policy may also include a pushing target rule, and accordingly, the second type of interaction control in the interaction interface includes a control for configuring the pushing target rule, and the user-defined information of the user on the pushing target rule is obtained through the control.
In the foregoing embodiment, the push target rule may include a blacklist, and accordingly, the push target rule configuration information received through the second type of interactive control includes the blacklist. Additionally, the push target rule may include both a blacklist and a whitelist. Correspondingly, the push target rule configuration information received through the second type of interactive control includes the white list and the black list. The specific application logic of the black list and the white list is described in the following section of pushing the application policy, and will not be described in detail here.
For ease of understanding, please refer to fig. 4, fig. 4 is a schematic diagram of an interactive interface:
in this example, a scheme combining the above-mentioned multiple specific embodiments is adopted, and the user-defined constraint conditions of the key features and the values thereof exist together with the content conversion rule and the push target rule. The user can configure the constraint condition of the value of the corresponding key feature through the text box, and can also configure the key feature through a drop-down box or an input mode. It is understood that the figure is only an alternative example, and those skilled in the art can select and combine the above embodiments according to actual needs, and determine the specific layout of the interface by themselves.
On the basis of the scheme, the following designs can be combined:
for example, after the user input content is acquired, the interactive interface performs content checking, and generates a risk information push policy entry according to the user input content when the checking is passed. Further, when the content to be filled is found to be empty, a prompt can be given at a corresponding position on the interactive interface. By adopting the scheme, the strategy content missing caused by negligence of a manager can be greatly reduced, and the checking of the manager on the integrity of the input content can be facilitated.
For another example, after the risk information push policy entry is generated, a conflict check is performed on the existing policy entry in the risk information push policy table, and when the check result indicates no conflict, the newly generated risk information push policy entry is added to the risk information push policy table.
Optionally, according to the content that has been input by the user and the policy entry that exists in the risk information pushing policy table, a prediction prompt or automatic completion may be performed on the content that has not been input by the user. The prediction prompt may be based on the usage habits of the user or based on policy statistics. By applying the scheme, the energy of management personnel can be greatly saved, and the efficiency of strategy configuration is obviously improved.
Optionally, the risk information pushing policy may adopt a multi-level policy structure, and sub-policies having the same parent policy may be classified into one policy group, so that the interactive interface further includes a third type of interactive control for specifying a policy group to which the new policy belongs; the performing of the configuration process of the policy further comprises:
when generating a risk information pushing strategy item, judging whether the item belongs to a strategy group, if so, covering overlapping content with a parent strategy of the item on the basis of the user input content to obtain a risk information pushing strategy item; and if not, directly generating a risk information pushing strategy item according to the user input content.
For reference, the risk information pushing policy entry may be numbered, and in the configuration stage, according to the key feature of the risk information and/or the risk information pushing policy entry number input by the user, if an existing policy entry is found in the risk information pushing policy set, the user is prompted to decide to add a new policy or update the original policy.
By applying the scheme, the convenience of the interactive interface can be improved, and the user experience is enhanced. In one embodiment, one form of presentation of the interactive control is shown in fig. 5, in which a pull-down menu is used to configure key features, a policy numbering system is adopted, and the interactive control has functions of automatically prompting a parent policy, automatically checking input content for errors, and the like.
The above is the description of the "push policy generation" stage in this specification, and the following is a description of a corresponding technical scheme of "push policy use":
referring to fig. 6, fig. 6 is a flowchart of an exemplary embodiment of a method for pushing risk information disclosed in the present specification, including:
s601, receiving the risk information to be pushed:
the first step of pushing the risk information is to receive the risk information to be pushed, the risk information to be pushed may come from different channels and contain different contents, and the differential pushing is to select the specific pushing behavior according to the characteristics of different risk information, so that the data characteristics of the risk information need to be extracted;
s602, retrieving the matched strategy items:
in the scheme of the present specification, the pushing policy is independently removed in a policy set form, so that the risk information to be pushed needs to be retrieved from the risk information pushing policy set according to the data characteristics extracted from the risk information to be pushed, and a matching policy item of the risk information to be pushed is searched; as can be seen from the above, each risk information pushing policy entry includes its own matching rule, where if the extracted data feature conforms to the matching rule in the entry, the entry is the matching rule of the current risk information to be pushed;
s603, pushing is executed:
as can be seen from the above description of the risk information pushing policy entry, the risk pushing policy entry contains an execution rule; after the matching policy item is obtained, the risk information to be pushed can be pushed according to the execution rule in the policy item.
Corresponding to the above-mentioned multiple specific alternatives of the risk information pushing policy, the risk information pushing method also has multiple embodiments, and the following description is one by one according to the sequence of the matching stage and the execution stage:
first consider the matching phase in the risk information push process. In one embodiment, the matching rule includes: the key feature and feature value constraint condition means that the value of the key feature of the risk information to be pushed satisfies the constraint condition, so that the risk information can be matched with the policy. From the technical aspect, the constraint condition may be a regular expression, or may be a simple numerical range, or a list matching, etc., and the specific implementation of the matching process should be adapted to the policy itself, and those skilled in the art should be able to select the configuration according to the above examples.
Further, the key features described above may include: the risk source, the risk type, the risk level, and/or the merchant cooperation manner mean that matching can be achieved only if the values of the risk source, the risk type, the risk level, and/or the merchant cooperation manner satisfy the corresponding constraint conditions according to the configuration in the risk information pushing policy.
Generally, the execution policy for the risk information to be pushed can be determined according to the above-mentioned several important features. It is clear that the above examples only present a few important features that may appear in the field of risk control as examples, it being envisaged that the skilled person may choose the key features for matching according to the specific situation, without this description being limitative.
The execution phase in the process of pushing the risk information follows. In a specific embodiment, the enforcement rule in the risk information pushing policy may include a content conversion rule, and then the enforcing the pushing process includes: and according to the content conversion rule, performing content conversion on the risk information to be pushed, and pushing the converted risk information. The content conversion policy exists to adapt the pushed information, and it has been analyzed in the foregoing that the pushed information needs to be interfaced with various upstream risk information sources and also needs to serve numerous downstream clients, and in order to adapt to different formats, and also to protect part of sensitive information in the risk information to a certain extent, or in other consideration, content conversion may need to be performed on the original data of the risk information.
Further, the content conversion rule may include: and aiming at the field corresponding rule, the field screening rule, the field escape rule, the content desensitization rule and/or the content encryption rule of the risk information hit by the matching strategy of the item. Obviously, the above examples only provide a few common methods for content transformation and data processing that may appear in the field of risk control as examples, and it is conceivable that a person skilled in the art may select a specific method and a processing procedure for content transformation according to specific situations and specific needs, and this specification is not necessarily limited.
For the risk information push, the risk information may be pushed to all users without limitation, or a targeted target may be specified. In a specific embodiment, the enforcement rule in the risk information pushing policy may include a pushing target rule, and the enforcing pushing process includes: determining a pushing target of the risk information to be pushed according to a pushing target rule, and pushing the risk information to be pushed to the pushing target.
Corresponding to the implementation mode of the risk information pushing policy, if the pushing target rule includes a blacklist, it is determined that the pushing target can be implemented in the following manner: and filtering according to the blacklist to obtain a pushing target of the risk information to be pushed. Specifically, an optional scheme is to extract a default push target into a set, mark the default push target according to a blacklist, and use an unmarked push target as a final push target, specifically, which blacklist implementation manner is adopted, and a person skilled in the art can decide according to system characteristics and customer requirements.
In one embodiment, the push target rule may include both a blacklist and a whitelist. The purpose of doing so is to ensure that a small part of targets are not mistakenly injured by the blacklist while keeping that the blacklist can quickly filter a large number of non-push targets, so the basic call logic of the blacklist and the white list is as follows: the white list has a higher priority than the black list. It is to be understood that the black list and the white list are not limited to the narrow list, but may be a set of constraints for judgment. Fig. 7 shows an example of the determination applied to the black list and the white list in this specification, which specifically includes:
if the target to be judged is hit by the white list, determining that the target is a pushing target of the risk information to be pushed and needing to be pushed; if the target to be judged is not hit by the white list and not hit by the black list, determining that the target is a pushing target of the risk information to be pushed and needing to be pushed; and if the target to be judged is not hit by the white list and is hit by the black list, determining that the target is not the pushing target of the risk information to be pushed, and not pushing.
In a specific application, the determining a pushing target manner of the risk information to be pushed may include: and determining a target which is not filtered by the blacklist according to the white list, and filtering according to the blacklist to obtain a pushing target of the risk information to be pushed. Specifically, an optional scheme is that a default push target is extracted into a set, the set is marked according to a black list, the mark is cancelled according to a white list, and the unmarked set is used as a final push target; or judging whether each default push target is in a blacklist and not in a whitelist, and if so, removing the default push targets from the push target set.
Therefore, under the condition that the priority of the white list is higher than that of the black list, the filtering task can be completed, and the implementation mode of the black list and the white list is specifically adopted.
Finally, it can be understood that the method may be possible to match multiple policies simultaneously, in which case, for example, matching a policy entry with an execution rule a and a policy entry with an execution rule B simultaneously, and a feasible solution is to perform pushing according to multiple policies respectively, that is, pushing according to both a and B does not affect each other.
Corresponding to the above method embodiments, the present specification further provides embodiments of a risk information pushing policy configuration device and a risk information pushing device. As can be seen from the foregoing, the two devices may operate independently to solve respective technical problems, and may cooperate with each other to form a risk information push system.
An example of the structure of the risk information pushing policy configuration device is shown in fig. 8, and the device includes:
an interactive interface display module 801, configured to display an interactive interface, where the interactive interface includes at least a first type of interactive control for configuring a matching rule and a second type of interactive control for configuring an execution rule;
a configuration information obtaining module 802, configured to obtain configuration information input by a user through the interactive interface, where the configuration information includes: matching rule configuration information input through the first type of interactive control and execution rule configuration information input through the second type of interactive control;
a policy entry generating module 803, configured to establish a corresponding relationship between the matching rule configuration information and the execution rule configuration information, so as to generate a risk information pushing policy entry; the risk information pushing policy entry is used for expressing: pushing the risk information of which the data characteristics accord with the matching rules according to the corresponding execution rules;
a policy entry management module 804, configured to add the generated risk information pushing policy entry to the risk information pushing policy set.
In one embodiment provided herein, the matching rule includes a key feature and a constraint on a value of the key feature; the first type of interactive control comprises a control for configuring a constraint condition of a value of a key feature; the interactive interface display module is used for: and for at least one key feature, showing a control for configuring the key feature value constraint condition in the interactive interface.
In one embodiment provided in the present specification, the key features include: risk sources, risk types, risk levels, and/or merchant partnerships.
In a specific embodiment provided by the present specification, the first type of interaction control further includes: a control for configuring a key feature; the interactive interface display module is used for: and showing a control for configuring the key feature in the interactive interface.
In one embodiment provided in the present specification, the execution rule includes: a content conversion rule; the second type of interaction control comprises: a control for configuring content conversion rules; the interactive interface display module is used for: and displaying the control for configuring the content conversion rule in the interactive interface.
In one embodiment provided in the present specification, the execution rule includes: pushing a target rule; the second type of interaction control comprises: a control for configuring a push target rule; the interactive interface display module is used for: and displaying the control for configuring the push target rule in the interactive interface.
On the basis of the above embodiments, the device may further combine optimization functions such as content checking, conflict checking, automatic completion, and the like to provide better use experience for the user, and the specific implementation form of the above technical solution may refer to other embodiments of this specification, and details are not repeated here.
The present specification also provides a risk information pushing device, as shown in fig. 9, the risk information pushing device may include:
a risk information receiving module 901, configured to receive risk information to be pushed from an upstream risk source, and extract data features of the risk information;
a push policy matching module 902, configured to retrieve a matching policy entry of the risk information to be pushed from the policy set; wherein the matching policy entry satisfies: the extracted data features conform to the matching rules in the entry;
and the pushing policy executing module 903 is configured to push the risk information to be pushed according to the execution rule in the matching policy entry.
In one embodiment provided in the present specification, the matching rule includes: a key feature and a constraint on a value of the key feature; the extracted data features conform to matching rules in the entry, including: the value of the key feature of the risk information to be pushed meets the constraint condition.
In one embodiment provided in the present specification, the key features include: risk sources, risk types, risk levels, and/or merchant partnerships.
In one embodiment provided in the present specification, the execution rule includes: a content conversion rule; the pushing strategy executing module is used for performing content conversion on the risk information to be pushed according to the content conversion rule and pushing the converted risk information.
In one embodiment provided in this specification, the content conversion rule includes: and aiming at the field corresponding rule, the field screening rule, the field escaping rule, the content desensitization rule and/or the content encryption rule of the risk information to be pushed.
In one embodiment provided in the present specification, the execution rule includes: pushing a target rule; the pushing strategy executing module is used for determining a pushing target of the risk information to be pushed according to the pushing target rule and pushing the risk information to be pushed to the pushing target.
In one embodiment provided herein, the push target rule includes a blacklist; the push policy enforcement module is configured to: and filtering according to the blacklist to obtain a pushing target of the risk information to be pushed.
In a specific embodiment provided in this specification, the push target rule further includes a white list, and the push policy enforcement module is further configured to: and determining the target which is not filtered by the black list according to the white list.
The implementation process of the functions and actions of each unit in the above device has been described in detail in the foregoing method embodiments, and specific reference may be made to the foregoing embodiments, which are not described herein again. For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
Embodiments of the present specification also provide a computer device, including a processor, a memory, and a computer program stored in the memory and executable on the processor; wherein the processor, when executing the computer program, implements the risk information push policy configuration method according to any of the foregoing method embodiments.
Embodiments of the present disclosure also provide a computer device, including a processor, a memory, and a computer program stored in the memory and executable on the processor; wherein the processor, when executing the computer program, implements the risk information pushing method according to any of the preceding method embodiments.
It will be appreciated that although the two computer devices are conceptually two devices, the physical entities may be two separate devices or one device capable of providing both functions.
Referring to fig. 10, a more specific hardware structure diagram of a computing device provided in an embodiment of the present disclosure is shown, where the computing device may include: a processor 1001, a memory 1002, an I/O interface 1003, a communication interface 1004, and a bus 1005. The processor 1001, the memory 1002, the I/O interface 1003, and the communication interface 1004 are communicatively connected to each other within the apparatus via a bus 1005.
In the embodiment of the electronic device, it is understood that the processor 1001 may be a Central Processing Unit (CPU), other general-purpose processors, an Application Specific Integrated Circuit (ASIC), and the like, and is configured to execute a relevant program to implement the technical solutions provided in the embodiments of the present specification.
The Memory 1002 may be a Read-only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash), a hard disk, or a solid state disk. The memory 1002 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1002 and called to be executed by the processor 1001.
The I/O interface 1003 is used for connecting an I/O module to realize information input and output. The I/O module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. Wherein the Input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the Output device may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1005 includes a pathway to transfer information between various components of the device, such as processor 1001, memory 1002, input/output interface 1003, and communication interface 1004.
It should be noted that although the above-mentioned devices only show the processor 1001, the memory 1002, the I/O interface 1003, the communication interface 1004 and the bus 1005, in a specific implementation, the devices may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Moreover, both of the above two conceptual computer devices can adopt the above specific hardware structure, and the specific functions thereof are determined by software or firmware in the memory thereof for implementing the technical solution.
The embodiment of the present specification further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the foregoing risk information pushing policy configuration method; embodiments of the present disclosure also provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the risk information pushing method.
The storage medium may be two storage media storing different programs and implementing different methods, or may be the same storage medium physically storing different programs and implementing different technical solutions.
The computer-readable storage media described above, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiment of the electronic device, since it is substantially similar to the embodiment of the method, the description is simple, and for the relevant points, reference may be made to part of the description of the embodiment of the method.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It will be understood that the present description is not limited to the particular constructions described above and shown in the drawings, but that several modifications and adaptations may be made without departing from the principles of the embodiments of the present description, and should be considered within the scope of the embodiments of the present description.

Claims (31)

1. A configuration method of a risk information push strategy comprises the following steps:
displaying an interactive interface, wherein the interactive interface at least comprises a first type of interactive control used for configuring matching rules and a second type of interactive control used for configuring execution rules;
obtaining configuration information input by a user through the interactive interface, wherein the configuration information comprises: matching rule configuration information input through the first type of interactive control and execution rule configuration information input through the second type of interactive control;
establishing a corresponding relation between the matching rule configuration information and the execution rule configuration information to generate a risk information pushing strategy item; the risk information pushing policy entry is used for expressing: pushing the risk information of which the data characteristics accord with the matching rules according to the corresponding execution rules;
and adding the generated risk information pushing strategy item into a risk information pushing strategy set.
2. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,
the matching rule includes: a key feature and a constraint on a value of the key feature;
the first type of interaction control comprises: a control for configuring constraints on values of the key features;
the display interactive interface comprises: and for at least one key feature, showing a control for configuring the key feature value constraint condition in the interactive interface.
3. The method of claim 2, the key features comprising: risk sources, risk types, risk levels, and/or merchant partnerships.
4. The method of claim 2, wherein the first and second light sources are selected from the group consisting of,
the first type of interaction control further comprises: a control for configuring a key feature;
the display interactive interface comprises: and showing a control for configuring the key feature in the interactive interface.
5. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,
the execution rule includes: a content conversion rule;
the second type of interactive control comprises: a control for configuring content conversion rules;
the display interactive interface comprises: and displaying the control for configuring the content conversion rule in an interactive interface.
6. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,
the execution rule includes: pushing a target rule;
the second type of interactive control comprises: a control for configuring a push target rule;
the display interactive interface comprises: and displaying the control for configuring the push target rule in the interactive interface.
7. A risk information pushing method comprises the following steps:
receiving risk information to be pushed from an upstream risk source, and extracting data characteristics of the risk information;
in the push policy set of claim 1, retrieving matching policy entries for the risk information to be pushed; wherein the matching policy entry satisfies: the extracted data features conform to the matching rules in the entry;
and pushing the risk information to be pushed according to the execution rule in the matching strategy entry.
8. The method of claim 7, wherein the first and second light sources are selected from the group consisting of,
the matching rule includes: a key feature and a constraint on a value of the key feature;
the extracted data features conform to matching rules in the entry, including: and the value of the key feature of the risk information to be pushed meets the constraint condition.
9. The method of claim 8, the key features comprising: risk sources, risk types, risk levels, and/or merchant partnerships.
10. The method of claim 7, wherein the first and second light sources are selected from the group consisting of,
the execution rule includes: a content conversion rule;
the pushing the risk information to be pushed according to the execution rule in the matching policy entry includes: and according to the content conversion rule, performing content conversion on the risk information to be pushed, and pushing the converted risk information.
11. The method of claim 10, the content transformation rules comprising: and aiming at the field corresponding rule, the field screening rule, the field escaping rule, the content desensitization rule and/or the content encryption rule of the risk information to be pushed.
12. The method of claim 7, wherein the first and second light sources are selected from the group consisting of,
the execution rule includes: pushing a target rule;
the pushing the risk information to be pushed according to the execution rule in the matching policy entry includes: and determining a pushing target of the risk information to be pushed according to the pushing target rule, and pushing the risk information to be pushed to the pushing target.
13. The method of claim 12, the push target rule comprising a blacklist, the determining a push target for the risk information to be pushed comprising:
and filtering according to the blacklist to obtain a pushing target of the risk information to be pushed.
14. The method of claim 13, the push target rule further comprising a whitelist, the determining a push target for the risk information to be pushed further comprising:
and determining the target which is not filtered by the blacklist according to the white list.
15. A configuration device of risk information pushing strategy comprises:
the interactive interface display module is used for displaying an interactive interface, and the interactive interface at least comprises a first type of interactive control used for configuring a matching rule and a second type of interactive control used for configuring an execution rule;
a configuration information obtaining module, configured to obtain configuration information input by a user through the interactive interface, where the configuration information includes: matching rule configuration information input through the first type of interactive control and execution rule configuration information input through the second type of interactive control;
the strategy item generation module is used for establishing the corresponding relation between the matching rule configuration information and the execution rule configuration information so as to generate a risk information pushing strategy item; the risk information pushing policy entry is used for expressing: pushing the risk information of which the data characteristics accord with the matching rules according to the corresponding execution rules;
and the policy item management module is used for adding the generated risk information pushing policy items into the risk information pushing policy set.
16. The apparatus as set forth in claim 15, wherein,
the matching rule includes: a key feature and a constraint on a value of the key feature; the first type of interaction control comprises: a control for configuring constraints on values of the key features;
the interactive interface display module is used for: and for at least one key feature, showing a control for configuring the key feature value constraint condition in the interactive interface.
17. The apparatus of claim 16, the key features comprising: risk sources, risk types, risk levels, and/or merchant partnerships.
18. The apparatus of claim 16, wherein the first and second electrodes are disposed in a common plane,
the first type of interaction control further comprises: a control for configuring a key feature;
the interactive interface display module is used for: and showing a control for configuring the key feature in the interactive interface.
19. The apparatus as set forth in claim 15, wherein,
the execution rule includes: a content conversion rule;
the second type of interactive control comprises: a control for configuring content conversion rules;
the interactive interface display module is used for: and displaying the control for configuring the content conversion rule in an interactive interface.
20. The apparatus as set forth in claim 15, wherein,
the execution rule includes: pushing a target rule;
the second type of interactive control comprises: a control for configuring a push target rule;
the interactive interface display module is used for: and displaying the control for configuring the push target rule in the interactive interface.
21. A risk information pushing device, comprising:
the risk information receiving module is used for receiving the risk information to be pushed from an upstream risk source and extracting the data characteristics of the risk information;
a push policy matching module, configured to retrieve a matching policy entry of the risk information to be pushed in the push policy set according to claim 15; wherein the matching policy entry satisfies: the extracted data features conform to the matching rules in the entry;
and the pushing strategy executing module is used for pushing the risk information to be pushed according to the executing rule in the matched strategy item.
22. The apparatus of claim 21, wherein the first and second electrodes are disposed in a common plane,
the matching rule includes: a key feature and a constraint on a value of the key feature;
the extracted data features conform to matching rules in the entry, including: and the value of the key feature of the risk information to be pushed meets the constraint condition.
23. The apparatus of claim 22, the key features comprising: risk sources, risk types, risk levels, and/or merchant partnerships.
24. The apparatus of claim 21, wherein the first and second electrodes are disposed in a common plane,
the execution rule includes: a content conversion rule;
and the pushing strategy executing module is used for performing content conversion on the risk information to be pushed according to the content conversion rule and pushing the converted risk information.
25. The apparatus of claim 24, the content transformation rules comprising: and aiming at the field corresponding rule, the field screening rule, the field escaping rule, the content desensitization rule and/or the content encryption rule of the risk information to be pushed.
26. The apparatus of claim 21, wherein the first and second electrodes are disposed in a common plane,
the execution rule includes: pushing a target rule;
and the pushing strategy executing module is used for determining a pushing target of the risk information to be pushed according to the pushing target rule and pushing the risk information to be pushed to the pushing target.
27. The apparatus of claim 26, the push target rule comprising a blacklist;
the push policy enforcement module is configured to: and filtering according to the blacklist to obtain a pushing target of the risk information to be pushed.
28. The apparatus of claim 27, the push target rule further comprising a whitelist, the push policy enforcement module further to:
and determining the target which is not filtered by the blacklist according to the white list.
29. A risk information pushing system comprising the risk information pushing policy configuring device of claim 15 and the risk information pushing device of claim 21.
30. A computer device comprising a processor, a memory, and a computer program stored in the memory and executable on the processor; wherein the processor, when executing the computer program, implements a configuration method of a risk information push policy according to any one of claims 1 to 6.
31. A computer device comprising a processor, a memory, and a computer program stored in the memory and executable on the processor; wherein the processor, when executing the computer program, implements the risk information pushing method according to any one of claims 7 to 14.
CN201911042775.4A 2019-10-30 2019-10-30 Configuration method and device of risk information pushing strategy Active CN110866681B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911042775.4A CN110866681B (en) 2019-10-30 2019-10-30 Configuration method and device of risk information pushing strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911042775.4A CN110866681B (en) 2019-10-30 2019-10-30 Configuration method and device of risk information pushing strategy

Publications (2)

Publication Number Publication Date
CN110866681A true CN110866681A (en) 2020-03-06
CN110866681B CN110866681B (en) 2022-04-19

Family

ID=69653136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911042775.4A Active CN110866681B (en) 2019-10-30 2019-10-30 Configuration method and device of risk information pushing strategy

Country Status (1)

Country Link
CN (1) CN110866681B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111428131A (en) * 2020-03-17 2020-07-17 苏宁金融科技(南京)有限公司 Information pushing method, device and system
CN111553749A (en) * 2020-05-09 2020-08-18 支付宝(杭州)信息技术有限公司 Activity push strategy configuration method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130311196A1 (en) * 2012-05-18 2013-11-21 Medtronic, Inc. Establishing Risk-Based Study Conduct
CN107316134A (en) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 A kind of risk control method, device, server and storage medium
CN108596424A (en) * 2018-03-06 2018-09-28 中国水利水电科学研究院 Risk information determines method, apparatus and computer readable storage medium
WO2018214935A1 (en) * 2017-05-26 2018-11-29 阿里巴巴集团控股有限公司 Method for determining risk preference of user, information recommendation method, and apparatus
CN109129508A (en) * 2018-09-17 2019-01-04 广州惠创信息科技有限公司 A kind of intelligent robot interactive system
CN109272362A (en) * 2018-09-29 2019-01-25 阿里巴巴集团控股有限公司 A kind of method for pushing, device and the electronic equipment of risk guarantee product
US10410142B1 (en) * 2014-05-06 2019-09-10 United Services Automobile Association (Usaa) Integrated risk analysis management

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130311196A1 (en) * 2012-05-18 2013-11-21 Medtronic, Inc. Establishing Risk-Based Study Conduct
US10410142B1 (en) * 2014-05-06 2019-09-10 United Services Automobile Association (Usaa) Integrated risk analysis management
WO2018214935A1 (en) * 2017-05-26 2018-11-29 阿里巴巴集团控股有限公司 Method for determining risk preference of user, information recommendation method, and apparatus
CN107316134A (en) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 A kind of risk control method, device, server and storage medium
CN108596424A (en) * 2018-03-06 2018-09-28 中国水利水电科学研究院 Risk information determines method, apparatus and computer readable storage medium
CN109129508A (en) * 2018-09-17 2019-01-04 广州惠创信息科技有限公司 A kind of intelligent robot interactive system
CN109272362A (en) * 2018-09-29 2019-01-25 阿里巴巴集团控股有限公司 A kind of method for pushing, device and the electronic equipment of risk guarantee product

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111428131A (en) * 2020-03-17 2020-07-17 苏宁金融科技(南京)有限公司 Information pushing method, device and system
CN111553749A (en) * 2020-05-09 2020-08-18 支付宝(杭州)信息技术有限公司 Activity push strategy configuration method and device

Also Published As

Publication number Publication date
CN110866681B (en) 2022-04-19

Similar Documents

Publication Publication Date Title
US11886609B2 (en) Computer-implemented methods, systems comprising computer-readable media, and electronic devices for secure multi-datasource query job status notificaion
US9645914B1 (en) Apps store with integrated test support
CN111859371B (en) Privacy risk assessment method and device of application program and storage medium
CN110502515B (en) Data acquisition method, device, equipment and computer readable storage medium
CN110866681B (en) Configuration method and device of risk information pushing strategy
US20190286849A1 (en) Data anonymization
KR102478464B1 (en) System, apparatuses, and methods of processing and managing web traffic data
BR102013013607A2 (en) Provision of regeneration via social computer network of a media distribution platform
US10606568B2 (en) Method and apparatus for compiling computer language
US20240232350A1 (en) Detection of suspicious objects in customer premises equipment (cpe)
JP7347888B1 (en) Program, method, information processing device, system
US20140324891A1 (en) Apparatus and method for managing application error
CN104361094A (en) Storage method and device for file in search result, and browser client
CN108563578B (en) SDK compatibility detection method, device, equipment and readable storage medium
KR20130126012A (en) Method and apparatusfor providing report of business intelligence
CN107491460A (en) The data mapping method and device of adaption system
CN115113898A (en) Dynamic updating method and device for micro application, computer equipment and storage medium
US10783020B2 (en) Method for invoking component, and terminal
CN113254837A (en) Application program evaluation method, device, system, equipment and medium
CN108170408B (en) JS object definition generation method and device
CN111158873A (en) System state machine implementation method and device, storage medium and processor
JP7344521B1 (en) Program, method, information processing device, and system
US20180046688A1 (en) User Interface by way of Unknown Data Structure
CN111132121B (en) Information processing method and network warehouse function NRF network element
Derks et al. Fair Privacy: Improving Usability of the Android Permission System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant