CN112149951B - Risk control method, apparatus, computer device and storage medium - Google Patents

Risk control method, apparatus, computer device and storage medium Download PDF

Info

Publication number
CN112149951B
CN112149951B CN202010799028.1A CN202010799028A CN112149951B CN 112149951 B CN112149951 B CN 112149951B CN 202010799028 A CN202010799028 A CN 202010799028A CN 112149951 B CN112149951 B CN 112149951B
Authority
CN
China
Prior art keywords
variable
configuration
risk control
risk
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010799028.1A
Other languages
Chinese (zh)
Other versions
CN112149951A (en
Inventor
曾科
邬稳
张鹏
韩建
徐杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhaolian Consumer Finance Co ltd
Original Assignee
Zhaolian Consumer Finance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhaolian Consumer Finance Co ltd filed Critical Zhaolian Consumer Finance Co ltd
Priority to CN202010799028.1A priority Critical patent/CN112149951B/en
Publication of CN112149951A publication Critical patent/CN112149951A/en
Application granted granted Critical
Publication of CN112149951B publication Critical patent/CN112149951B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The application relates to a risk control method, a risk control device, computer equipment and a storage medium. The method comprises the following steps: when executing to a risk control node with configuration data according to a risk control flow, acquiring a variable identifier configured for the risk control node; acquiring configured variable configuration and variable processing modes from a variable pool according to the variable identification; calling a generalization caller, and obtaining risk data of the risk control node by using the generalization caller according to the variable configuration; and performing risk inspection on the risk data based on the variable processing mode. The method can improve efficiency, reduce influence caused by external systems and ensure continuity and high availability of the system.

Description

Risk control method, apparatus, computer device and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a risk control method, apparatus, computer device, and storage medium.
Background
With the development of computers, more and more businesses start to automatically perform risk control by using the computers, and the risk control is usually implemented by relying on internal or external data. Generally, data required by risk control needs to be updated or modified frequently, so that a business background system is changed frequently, and the response speed and expansibility of the system are reduced. Conventionally, in order to improve response speed and extensibility, new data is generally acquired each time data dependency redevelopment code needs to be updated or modified.
However, the conventional manner of re-developing code also requires testing after development is completed. In addition, the code call interface is used for acquiring data in a maven dependent packet mode, and the mode often indirectly introduces a large number of useless jar packets of a third party to cause dependence and bulkiness, and even conflict with the existing jar packets, so that the efficiency is reduced, and the normal operation of a system is possibly influenced.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a risk control method, apparatus, computer device, and storage medium capable of improving efficiency and reducing system impact.
A risk control method, the method comprising:
When executing to a risk control node with configuration data according to a risk control flow, acquiring a variable identifier configured for the risk control node;
Acquiring configured variable configuration and variable processing modes from a variable pool according to the variable identification;
Calling a generalization caller, and obtaining risk data of the risk control node by using the generalization caller according to the variable configuration;
and performing risk inspection on the risk data based on the variable processing mode.
In one embodiment, the variable configuration and variable processing manner for obtaining the configuration from the variable pool according to the variable identifier includes:
inquiring whether the variable identification exists in a variable pool;
when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain variable configuration and variable processing modes;
when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
In one embodiment, the invoking the generalization caller, using the generalization caller to obtain the risk data of the risk control node according to the variable configuration, includes:
calling a generalization caller, and transmitting the variable configuration to the generalization caller;
And the generalization caller initiates service call according to the variable configuration, and acquires the risk data of the risk control node through the service call.
In one embodiment, the variable identifier, the variable configuration and the configuration method of the variable processing mode include:
receiving a variable identifier, variable configuration and variable processing mode submitted by a first user at a variable configuration interface of a terminal;
Rechecking the submitted variable identification, variable configuration and variable processing mode;
And storing the variable identification, the variable configuration and the variable processing mode which pass the rechecking into a variable pool.
In one embodiment, the method for configuring the risk control node includes:
receiving node configuration information and variable identifiers submitted by a first user at a node configuration interface of a terminal, wherein the variable identifiers are variable identifiers existing in a variable pool;
rechecking the submitted node configuration information and the variable identifier;
and adding the risk control nodes corresponding to the node configuration information and the variable identification which pass the rechecking to a risk control flow.
In one embodiment, rechecking the configuration information submitted by the first user includes:
Submitting the variable identifier, the variable configuration and the variable processing mode, or the node configuration information and the variable identifier to a second user for rechecking;
And determining whether the rechecking passes or not according to a rechecking result returned by the second user.
In one embodiment, after the risk data is subjected to risk inspection based on the variable processing manner, the method further includes:
When the risk inspection passes, acquiring a next risk control node of the current risk control node;
when the configuration data of the next risk control node is determined, acquiring a variable identifier configured for the next risk control node;
And returning to the step of acquiring the configured variable configuration and variable processing mode from the configuration variable pool according to the variable identification until all nodes in the risk control flow are executed.
A risk control device, the device comprising:
The identification acquisition module is used for acquiring a variable identification configured for the risk control node when the risk control node with configuration data is executed according to a risk control flow;
The configuration acquisition module is used for acquiring configured variable configuration and variable processing modes from a configuration variable pool according to the variable identification;
The call module is used for calling a generalization caller and obtaining the risk data of the risk control node by using the generalization caller according to the variable configuration;
And the wind control module is used for performing risk inspection on the risk data based on the variable processing mode.
A computer device comprising a memory storing a computer program and a processor implementing the steps of any one of the risk control methods described above when the computer program is executed.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the risk control method of any of the preceding claims.
The risk control method, the risk control device, the computer equipment and the storage medium acquire variable identifiers configured for the risk control nodes when the risk control nodes with configuration data are executed according to a risk control flow; acquiring configured variable configuration and variable processing modes from a configuration variable pool according to variable identifiers; calling a generalization caller, and obtaining risk data of the risk control node by using the generalization caller according to variable configuration; and performing risk inspection on the risk data based on the variable processing mode. The method realizes the data acquisition for the variable configuration of the node configuration in a configuration mode, and does not need code development every time. And according to the mode of performing generalization calling by adopting a generalization caller when the calling data is configured, redundant jar packets can be prevented from being introduced, the efficiency can be improved, the influence caused by an external system can be reduced, and the continuity and high availability of the system are ensured.
Drawings
FIG. 1 is a diagram of an application environment for a risk control method in one embodiment;
FIG. 2 is a flow chart of a risk control method according to one embodiment;
FIG. 3 is a flow diagram of steps in variable configuration and variable handling mode for obtaining a configuration from a variable pool based on variable identification in one embodiment;
FIG. 4 is an interface diagram of a variable pool configuration interface in one embodiment;
FIG. 5 is an interface diagram of a node configuration interface in one embodiment;
FIG. 6 is a block diagram of a risk control device in one embodiment;
fig. 7 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The risk control method provided by the application can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. When the terminal 102 receives the wind control request, the terminal 102 implements a risk control method in response to the wind control request. Or the terminal 102 sends the received wind control request to the server 104, and the server 104 implements the risk control method.
Taking the server 104 as an example, specifically, the server 104 performs risk control according to a preset risk control flow, and when the risk control node with configuration data is executed according to the risk control flow, the server 104 obtains a variable identifier configured for the risk control node; the server 104 obtains the configured variable configuration and variable processing mode from the variable pool according to the variable identification; the server 104 calls a generalization caller, and the generalization caller is utilized to acquire the risk data of the risk control node according to variable configuration; the server 104 performs risk checking on the risk data based on the variable processing manner. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices, and the server 104 may be implemented by a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a risk control method is provided, and the method is applied to the server in fig. 1 for illustration, and includes the following steps:
Step S202, when executing to the risk control node having the configuration data according to the risk control flow, acquiring the variable identifier configured for the risk control node.
The risk control flow refers to wind control logic preset according to wind control demands of different businesses, and the risk control flow comprises at least one risk control node. The configuration data is information configured for the risk control node in advance, and comprises node configuration information and variable identification. The variable identifier is a unique identifier of a variable, and the variable identifier in the configuration data corresponding to the risk control node represents a variable associated with the node, which may be a variable name, a variable ID, or the like. In this embodiment, the variable may be understood as wind control data required for wind control, such as credit. The node configuration information comprises node codes, service scenes, vin variable/array/rule identifications, processing modes, states and the like. vin variables/arrays/rule identifications can be understood as more finely divided variables or rules that need to be executed.
Specifically, when the server receives a wind control request of a service, a risk control flow preset for the service is acquired. And the server sequentially executes risk inspection according to the sequence of each risk control node in the risk control flow. When the server executes to a certain risk control node, firstly judging whether the risk control node has configuration data. When the risk control node has configuration data, the execution of the risk control node is required to be invoked to acquire certain risk data. Thus, the server obtains the variable identification of the configuration from the configuration data of the risk control node.
Step S204, obtaining the configured variable configuration and variable processing mode from the variable pool according to the variable identification.
The variable pool comprises a plurality of configured variables, including variable configuration and variable processing modes of the variables. The variable configuration comprises factors such as zeroing identification, class name, method name, parameters, processing mode and the like. The class name represents a class that already exists and can be used to obtain the variable. The risk data containing the variable can be called and acquired according to the class name, the method name and the method parameter.
Specifically, after the server obtains the variable identifier configured for the risk control node, variable configuration and variable processing modes matched with the variable identifier are obtained from the variable pool according to the variable identifier. For example, according to the variable identifier a, the zeroing configuration and the variable processing mode corresponding to the variable identifier a are obtained from the variable pool.
And S206, calling a generalization caller, and obtaining risk data of the risk control node by using the generalization caller according to variable configuration.
Specifically, the generalization invoker is a plug-in for making generalization invocations. And calling the generalization caller after the server acquires the variable configuration of the variable from the variable pool. And sending the variable configuration to a generalization caller, and carrying out generalization call on a corresponding platform by the generalization caller according to the variable configuration. And acquiring risk data corresponding to the variables from the corresponding platform through generalization calling. For example, when the variable is credit, the acquired risk data is specifically a credit score, such as 100 points, 90 points, etc.
Step S208, performing risk inspection on the risk data based on the variable processing mode.
Specifically, after the server obtains the risk data of the variable through the generalization call, the risk data is processed according to the variable processing mode configured for the variable, so that risk inspection is completed. Variable processing is understood to be the processing logic of the acquired data. For example, assume that the credit allocation is processed by comparing with a threshold to determine whether the credit requirement is met. I.e. the credit is compared with a threshold value. For example, a score of 90 or greater indicates compliance with the credit requirement, and a score of less than 90 indicates non-compliance with the credit requirement.
In addition, in one embodiment, after the current risk control node performs the completion risk check, it is determined whether there is a next risk control node according to the risk control flow. And ending the risk control when the next risk control node does not exist. And when the next risk control node exists and the next risk control node exists configuration data, acquiring a variable identifier configured for the next risk control node. Then, the flow proceeds to step S204, where the risk check of the next risk control node is started. The whole risk control flow is finished after all the risk control nodes are executed.
According to the risk control method, when the risk control node with configuration data is executed according to the risk control flow, variable identifiers configured for the risk control node are obtained; acquiring configured variable configuration and variable processing modes from a configuration variable pool according to variable identifiers; calling a generalization caller, and obtaining risk data of the risk control node by using the generalization caller according to variable configuration; and performing risk inspection on the risk data based on the variable processing mode. The method obtains the variable configuration configured for the node by a configuration mode to realize the data acquisition without code development each time. And according to the mode of performing generalization calling by adopting a generalization caller when the calling data is configured, redundant jar packets can be prevented from being introduced, the efficiency can be improved, the influence caused by an external system can be reduced, and the continuity and high availability of the system are ensured.
In one embodiment, as shown in fig. 3, step S204 includes:
Step S302, inquiring whether a variable identifier exists in the variable pool.
And step S304, when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain variable configuration and variable processing modes.
Step S306, when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request the user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
Specifically, because the variables existing in the variable pool are variables configured by the user, the variables corresponding to the risk control nodes may not exist in the variable pool due to human configuration errors or abnormal variable pool. Therefore, when the server obtains variable configuration and variable processing modes according to the variable configuration, firstly, inquiring whether the variable identification exists in the variable pool. When the variable identification exists in the variable pool, the server acquires configuration information associated with the variable identification, so that variable configuration and variable processing modes are obtained. When the variable identification does not exist in the variable pool, the server generates a variable configuration instruction in order to ensure normal running of the risk control flow. And the server returns the variable configuration instruction to the terminal and is used for requesting the user to submit configuration information corresponding to the variable identifier, so as to obtain variable configuration and variable processing modes.
In this embodiment, when the variable does not exist, the user is requested to perform variable matching in time, so that normal performance of the risk control flow is ensured.
In one embodiment, step S206, calling a generalization caller, and obtaining risk data of a risk control node by using the generalization caller according to variable configuration, where the generalization call includes: calling a generalization caller, and transmitting variable configuration to the generalization caller; the generalization caller initiates service call according to variable configuration, and obtains risk data of the risk control node through the service call.
Specifically, when the server invokes the risk data, the variable configuration is passed to the plug-in generalization invoker. After variable configuration is received by the generalization caller, service call is initiated to the corresponding platform according to class names, method names and method parameters in the variable configuration, and risk data returned by the corresponding platform is obtained through the service call.
In this embodiment, generalized call can be performed without depending on packets, so that redundant jar packets can be avoided from being introduced, efficiency can be improved, influence caused by an external system can be reduced, and continuity and high availability of the system are ensured.
In one embodiment, the variable identification, variable configuration and variable handling methods stored in the variable pool are obtained by configuration. The configuration method for the variable identification, the variable configuration and the variable processing mode comprises the following steps: receiving a variable identifier, variable configuration and variable processing mode submitted by a first user at a variable configuration interface of a terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the checked variable identification, variable configuration and variable processing mode to a variable pool.
Specifically, the server provides a corresponding configuration system, and the first user configures variables through a variable pool configuration interface provided by the configuration system and displayed on the terminal. The first user inputs information such as variable identification, variable processing mode and variable configuration including class names, method names and parameters in the variable pool configuration interface, and specifically refers to the variable pool configuration interface shown in fig. 4. And after the first user input is completed, submitting the input variable identification, variable configuration and variable processing mode to a server through terminal click submission. The server performs rechecking corresponding to the variable identifier, the variable configuration and the variable processing mode submitted by the first user, and stores the rechecked variable identifier, the variable configuration and the variable processing mode in the variable pool after the rechecking. The first user may be understood as a user of the configuration variable.
In one embodiment, rechecking variable identification, variable configuration and variable handling means includes: and the server submits the variable identification, the variable configuration and the variable processing mode submitted by the first user to the second user. And submitting the variable identification, the variable configuration and the variable processing mode to a terminal corresponding to the second user. And then, the second user rechecks the variable identification, the variable configuration and the variable processing mode submitted by the first user. And the second user submits the rechecking result to the server through the terminal. When the second user submitted by the terminal is checked to pass, the server stores the variable identification, the variable configuration and the variable processing mode into the variable pool. And when the rechecking result submitted by the second user is failed, the server returns the variable identification, the variable configuration and the variable processing mode to the first user for modification and reconfiguration. And returning the modification configuration and simultaneously returning the modification suggestion of the second user to the first user. In this embodiment, the accuracy of configuration is further ensured by rechecking when configuring variables.
In one embodiment, each risk control node in the risk control flow is also configured, and all risk control nodes are configured to obtain a completed risk control flow. The configuration method of the risk control node comprises the following steps: receiving node configuration information and variable identifiers submitted by a first user at a node configuration interface of a terminal, wherein the variable identifiers are variable identifiers existing in a variable pool; rechecking the submitted node configuration information and variable identification; and adding the risk control nodes corresponding to the node configuration information and the variable identification which pass the recheck to a risk control flow.
Specifically, the server provides a corresponding configuration system, and the first user configures the risk control node through a node configuration interface provided by the configuration system and displayed on the terminal. The first user inputs variable identification and node configuration information including node codes, service scenes, vin variables/arrays/rule identifications and states in the node configuration interface, and specifically refers to the node configuration interface shown in fig. 5. And after the first user input is completed, submitting the input variable identification and node configuration information to a server through terminal click submission. The server performs rechecks corresponding to the variable identification and the node configuration information submitted by the first user, and adds the corresponding risk control node to the risk control flow after rechecking.
In one embodiment, rechecking variable identification and node configuration information includes: the server submits the variable identification and the node configuration information submitted by the first user to the second user. And submitting the variable identification and the node configuration information to a terminal corresponding to the second user. And then, the second user rechecks the variable identification and the node configuration information submitted by the first user, and the second user submits the rechecking result to the server through the terminal. And when the rechecking result submitted by the second user through the terminal is passed, the server determines that the risk control node is successfully configured. And when the rechecking result submitted by the second user is failed, the server returns the variable identification and the node configuration information to the first user for modification and reconfiguration. And returning the modification configuration and simultaneously returning the modification suggestion of the second user to the first user. In this embodiment, the accuracy of configuration is further ensured by rechecking when configuring variables.
In one embodiment, the risk control method is explained in detail according to the following steps, including:
Step 1, a server receives variable identification, variable configuration and variable processing methods input by a first user in a variable pool configuration interface. And checking the configuration information of the variables submitted by the first user through the second user, and taking effect after passing.
And 2, the server receives variable identification and node configuration information input by the first user on the node configuration interface. The variable identification is a variable identification in the variable pool, and the variable is associated with the node through the variable identification. And simultaneously, checking the passing of the second user to take effect.
And step 3, when the server executes the risk control node, acquiring a variable identifier configured by the risk control node, and reading the configuration of the variable through the variable identifier. And then, the configuration of the variables is sent to a generalization caller, risk data is obtained through generalization call, and data processing is carried out according to variable processing to complete risk inspection.
It should be understood that, although the steps in the flowcharts of fig. 2-3 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-3 may include multiple steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the steps or stages in other steps or other steps.
In one embodiment, as shown in fig. 6, there is provided a risk control apparatus including: an identification acquisition module 602, a configuration acquisition module 604, a calling module 606, and a wind control module 608, wherein:
the identifier obtaining module 602 is configured to obtain, when executing to a risk control node having configuration data according to a risk control flow, a variable identifier configured for the risk control node.
The configuration obtaining module 604 is configured to obtain the configured variable configuration and variable processing mode from the configuration variable pool according to the variable identifier.
And the calling module 606 is used for calling the generalization caller and obtaining the risk data of the risk control node by using the generalization caller according to the variable configuration.
The wind control module 608 is configured to perform risk check on the risk data based on the variable processing manner.
In one embodiment, the configuration acquisition module 604 is further configured to query whether a variable identifier exists in the variable pool; when a variable identifier exists in the variable pool, configuration information associated with the variable identifier is obtained from the variable pool, and variable configuration and variable processing modes are obtained; when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
In one embodiment, the calling module 606 is further configured to call the generalization caller, and pass the variable configuration to the generalization caller; the generalization caller initiates service call according to variable configuration, and obtains risk data of the risk control node through the service call.
In one embodiment, the risk control device further includes a configuration module, configured to receive a variable identifier, a variable configuration, and a variable processing manner submitted by the first user at a variable configuration interface of the terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the checked variable identification, variable configuration and variable processing mode to a variable pool.
In one embodiment, the configuration module is further configured to receive node configuration information and a variable identifier submitted by the first user at a node configuration interface of the terminal, where the variable identifier is a variable identifier existing in the variable pool; rechecking the submitted node configuration information and variable identification; and adding the risk control nodes corresponding to the node configuration information and the variable identification which pass the recheck to a risk control flow.
In one embodiment, the configuration module is further configured to submit the variable identifier, the variable configuration and variable processing mode, or the node configuration information and the variable identifier to the second user for review; and determining whether the rechecking passes or not according to a rechecking result returned by the second user.
In one embodiment, the risk control device further includes a traversing module, configured to obtain a next risk control node of the current risk control node after the risk inspection passes; when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node; and returning to the step of acquiring the configured variable configuration and variable processing mode from the configuration variable pool according to the variable identification until all nodes in the risk control flow are executed.
For specific limitations of the risk control device, reference may be made to the above limitation of the risk control method, and no further description is given here. The various modules in the risk control device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing configuration data of variables and nodes. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a risk control method.
It will be appreciated by those skilled in the art that the structure shown in FIG. 7 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
When executing to the risk control node with configuration data according to the risk control flow, acquiring a variable identifier configured for the risk control node;
Acquiring configured variable configuration and variable processing modes from a configuration variable pool according to variable identifiers;
Calling a generalization caller, and obtaining risk data of the risk control node by using the generalization caller according to variable configuration;
and performing risk inspection on the risk data based on the variable processing mode.
In one embodiment, the processor when executing the computer program further performs the steps of: inquiring whether a variable identifier exists in the variable pool; when a variable identifier exists in the variable pool, configuration information associated with the variable identifier is obtained from the variable pool, and variable configuration and variable processing modes are obtained; when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
In one embodiment, the processor when executing the computer program further performs the steps of: calling a generalization caller, and transmitting variable configuration to the generalization caller; the generalization caller initiates service call according to variable configuration, and obtains risk data of the risk control node through the service call.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving a variable identifier, variable configuration and variable processing mode submitted by a first user at a variable configuration interface of a terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the checked variable identification, variable configuration and variable processing mode to a variable pool.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving node configuration information and variable identifiers submitted by a first user at a node configuration interface of a terminal, wherein the variable identifiers are variable identifiers existing in a variable pool; rechecking the submitted node configuration information and variable identification; and adding the risk control nodes corresponding to the node configuration information and the variable identification which pass the recheck to a risk control flow.
In one embodiment, the processor when executing the computer program further performs the steps of: submitting the variable identification, the variable configuration and variable processing mode or the node configuration information and the variable identification to a second user for rechecking; and determining whether the rechecking passes or not according to a rechecking result returned by the second user.
In one embodiment, the processor when executing the computer program further performs the steps of: when the risk inspection passes, acquiring a next risk control node of the current risk control node; when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node; and returning to the step of acquiring the configured variable configuration and variable processing mode from the configuration variable pool according to the variable identification until all nodes in the risk control flow are executed.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
When executing to the risk control node with configuration data according to the risk control flow, acquiring a variable identifier configured for the risk control node;
Acquiring configured variable configuration and variable processing modes from a configuration variable pool according to variable identifiers;
Calling a generalization caller, and obtaining risk data of the risk control node by using the generalization caller according to variable configuration;
and performing risk inspection on the risk data based on the variable processing mode.
In one embodiment, the computer program when executed by the processor further performs the steps of: inquiring whether a variable identifier exists in the variable pool; when a variable identifier exists in the variable pool, configuration information associated with the variable identifier is obtained from the variable pool, and variable configuration and variable processing modes are obtained; when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
In one embodiment, the computer program when executed by the processor further performs the steps of: calling a generalization caller, and transmitting variable configuration to the generalization caller; the generalization caller initiates service call according to variable configuration, and obtains risk data of the risk control node through the service call.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving a variable identifier, variable configuration and variable processing mode submitted by a first user at a variable configuration interface of a terminal; rechecking the submitted variable identification, variable configuration and variable processing mode; and storing the checked variable identification, variable configuration and variable processing mode to a variable pool.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving node configuration information and variable identifiers submitted by a first user at a node configuration interface of a terminal, wherein the variable identifiers are variable identifiers existing in a variable pool; rechecking the submitted node configuration information and variable identification; and adding the risk control nodes corresponding to the node configuration information and the variable identification which pass the recheck to a risk control flow.
In one embodiment, the computer program when executed by the processor further performs the steps of: submitting the variable identification, the variable configuration and variable processing mode or the node configuration information and the variable identification to a second user for rechecking; and determining whether the rechecking passes or not according to a rechecking result returned by the second user.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the risk inspection passes, acquiring a next risk control node of the current risk control node; when determining that the next risk control node has configuration data, acquiring a variable identifier configured for the next risk control node; and returning to the step of acquiring the configured variable configuration and variable processing mode from the configuration variable pool according to the variable identification until all nodes in the risk control flow are executed.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration, and not limitation, RAM can be in various forms such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), etc.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (10)

1. A risk control method, the method comprising:
When executing to a risk control node with configuration data according to a risk control flow, acquiring a variable identifier configured for the risk control node; the configuration data comprises node configuration information and variable identifiers, the variable identifiers in the configuration data corresponding to the risk control nodes represent variables associated with the nodes, and the node configuration information comprises node codes, service scenes, vin variable/array/rule identifiers, processing modes and states;
Acquiring configured variable configuration and variable processing modes from a variable pool according to the variable identification; the variable configuration factors comprise class names, method parameters and processing modes;
calling a generalization caller, transmitting the variable configuration to the generalization caller, and initiating service call to a corresponding platform by the generalization caller according to class names, method names and method parameters in the variable configuration, and acquiring risk data of the risk control nodes returned by the corresponding platform through the service call;
and performing risk inspection on the risk data based on the variable processing mode.
2. The method according to claim 1, wherein the obtaining the configured variable configuration and variable processing manner from the variable pool according to the variable identifier includes:
inquiring whether the variable identification exists in a variable pool;
when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain variable configuration and variable processing modes;
when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
3. The method of claim 1, wherein the variable identification, the variable configuration, and the configuration method of the variable handling manner comprise:
receiving a variable identifier, variable configuration and variable processing mode submitted by a first user at a variable configuration interface of a terminal;
Rechecking the submitted variable identification, variable configuration and variable processing mode;
And storing the variable identification, the variable configuration and the variable processing mode which pass the rechecking into a variable pool.
4. The method according to claim 1, wherein the risk control node configuration method comprises:
receiving node configuration information and variable identifiers submitted by a first user at a node configuration interface of a terminal, wherein the variable identifiers are variable identifiers existing in a variable pool;
rechecking the submitted node configuration information and the variable identifier;
and adding the risk control nodes corresponding to the node configuration information and the variable identification which pass the rechecking to a risk control flow.
5. The method of claim 3 or 4, wherein rechecking the configuration information submitted by the first user comprises:
submitting the configuration information submitted by the first user to the second user for rechecking;
And determining whether the rechecking passes or not according to a rechecking result returned by the second user.
6. The method of claim 1, wherein after performing risk inspection on the risk data based on the variable processing method, further comprising:
When the risk inspection passes, acquiring a next risk control node of the current risk control node;
when the configuration data of the next risk control node is determined, acquiring a variable identifier configured for the next risk control node;
And returning to the step of acquiring the configured variable configuration and variable processing mode from the configuration variable pool according to the variable identification until all nodes in the risk control flow are executed.
7. A risk control device, the device comprising:
The identification acquisition module is used for acquiring a variable identification configured for the risk control node when the risk control node with configuration data is executed according to a risk control flow; the configuration data comprises node configuration information and variable identifiers, the variable identifiers in the configuration data corresponding to the risk control nodes represent variables associated with the nodes, and the node configuration information comprises node codes, service scenes, vin variable/array/rule identifiers, processing modes and states;
The configuration acquisition module is used for acquiring configured variable configuration and variable processing modes from a configuration variable pool according to the variable identification; the variable configuration factors comprise class names, method parameters and processing modes;
The call module is used for calling the generalization caller, transmitting the variable configuration to the generalization caller, and the generalization caller initiates service call to the corresponding platform according to the class name, the method name and the method parameter in the variable configuration, and acquires the risk data of the risk control node returned by the corresponding platform through the service call;
And the wind control module is used for performing risk inspection on the risk data based on the variable processing mode.
8. The apparatus of claim 7, wherein the configuration acquisition module is further configured to:
inquiring whether the variable identification exists in a variable pool; when the variable identification exists in the variable pool, acquiring configuration information associated with the variable identification from the variable pool to obtain variable configuration and variable processing modes; when the variable identification does not exist in the variable pool, generating a variable configuration instruction to request a user to submit configuration information corresponding to the variable identification, and obtaining variable configuration and a variable processing mode.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202010799028.1A 2020-08-11 2020-08-11 Risk control method, apparatus, computer device and storage medium Active CN112149951B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010799028.1A CN112149951B (en) 2020-08-11 2020-08-11 Risk control method, apparatus, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010799028.1A CN112149951B (en) 2020-08-11 2020-08-11 Risk control method, apparatus, computer device and storage medium

Publications (2)

Publication Number Publication Date
CN112149951A CN112149951A (en) 2020-12-29
CN112149951B true CN112149951B (en) 2024-07-12

Family

ID=73888735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010799028.1A Active CN112149951B (en) 2020-08-11 2020-08-11 Risk control method, apparatus, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN112149951B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113419916B (en) * 2021-05-25 2022-09-30 深圳壹账通智能科技有限公司 Wind control inspection program uninterrupted operation method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409892A (en) * 2017-08-15 2019-03-01 凡普互金有限公司 Methods of risk assessment and system
CN111258873A (en) * 2018-11-30 2020-06-09 阿里巴巴集团控股有限公司 Test method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9495395B2 (en) * 2013-04-11 2016-11-15 Oracle International Corporation Predictive diagnosis of SLA violations in cloud services by seasonal trending and forecasting with thread intensity analytics
WO2015191849A1 (en) * 2014-06-11 2015-12-17 Wepay, Inc. Risk data modeling
US10216523B2 (en) * 2015-07-17 2019-02-26 General Electric Company Systems and methods for implementing control logic
CN109165840B (en) * 2018-08-20 2022-06-21 平安科技(深圳)有限公司 Risk prediction processing method, risk prediction processing device, computer equipment and medium
CN110390465A (en) * 2019-06-18 2019-10-29 深圳壹账通智能科技有限公司 Air control analysis and processing method, device and the computer equipment of business datum
CN110659800A (en) * 2019-08-15 2020-01-07 平安科技(深圳)有限公司 Risk monitoring processing method and device, computer equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409892A (en) * 2017-08-15 2019-03-01 凡普互金有限公司 Methods of risk assessment and system
CN111258873A (en) * 2018-11-30 2020-06-09 阿里巴巴集团控股有限公司 Test method and device

Also Published As

Publication number Publication date
CN112149951A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN109474578B (en) Message checking method, device, computer equipment and storage medium
CN112100071B (en) Test case generation method and device, computer equipment and storage medium
CN111598575A (en) Business process control method and device, electronic equipment and readable storage medium
CN112149951B (en) Risk control method, apparatus, computer device and storage medium
CN111694639A (en) Method and device for updating address of process container and electronic equipment
CN114090113B (en) Method, device, equipment and storage medium for dynamically loading data source processing plug-in
CN111338716A (en) Data processing method and device based on rule engine and terminal equipment
CN111522881B (en) Service data processing method, device, server and storage medium
CN111522873B (en) Block generation method, device, computer equipment and storage medium
CN112506590A (en) Interface calling method and device and electronic equipment
CN110609707B (en) Online data processing system generation method, device and equipment
CN112764897B (en) Task request processing method, device and system and computer readable storage medium
CN114327673B (en) Task starting method and device, electronic equipment and storage medium
US20160187231A1 (en) Performance testing method, performance testing apparatus performing the same and storage medium storing the same
CN112783866B (en) Data reading method, device, computer equipment and storage medium
CN113901057A (en) Data playback method and device, computer equipment and storage medium
CN113051008A (en) Interface request processing method and device, computer equipment and storage medium
CN112907198A (en) Service state circulation maintenance method and device and electronic equipment
CN114567573B (en) Abnormal data positioning method, device, server and storage medium
CN112306551B (en) Historical configuration information acquisition method, system and device
CN116528300B (en) Task issuing method, device, system and communication equipment
CN110286913B (en) Check code packet deployment method and device
CN111476663B (en) Data processing method and device, node equipment and storage medium
CN113051157B (en) Interface testing method and device, computer equipment and storage medium
CN113836012A (en) Algorithm testing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Zhaolian Consumer Finance Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: MERCHANTS UNION CONSUMER FINANCE Co.,Ltd.

Country or region before: China

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant