CN111580874A - System safety control method and system for data application and computer equipment - Google Patents

System safety control method and system for data application and computer equipment Download PDF

Info

Publication number
CN111580874A
CN111580874A CN202010272798.0A CN202010272798A CN111580874A CN 111580874 A CN111580874 A CN 111580874A CN 202010272798 A CN202010272798 A CN 202010272798A CN 111580874 A CN111580874 A CN 111580874A
Authority
CN
China
Prior art keywords
information
target user
user
analysis
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010272798.0A
Other languages
Chinese (zh)
Other versions
CN111580874B (en
Inventor
徐欣
周盛臻
施奕明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN202010272798.0A priority Critical patent/CN111580874B/en
Publication of CN111580874A publication Critical patent/CN111580874A/en
Priority to PCT/CN2021/077760 priority patent/WO2021203858A1/en
Application granted granted Critical
Publication of CN111580874B publication Critical patent/CN111580874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/80Information retrieval; Database structures therefor; File system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a system safety control method for data application, which comprises the following steps: determining target user information according to the received application information; acquiring target intermediate variable data corresponding to the target user from a frame database according to the target user information; carrying out wind control analysis on the application information according to the target intermediate variable data and through a preset analysis template; determining whether the target user is a safe user or not according to the wind control analysis result; and when the target user is a safe user, forwarding the application information of the target user to a server. According to the embodiment of the invention, through the intermediate variable data stored in the frame database in advance and the preset analysis template, the information of the target user does not need to be analyzed again when the data is applied, the response time of single access is reduced, and the decision efficiency of the engine is improved.

Description

System safety control method and system for data application and computer equipment
Technical Field
The embodiment of the invention relates to the field of data system security control, in particular to a system security control method, a system, computer equipment and a computer readable storage medium for data application.
Background
Wind management refers to the risk manager taking various measures and methods to eliminate or reduce the various possibilities of occurrence of risk events, or to reduce the losses caused when risk events occur. In the financial industry, wind control is an essential part, and can effectively identify users with fraud risks so as to ensure the safety of funds or transactions. For example, the wind controller may determine whether the user is at risk by querying information related to the user (e.g., people's bank notes, academic calendars, black and white lists, etc.); however, if the wind control operations are all hard-coded, the development and test process needs to be performed once each time when the logic needs to be modified, which is time-consuming and labor-consuming. In addition, the current process engine synchronously writes operation logs into a database when executing tasks, so that the total execution time of each wind control request is increased.
Therefore, how to reduce the response time of a single access when a large number of accesses occur, so as to further improve the decision efficiency of the engine, becomes one of the technical problems to be solved currently.
Disclosure of Invention
In view of the above, there is a need to provide a system security control method, system, computer device and computer readable storage medium for data application, so as to solve the technical problems of too long response time of a process engine and low decision efficiency of the process engine during a large number of accesses.
In order to achieve the above object, an embodiment of the present invention provides a system security control method for data application, where the method includes:
determining target user information according to the received application information;
acquiring target intermediate variable data corresponding to the target user from a frame database according to the target user information;
carrying out wind control analysis on the application information according to the target intermediate variable data and through a preset analysis template;
determining whether the target user is a safe user or not according to the wind control analysis result;
and when the target user is a safe user, forwarding the application information of the target user to a server.
Illustratively, the step of determining the target user information according to the received application information includes:
receiving application information input by a client terminal;
acquiring identity authentication information of a user at a client terminal according to the application information;
and determining target user information of a target user according to the identity authentication information, wherein the target user information comprises face information, mobile phone number information, identity card information, sound information and the like.
Illustratively, the method further comprises: configuring the analysis template, wherein the configuration step of the analysis template comprises the following steps:
acquiring an xml template, wherein the xml template is used for defining the execution sequence of the whole analysis process;
sequentially loading a plurality of service operation logic files configured in advance into an xml template for analysis to obtain a plurality of xml analysis files corresponding to the plurality of service operation logic files; the plurality of business operation logics comprise data source query, business query, application frequency, operation equipment replacement frequency and the like;
abstracting the plurality of xml parsing files into a plurality of nodes, wherein each node corresponds to one xml parsing file;
configuring the plurality of nodes to form a directed acyclic graph according to the sequence of the plurality of business operation logics in the xml template;
and defining an analysis template according to the directed acyclic graph.
Illustratively, the step of obtaining the target intermediate variable data corresponding to the target user from the framework database according to the target user information includes:
and analyzing and calculating the historical information of the target user corresponding to the target user through a preconfigured hadoop calculation frame to obtain the target intermediate variable data.
Illustratively, the step of configuring the hadoop computing framework comprises:
acquiring a plurality of user information in advance from one or more databases, wherein the user information comprises historical operation information and user historical financial information;
inputting the plurality of user information into a hadoop calculation framework;
calculating the historical financial data of the user through the hadoop calculation frame according to the preset frequency to obtain a plurality of intermediate variable data corresponding to a plurality of user information;
and saving the intermediate variable data to a frame database.
In order to achieve the above object, an embodiment of the present invention further provides a system security control system for data application, including:
the receiving module is used for determining the target user information according to the received application information;
the acquisition module is used for acquiring target intermediate variable data corresponding to the target user from a frame database according to the target user information;
the analysis module is used for carrying out wind control analysis on the application information according to the target intermediate variable data and through a preset analysis template;
the determining module is used for determining whether the target user is a safe user according to the wind control analysis result;
and the forwarding module is used for forwarding the application information of the target user to a server when the target user is a safe user.
Illustratively, the receiving module is further configured to:
receiving application information input by a client terminal;
acquiring identity authentication information of a user at a client terminal according to the application information;
and determining target user information of a target user according to the identity authentication information, wherein the target user information comprises face information, mobile phone number information, identity card information, sound information and the like.
Illustratively, the system further comprises a configuration module configured to:
acquiring an xml template, wherein the xml template is used for defining the execution sequence of the whole analysis process;
sequentially loading a plurality of service operation logic files configured in advance into an xml template for analysis to obtain a plurality of xml analysis files corresponding to the plurality of service operation logic files; the plurality of business operation logics comprise data source query, business query, application frequency, operation equipment replacement frequency and the like;
abstracting the plurality of xml parsing files into a plurality of nodes, wherein each node corresponds to one xml parsing file;
configuring the plurality of nodes to form a directed acyclic graph according to the sequence of the plurality of business operation logics in the xml template;
and defining an analysis template according to the directed acyclic graph.
In order to achieve the above object, an embodiment of the present invention further provides a computer device, where the computer device includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the computer program, when executed by the processor, implements the steps of the system security control method of the data application.
To achieve the above object, an embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is executable by at least one processor, so as to cause the at least one processor to execute the steps of the system security control method of the data application.
The system safety control method, the system, the computer equipment and the computer readable storage medium for data application provided by the embodiment of the invention provide an effective system safety control method for data application; by the aid of the intermediate variable data stored in the frame database in advance and the preset analysis template, when data is applied, information of a target user does not need to be analyzed again, time length of single access response is shortened, and decision efficiency of an engine is improved.
Drawings
Fig. 1 is a schematic flow chart of a system security control method of a data application according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of program modules of a second embodiment of a system safety control system according to the present invention.
Fig. 3 is a schematic diagram of a hardware structure of a third embodiment of the computer device according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
In the following embodiments, the computer device 2 will be exemplarily described as an execution subject.
Example one
Referring to fig. 1, a flowchart of steps of a system security control method of a data application according to an embodiment of the present invention is shown. It is to be understood that the flow charts in the embodiments of the present method are not intended to limit the order in which the steps are performed. The following description is made by way of example with the computer device 2 as the execution subject. The details are as follows.
And step S100, determining target user information according to the received application information.
When a user applies for a loan on a client terminal, in order to reduce risks, the user's authentication information needs to be further confirmed, and the next operation can be performed when the user's identity is confirmed to be correct.
Illustratively, the step S100 may further include:
in step S100a, application information input by the client terminal is received.
The application information can be the amount of requested loan, loan date, repayment date and the like input by the user; the client terminal may be a Mobile phone, a tablet computer, a palm computer, a notebook computer, an MID (Mobile Internet Device) or other terminal devices.
And step S100b, acquiring the identity authentication information of the user at the client terminal according to the application information.
After receiving application information of a user, a server acquires identity verification information on a client terminal of the user inputting the application information according to the application information, wherein the identity verification information is used for verifying whether a person inputting the application information is the user, and the identity verification information can comprise password information, dynamic password information, short message password information, two-dimensional code information, fingerprint information, palm print information, voice information, retina information or face information and the like.
Step S100c, determining target user information of a target user according to the identity verification information, where the target user information includes face information, mobile phone number information, identity card information, voice information, and other information that can verify the identity of the user.
And judging whether the person who inputs the application information is the user according to the identity verification information, if so, confirming the user as a target user, and acquiring the information of the target user from a user database.
And step S102, acquiring target intermediate variable data corresponding to the target user from a frame database according to the target user information.
The intermediate variable data is pre-calculated and stored in the frame database. The data in the frame database is intermediate variable data calculated according to user historical borrowing behavior information, and the user historical borrowing behavior information comprises user login frequency information on a borrowing platform, frequency information of applying for withdrawal, loan delay days information, loan amount information and the like. The information of the number of times of logging in the loan platform, the information of the number of times of applying for withdrawal, the information of the number of days of loan delay, the information of the amount of the loan and the like of the user change along with the increase of the loan time of the user, that is, the intermediate variable data continuously changes along with the increase of the loan time of the user.
It is understood that the calculated intermediate variable data is temporarily stored in the framework database for being called by the flow engine. Namely, the user information of the target user does not need to be analyzed again, the single access response time is reduced, and the decision efficiency of the engine is improved, so that the overall TPS (transaction processing system) of the process engine is greatly improved.
When the target user is a new user, namely target intermediate variable data corresponding to the target user cannot be acquired from the frame database, the target user can be analyzed in real time.
Illustratively, the step S102 may further include:
and analyzing and calculating the historical information of the target user corresponding to the target user through a preconfigured hadoop calculation frame to obtain the target intermediate variable data.
The data in the frame database is intermediate variable data calculated by a hadoop (distributed processing) calculation frame according to the historical loan behavior information of the user. The Hadoop is a Distributed storage and calculation platform suitable for big data, and relates to Distributed storage and Distributed calculation, the Distributed storage refers to an HDFS (Hadoop Distributed File System) architecture, the Distributed calculation refers to a MapReduce (programming model) architecture, mass data stored in the HDFS are combined, calculated and counted according to individual users through a Distributed calculation Job at night every day, and a counted intermediate value is stored into a cache server as an intermediate variable for use in conditions in a subsequent wind control engine. The intermediate variable data are obtained through calculation of a big data calculation framework, namely the intermediate variable data are indirectly obtained and are not directly obtained. The information such as the name, age and occupation of the user can be directly obtained without the Hadoop calculation framework.
Illustratively, the method may further include: configuring the hadoop calculation framework, wherein the step of configuring the hadoop calculation framework comprises the following steps:
step S102a, a plurality of user information is obtained in advance from one or more databases, and the user information includes historical operation information and user historical financial information.
The application range of the hadoop computing framework comprises offline real-time data acquisition, data storage, data caching, data preprocessing, data warehousing, data analysis and the like.
Step S102b, inputting the user information into the hadoop calculation framework.
Illustratively, the financial data is divided into banking data, securities business data, insurance business data and data of trust, consultation and the like, wherein the banking data comprises data of credit, accounting, savings, settlement, interest rate and the like; the securities business data also comprises data in aspects of quotation, entrustment, bargain, capital market supply and demand, marketing company operation state and the like; the insurance business data also comprises data on application insurance, claim settlement, investment and the like. These data may reflect the characteristics, regularity and behavior of the financial activity from a certain side.
Step S102c, calculating the historical financial data of the user through the hadoop calculation framework with a predetermined frequency to obtain a plurality of intermediate variable data corresponding to a plurality of user information.
Illustratively, the operation of the predetermined frequency is typically timed at night with less traffic; and calculating some intermediate variables from massive historical data through the hadoop calculation framework at night. The mass historical data is obtained in the system for multiple times through a hadoop calculation framework.
Step S102d, saving the intermediate variable data in the frame database.
And temporarily storing the intermediate variable data into a frame database so as to facilitate real-time calling of the process engine during work, thereby greatly improving the decision efficiency of the engine. For example, the login frequency of a certain client in the week is calculated by a hadoop calculation framework at night to reach 3 times, the user logs in at a certain time today, the login is the fourth time, the previous login records are all on a large data platform, if the real-time calculation needs a certain time, the user is calculated by the hadoop calculation framework at night in advance and the calculated intermediate variable data is stored in a framework database, namely, the data logged in 3 times is recorded to a cache framework database by taking the user as a dimension, when logging in again today, the cached intermediate variable data is directly taken out from the framework database, the current login operation is combined, the login operation is directly accumulated to obtain the total 4 times of login in the week, and the value of 4 times is directly stored into the cache framework database to be used by subsequent wind control in the day, therefore, real-time calculation on a big data platform is not needed, and the execution efficiency of the wind control engine can be effectively improved.
And step S104, carrying out wind control analysis on the application information through a preset analysis template according to the target intermediate variable data.
The analysis template defines a template for analyzing an execution sequence, the application information is analyzed through the analysis template with the predefined execution sequence, and whether a wind control rule condition exists in the application information is judged by combining target intermediate variable data in the analysis processing process; the wind control rule conditions are a plurality of business operation logics, such as the upper limit of loan amount, the lower limit of loan credit value, the lower limit of loan overdue and the like of a user.
Analyzing item by item according to conditions configured in each xml template, and when an intermediate variable is used in a certain condition, directly caching the intermediate variable calculated from hadoop by the server, such as
Illustratively, the method may further include: configuring an analysis template, wherein the configuration step of the analysis template comprises the following steps:
step S104a, an xml template is obtained, where the xml template is used to define the execution sequence of the entire parsing flow.
For example, the xml (extensible markup language) template may define an execution sequence of a set of managed processes related to the application service according to the requirements of the application.
Step S104b, sequentially loading a plurality of service operation logic files configured in advance into an xml template for analysis to obtain a plurality of xml analysis files corresponding to the plurality of service operation logic files; the plurality of business operation logics comprise data source inquiry, business inquiry, application frequency, operation equipment replacement frequency and the like.
Illustratively, each service operation logic in the plurality of service operation logic files corresponds to a service function, the service function may be a data source query function, a service query function, a frequency application function, an operation device replacement frequency function, and the like, each service function has its own operation logic, and the service operation logic file corresponding to the service function can be obtained by encapsulating the operation logic of the service function. The xml template may parse the business operation logic file logic, where the business operation logic file may be dragged into the xml template, for example, one or more business operation logic files may be selected first, and then the selected business operation logic files may be dragged to a designated area of the xml template.
Step S104c, abstracting the xml parsing files into nodes, where each node corresponds to an xml parsing file.
Step S104d, configuring the plurality of nodes to form a directed acyclic graph according to the order of the plurality of business operation logics in the xml template.
And step S104e, defining an analysis template according to the directed acyclic graph.
For example, the service operation logic file may be parsed in the xml template, and after parsing of each service operation logic file, an xml parsing file corresponding to the service operation logic file may be obtained, so as to obtain a plurality of xml parsing files. Performing nodularization processing on each xml parsing file in the plurality of xml parsing files to obtain a plurality of nodes corresponding to the plurality of xml parsing files, and connecting the plurality of nodes in series through lines according to the sequence of the plurality of business operation logics in the xml template to obtain a directed acyclic graph, wherein the sequence of the plurality of business operation logics in the xml template can be preset, and the parsing template is defined according to the sequence of the xml parsing files corresponding to each node in the directed acyclic graph.
And S106, determining whether the target user is a safe user according to the wind control analysis result.
And when the wind control rule condition does not exist in the wind control analysis result, determining the target user as a safe user, wherein the safe user is a user capable of normally lending according to the application information. And when the application information has the wind control rule condition, the application information is risk application information, the user is a risk user, and the risk user is a user who cannot normally loan according to the application information.
Step S108, when the target user is a safe user, the application information of the target user is forwarded to a server.
And when the target user is judged to be the safe user, the user is indicated to be a user capable of making a loan, namely, the target user is indicated to be capable of making a loan, and the application information of the safe user is forwarded to the specified server.
Further, when the target user is judged to be a risk user, the target user indicates that the user cannot loan the application, all subsequent processes are immediately stopped, and the application information is forwarded to a specified server.
Example two
Fig. 2 is a schematic diagram of program modules of a second embodiment of a system safety control system according to the present invention. The lip language liveness detection system 20 may include or be divided into one or more program modules, which are stored in a storage medium and executed by one or more processors to implement the present invention and implement the system safety control method of the above-mentioned data application. The program module referred to in the embodiments of the present invention refers to a series of computer program instruction segments capable of performing specific functions, and is more suitable for describing the execution process of the lip language liveness detection system 20 in the storage medium than the program itself. The following description will specifically describe the functions of the program modules of the present embodiment:
and a receiving module 200, configured to determine the target user information according to the received application information.
Illustratively, the receiving module 200 is further configured to: receiving application information input by a client terminal; acquiring identity authentication information of a user at a client terminal according to the application information; and determining target user information of a target user according to the identity authentication information, wherein the target user information comprises face information, mobile phone number information, identity card information, sound information and the like.
An obtaining module 202, configured to obtain, from a framework database, target intermediate variable data corresponding to the target user according to the target user information.
Illustratively, the obtaining module 202 is further configured to: and analyzing and calculating the historical information of the target user corresponding to the target user through a preconfigured hadoop calculation frame to obtain the target intermediate variable data.
Illustratively, the obtaining module 202 is further configured to: acquiring a plurality of user information in advance from one or more databases, wherein the user information comprises historical operation information and user historical financial information; inputting the plurality of user information into a hadoop calculation framework; calculating the historical financial data of the user through the hadoop calculation frame according to the preset frequency to obtain a plurality of intermediate variable data corresponding to a plurality of user information; and saving the intermediate variable data to a frame database.
And the analysis module 204 is used for carrying out wind control analysis on the application information according to the target intermediate variable data and through a preset analysis template.
A determining module 206, configured to determine whether the target user is a safe user according to the wind control analysis result.
A forwarding module 208, configured to forward the application information of the target user to a server when the target user is a secure user.
Illustratively, the system further comprises: a configuration module 210, configured to obtain an xml template, where the xml template is used to define an execution sequence of a whole analysis process; sequentially loading a plurality of service operation logic files configured in advance into an xml template for analysis to obtain a plurality of xml analysis files corresponding to the plurality of service operation logic files; the plurality of business operation logics comprise data source query, business query, application frequency, operation equipment replacement frequency and the like; abstracting the plurality of xml parsing files into a plurality of nodes, wherein each node corresponds to one xml parsing file; configuring the plurality of points to form a directed acyclic graph according to the sequence of the plurality of business operation logics in the xml template; and defining an analysis template according to the directed acyclic graph.
EXAMPLE III
Fig. 3 is a schematic diagram of a hardware architecture of a computer device according to a third embodiment of the present invention. In the present embodiment, the computer device 2 is a device capable of automatically performing numerical calculation and/or information processing in accordance with a preset or stored instruction. The computer device 2 may be a rack server, a blade server, a tower server or a rack server (including an independent server or a server cluster composed of a plurality of servers), and the like. As shown, the computer device 2 includes, but is not limited to, at least a memory 21, a processor 22, a network interface 23, and a lip biopsy system 20, which are communicatively coupled to each other via a system bus.
In this embodiment, the memory 21 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the storage 21 may be an internal storage unit of the computer device 2, such as a hard disk or a memory of the computer device 2. In other embodiments, the memory 21 may also be an external storage device of the computer device 2, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like provided on the computer device 2. Of course, the memory 21 may also comprise both internal and external memory units of the computer device 2. In this embodiment, the memory 21 is generally used for storing an operating system and various application software installed in the computer device 2, such as a program code of the system security control system 20 of the data application of the second embodiment. Further, the memory 21 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 22 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 22 is typically used to control the overall operation of the computer device 2. In this embodiment, the processor 22 is configured to run the program code stored in the memory 21 or process data, for example, run the system security control system 20 of the data application, so as to implement the system security control method of the data application in the first embodiment.
The network interface 23 may comprise a wireless network interface or a wired network interface, and the network interface 23 is generally used for establishing communication connection between the computer device 2 and other electronic apparatuses. For example, the network interface 23 is used to connect the computer device 2 to an external terminal through a network, establish a data transmission channel and a communication connection between the computer device 2 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), Wi-Fi, and the like.
It is noted that fig. 3 only shows the computer device 2 with components 20-23, but it is to be understood that not all shown components are required to be implemented, and that more or less components may be implemented instead.
In this embodiment, the system security control system 20 of the data application stored in the memory 21 may be further divided into one or more program modules, and the one or more program modules are stored in the memory 21 and executed by one or more processors (in this embodiment, the processor 22) to complete the present invention.
For example, fig. 2 is a schematic diagram illustrating program modules of the system security control system 20 for implementing a data application according to a second embodiment of the present invention, in which the system security control system 20 for implementing a data application may be divided into a receiving module 200, an obtaining module 202, a parsing module 204, a determining module 206, and a forwarding module 208. The program modules referred to herein refer to a series of computer program instruction segments that can perform specific functions, and are more suitable than programs for describing the execution process of the system security control system 20 of the data application in the computer device 2. The specific functions of the program modules 200 and 208 have been described in detail in the second embodiment, and are not described herein again.
Example four
The present embodiment also provides a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements corresponding functions. The computer-readable storage medium of this embodiment is used in the system security control system 20 of the data application, and when executed by the processor, implements the system security control method of the data application of the first embodiment.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A system security control method for a data application, the method comprising:
determining target user information according to the received application information;
acquiring target intermediate variable data corresponding to the target user from a frame database according to the target user information, wherein the target intermediate variable data is pre-calculated data related to the target user;
carrying out wind control analysis on the application information according to the target intermediate variable data and through a preset analysis template;
determining whether the target user is a safe user or not according to the wind control analysis result; and
and when the target user is a safe user, forwarding the application information of the target user to a server.
2. The system security control method of claim 1, wherein the step of determining the target user information according to the received application information comprises:
receiving application information input by a client terminal;
acquiring identity authentication information of a user at a client terminal according to the application information; and
and determining target user information of a target user according to the identity authentication information, wherein the target user information comprises face information, mobile phone number information, identity card information, sound information and the like.
3. The method for system security control of a data application according to claim 1, wherein the method further comprises: configuring an analysis template, wherein the configuration step of the analysis template comprises the following steps:
acquiring an xml template, wherein the xml template is used for defining the execution sequence of the whole analysis process;
sequentially loading a plurality of service operation logic files configured in advance into an xml template for analysis to obtain a plurality of xml analysis files corresponding to the plurality of service operation logic files; the plurality of business operation logics comprise data source query, business query, application frequency, operation equipment replacement frequency and the like;
abstracting the plurality of xml parsing files into a plurality of nodes, wherein each node corresponds to one xml parsing file;
configuring the plurality of nodes to form a directed acyclic graph according to the sequence of the plurality of business operation logics in the xml template; and
and defining an analysis template according to the directed acyclic graph.
4. The system security control method of claim 1, wherein the step of obtaining the target intermediate variable data corresponding to the target user from the framework database according to the target user information comprises:
and analyzing and calculating the historical information of the target user corresponding to the target user through a preconfigured hadoop calculation frame to obtain the target intermediate variable data.
5. The system security control method of claim 4, wherein the hadoop computing framework is configured, and the step of configuring the hadoop computing framework comprises:
acquiring a plurality of user information in advance from one or more databases, wherein the user information comprises historical operation information and user historical financial information;
inputting the plurality of user information into a hadoop calculation framework;
calculating the historical financial data of the user through the hadoop calculation frame according to the preset frequency to obtain a plurality of intermediate variable data corresponding to a plurality of user information; and
and saving the intermediate variable data to a frame database.
6. A system security control system for a data application, comprising:
the receiving module is used for determining the target user information according to the received application information;
the acquisition module is used for acquiring target intermediate variable data corresponding to the target user from a frame database according to the target user information;
the analysis module is used for carrying out wind control analysis on the application information according to the target intermediate variable data and through a preset analysis template;
the determining module is used for determining whether the target user is a safe user according to the wind control analysis result; and
and the forwarding module is used for forwarding the application information of the target user to a server when the target user is a safe user.
7. The system security control system of claim 6, wherein the receiving module is further configured to:
receiving application information input by a client terminal;
acquiring identity authentication information of a user at a client terminal according to the application information; and
and determining target user information of a target user according to the identity authentication information, wherein the target user information comprises face information, mobile phone number information, identity card information, sound information and the like.
8. The system security control system of claim 5, further comprising a configuration module to:
acquiring an xml template, wherein the xml template is used for defining the execution sequence of the whole analysis process;
sequentially loading a plurality of service operation logic files configured in advance into an xml template for analysis to obtain a plurality of xml analysis files corresponding to the plurality of service operation logic files; the plurality of business operation logics comprise data source query, business query, application frequency, operation equipment replacement frequency and the like;
abstracting the plurality of xml parsing files into a plurality of nodes, wherein each node corresponds to one xml parsing file;
configuring the plurality of nodes to form a directed acyclic graph according to the sequence of the plurality of business operation logics in the xml template; and
and defining an analysis template according to the directed acyclic graph.
9. A computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the computer program, when executed by the processor, carries out the steps of the method for system security control of a data application according to any one of claims 1 to 5.
10. A computer-readable storage medium, in which a computer program is stored which is executable by at least one processor to cause the at least one processor to perform the steps of the method for system security control of a data application according to any one of claims 1 to 5.
CN202010272798.0A 2020-04-09 2020-04-09 System safety control method and system for data application and computer equipment Active CN111580874B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010272798.0A CN111580874B (en) 2020-04-09 2020-04-09 System safety control method and system for data application and computer equipment
PCT/CN2021/077760 WO2021203858A1 (en) 2020-04-09 2021-02-25 Data application system security control method and system, and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010272798.0A CN111580874B (en) 2020-04-09 2020-04-09 System safety control method and system for data application and computer equipment

Publications (2)

Publication Number Publication Date
CN111580874A true CN111580874A (en) 2020-08-25
CN111580874B CN111580874B (en) 2022-05-27

Family

ID=72111406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010272798.0A Active CN111580874B (en) 2020-04-09 2020-04-09 System safety control method and system for data application and computer equipment

Country Status (2)

Country Link
CN (1) CN111580874B (en)
WO (1) WO2021203858A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949829A (en) * 2020-09-01 2020-11-17 辽宁振兴银行股份有限公司 XML (extensive markup language) analysis and wind control variable generation method
WO2021203858A1 (en) * 2020-04-09 2021-10-14 深圳壹账通智能科技有限公司 Data application system security control method and system, and computer device

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110689442A (en) * 2019-09-02 2020-01-14 中国人民人寿保险股份有限公司 Method and system for underwriting
CN114357525B (en) * 2022-03-10 2022-06-14 杭银消费金融股份有限公司 Data security processing method, equipment and medium based on financial business
CN114915557B (en) * 2022-04-25 2024-02-09 广发证券股份有限公司 Configuration method and device of information isolation wall, mobile terminal and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194096A1 (en) * 2002-04-29 2002-12-19 Richard Falcone Optimizing profitability in business transactions
US20070094118A1 (en) * 2005-10-21 2007-04-26 Elke Becker Exposure management system and method
US20090106141A1 (en) * 2007-10-23 2009-04-23 Trans Union Llc Systems and Methods for Minimizing Effects of Authorized User Credit Tradelines
CN104408610A (en) * 2014-12-03 2015-03-11 苏州贝多环保技术有限公司 Third-party payment platform business processing method based on risk assessment
CN107767021A (en) * 2017-09-12 2018-03-06 阿里巴巴集团控股有限公司 A kind of risk control method and equipment
CN107818513A (en) * 2017-11-24 2018-03-20 泰康保险集团股份有限公司 Methods of risk assessment and device, storage medium, electronic equipment
CN108230157A (en) * 2016-12-15 2018-06-29 平安科技(深圳)有限公司 A kind of Claims Resolution treating method and apparatus
CN109146696A (en) * 2018-09-03 2019-01-04 汇保医联信息科技有限公司 Air control check method, device and the electronic equipment of business insurance
CN109543984A (en) * 2018-11-15 2019-03-29 上海盛付通电子支付服务有限公司 Risk control method, device, electronic equipment and medium
CN110348704A (en) * 2019-06-25 2019-10-18 阿里巴巴集团控股有限公司 Risk Identification Method, apparatus and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012113537A (en) * 2010-11-25 2012-06-14 Hitachi Ltd Latent risk extraction method and system
CN105046562B (en) * 2015-09-10 2018-07-27 腾讯科技(深圳)有限公司 Air control system and air control data capture method
CN108520073A (en) * 2018-04-13 2018-09-11 深圳壹账通智能科技有限公司 Air control data integration method, device, equipment and computer readable storage medium
CN109670936A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Loan examination & approval processing method, platform, equipment and computer readable storage medium
CN111580874B (en) * 2020-04-09 2022-05-27 深圳壹账通智能科技有限公司 System safety control method and system for data application and computer equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194096A1 (en) * 2002-04-29 2002-12-19 Richard Falcone Optimizing profitability in business transactions
US20070094118A1 (en) * 2005-10-21 2007-04-26 Elke Becker Exposure management system and method
US20090106141A1 (en) * 2007-10-23 2009-04-23 Trans Union Llc Systems and Methods for Minimizing Effects of Authorized User Credit Tradelines
CN104408610A (en) * 2014-12-03 2015-03-11 苏州贝多环保技术有限公司 Third-party payment platform business processing method based on risk assessment
CN108230157A (en) * 2016-12-15 2018-06-29 平安科技(深圳)有限公司 A kind of Claims Resolution treating method and apparatus
CN107767021A (en) * 2017-09-12 2018-03-06 阿里巴巴集团控股有限公司 A kind of risk control method and equipment
CN107818513A (en) * 2017-11-24 2018-03-20 泰康保险集团股份有限公司 Methods of risk assessment and device, storage medium, electronic equipment
CN109146696A (en) * 2018-09-03 2019-01-04 汇保医联信息科技有限公司 Air control check method, device and the electronic equipment of business insurance
CN109543984A (en) * 2018-11-15 2019-03-29 上海盛付通电子支付服务有限公司 Risk control method, device, electronic equipment and medium
CN110348704A (en) * 2019-06-25 2019-10-18 阿里巴巴集团控股有限公司 Risk Identification Method, apparatus and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021203858A1 (en) * 2020-04-09 2021-10-14 深圳壹账通智能科技有限公司 Data application system security control method and system, and computer device
CN111949829A (en) * 2020-09-01 2020-11-17 辽宁振兴银行股份有限公司 XML (extensive markup language) analysis and wind control variable generation method

Also Published As

Publication number Publication date
WO2021203858A1 (en) 2021-10-14
CN111580874B (en) 2022-05-27

Similar Documents

Publication Publication Date Title
CN111580874B (en) System safety control method and system for data application and computer equipment
CN110782240B (en) Business data processing method and device, computer equipment and storage medium
CN108415832A (en) Automatic interface testing method, device, equipment and storage medium
CN110266510B (en) Network control strategy generation method and device, network control method and storage medium
CN110503564B (en) Security case processing method, system, equipment and storage medium based on big data
US8620911B2 (en) Document registry system
CN111091358A (en) Unified processing method and system for multiple payment channels
CN112598513B (en) Method and device for identifying stockholder risk transaction behaviors
CN110851298A (en) Abnormality analysis and processing method, electronic device, and storage medium
CN110309099A (en) Interface managerial method, device, equipment and computer readable storage medium
CN112785411A (en) Credit investigation data processing method, system, equipment and computer readable storage medium
CN111915316A (en) Suspicious transaction monitoring method and device, computer equipment and storage medium
CN114298804A (en) Intelligent account checking method, system and computer readable storage medium
CN113888299A (en) Wind control decision method and device, computer equipment and storage medium
CN110827142A (en) User credit evaluation method, system, server and storage medium
CN116797345A (en) Task processing method, device, computer equipment and storage medium
CN114998022A (en) Compliance wind control method and system
CN111429125B (en) Account management method and device, storage medium and electronic equipment
CN114116761A (en) Variable processing method, variable processing device, computer equipment and storage medium
CN113327111A (en) Method and system for evaluating network financial transaction risk
CN113094595A (en) Object recognition method, device, computer system and readable storage medium
CN112632607A (en) Data processing method, device and equipment
CN111709709A (en) Information processing method, system and computer equipment based on warranty service
CN111292184A (en) File feedback alarm prompting method and device and storage medium
CN110969430A (en) Method and device for identifying suspicious user, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant