CN111245877A - User risk index query method and device, electronic equipment and medium - Google Patents

User risk index query method and device, electronic equipment and medium Download PDF

Info

Publication number
CN111245877A
CN111245877A CN201811442340.4A CN201811442340A CN111245877A CN 111245877 A CN111245877 A CN 111245877A CN 201811442340 A CN201811442340 A CN 201811442340A CN 111245877 A CN111245877 A CN 111245877A
Authority
CN
China
Prior art keywords
user
risk index
request
user identification
query
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811442340.4A
Other languages
Chinese (zh)
Inventor
郝彦军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201811442340.4A priority Critical patent/CN111245877A/en
Publication of CN111245877A publication Critical patent/CN111245877A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/164Adaptation or special uses of UDP protocol

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure provides a query method of a user risk index, which is applied to a client and comprises the following steps: sending a query request of a user risk index, wherein the request comprises a first user identifier; receiving a risk index and a second user identification of the user; and verifying whether the first user identifier is the same as the second user identifier, if the first user identifier is different from the second user identifier, the request is retransmitted if the verification fails to indicate that the user does not meet the preset condition, so that whether the user risk index received by the client is the user's intention is conveniently confirmed, the phenomenon that the user wears the blonde plum is avoided, namely, the disorder problem mentioned in the related technology is solved, and the reliability is realized. The disclosure also provides a user risk index query device, electronic equipment and a medium.

Description

User risk index query method and device, electronic equipment and medium
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a method and an apparatus for querying a user risk index, an electronic device, and a medium.
Background
Currently, a client based on a User Datagram Protocol (UDP) may send a request for querying a User risk index to a server, and the server responds to the request and returns the User risk index, which may reflect whether the User is a valid User, so as to help intercept an illegal User. However, in the inventive concept of implementing the present invention, the inventors found that at least the following problems existed in the prior art: under the scene of high concurrency and large flow, the user risk index query has extremely high performance requirements, and UDP transmission is unreliable. For example, when the client sends the request 1, the server is stuck and does not timely return the risk index to the client user, and then the client determines that the request 1 fails due to overtime; the request 2 is sent, and the user risk index of the request 1 is received, obviously, the received user risk index is not the result wanted by the user, namely, the disorder problem occurs in the transmission.
Disclosure of Invention
In view of the above, the present disclosure provides a method, an apparatus, an electronic device, and a medium for querying a user risk index, thereby at least partially solving one or more problems due to limitations and disadvantages of the related art.
The first aspect of the present disclosure provides a method for querying a user risk index, which is applied to a client, and the method includes: sending a query request of a user risk index, wherein the request comprises a first user identifier; receiving a risk index and a second user identification of the user; and verifying whether the first user identification is the same as the second user identification, if the first user identification is different from the second user identification, if the first user identification and the second user identification do not pass the verification, indicating that the user does not meet the preset condition, and resending the request.
According to the embodiment of the disclosure, the method further includes, if the first user identifier is the same as the second user identifier, that the user satisfies a preset condition is indicated by passing the verification.
According to an embodiment of the present disclosure, the method further includes setting a thread for creating a port for sending the request and receiving the risk index and the second user identification of the user.
According to an embodiment of the present disclosure, before the resending the request, the method further includes closing a current port and creating a new port, the new port being used for resending the query request for the user risk index.
A second aspect of the present disclosure provides a method for querying a user risk index, which is applied to a server, and the method includes: receiving a query request of a user risk index, wherein the request comprises a first user identifier; inquiring the risk index of the user according to the request; and sending the risk index and the second user identification of the user so that the client verifies whether the first user identification is the same as the second user identification, and if the first user identification is different from the second user identification, if the verification fails, the user does not meet preset conditions, and then resending the request.
A third aspect of the present disclosure provides an apparatus for querying a user risk index, which is applied to a client, and the apparatus includes: the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending a query request of a user risk index, and the request comprises a first user identifier; the receiving module is used for receiving the risk index and the second user identification of the user; and the verification module is used for verifying whether the first user identification is the same as the second user identification, and if the first user identification is different from the second user identification, the verification fails to indicate that the user does not meet the preset condition, and the request is retransmitted.
According to the embodiment of the disclosure, the verification module is further configured to verify whether the first user identifier is the same as the second user identifier, and if the first user identifier is the same as the second user identifier, the verification is passed, which indicates that the user meets a preset condition.
According to an embodiment of the present disclosure, the apparatus further comprises: and the setting module is used for setting a thread and creating a port, and the port is used for sending the request and receiving the risk index and the second user identification of the user.
According to an embodiment of the present disclosure, the apparatus further comprises: and the creating module is used for closing the current port and creating a new port, and the new port is used for resending the query request of the user risk index.
A fourth aspect of the present disclosure provides an apparatus for querying a user risk index, which is applied to a server, and the apparatus includes: the receiving module is used for receiving a query request of the user risk index, wherein the request comprises a first user identifier; the query module is used for querying the risk index of the user according to the request; and the sending module is used for sending the risk index and the second user identifier of the user so as to enable the client to verify whether the first user identifier is the same as the second user identifier, and if the first user identifier is different from the second user identifier, the verification fails to indicate that the user does not meet preset conditions, and then the request is sent again.
A fifth aspect of the present disclosure provides a client, comprising: one or more processors, and a storage device. The storage device is used for storing one or more programs. Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of querying a user risk index provided in the first aspect.
A sixth aspect of the present disclosure provides a computer-readable medium having stored thereon executable instructions, which when executed by a processor, cause the processor to perform the method of querying a user risk index provided by the first aspect.
A seventh aspect of the present disclosure provides a computer program comprising computer executable instructions for implementing the method of querying a user risk index provided by the first aspect when executed.
An eighth aspect of the present disclosure provides a client, comprising: one or more processors, and a storage device. The storage device is used for storing one or more programs. Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of querying a user risk index provided by the second aspect.
A ninth aspect of the present disclosure provides a computer-readable medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the method of querying a user risk index provided by the second aspect.
A tenth aspect of the present disclosure provides a computer program comprising computer executable instructions for implementing the query method for user risk indices provided by the second aspect when executed.
The method for querying the user risk index applied to the client provided by the first aspect of the disclosure has the following beneficial effects: the method comprises the steps of sending a query request of a user risk index containing a first user identification, receiving the user risk index and a second user identification, verifying whether the first user identification is the same as the second user identification, and if the first user identification is different from the second user identification, verifying that the user does not meet preset conditions, and then sending the request again, so that whether the user risk index received by a client is required by the user is conveniently confirmed, the phenomenon that the user wears the costume is avoided, namely, the disorder problem mentioned in the related technology is solved, and reliability is realized.
The query method applied to the user risk index of the server provided by the second aspect of the disclosure has the following beneficial effects: receiving a query request of a user risk index, wherein the request comprises a first user identifier, querying the risk index of the user according to the request, and sending the risk index and a second user identifier of the user, so that a client verifies whether the first user identifier is the same as the second user identifier, if the first user identifier and the second user identifier are different, the verification does not pass and shows that the user does not meet a preset condition, and then the request is sent again, thereby being convenient for confirming whether the user risk index received by the client is required by the user, avoiding the wearing condition of the spangle, namely solving the disorder problem mentioned in the related technology and realizing reliability.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
FIG. 1 is a schematic diagram illustrating interaction of a client and a server in querying a user risk index according to the prior art;
fig. 2 is a schematic diagram schematically illustrating an exemplary system architecture of a user risk index query method or a user risk index query device to which an embodiment of the present invention may be applied;
FIG. 3 schematically illustrates a flow chart of a query method applied to a user risk index of a client according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow chart of a query method for a user risk index according to another embodiment of the present disclosure;
FIG. 5 schematically illustrates a client-server interaction diagram in querying a user risk index according to the present disclosure
FIG. 6 schematically shows a block diagram of a query method applied to a user risk index of a server according to an embodiment of the present disclosure;
FIG. 7 schematically shows a block diagram of a querying device applied to a user risk index of a client according to an embodiment of the present disclosure;
FIG. 8 schematically illustrates a block diagram of a querying device applied to a user risk index of a client according to another embodiment of the present disclosure;
FIG. 9 schematically illustrates a block diagram of a querying device applied to a user risk index of a client according to another embodiment of the present disclosure;
FIG. 10 schematically shows a block diagram of a computer system of a client according to an embodiment of the disclosure.
FIG. 11 schematically shows a block diagram of a querying device applied to a user risk index of a server according to an embodiment of the present disclosure;
FIG. 12 schematically shows a block diagram of a computer system of a server according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase "a or B" should be understood to include the possibility of "a" or "B", or "a and B".
UDP is a short name of User Datagram Protocol, a Chinese name is a User Datagram Protocol, and is a connectionless transport layer Protocol in an OSI (open system Interconnection) reference model, and provides a transaction-oriented simple unreliable information transfer service. It is a connectionless protocol that is used to process packets in the network as is the TCP protocol. In the OSI model, at the fourth layer, the transport layer, is at a layer above the IP protocol. UDP has the disadvantage of not providing for packet packetization, packetization and the inability to order packets, i.e. after a message is sent, it cannot be known whether it arrives safely and completely. UDP is used to support network applications that require data to be transferred between computers. Many client/server mode network applications, including network video conferencing systems, require the use of the UDP protocol. UDP has been used for many years since its inception, although its initial brilliance has been masked by some similar protocols, even today UDP is still a very practical and feasible network transport layer protocol.
Fig. 1 shows a schematic diagram of interaction between a client and a server when querying a user risk index in the prior art.
As shown in fig. 1, clientA10 (client, which includes one or more terminal devices) sends a query request containing a user risk index of k1 to severB20 (server) through port1 (port1), sever B20 returns a user risk index containing v1, and the query is considered successful and UDP transmission is normal. However, when client A10 sends a query request containing a user risk index of k1, since server B20 is stuck, it is not returned to client A10, in which case client A10 recognizes the timeout request as failed. Then, the client starts to send a query request containing the user risk index of k2, and as a result, the user risk index containing v1 is received, it is obvious that the user risk index containing v1 is not the result that the client wants, i.e., a disorder problem occurs, and the client a10 does not have a verification function, so that the disorder problem may occur continuously in the user risk index received by the client a10, and the user experience is reduced. Therefore, the present disclosure provides a method for querying a user risk index to solve the problems of the prior art.
Fig. 2 is a schematic diagram illustrating an exemplary system architecture to which a user risk index query method or a user risk index query device according to an embodiment of the present invention may be applied.
As shown in fig. 2, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
In some embodiments, the client may include one or more of the terminal devices 101, 102, 103 for sending, receiving, and verifying data.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may be various electronic devices having a display screen, including but not limited to smart phones, tablet computers, portable computers, desktop computers, and the like.
The server 105 may be a server that provides various services. For example, a user sends a query request including a user risk index of a first user identifier to the server 105 by using the terminal device 103 (which may also be the terminal device 101 or 102), the server 105 may send the user risk index and a second user identifier to the terminal device 103 based on the request, the terminal device 103 may verify whether the first user identifier and the second user identifier are the same, and if the first user identifier and the second user identifier are different, the verification does not pass, which means that the user does not satisfy a preset condition, the request is sent again, so that it is convenient to confirm whether the user risk index received by the client is what the user wants, occurrence of a situation of wearing a piece of plum is avoided, that is, a disorder problem mentioned in the related art is solved, and reliability is achieved.
In some embodiments, the query method for the user risk index provided by the embodiments of the present invention is generally performed by the server 105, and accordingly, the query device for the user risk index is generally disposed in the server 105.
In other embodiments, the query method for the user risk index provided in the embodiments of the present invention may also be executed by the terminal devices 101, 102, and 103, and accordingly, the query apparatus for the user risk index is generally disposed in the terminal devices 101, 102, and 103.
Fig. 3 schematically shows a flowchart of a query method applied to a user risk index of a client according to an embodiment of the present disclosure.
As shown in fig. 3, the query method applied to the user risk index of the client includes steps S101 to S103.
In step S101, a query request of the user risk index is sent, where the request includes the first user identifier.
In step S102, a risk index and a second user identification of the user are received.
In step S103, it is verified whether the first user identifier is the same as the second user identifier, and if the first user identifier is different from the second user identifier, the verification fails to indicate that the user does not satisfy the preset condition, and the request is retransmitted.
The method can send a query request of the user risk index containing the first user identification, receive the risk index and the second user identification of the user, verify whether the first user identification is the same as the second user identification, if the first user identification is different from the second user identification, the verification does not pass and shows that the user does not meet the preset conditions, and then the request is sent again, so that whether the user risk index received by the client is the user's intention or not is confirmed, the phenomenon of putting on the piece of baggage is avoided, namely, the disorder problem mentioned in the related technology is solved, and the reliability is realized.
In some embodiments of the present disclosure, the client may include a plurality of terminal devices, and each terminal device may send a request for querying the risk index of the user to the server to obtain the risk index of the user.
In some embodiments of the present disclosure, each terminal device sends, to the server, a request for querying a user risk index, where the request includes a unique first user identifier, and is used for comparing the unique first user identifier with a second user identifier returned by the server, which is helpful for verifying whether a returned user risk index is desired by the client, so as to avoid a problem of disorder of user risk indexes, that is, putting on a piece of baggage. For example, a first terminal device sends a query request of a user risk index to a server, where a first user identifier of the query request is a, but due to a delay problem, the first terminal device does not receive the user risk index returned by the server, but at this time, a second terminal device also sends a query request of the user risk index to the server, where a first user identifier of the request is B, and the server returns the user risk index and a second user identifier to the second terminal device, where the second user identifier is a, it is obvious that the user risk index returned by the current server is not wanted by the second terminal device, because the first user identifier sent by the second terminal device is B, and the second user identifier returned by the server is a, the problem of disorder of the user risk indexes occurs. In this embodiment, the second terminal device may verify the second user identifier returned by the server. For example, it may be verified whether the second user identifier returned by the server is the same as the first user identifier sent by the second terminal device (i.e., whether a is the same as B is verified), and if so, the second terminal device sends the query request of the user risk index to the server again, so that the problem of disorder of the user risk index is effectively solved.
In some embodiments of the present disclosure, a user not meeting a preset condition may refer to not being eligible to engage in an activity. For example, the kyoto shopping mall is holding a shopping deal, and the first user identifier is different from the second user identifier as a result of the verification, which indicates that the user cannot participate in the shopping deal.
Fig. 4 schematically shows a flowchart of a user risk index query method according to another embodiment of the present disclosure.
As shown in fig. 4, the query method applied to the user risk index of the client further includes step S201.
In step S101, a query request of the user risk index is sent, where the request includes the first user identifier.
In step S102, a risk index and a second user identification of the user are received.
In step S201, it is verified whether the first user identifier is the same as the second user identifier, and if the first user identifier is the same as the second user identifier, the user meets a preset condition after verification.
In the method, if the first user identifier is the same as the second user identifier, the verification result shows that the user meets the preset condition, the disorder problem of the user risk indexes of the related technology is avoided, and the reliability is realized.
In some embodiments of the present disclosure, a user not meeting a preset condition may refer to not being eligible to engage in an activity. For example, the kyoto mall is holding a first-time shopping activity, and the first user identifier is the same as the second user identifier according to the verification result, which indicates that the user can participate in the first-time shopping activity.
In some embodiments of the present disclosure, UDP-based may enable a UDP sdk module for reliable and efficient transmission that utilizes UDP and multithreading to enable fast response. For example, the module may be used to set a thread for each client, and a send-receive port may be created in the thread, and an authentication and retry mechanism is used to implement reliability. In addition, the udp dk module is disposed in the client.
In some embodiments of the disclosure, the method further comprises: and setting a thread for creating a port, wherein the port is used for sending the request and receiving the risk index and the second user identification of the user. For example, a port dedicated for transmitting the request of the client and receiving the data of the server can be created by using the udp dk module, thereby achieving the technical effect of fast response.
In some embodiments of the disclosure, prior to said resending said request, the method further comprises: and closing the current port and creating a new port, wherein the new port is used for resending the query request of the user risk index.
Referring to FIG. 5, client A10 is typically a multi-threaded concurrent process. For example, the udp dk module a11 is invoked to initiate a request (1.0) for querying the user risk index to the udp server b20 (i.e., the above-mentioned server) cluster, and after receiving the user risk index and the second user identifier (1.4), it is determined whether the user is qualified for a robbery (e.g., it is determined whether the key1 is the same as the returned key 1). Wherein, key1 is the first user ID, and value1 is the user risk index.
The method provided by the disclosure can create an independent port for sending and receiving data for each client A10 thread, and initiate a request to the UdpServerB20 as shown in FIG. 5(1.1), after the UdpServerB20 receives the request, the user risk index and the second user identifier can be returned to the UdpSdk module A11 as shown in FIG. 5(1.2), after the UdpSdk module A11 receives the user risk index and the second user identifier, it is verified whether the sent key1 is the same as the received key1 (1.3), if the same indicates that the query is successful, the data is returned to the client A10 for subsequent processing, if the same is different, the sequence is not guaranteed due to UPD, at this time, the current port (port1) needs to be closed, a new port (port2) needs to be created again, so as to facilitate the request to be sent again, thereby solving the sequence problem of the related technology and achieving messy reliability.
Fig. 6 schematically shows a block diagram of a query method applied to a user risk index of a server according to an embodiment of the present disclosure.
As shown in fig. 6, the query method applied to the user risk index of the server includes steps S301 to S303.
In step S301, a query request of a user risk index is received, where the request includes a first user identifier.
In step S302, the risk index of the user is queried according to the request.
In step S303, the risk index and the second user identifier of the user are sent, so that the client verifies whether the first user identifier is the same as the second user identifier, and if the first user identifier is different from the second user identifier, the verification fails, which indicates that the user does not satisfy the preset condition, the request is sent again.
The method can receive a query request of a user risk index, wherein the request comprises a first user identifier, the risk index of the user is queried according to the request, the risk index of the user and a second user identifier are sent, so that a client verifies whether the first user identifier is the same as the second user identifier, if the first user identifier and the second user identifier are different, the verification fails to show that the user does not meet preset conditions, the request is sent again, whether the user risk index received by the client is required by the user or not is convenient to confirm, the phenomenon that the user is worn by the client is avoided, namely, the disorder problem mentioned in the related technology is solved, and the reliability is realized.
Fig. 7 schematically shows a block diagram of a query device applied to a user risk index of a client according to an embodiment of the present disclosure.
As shown in fig. 7, the query device 400 applied to the user risk index of the client includes a sending module 410, a receiving module 420 and a verifying module 430.
A sending module 410, configured to send a query request of the user risk index, where the request includes the first user identifier.
A receiving module 420, configured to receive the risk index and the second user identifier of the user.
And the verifying module 430 is configured to verify whether the first user identifier is the same as the second user identifier, and if the first user identifier is different from the second user identifier, the verification fails to indicate that the user does not satisfy a preset condition, and resend the request.
The query device 400 for the user risk index applied to the client may send a query request for the user risk index including the first user identifier, receive the risk index and the second user identifier of the user, verify whether the first user identifier is the same as the second user identifier, and if the first user identifier and the second user identifier are different, if the first user identifier and the second user identifier do not pass the verification, the user does not satisfy the preset condition, and then the request is sent again, so that it is convenient to confirm whether the user risk index received by the client is what the user wants, and the occurrence of the wearing condition of the spangle is avoided, that is, the disorder problem mentioned in the related art is solved, and the reliability is achieved.
According to an embodiment of the present disclosure, the above query device 400 applied to the user risk index of the client is used to implement the query method applied to the user risk index of the client described in the embodiment of fig. 3.
In some embodiments of the present disclosure, the verification module is further configured to verify whether the first user identifier is the same as the second user identifier, and if the first user identifier is the same as the second user identifier, the verification is passed, which indicates that the user meets a preset condition.
Fig. 8 schematically shows a block diagram of a query device applied to a user risk index of a client according to another embodiment of the present disclosure.
As shown in fig. 8, the query device 500 applied to the user risk index of the client further includes a setting module 510.
A setting module 510, configured to set a thread, configured to create a port, where the port is configured to send the request and receive the risk index and the second user identifier of the user.
The query device 500 for the user risk index applied to the client can create a port which is specially responsible for transmitting the request of the client and receiving the data of the server, thereby realizing the technical effect of quick response.
Fig. 9 schematically shows a block diagram of a query device applied to a user risk index of a client according to another embodiment of the present disclosure.
As shown in fig. 9, the query device 600 applied to the user risk index of the client further includes a creation module 610.
A creating module 610, configured to close a current port and create a new port, where the new port is used to resend the query request of the user risk index.
FIG. 10 schematically shows a block diagram of a computer system of a client according to an embodiment of the disclosure. The computer system illustrated in FIG. 10 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 10, a computer system 700 of a client according to an embodiment of the present disclosure includes a processor 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure described with reference to fig. 2 and 3.
In the RAM 703, various programs and data necessary for the operation of the system 700 are stored. The processor 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. The processor 701 performs the various steps of the user risk index querying method described above with reference to fig. 2 and 3 by executing programs in the ROM 702 and/or RAM 703. Note that the program may also be stored in one or more memories other than the ROM 702 and the RAM 703. The processor 701 may also perform the various steps of the user risk index querying method described above with reference to fig. 2 and 3 by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the system 700 may also include an input/output (I/O) interface 707, the input/output (I/O) interface 707 also being connected to the bus 704. The system 700 may also include one or more of the following components connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
According to an embodiment of the present disclosure, the method described above with reference to the flow chart may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program, when executed by the processor 701, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing. According to embodiments of the present disclosure, a computer-readable medium may include the ROM 702 and/or the RAM 703 and/or one or more memories other than the ROM 702 and the RAM 703 described above.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As another aspect, the present disclosure also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to perform a method of querying a user risk index applied to a client according to an embodiment of the present disclosure. The method comprises the following steps: sending a query request of a user risk index, wherein the request comprises a first user identifier; receiving a risk index and a second user identification of the user; and verifying whether the first user identification is the same as the second user identification, if the first user identification is different from the second user identification, if the first user identification and the second user identification do not pass the verification, indicating that the user does not meet the preset condition, and resending the request.
Fig. 11 schematically shows a block diagram of a query device applied to a user risk index of a server according to an embodiment of the present disclosure.
As shown in fig. 11, the query apparatus 800 applied to the user risk index of the server includes a receiving module 810, a query module 820 and a transmitting module 830.
A receiving module 810, configured to receive a query request of a user risk index, where the request includes a first user identifier.
A query module 820, configured to query the risk index of the user according to the request.
A sending module 830, configured to send the risk index and the second user identifier of the user, so that the client verifies whether the first user identifier is the same as the second user identifier, and if the first user identifier is different from the second user identifier, if the verification fails, the user does not meet a preset condition, the request is sent again.
The query device 800 for the user risk index applied to the server may receive a query request for the user risk index, where the request includes a first user identifier, query the risk index of the user according to the request, and send the risk index of the user and a second user identifier, so that the client verifies whether the first user identifier is the same as the second user identifier, and if the first user identifier is different from the second user identifier, the verification does not pass to indicate that the user does not satisfy a preset condition, the request is sent again, so that it is convenient to confirm whether the user risk index received by the client is what the user wants, a situation that the client wears a piece of string goods is avoided, that is, a disorder problem mentioned in the related art is solved, and reliability is achieved.
According to an embodiment of the present disclosure, the query device 800 applied to the user risk index of the server is used to implement the query method applied to the user risk index of the server described in the embodiment of fig. 6.
FIG. 12 schematically shows a block diagram of a computer system of a server according to an embodiment of the disclosure. The computer system illustrated in FIG. 12 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 12, a computer system 900 of a server according to an embodiment of the present disclosure includes a processor 901, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure described with reference to fig. 4.
In the RAM 903, various programs and data necessary for the operation of the system 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various steps of the user risk index querying method described above with reference to fig. 4 by executing programs in the ROM 902 and/or the RAM 903. Note that the program may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform the various steps of the query method of user risk index described above with reference to fig. 4 by executing programs stored in the one or more memories.
System 900 may also include an input/output (I/O) interface 907, which is also connected to bus 904, according to embodiments of the present disclosure. The system 900 may also include one or more of the following components connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
According to an embodiment of the present disclosure, the method described above with reference to the flow chart may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing. According to embodiments of the present disclosure, a computer-readable medium may include the ROM 902 and/or the RAM 903 described above and/or one or more memories other than the ROM 902 and the RAM 903.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As another aspect, the present disclosure also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to perform a method of querying a user risk index applied to a server according to an embodiment of the present disclosure. The method comprises the following steps: receiving a query request of a user risk index, wherein the request comprises a first user identifier; inquiring the risk index of the user according to the request; and sending the risk index and the second user identification of the user so that the client verifies whether the first user identification is the same as the second user identification, and if the first user identification is different from the second user identification, if the verification fails, the user does not meet preset conditions, and then resending the request.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (14)

1. A query method of a user risk index is applied to a client, and comprises the following steps:
sending a query request of a user risk index, wherein the request comprises a first user identifier;
receiving a risk index and a second user identification of the user;
and verifying whether the first user identification is the same as the second user identification, if the first user identification is different from the second user identification, if the first user identification and the second user identification do not pass the verification, indicating that the user does not meet the preset condition, and resending the request.
2. The method of claim 1, wherein the method further comprises:
and if the first user identification is the same as the second user identification, the verification is passed, and the user meets the preset condition.
3. The method of claim 1, wherein the method further comprises:
and setting a thread for creating a port, wherein the port is used for sending the request and receiving the risk index and the second user identification of the user.
4. The method of claim 3, wherein prior to said resending said request, the method further comprises:
and closing the current port and creating a new port, wherein the new port is used for resending the query request of the user risk index.
5. A user risk index query method is applied to a server and comprises the following steps:
receiving a query request of a user risk index, wherein the request comprises a first user identifier;
inquiring the risk index of the user according to the request;
and sending the risk index and the second user identification of the user so that the client verifies whether the first user identification is the same as the second user identification, and if the first user identification is different from the second user identification, if the verification fails, the user does not meet preset conditions, and then resending the request.
6. An apparatus for querying a user risk index, applied to a client, the apparatus comprising:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending a query request of a user risk index, and the request comprises a first user identifier;
the receiving module is used for receiving the risk index and the second user identification of the user;
and the verification module is used for verifying whether the first user identification is the same as the second user identification, and if the first user identification is different from the second user identification, the verification fails to indicate that the user does not meet the preset condition, and the request is retransmitted.
7. The apparatus of claim 6, wherein the verification module is further to:
and if the first user identification is the same as the second user identification, the verification is passed, and the user meets the preset condition.
8. The apparatus of claim 6, wherein the apparatus further comprises:
and the setting module is used for setting a thread and creating a port, and the port is used for sending the request and receiving the risk index and the second user identification of the user.
9. The apparatus of claim 8, wherein the apparatus further comprises:
and the creating module is used for closing the current port and creating a new port, and the new port is used for resending the query request of the user risk index.
10. An apparatus for querying a user risk index, applied to a server, includes:
the receiving module is used for receiving a query request of the user risk index, wherein the request comprises a first user identifier;
the query module is used for querying the risk index of the user according to the request;
and the sending module is used for sending the risk index and the second user identifier of the user so as to enable the client to verify whether the first user identifier is the same as the second user identifier, and if the first user identifier is different from the second user identifier, the verification fails to indicate that the user does not meet preset conditions, and then the request is sent again.
11. A client, comprising:
one or more processors; and
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-4.
12. A computer readable medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 4.
13. A server, comprising:
one or more processors; and
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of claim 5.
14. A computer readable medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of claim 5.
CN201811442340.4A 2018-11-29 2018-11-29 User risk index query method and device, electronic equipment and medium Pending CN111245877A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811442340.4A CN111245877A (en) 2018-11-29 2018-11-29 User risk index query method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811442340.4A CN111245877A (en) 2018-11-29 2018-11-29 User risk index query method and device, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN111245877A true CN111245877A (en) 2020-06-05

Family

ID=70875890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811442340.4A Pending CN111245877A (en) 2018-11-29 2018-11-29 User risk index query method and device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN111245877A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014006184A1 (en) * 2012-07-06 2014-01-09 Oulun Yliopisto On-demand identity attribute verification and certification for services
CN105635227A (en) * 2014-11-05 2016-06-01 北京东土科技股份有限公司 Point to point communication method and system on the basis of serial server
CN106815734A (en) * 2015-11-27 2017-06-09 方正国际软件(北京)有限公司 A kind of information transferring method and device
CN107104938A (en) * 2016-02-19 2017-08-29 胡雪松 Set up the data exchange channel of safety
CN108462724A (en) * 2018-05-17 2018-08-28 北京京东金融科技控股有限公司 Data sharing method, device, system, member node and readable storage medium storing program for executing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014006184A1 (en) * 2012-07-06 2014-01-09 Oulun Yliopisto On-demand identity attribute verification and certification for services
CN105635227A (en) * 2014-11-05 2016-06-01 北京东土科技股份有限公司 Point to point communication method and system on the basis of serial server
CN106815734A (en) * 2015-11-27 2017-06-09 方正国际软件(北京)有限公司 A kind of information transferring method and device
CN107104938A (en) * 2016-02-19 2017-08-29 胡雪松 Set up the data exchange channel of safety
CN108462724A (en) * 2018-05-17 2018-08-28 北京京东金融科技控股有限公司 Data sharing method, device, system, member node and readable storage medium storing program for executing

Similar Documents

Publication Publication Date Title
WO2019015272A1 (en) Information processing method and device
US10127140B2 (en) Automated problem determination for cooperating web services using debugging technology
CN112416632B (en) Event communication method and device, electronic equipment and computer readable medium
CN111510466B (en) Data updating method and device for client, electronic equipment and readable medium
CN114124929A (en) Cross-network data processing method and device
US20150296014A1 (en) Picture download method and apparatus
US20170019836A1 (en) Access port queuing & resource management
CN115170321A (en) Method and device for processing batch transaction data
CN111381965A (en) Method and apparatus for processing requests
CN113132400B (en) Business processing method, device, computer system and storage medium
CN111600787B (en) Information processing method, information processing apparatus, electronic device, and medium
WO2021147466A1 (en) Message processing method and apparatus, and electronic device
CN110968433A (en) Information processing method and system and electronic equipment
CN110855655B (en) Information verification method, device, equipment and storage medium
CN111026532B (en) Message queue management method for voice data
CN112800363A (en) Page display method and device, electronic equipment and computer readable medium
CN111245877A (en) User risk index query method and device, electronic equipment and medium
CN111030900A (en) Authentication-free login method and device and electronic equipment
CN113420275B (en) Data connection processing method, related device and computer program product
CN110851097B (en) Control method, device, medium and electronic equipment for consistency of handwriting data
CN114244700A (en) Port processing method and device, electronic equipment and computer readable storage medium
CN113015160B (en) Network allocation method and device of Internet of things equipment, electronic equipment and computer readable medium
CN110609866B (en) Method, apparatus and computer program product for negotiating transactions
CN111130702A (en) Decoding method, decoding system, electronic device, and storage medium
CN113315833B (en) File transfer mode processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200605