CN112417441A - Data processing method and device, computer equipment and computer readable storage medium - Google Patents
Data processing method and device, computer equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN112417441A CN112417441A CN202011241142.9A CN202011241142A CN112417441A CN 112417441 A CN112417441 A CN 112417441A CN 202011241142 A CN202011241142 A CN 202011241142A CN 112417441 A CN112417441 A CN 112417441A
- Authority
- CN
- China
- Prior art keywords
- wind control
- service request
- user
- data
- control detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title abstract description 8
- 238000000034 method Methods 0.000 claims abstract description 49
- 238000001514 detection method Methods 0.000 claims abstract description 41
- 230000006399 behavior Effects 0.000 claims abstract description 26
- 238000012550 audit Methods 0.000 claims abstract description 18
- 238000004590 computer program Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 abstract description 12
- 230000008859 change Effects 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 5
- 238000011217 control strategy Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/242—Query formulation
- G06F16/2433—Query languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Data Mining & Analysis (AREA)
- General Business, Economics & Management (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Mathematical Physics (AREA)
- Computational Linguistics (AREA)
- Quality & Reliability (AREA)
- Databases & Information Systems (AREA)
- Game Theory and Decision Science (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application discloses a data processing method, a device system, computer equipment and a computer readable storage medium, which are used for acquiring a service request of a user and acquiring user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.
Description
Technical Field
The embodiments of the present application relate to the field of data processing videos, and in particular, to a method and an apparatus for data processing, a computer device, and a computer-readable storage medium.
Background
At present, there are two wind control modes, one is client wind control, and the other is single-service wind control system.
And for client wind control, wind control strategies and rule processing are integrated in client application, system information and user operation of the client are quickly identified, and illegal operation is intercepted in real time.
The advantages are that: the system can be operated off-line and on-line without intervention of a server. The operation is simple, and the interception speed is high.
The disadvantages are as follows: the strategy and the rule are difficult to update iteratively, and need to be updated together with the client when the strategy and the rule need to be updated. And the policy operation is limited, complex service scenes cannot be processed, otherwise, the client is overstaffed, too much client resources are occupied, and the user experience is poor.
And for the single-service wind control system, the wind control operation logic is separately extracted out, and the single-service wind control system is integrated. And the client identifies the system information of the client and the user operation and uploads the system information and the user operation to a wind control system for wind control identification detection, and then the client is fed back to judge whether the client is intercepted or not.
The advantages are that: the wind control function is independent of the client, and complex wind control scenes can be processed by multi-service combination. Because the wind control strategy and the rules are separated from the client, the iterative updating is convenient. Meanwhile, the system can gather the user operation information of all the clients, so that the system can be used as a data support for updating the later-stage wind control strategy and rule, and the strategy and rule can be more efficient and accurate.
The disadvantages are as follows: the single-service wind control only takes effect on a certain service scene, and the service scene is single. The wind control strategy and the rules have strong pertinence, can not be multiplexed to other services, and have low resource utilization rate.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method, an apparatus, a system, a computer device, and a computer-readable storage medium for data processing, which aim to solve the problem of data wind control.
One aspect of the embodiments of the present application provides a method for data processing, where the method includes:
acquiring a service request of a user, and acquiring user data according to the service request, wherein the user data comprises: user role, IP, device fingerprint, event type, map track and/or service type;
carrying out wind control detection according to the service request;
acquiring a business processing rule corresponding to a wind control detection result;
and processing the service request according to the service processing rule.
An aspect of an embodiment of the present application provides an apparatus for data processing, where the apparatus includes:
a first obtaining module, configured to obtain a service request of a user, and obtain user data according to the service request, where the user data includes: user role, IP, device fingerprint, event type, map track and/or service type;
the detection module is used for carrying out wind control detection according to the service request;
the second acquisition module is used for acquiring a business processing rule corresponding to the wind control detection result;
and the processing module is used for processing the service request according to the service processing rule.
An aspect of the embodiments of the present application further provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
An aspect of the embodiments of the present application further provides a computer-readable storage medium, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
The method, the device system, the computer equipment and the computer readable storage medium for data processing provided by the embodiment of the application are used for acquiring a service request of a user and acquiring user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment realizes an interfacing configurable data query scheme, a single SQL data query service supports various storage engines, and a corresponding SQL parser can be selected to query data on the storage engines according to different storage engines. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.
Drawings
FIG. 1 schematically illustrates an environmental application diagram according to an embodiment of the present application;
fig. 2 schematically shows a flow chart of a method of data processing according to a first embodiment of the present application;
FIG. 3 schematically shows a flow chart of a method of data processing according to an embodiment two of the present application;
fig. 4 schematically shows a schematic structural diagram of a data processing apparatus according to a third embodiment of the present application;
fig. 5 schematically shows a hardware architecture diagram of a computer device adapted to implement the method of data processing according to a fourth embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the descriptions relating to "first", "second", etc. in the embodiments of the present application are only for descriptive purposes and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
Fig. 1 schematically shows an environment application diagram according to an embodiment of the application.
The user terminal 11 may be connected to a plurality of mobile terminals 13 through the server 12. The user terminal 11 receives a service request input by a user, the server 12 obtains the service request of the user, performs wind control detection according to the service request, obtains a service processing rule corresponding to a wind control detection result, and processes the service request according to the service processing rule. The mobile terminal 13 and the user terminal 11 may be the same device or different devices.
The user terminal 11, the server 12, and the mobile terminal 13 are connected to each other through a network. The network may include various network devices such as routers, switches, multiplexers, hubs, modems, bridges, repeaters, firewalls, proxy devices, and/or the like. The network may include physical links, such as coaxial cable links, twisted pair cable links, fiber optic links, combinations thereof, and the like. The network may include wireless links, such as cellular links, satellite links, Wi-Fi links, and the like.
The plurality of mobile terminals 13 may be configured to receive the content and services of the server 12. The plurality of mobile terminals 13 may include any type of electronic device, such as a mobile device, a tablet device, a laptop computer, a workstation, a virtual reality device, a gaming device, a set-top box, a digital streaming media device, a vehicle terminal, a smart television, a set-top box, and so forth.
A plurality of mobile terminals 13 may be associated with one or more users. A single user may use one or more of the plurality of mobile terminals 13 to access the server 12.
Example one
Fig. 2 schematically shows a flow chart of a method of data processing according to a first embodiment of the present application. It is understood that the present method embodiment may be implemented in the mobile terminal 13, and the flowchart of the present method embodiment is not used to limit the order in which the steps are executed.
As shown in fig. 2, the data processing method may include steps S200 to S206, in which:
step S200, obtaining a service request of a user, and obtaining user data according to the service request, wherein the user data comprises: user role, IP, device fingerprint, event type, map track and/or service type;
the acquiring of the service processing rule corresponding to the wind control detection result includes:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
Step S202, carrying out wind control detection according to the service request;
step S204, acquiring a business processing rule corresponding to the wind control detection result;
step S206, the service request is processed according to the service processing rule.
Optionally, the method further includes:
according to the wind control detection result, corresponding penalty measures are taken on the behaviors of the nodes at different time in advance, in advance and after before high, medium and low risk level division is carried out on different user behavior data, and the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
Optionally, the method further includes:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
Specifically, 1, each service end analyzes the service request of the user and records the related user behavior and characteristic data. Such as user role, IP, device fingerprint, event type, map track, service type, etc.
2. The system carries out wind control detection on each wind control link of the user service request, executes each rule according to the service processing flow, takes the rule decision result as the guide, executes the rule to be executed next step, and finally generates the decision result.
3. According to the wind control detection result, high, medium and low risk grade division is carried out on different user behavior data, different punishment measures are carried out according to the behaviors of nodes at different time such as the prior, the in-process and the after-process, the in-process interception is carried out, the in-process cancellation is carried out, the in-process violation record is carried out, and corresponding punishment is carried out.
4. And an operator audit and automatic audit mechanism is used, and violation behaviors are verified according to strong and weak rules, so that system misjudgment behaviors are reduced.
5. And providing complaints, violation withdrawals and audit entries for the mishandling data, and realizing wind control closed loop.
6. The system automatically monitors the wind control effect of each rule and compares and adjusts the effects in time.
The data processing method provided by the embodiment of the application obtains a service request of a user, and obtains user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment realizes an interfacing configurable data query scheme, a single SQL data query service supports various storage engines, and a corresponding SQL parser can be selected to query data on the storage engines according to different storage engines. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.
Example two
Fig. 3 schematically shows a flow chart of a method of data processing according to the second embodiment of the present application. It is understood that the present method embodiment may be performed in the server 12 and the flow chart of the present method embodiment is not intended to limit the order in which the steps are performed.
As shown in fig. 3, a sensitive word detection service, an event reporting service, a blacklist service, a case center, an operation tool, and the like. In the scheme, a DFA algorithm is used for sensitive word matching, and in the computer theory, a deterministic finite state automaton or a deterministic finite automaton is an automaton capable of realizing state transition. For a given state belonging to the automaton and a character belonging to the automaton alphabet, it is able to transition to the next state (which may be the previous state) according to a transfer function given beforehand.
For the unmarked state pair (p, q) and σ, (p, q) is marked if (δ (p, σ), δ (q, σ)) is marked
The set of all the above labeled state pairs is the non-equivalence relation N
Expanding the transfer function:
to describe the DFA content for convenience, while ensuring stringency, the following extended transfer function is defined:
δ*:Q×∑*→Q。
δ*(q, w) is the state reached by the automaton after reading the string w from the state q in sequence
The definition of the extended transfer function recursion is:
EXAMPLE III
Fig. 4 schematically shows a structural diagram of a data processing apparatus according to a third embodiment of the present application. The data processing apparatus may be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the embodiments of the present application. The program modules referred to in the embodiments of the present application refer to a series of computer program instruction segments that can perform specific functions, and the following description will specifically describe the functions of the program modules in the embodiments.
As shown in fig. 4, the data processing apparatus 400 may include a first obtaining module 400, a detecting module 402, a second obtaining module 404, and a processing module 406, wherein,
a first receiving module 400, configured to obtain a service request of a user, and obtain user data according to the service request, where the user data includes: user role, IP, device fingerprint, event type, map track and/or service type;
a detection module 402, configured to perform a wind control detection according to the service request;
a second obtaining module 404, configured to obtain a service processing rule corresponding to the wind control detection result;
the processing module 406 is configured to process the service request according to the service processing rule.
Wherein, the second obtaining module 404 is configured to:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
Wherein the apparatus further comprises:
the penalty module is used for performing corresponding penalty measures on the behaviors of the nodes at different time in advance, in the middle and after before performing high, medium and low risk grade division on different user behavior data according to the wind control detection result, wherein the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
Wherein the apparatus further comprises:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
Specifically, 1, each service end analyzes the service request of the user and records the related user behavior and characteristic data. Such as user role, IP, device fingerprint, event type, map track, service type, etc.
2. The system carries out wind control detection on each wind control link of the user service request, executes each rule according to the service processing flow, takes the rule decision result as the guide, executes the rule to be executed next step, and finally generates the decision result.
3. According to the wind control detection result, high, medium and low risk grade division is carried out on different user behavior data, different punishment measures are carried out according to the behaviors of nodes at different time such as the prior, the in-process and the after-process, the in-process interception is carried out, the in-process cancellation is carried out, the in-process violation record is carried out, and corresponding punishment is carried out.
4. And an operator audit and automatic audit mechanism is used, and violation behaviors are verified according to strong and weak rules, so that system misjudgment behaviors are reduced.
5. And providing complaints, violation withdrawals and audit entries for the mishandling data, and realizing wind control closed loop.
6. The system automatically monitors the wind control effect of each rule and compares and adjusts the effects in time.
The data processing device provided by the embodiment of the application acquires a service request of a user and acquires user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment realizes an interfacing configurable data query scheme, a single SQL data query service supports various storage engines, and a corresponding SQL parser can be selected to query data on the storage engines according to different storage engines. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.
Example four
Fig. 5 schematically shows a hardware architecture diagram of a computer device adapted to implement the method of data processing according to a fourth embodiment of the present application.
In this embodiment, the computer device 5 may be used as a provider network or a component part of the provider network, and the computer device 5 may be, for example, a virtual machine host process and one or more virtual machine instances, or a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of multiple servers), and the like.
In this embodiment, the computer device 5 may also be used as a mobile terminal or a component part constituting a mobile terminal. When the computer device 5 is a mobile terminal or forms part of a mobile terminal, the computer device 5 may be, for example, a smartphone, a computer, a projector, a set-top box, etc.
In the present embodiment, the computer device 5 is a device capable of automatically performing numerical calculation and/or information processing in accordance with a command set or stored in advance. As shown in fig. 5, the computer device 5 includes at least, but is not limited to: memory 510, processor 520, and network interface 530 may be communicatively linked to each other by a system bus. Wherein:
the memory 510 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 510 may be an internal storage module of the computer device 5, such as a hard disk or a memory of the computer device 5. In other embodiments, the memory 510 may also be an external storage device of the computer device 5, such as a plug-in hard disk provided on the computer device 5, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Of course, the memory 510 may also include both internal and external memory modules of the computer device 5. In this embodiment, the memory 510 is generally used for storing an operating system installed in the computer device 5 and various types of application software, such as program codes of a data processing method and the like. In addition, the memory 510 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 520 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 520 is generally used for controlling the overall operation of the computer device 5, such as performing control and processing related to data or communication with the computer device 5. In this embodiment, processor 520 is configured to execute program codes stored in memory 510 or process data.
Network interface 530 may include a wireless network interface or a wired network interface, and network interface 530 is typically used to establish communication links between computer device 5 and other computer devices. For example, the network interface 530 is used to connect the computer device 5 with an external terminal via a network, establish a data transmission channel and a communication link between the computer device 5 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), or Wi-Fi.
It should be noted that FIG. 5 only shows a computer device having components 510 and 530, but it should be understood that not all of the shown components are required and that more or fewer components may be implemented instead.
In this embodiment, the data processing method stored in the memory 510 may be further divided into one or more program modules and executed by one or more processors (in this embodiment, the processor 520) to complete the present application.
EXAMPLE five
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of data processing in the embodiments.
In this embodiment, the computer-readable storage medium includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the computer readable storage medium may be an internal storage unit of the computer device, such as a hard disk or a memory of the computer device. In other embodiments, the computer readable storage medium may be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device. Of course, the computer-readable storage medium may also include both internal and external storage devices of the computer device. In the present embodiment, the computer-readable storage medium is generally used for storing an operating system and various types of application software installed in the computer device, for example, the program codes of the data processing method in the embodiment, and the like. Further, the computer-readable storage medium may also be used to temporarily store various types of data that have been output or are to be output.
Claims (10)
1. A method of data processing, the method comprising:
acquiring a service request of a user, and acquiring user data according to the service request, wherein the user data comprises: user role, IP, device fingerprint, event type, map track and/or service type;
carrying out wind control detection according to the service request;
acquiring a business processing rule corresponding to a wind control detection result;
and processing the service request according to the service processing rule.
2. The method according to claim 1, wherein the obtaining of the business processing rule corresponding to the wind control detection result comprises:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
3. The method of claim 2, further comprising:
according to the wind control detection result, corresponding penalty measures are taken on the behaviors of the nodes at different time in advance, in advance and after before high, medium and low risk level division is carried out on different user behavior data, and the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
4. The method according to any one of claims 1-3, further comprising:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
5. An apparatus for data processing, the apparatus comprising:
a first obtaining module, configured to obtain a service request of a user, and obtain user data according to the service request, where the user data includes: user role, IP, device fingerprint, event type, map track and/or service type;
the detection module is used for carrying out wind control detection according to the service request;
the second acquisition module is used for acquiring a business processing rule corresponding to the wind control detection result;
and the processing module is used for processing the service request according to the service processing rule.
6. The apparatus of claim 5, wherein the second obtaining module is configured to:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
7. The apparatus of claim 6, further comprising:
the penalty module is used for performing corresponding penalty measures on the behaviors of the nodes at different time in advance, in the middle and after before performing high, medium and low risk grade division on different user behavior data according to the wind control detection result, wherein the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
8. The apparatus of any of claims 5-7, further comprising:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented by the processor when executing the computer program.
10. A computer-readable storage medium, having stored thereon a computer program, the computer program being executable by at least one processor to cause the at least one processor to perform the steps of the method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011241142.9A CN112417441A (en) | 2020-11-09 | 2020-11-09 | Data processing method and device, computer equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011241142.9A CN112417441A (en) | 2020-11-09 | 2020-11-09 | Data processing method and device, computer equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112417441A true CN112417441A (en) | 2021-02-26 |
Family
ID=74780823
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011241142.9A Pending CN112417441A (en) | 2020-11-09 | 2020-11-09 | Data processing method and device, computer equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112417441A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109636607A (en) * | 2018-12-18 | 2019-04-16 | 平安科技(深圳)有限公司 | Business data processing method, device and computer equipment based on model deployment |
CN110309373A (en) * | 2018-03-15 | 2019-10-08 | 阿里巴巴集团控股有限公司 | Information processing method and device |
CN111160740A (en) * | 2019-12-19 | 2020-05-15 | 上海赛可出行科技服务有限公司 | Network taxi appointment risk control system and control method |
CN111754241A (en) * | 2019-05-27 | 2020-10-09 | 北京京东尚科信息技术有限公司 | User behavior perception method, device, equipment and medium |
-
2020
- 2020-11-09 CN CN202011241142.9A patent/CN112417441A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110309373A (en) * | 2018-03-15 | 2019-10-08 | 阿里巴巴集团控股有限公司 | Information processing method and device |
CN109636607A (en) * | 2018-12-18 | 2019-04-16 | 平安科技(深圳)有限公司 | Business data processing method, device and computer equipment based on model deployment |
CN111754241A (en) * | 2019-05-27 | 2020-10-09 | 北京京东尚科信息技术有限公司 | User behavior perception method, device, equipment and medium |
CN111160740A (en) * | 2019-12-19 | 2020-05-15 | 上海赛可出行科技服务有限公司 | Network taxi appointment risk control system and control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9699028B2 (en) | Method and device for updating client | |
CN105871587A (en) | Log uploading method and device | |
CN110932918B (en) | Log data acquisition method and device and storage medium | |
CN105260639A (en) | Face recognition system data update method and device | |
US9641595B2 (en) | System management apparatus, system management method, and storage medium | |
CN112714365B (en) | Video playing method and system | |
CN112087475B (en) | Message pushing method and device for cloud platform component application and message server | |
CN111126928A (en) | Method and device for auditing release content | |
CN105184559B (en) | A kind of payment system and method | |
CN112052141B (en) | Data fragment verification method and device, computer equipment and readable storage medium | |
CN111158716B (en) | Version upgrade calling method and device, computer system and readable storage medium | |
CN111294888B (en) | Network selection method and device | |
CN112417441A (en) | Data processing method and device, computer equipment and computer readable storage medium | |
CN114911515A (en) | Configuration management method, device, equipment and medium | |
CN115604095A (en) | Network equipment configuration method and system | |
CN112579472B (en) | Automatic generation method and device for test cases | |
CN111782435B (en) | Method and system for recovering and processing cascade exception of video monitoring management platform | |
CN114416420A (en) | Equipment problem feedback method and system | |
CN109634931B (en) | Log uploading method and device | |
CN113760450A (en) | Automatic safety management method and device for private cloud virtual machine, terminal and storage medium | |
CN113132324B (en) | Sample identification method and system | |
CN112148479B (en) | Data processing method, device and computer equipment based on Siddi log audit | |
CN112861093B (en) | Verification method, device and equipment for access data and storage medium | |
CN117743721A (en) | Data processing method and device | |
CN111752590A (en) | Operation and maintenance management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |