CN112417441A - Data processing method and device, computer equipment and computer readable storage medium - Google Patents

Data processing method and device, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN112417441A
CN112417441A CN202011241142.9A CN202011241142A CN112417441A CN 112417441 A CN112417441 A CN 112417441A CN 202011241142 A CN202011241142 A CN 202011241142A CN 112417441 A CN112417441 A CN 112417441A
Authority
CN
China
Prior art keywords
wind control
service request
user
data
control detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011241142.9A
Other languages
Chinese (zh)
Inventor
林宝鹏
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yishi Huolala Technology Co Ltd
Original Assignee
Shenzhen Yishi Huolala Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yishi Huolala Technology Co Ltd filed Critical Shenzhen Yishi Huolala Technology Co Ltd
Priority to CN202011241142.9A priority Critical patent/CN112417441A/en
Publication of CN112417441A publication Critical patent/CN112417441A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses a data processing method, a device system, computer equipment and a computer readable storage medium, which are used for acquiring a service request of a user and acquiring user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.

Description

Data processing method and device, computer equipment and computer readable storage medium
Technical Field
The embodiments of the present application relate to the field of data processing videos, and in particular, to a method and an apparatus for data processing, a computer device, and a computer-readable storage medium.
Background
At present, there are two wind control modes, one is client wind control, and the other is single-service wind control system.
And for client wind control, wind control strategies and rule processing are integrated in client application, system information and user operation of the client are quickly identified, and illegal operation is intercepted in real time.
The advantages are that: the system can be operated off-line and on-line without intervention of a server. The operation is simple, and the interception speed is high.
The disadvantages are as follows: the strategy and the rule are difficult to update iteratively, and need to be updated together with the client when the strategy and the rule need to be updated. And the policy operation is limited, complex service scenes cannot be processed, otherwise, the client is overstaffed, too much client resources are occupied, and the user experience is poor.
And for the single-service wind control system, the wind control operation logic is separately extracted out, and the single-service wind control system is integrated. And the client identifies the system information of the client and the user operation and uploads the system information and the user operation to a wind control system for wind control identification detection, and then the client is fed back to judge whether the client is intercepted or not.
The advantages are that: the wind control function is independent of the client, and complex wind control scenes can be processed by multi-service combination. Because the wind control strategy and the rules are separated from the client, the iterative updating is convenient. Meanwhile, the system can gather the user operation information of all the clients, so that the system can be used as a data support for updating the later-stage wind control strategy and rule, and the strategy and rule can be more efficient and accurate.
The disadvantages are as follows: the single-service wind control only takes effect on a certain service scene, and the service scene is single. The wind control strategy and the rules have strong pertinence, can not be multiplexed to other services, and have low resource utilization rate.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method, an apparatus, a system, a computer device, and a computer-readable storage medium for data processing, which aim to solve the problem of data wind control.
One aspect of the embodiments of the present application provides a method for data processing, where the method includes:
acquiring a service request of a user, and acquiring user data according to the service request, wherein the user data comprises: user role, IP, device fingerprint, event type, map track and/or service type;
carrying out wind control detection according to the service request;
acquiring a business processing rule corresponding to a wind control detection result;
and processing the service request according to the service processing rule.
An aspect of an embodiment of the present application provides an apparatus for data processing, where the apparatus includes:
a first obtaining module, configured to obtain a service request of a user, and obtain user data according to the service request, where the user data includes: user role, IP, device fingerprint, event type, map track and/or service type;
the detection module is used for carrying out wind control detection according to the service request;
the second acquisition module is used for acquiring a business processing rule corresponding to the wind control detection result;
and the processing module is used for processing the service request according to the service processing rule.
An aspect of the embodiments of the present application further provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
An aspect of the embodiments of the present application further provides a computer-readable storage medium, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
The method, the device system, the computer equipment and the computer readable storage medium for data processing provided by the embodiment of the application are used for acquiring a service request of a user and acquiring user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment realizes an interfacing configurable data query scheme, a single SQL data query service supports various storage engines, and a corresponding SQL parser can be selected to query data on the storage engines according to different storage engines. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.
Drawings
FIG. 1 schematically illustrates an environmental application diagram according to an embodiment of the present application;
fig. 2 schematically shows a flow chart of a method of data processing according to a first embodiment of the present application;
FIG. 3 schematically shows a flow chart of a method of data processing according to an embodiment two of the present application;
fig. 4 schematically shows a schematic structural diagram of a data processing apparatus according to a third embodiment of the present application;
fig. 5 schematically shows a hardware architecture diagram of a computer device adapted to implement the method of data processing according to a fourth embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the descriptions relating to "first", "second", etc. in the embodiments of the present application are only for descriptive purposes and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
Fig. 1 schematically shows an environment application diagram according to an embodiment of the application.
The user terminal 11 may be connected to a plurality of mobile terminals 13 through the server 12. The user terminal 11 receives a service request input by a user, the server 12 obtains the service request of the user, performs wind control detection according to the service request, obtains a service processing rule corresponding to a wind control detection result, and processes the service request according to the service processing rule. The mobile terminal 13 and the user terminal 11 may be the same device or different devices.
The user terminal 11, the server 12, and the mobile terminal 13 are connected to each other through a network. The network may include various network devices such as routers, switches, multiplexers, hubs, modems, bridges, repeaters, firewalls, proxy devices, and/or the like. The network may include physical links, such as coaxial cable links, twisted pair cable links, fiber optic links, combinations thereof, and the like. The network may include wireless links, such as cellular links, satellite links, Wi-Fi links, and the like.
The plurality of mobile terminals 13 may be configured to receive the content and services of the server 12. The plurality of mobile terminals 13 may include any type of electronic device, such as a mobile device, a tablet device, a laptop computer, a workstation, a virtual reality device, a gaming device, a set-top box, a digital streaming media device, a vehicle terminal, a smart television, a set-top box, and so forth.
A plurality of mobile terminals 13 may be associated with one or more users. A single user may use one or more of the plurality of mobile terminals 13 to access the server 12.
Example one
Fig. 2 schematically shows a flow chart of a method of data processing according to a first embodiment of the present application. It is understood that the present method embodiment may be implemented in the mobile terminal 13, and the flowchart of the present method embodiment is not used to limit the order in which the steps are executed.
As shown in fig. 2, the data processing method may include steps S200 to S206, in which:
step S200, obtaining a service request of a user, and obtaining user data according to the service request, wherein the user data comprises: user role, IP, device fingerprint, event type, map track and/or service type;
the acquiring of the service processing rule corresponding to the wind control detection result includes:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
Step S202, carrying out wind control detection according to the service request;
step S204, acquiring a business processing rule corresponding to the wind control detection result;
step S206, the service request is processed according to the service processing rule.
Optionally, the method further includes:
according to the wind control detection result, corresponding penalty measures are taken on the behaviors of the nodes at different time in advance, in advance and after before high, medium and low risk level division is carried out on different user behavior data, and the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
Optionally, the method further includes:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
Specifically, 1, each service end analyzes the service request of the user and records the related user behavior and characteristic data. Such as user role, IP, device fingerprint, event type, map track, service type, etc.
2. The system carries out wind control detection on each wind control link of the user service request, executes each rule according to the service processing flow, takes the rule decision result as the guide, executes the rule to be executed next step, and finally generates the decision result.
3. According to the wind control detection result, high, medium and low risk grade division is carried out on different user behavior data, different punishment measures are carried out according to the behaviors of nodes at different time such as the prior, the in-process and the after-process, the in-process interception is carried out, the in-process cancellation is carried out, the in-process violation record is carried out, and corresponding punishment is carried out.
4. And an operator audit and automatic audit mechanism is used, and violation behaviors are verified according to strong and weak rules, so that system misjudgment behaviors are reduced.
5. And providing complaints, violation withdrawals and audit entries for the mishandling data, and realizing wind control closed loop.
6. The system automatically monitors the wind control effect of each rule and compares and adjusts the effects in time.
The data processing method provided by the embodiment of the application obtains a service request of a user, and obtains user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment realizes an interfacing configurable data query scheme, a single SQL data query service supports various storage engines, and a corresponding SQL parser can be selected to query data on the storage engines according to different storage engines. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.
Example two
Fig. 3 schematically shows a flow chart of a method of data processing according to the second embodiment of the present application. It is understood that the present method embodiment may be performed in the server 12 and the flow chart of the present method embodiment is not intended to limit the order in which the steps are performed.
As shown in fig. 3, a sensitive word detection service, an event reporting service, a blacklist service, a case center, an operation tool, and the like. In the scheme, a DFA algorithm is used for sensitive word matching, and in the computer theory, a deterministic finite state automaton or a deterministic finite automaton is an automaton capable of realizing state transition. For a given state belonging to the automaton and a character belonging to the automaton alphabet, it is able to transition to the next state (which may be the previous state) according to a transfer function given beforehand.
Defining a non-equivalence relation:
Figure BDA0002768388560000051
this set N can be obtained by the following steps:
if p ∈ F is present,
Figure BDA0002768388560000052
all state pairs (p, q) and (q, p) are marked
For the unmarked state pair (p, q) and σ, (p, q) is marked if (δ (p, σ), δ (q, σ)) is marked
The set of all the above labeled state pairs is the non-equivalence relation N
Expanding the transfer function:
to describe the DFA content for convenience, while ensuring stringency, the following extended transfer function is defined:
δ*:Q×∑*→Q。
δ*(q, w) is the state reached by the automaton after reading the string w from the state q in sequence
The definition of the extended transfer function recursion is:
Figure BDA0002768388560000061
EXAMPLE III
Fig. 4 schematically shows a structural diagram of a data processing apparatus according to a third embodiment of the present application. The data processing apparatus may be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the embodiments of the present application. The program modules referred to in the embodiments of the present application refer to a series of computer program instruction segments that can perform specific functions, and the following description will specifically describe the functions of the program modules in the embodiments.
As shown in fig. 4, the data processing apparatus 400 may include a first obtaining module 400, a detecting module 402, a second obtaining module 404, and a processing module 406, wherein,
a first receiving module 400, configured to obtain a service request of a user, and obtain user data according to the service request, where the user data includes: user role, IP, device fingerprint, event type, map track and/or service type;
a detection module 402, configured to perform a wind control detection according to the service request;
a second obtaining module 404, configured to obtain a service processing rule corresponding to the wind control detection result;
the processing module 406 is configured to process the service request according to the service processing rule.
Wherein, the second obtaining module 404 is configured to:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
Wherein the apparatus further comprises:
the penalty module is used for performing corresponding penalty measures on the behaviors of the nodes at different time in advance, in the middle and after before performing high, medium and low risk grade division on different user behavior data according to the wind control detection result, wherein the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
Wherein the apparatus further comprises:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
Specifically, 1, each service end analyzes the service request of the user and records the related user behavior and characteristic data. Such as user role, IP, device fingerprint, event type, map track, service type, etc.
2. The system carries out wind control detection on each wind control link of the user service request, executes each rule according to the service processing flow, takes the rule decision result as the guide, executes the rule to be executed next step, and finally generates the decision result.
3. According to the wind control detection result, high, medium and low risk grade division is carried out on different user behavior data, different punishment measures are carried out according to the behaviors of nodes at different time such as the prior, the in-process and the after-process, the in-process interception is carried out, the in-process cancellation is carried out, the in-process violation record is carried out, and corresponding punishment is carried out.
4. And an operator audit and automatic audit mechanism is used, and violation behaviors are verified according to strong and weak rules, so that system misjudgment behaviors are reduced.
5. And providing complaints, violation withdrawals and audit entries for the mishandling data, and realizing wind control closed loop.
6. The system automatically monitors the wind control effect of each rule and compares and adjusts the effects in time.
The data processing device provided by the embodiment of the application acquires a service request of a user and acquires user data according to the service request; carrying out wind control detection according to the service request; acquiring a business processing rule corresponding to a wind control detection result; and processing the service request according to the service processing rule. The embodiment realizes an interfacing configurable data query scheme, a single SQL data query service supports various storage engines, and a corresponding SQL parser can be selected to query data on the storage engines according to different storage engines. The embodiment provides safety guarantee for the normal operation of the platform, finds various illegal operation behaviors in time, reduces the platform loss and reduces the operation cost; the SOP auditing process has high practicability and simple and standardized operation, and can greatly shorten the auditing process time of operators; and a configuration interface for customizing the audit rule is provided, and the audit rule can be adjusted in real time according to the change of the wind control rule.
Example four
Fig. 5 schematically shows a hardware architecture diagram of a computer device adapted to implement the method of data processing according to a fourth embodiment of the present application.
In this embodiment, the computer device 5 may be used as a provider network or a component part of the provider network, and the computer device 5 may be, for example, a virtual machine host process and one or more virtual machine instances, or a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of multiple servers), and the like.
In this embodiment, the computer device 5 may also be used as a mobile terminal or a component part constituting a mobile terminal. When the computer device 5 is a mobile terminal or forms part of a mobile terminal, the computer device 5 may be, for example, a smartphone, a computer, a projector, a set-top box, etc.
In the present embodiment, the computer device 5 is a device capable of automatically performing numerical calculation and/or information processing in accordance with a command set or stored in advance. As shown in fig. 5, the computer device 5 includes at least, but is not limited to: memory 510, processor 520, and network interface 530 may be communicatively linked to each other by a system bus. Wherein:
the memory 510 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 510 may be an internal storage module of the computer device 5, such as a hard disk or a memory of the computer device 5. In other embodiments, the memory 510 may also be an external storage device of the computer device 5, such as a plug-in hard disk provided on the computer device 5, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Of course, the memory 510 may also include both internal and external memory modules of the computer device 5. In this embodiment, the memory 510 is generally used for storing an operating system installed in the computer device 5 and various types of application software, such as program codes of a data processing method and the like. In addition, the memory 510 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 520 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 520 is generally used for controlling the overall operation of the computer device 5, such as performing control and processing related to data or communication with the computer device 5. In this embodiment, processor 520 is configured to execute program codes stored in memory 510 or process data.
Network interface 530 may include a wireless network interface or a wired network interface, and network interface 530 is typically used to establish communication links between computer device 5 and other computer devices. For example, the network interface 530 is used to connect the computer device 5 with an external terminal via a network, establish a data transmission channel and a communication link between the computer device 5 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), or Wi-Fi.
It should be noted that FIG. 5 only shows a computer device having components 510 and 530, but it should be understood that not all of the shown components are required and that more or fewer components may be implemented instead.
In this embodiment, the data processing method stored in the memory 510 may be further divided into one or more program modules and executed by one or more processors (in this embodiment, the processor 520) to complete the present application.
EXAMPLE five
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of data processing in the embodiments.
In this embodiment, the computer-readable storage medium includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the computer readable storage medium may be an internal storage unit of the computer device, such as a hard disk or a memory of the computer device. In other embodiments, the computer readable storage medium may be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device. Of course, the computer-readable storage medium may also include both internal and external storage devices of the computer device. In the present embodiment, the computer-readable storage medium is generally used for storing an operating system and various types of application software installed in the computer device, for example, the program codes of the data processing method in the embodiment, and the like. Further, the computer-readable storage medium may also be used to temporarily store various types of data that have been output or are to be output.

Claims (10)

1. A method of data processing, the method comprising:
acquiring a service request of a user, and acquiring user data according to the service request, wherein the user data comprises: user role, IP, device fingerprint, event type, map track and/or service type;
carrying out wind control detection according to the service request;
acquiring a business processing rule corresponding to a wind control detection result;
and processing the service request according to the service processing rule.
2. The method according to claim 1, wherein the obtaining of the business processing rule corresponding to the wind control detection result comprises:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
3. The method of claim 2, further comprising:
according to the wind control detection result, corresponding penalty measures are taken on the behaviors of the nodes at different time in advance, in advance and after before high, medium and low risk level division is carried out on different user behavior data, and the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
4. The method according to any one of claims 1-3, further comprising:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
5. An apparatus for data processing, the apparatus comprising:
a first obtaining module, configured to obtain a service request of a user, and obtain user data according to the service request, where the user data includes: user role, IP, device fingerprint, event type, map track and/or service type;
the detection module is used for carrying out wind control detection according to the service request;
the second acquisition module is used for acquiring a business processing rule corresponding to the wind control detection result;
and the processing module is used for processing the service request according to the service processing rule.
6. The apparatus of claim 5, wherein the second obtaining module is configured to:
and according to the wind control detection result, carrying out high, medium and low risk grade division on different user behavior data.
7. The apparatus of claim 6, further comprising:
the penalty module is used for performing corresponding penalty measures on the behaviors of the nodes at different time in advance, in the middle and after before performing high, medium and low risk grade division on different user behavior data according to the wind control detection result, wherein the penalty measures comprise: pre-interception, cancellation in advance, and/or penalty in post-event violations.
8. The apparatus of any of claims 5-7, further comprising:
receiving user feedback on the mishandled data, the user feedback comprising: complaints, violation withdrawals, and/or audit entries.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented by the processor when executing the computer program.
10. A computer-readable storage medium, having stored thereon a computer program, the computer program being executable by at least one processor to cause the at least one processor to perform the steps of the method according to any one of claims 1 to 4.
CN202011241142.9A 2020-11-09 2020-11-09 Data processing method and device, computer equipment and computer readable storage medium Pending CN112417441A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011241142.9A CN112417441A (en) 2020-11-09 2020-11-09 Data processing method and device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011241142.9A CN112417441A (en) 2020-11-09 2020-11-09 Data processing method and device, computer equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN112417441A true CN112417441A (en) 2021-02-26

Family

ID=74780823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011241142.9A Pending CN112417441A (en) 2020-11-09 2020-11-09 Data processing method and device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112417441A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636607A (en) * 2018-12-18 2019-04-16 平安科技(深圳)有限公司 Business data processing method, device and computer equipment based on model deployment
CN110309373A (en) * 2018-03-15 2019-10-08 阿里巴巴集团控股有限公司 Information processing method and device
CN111160740A (en) * 2019-12-19 2020-05-15 上海赛可出行科技服务有限公司 Network taxi appointment risk control system and control method
CN111754241A (en) * 2019-05-27 2020-10-09 北京京东尚科信息技术有限公司 User behavior perception method, device, equipment and medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309373A (en) * 2018-03-15 2019-10-08 阿里巴巴集团控股有限公司 Information processing method and device
CN109636607A (en) * 2018-12-18 2019-04-16 平安科技(深圳)有限公司 Business data processing method, device and computer equipment based on model deployment
CN111754241A (en) * 2019-05-27 2020-10-09 北京京东尚科信息技术有限公司 User behavior perception method, device, equipment and medium
CN111160740A (en) * 2019-12-19 2020-05-15 上海赛可出行科技服务有限公司 Network taxi appointment risk control system and control method

Similar Documents

Publication Publication Date Title
US9699028B2 (en) Method and device for updating client
CN105871587A (en) Log uploading method and device
CN110932918B (en) Log data acquisition method and device and storage medium
CN105260639A (en) Face recognition system data update method and device
US9641595B2 (en) System management apparatus, system management method, and storage medium
CN112714365B (en) Video playing method and system
CN112087475B (en) Message pushing method and device for cloud platform component application and message server
CN111126928A (en) Method and device for auditing release content
CN105184559B (en) A kind of payment system and method
CN112052141B (en) Data fragment verification method and device, computer equipment and readable storage medium
CN111158716B (en) Version upgrade calling method and device, computer system and readable storage medium
CN111294888B (en) Network selection method and device
CN112417441A (en) Data processing method and device, computer equipment and computer readable storage medium
CN114911515A (en) Configuration management method, device, equipment and medium
CN115604095A (en) Network equipment configuration method and system
CN112579472B (en) Automatic generation method and device for test cases
CN111782435B (en) Method and system for recovering and processing cascade exception of video monitoring management platform
CN114416420A (en) Equipment problem feedback method and system
CN109634931B (en) Log uploading method and device
CN113760450A (en) Automatic safety management method and device for private cloud virtual machine, terminal and storage medium
CN113132324B (en) Sample identification method and system
CN112148479B (en) Data processing method, device and computer equipment based on Siddi log audit
CN112861093B (en) Verification method, device and equipment for access data and storage medium
CN117743721A (en) Data processing method and device
CN111752590A (en) Operation and maintenance management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination