CN112613763B - Data transmission method and device - Google Patents

Data transmission method and device Download PDF

Info

Publication number
CN112613763B
CN112613763B CN202011572972.XA CN202011572972A CN112613763B CN 112613763 B CN112613763 B CN 112613763B CN 202011572972 A CN202011572972 A CN 202011572972A CN 112613763 B CN112613763 B CN 112613763B
Authority
CN
China
Prior art keywords
enterprise
risk
node
nodes
enterprise node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011572972.XA
Other languages
Chinese (zh)
Other versions
CN112613763A (en
Inventor
任亮
傅雨梅
王璞
赵大卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhiyin Intelligent Technology Co ltd
Original Assignee
Beijing Zhiyin Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhiyin Intelligent Technology Co ltd filed Critical Beijing Zhiyin Intelligent Technology Co ltd
Priority to CN202011572972.XA priority Critical patent/CN112613763B/en
Publication of CN112613763A publication Critical patent/CN112613763A/en
Application granted granted Critical
Publication of CN112613763B publication Critical patent/CN112613763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology

Abstract

The invention provides a data transmission method and device, and relates to the technical field of data transmission. The method comprises the following steps: determining a risk source enterprise node; when the risk source enterprise node exists in the enterprise atlas containing the ring structure, judging whether the current enterprise node to which the risk carried in the risk source enterprise node is conducted is a marked enterprise node according to the risk conduction rule; interrupting said conducting and obtaining a risk conducting path if the current enterprise node is a marked enterprise node; if the current enterprise node is not a marked enterprise node, the conducting continues. According to the data transmission method and device, the transmission processing rule is set for the problem that risks are transmitted in the enterprise atlas containing the ring structure, so that the risk transmission can be interrupted when the interruption condition is met, the problem of circulation transmission in the risk transmission process is solved, the accuracy of transmission risk values is improved, and therefore the practicability of the risk transmission technology is improved.

Description

Data transmission method and device
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a data transmission method and apparatus.
Background
At present, the risk conduction technology is mainly applied to risk transmission among enterprises of external risks, the enterprises are related by using association relations among the enterprises such as equity, transaction and the like, so that enterprise patterns are formed, and then the risks are conducted among the enterprises by using rules, algorithms and the like. However, when the technology processes a ring structure formed by association relations among enterprises, the existing conduction technology has no other risk termination method except that the conduction threshold value is used for determining to terminate risk conduction, and in this case, if the conduction threshold value is improperly set or the conduction risk value is not higher than the conduction threshold value, the risk is always conducted, so that infinite superposition of the conduction risks is caused, and errors are generated on actual risk results of various enterprises.
Disclosure of Invention
In view of the above, the present invention provides a data transmission method and apparatus to improve the above technical problems.
In a first aspect, an embodiment of the present invention provides a data transmission method, including the steps of:
determining a risk source enterprise node;
when the risk source enterprise node exists in an enterprise graph comprising a ring structure, judging whether the current enterprise node transmitted to by the risk carried in the risk source enterprise node is a marked enterprise node according to a transmission processing rule, wherein the enterprise graph is a graph comprising a plurality of enterprise nodes and association relations thereof, and the ring structure is a ring node structure formed by the enterprise nodes in the enterprise graph and the association relations thereof;
interrupting conduction of the risk and acquiring a risk conduction path if the current enterprise node is a marked enterprise node;
if the current enterprise node is not a marked enterprise node, the risk continues to conduct.
With reference to the first aspect, an embodiment of the present invention provides a first possible implementation manner of the first aspect, where before the step of determining, according to a risk conduction rule, whether a current enterprise node to which a risk carried in the risk source enterprise node is conducted is a marked enterprise node, the method further includes:
and marking the enterprise nodes passing through the risks in real time by using the node identifiers to obtain marked enterprise nodes.
With reference to the first aspect, the embodiment of the present invention provides a second possible implementation manner of the first aspect, where the step of interrupting conduction of the risk and obtaining a risk conduction path when detecting that the next enterprise node to which the risk is to be conducted is the marked enterprise node further includes:
and when the next enterprise node to which the risk is to be conducted is detected to be the marked enterprise node, interrupting the conduction of the risk, taking the enterprise node before the next enterprise node as the end enterprise node of the risk conduction path according to the risk conduction direction, and acquiring the risk conduction path.
With reference to the first aspect, the embodiment of the present invention provides a third possible implementation manner of the first aspect, where the method further includes:
when a risk event occurs to the plurality of enterprise nodes in the enterprise graph, a risk score for the plurality of enterprise nodes increases.
With reference to the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, wherein the ring structure includes a subset of the set of the plurality of enterprise nodes.
In a second aspect, an embodiment of the present invention further provides a data transmission device, including:
the node determining module is used for determining the risk source enterprise node;
the judging module is used for judging whether the current enterprise node to which the risk carried in the risk source enterprise node is conducted is a marked enterprise node according to a conducting processing rule when the risk source enterprise node exists in an enterprise graph comprising a ring structure, wherein the enterprise graph is a graph comprising a plurality of enterprise nodes and association relations thereof, and the ring structure is a ring node structure formed by the enterprise nodes in the enterprise graph and the association relations thereof;
an interruption module, configured to interrupt the risk conduction and obtain a risk conduction path if the current enterprise node is a marked enterprise node;
and a continuing conduction module, configured to continue conducting the risk if the current enterprise node is not a marked enterprise node.
With reference to the second aspect, an embodiment of the present invention provides a first possible implementation manner of the second aspect, where before the determining module, the apparatus further includes:
and the marking module is used for marking the enterprise nodes passing through the risks in real time by using the node identifiers to obtain marked enterprise nodes.
With reference to the second aspect, an embodiment of the present invention provides a second possible implementation manner of the second aspect, where the interrupt module is configured to:
and when the next enterprise node to which the risk is to be conducted is detected to be the marked enterprise node, interrupting the conduction of the risk, taking the enterprise node before the next enterprise node as the end enterprise node of the risk conduction path according to the risk conduction direction, and acquiring the risk conduction path.
In a third aspect, an embodiment of the present invention further provides a server, where the server includes: a processor and a memory storing computer executable instructions executable by the processor to implement the method described above.
In a fourth aspect, embodiments of the present invention also provide a computer-readable storage medium storing computer-executable instructions that, when invoked and executed by a processor, cause the processor to implement the method described above.
The embodiment of the invention has the following beneficial effects: the embodiment of the invention provides a data transmission method and a data transmission device, which are characterized in that firstly, an enterprise node of an risk source is determined, then, when the enterprise node of the risk source exists in an enterprise map comprising a ring structure, whether the current enterprise node transmitted by the risk carried in the enterprise node of the risk source is a marked enterprise node is judged according to a risk transmission rule, and if the current enterprise node is the marked enterprise node, the transmission is interrupted and a risk transmission path is acquired; if the current enterprise node is not a marked enterprise node, the conducting continues. According to the data transmission method and device, the transmission processing rule is set for the problem that risks are transmitted in the enterprise atlas containing the ring structure, so that the risk transmission can be interrupted when the interruption condition is met, the problem of circulation transmission in the risk transmission process is solved, the accuracy of transmission risk values is improved, and therefore the practicability of the risk transmission technology is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the following description will briefly explain the drawings needed in the embodiments or the prior art description, and it is obvious that the drawings in the following description are some embodiments of the invention and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a data transmission method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another data transmission method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an enterprise graph when risk is in a loop structure, according to an embodiment of the present invention;
FIG. 4 is a block diagram of a data transmission device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
At present, the risk conduction technology is mainly applied to risk transmission among enterprises of external risks, the enterprises are related by using association relations among the enterprises such as equity, transaction and the like, so that enterprise patterns are formed, and then the risks are conducted among the enterprises by using rules, algorithms and the like. However, when the technology processes a ring structure formed by association relations among enterprises, the existing conduction technology has no other risk termination method except that the conduction threshold value is used for determining to terminate risk conduction, and in this case, if the conduction threshold value is improperly set or the conduction risk value is not higher than the conduction threshold value, the risk is always conducted, so that infinite superposition of the conduction risks is caused, and errors are generated on actual risk results of various enterprises. Based on the above, the embodiment of the invention provides a data transmission method and device to alleviate the above problems.
For the convenience of understanding the present embodiment, a data transmission method disclosed in the embodiment of the present invention will be described in detail.
In one possible embodiment, the present invention provides a data conduction method. Fig. 1 is a flowchart of a data transmission method according to an embodiment of the present invention, where the method includes the following steps:
step S102: and determining the risk source enterprise node.
Specifically, the risk source enterprise node is an enterprise node whose risk score is higher than a predetermined score threshold, and the risk score increases in real time with risk conduction.
It should be further noted that all enterprise nodes in the enterprise atlas may become risk source enterprise nodes, and as long as their risk score is above a predetermined score threshold, they are determined to be risk source enterprise nodes.
Specifically, the method further comprises: when a risk event occurs to the plurality of enterprise nodes in the enterprise graph, a risk score for the plurality of enterprise nodes increases.
Step S104: when the risk source enterprise node exists in the enterprise atlas containing the ring structure, judging whether the current enterprise node to which the risk carried in the risk source enterprise node is conducted is a marked enterprise node according to the conducting processing rule.
The enterprise map is a map comprising a plurality of enterprise nodes and association relations thereof, and is a plurality of website maps with industry characteristics which are designed and developed by enterprises according to actual demands of various industries for a long time; the ring structure is a ring node structure formed by enterprise nodes and association relations thereof in the enterprise atlas.
Meanwhile, the risk in the embodiment of the invention is preferably a problem that the interests of enterprises with association relation with the risk can be influenced, such as enterprise bankruptcy, enterprise reputation damage, bad operation and the like, and can also be other problems, and the embodiment of the invention is not limited to the problem.
It should be further explained that, the conducting processing rule in the embodiment of the present invention is a rule for controlling that repeated enterprise nodes cannot appear on the risk conducting path, when the conducting processing rule is used, if repeated enterprise nodes are encountered, risk conducting is terminated, and the rule effectively solves the technical problem of infinite superposition of conducting risks due to a ring structure, and improves the accuracy of conducting risk values, thereby improving the practicality of the risk conducting technology.
Step S106: if the current enterprise node is a marked enterprise node, interrupting conduction of the risk and acquiring a risk conduction path.
Wherein when the current enterprise node interrupts conduction of risks for the marked enterprise node, capturing all possible conduction paths of risks when conducting in the enterprise atlas as final risk conduction paths by the computer, thereby obtaining the risk conduction paths.
Further, the risk conduction paths in the embodiment of the present invention are all possible conduction paths obtained according to the rule of conduction processing when the risk is conducted in the enterprise atlas.
Step S108: if the current enterprise node is not a marked enterprise node, the risk continues to conduct.
At this point, the risk may continue to conduct until it reaches the marked enterprise node.
The embodiment of the invention has the following beneficial effects: according to the embodiment of the invention, through a data transmission method, firstly, a risk source enterprise node is determined, then when the risk source enterprise node exists in an enterprise map comprising a ring structure, whether the current enterprise node transmitted by risks carried in the risk source enterprise node is a marked enterprise node is judged according to a risk transmission rule, and if the current enterprise node is the marked enterprise node, the transmission is interrupted and a risk transmission path is acquired; if the current enterprise node is not a marked enterprise node, the conducting continues. According to the data transmission method and device, the transmission processing rule is set for the problem that risks are transmitted in the enterprise atlas containing the ring structure, so that the risk transmission can be interrupted when the interruption condition is met, the problem of circulation transmission in the risk transmission process is solved, the accuracy of transmission risk values is improved, and therefore the practicability of the risk transmission technology is improved.
In practical use, in order to describe the process of the present invention in more detail, an embodiment of the present invention is shown in fig. 2, which is a flowchart of another data transmission method provided by the embodiment of the present invention, the method includes the following steps:
step S202: and determining the risk source enterprise node.
Specifically, the risk source enterprise node is an enterprise node whose risk score is higher than a predetermined score threshold, and the risk score increases in real time with risk conduction.
Step S204: and marking the enterprise nodes passing through the risks in real time by using the node identifiers to obtain marked enterprise nodes.
The node identifier is preferably a symbol, such as a number or a letter, capable of marking the enterprise node passing by the risk, or may be another type of identifier, which is not limited in this embodiment of the present invention.
Step S206: when the risk source enterprise node exists in the enterprise atlas containing the ring structure, judging whether the current enterprise node to which the risk carried in the risk source enterprise node is conducted is a marked enterprise node according to the conducting processing rule.
The enterprise map is a map comprising a plurality of enterprise nodes and association relations thereof, and is a plurality of website maps with industry characteristics which are designed and developed by enterprises according to actual demands of various industries for a long time; the ring structure is a ring node structure formed by enterprise nodes and association relations thereof in the enterprise atlas.
Meanwhile, the risk in the embodiment of the invention is preferably a problem that the interests of enterprises with association relation with the risk can be influenced, such as enterprise bankruptcy, enterprise reputation damage, bad operation and the like, and can also be other problems, and the embodiment of the invention is not limited to the problem.
It should be further noted that, the ring structure includes a subset of the set of the plurality of enterprise nodes, that is, the enterprise nodes included in the ring structure are all or part of the enterprise nodes included in the enterprise graph, and the association relationship is a relationship such as a share right relationship, a cooperative relationship, or other relationships that can affect each other, which is not limited by comparison of embodiments of the present invention.
In addition, the conducting processing rule in the embodiment of the invention is a rule for controlling that repeated enterprise nodes cannot appear on the risk conducting path, when the conducting processing rule is used, if repeated enterprise nodes are encountered, the risk conducting is terminated, the rule effectively solves the technical problem that conducting risks formed by a ring structure are infinitely overlapped, and the accuracy of conducting risk values is improved, so that the practicability of a risk conducting technology is improved.
The risk conduction path is recorded in real time when the risk is conducted in the enterprise atlas containing the ring structure, the risk is not repeatedly conducted to the same enterprise due to the limitation of the conduction processing rule, namely, the ring conduction cannot occur on the same risk conduction path, when a certain enterprise node is calculated, the enterprise node is marked, when the risk is conducted again into the enterprise node, the mark can be automatically identified through the mark identification function, if the mark exists, the enterprise node is automatically considered to be conducted, the secondary conduction is not conducted to the enterprise node, the conduction is interrupted at the enterprise node, and the whole risk conduction path does not comprise the enterprise node.
Step S208: if the current enterprise node is a marked enterprise node, interrupting conduction of the risk and acquiring a risk conduction path.
Step S210: if the current enterprise node is not a marked enterprise node, the risk continues to conduct.
The data transmission method of the present invention will be described below with reference to specific examples.
Fig. 3 is a schematic diagram of an enterprise graph including a ring structure when risk is present in accordance with an embodiment of the present invention.
As shown in fig. 3, if 4 enterprises A, B, C, D, S have the association relationship shown in fig. 3, where the enterprises B, C, D form a loop structure, according to the conduction processing rule, when the risk conduction paths of the risk source enterprise S have 5 paths at most, namely a- > B, A- > B- > C, A- > B- > D, A- > B- > C- > D, A- > B- > D- > C, this effectively avoids the technical problem of loop conduction due to the loop conduction structure in the risk conduction technology.
In summary, according to the data transmission method and device, firstly, the risk source enterprise node is determined, then when the risk source enterprise node exists in the enterprise map including the ring structure, whether the current enterprise node transmitted by the risk carried in the risk source enterprise node is a marked enterprise node is judged according to the risk transmission rule, and if the current enterprise node is the marked enterprise node, the transmission is interrupted and a risk transmission path is acquired; if the current enterprise node is not a marked enterprise node, the conducting continues. According to the data transmission method and device, the transmission processing rule is set for the problem that risks are transmitted in the enterprise atlas containing the ring structure, so that the risk transmission can be interrupted when the interruption condition is met, the problem of circulation transmission in the risk transmission process is solved, the accuracy of transmission risk values is improved, and therefore the practicability of the risk transmission technology is improved.
In another possible implementation manner, corresponding to the data transmission method provided in the foregoing implementation manner, the embodiment of the present invention further provides a data transmission device, and fig. 4 is a block diagram of a data transmission device provided in the embodiment of the present invention. As shown in fig. 4, the apparatus includes:
a node determining module 401, configured to determine a risk source enterprise node;
the judging module 402 is configured to judge, according to a conduction processing rule, whether a current enterprise node to which a risk carried in the risk source enterprise node is conducted is a marked enterprise node when the risk source enterprise node exists in an enterprise graph including a ring structure, where the enterprise graph is a graph including a plurality of enterprise nodes and association relationships thereof, and the ring structure is a ring node structure formed by the enterprise nodes in the enterprise graph and the association relationships thereof;
an interruption module 403, configured to interrupt the risk conduction and obtain a risk conduction path if the current enterprise node is a marked enterprise node;
continuing with the conduct module 404 for the current enterprise node not being a marked enterprise node, the risk continues conducting.
In actual use, before the judging module, the device further comprises:
and the marking module is used for marking the enterprise nodes passing through the risks in real time by using the node identifiers to obtain marked enterprise nodes.
In actual use, the interrupt module 403 is configured to:
and when the next enterprise node to which the risk is to be conducted is detected to be the marked enterprise node, interrupting the conduction of the risk, taking the enterprise node before the next enterprise node as the end enterprise node of the risk conduction path according to the risk conduction direction, and acquiring the risk conduction path.
In still another possible implementation manner, the embodiment of the present invention further provides a server, and fig. 5 shows a schematic structural diagram of a server provided by the embodiment of the present invention, and referring to fig. 5, the server includes: a processor 500, a memory 501, a data bus 502 and a communication interface 503, the processor 500, the memory 501, the communication interface 503 and being connected by the data bus 502; the processor 500 is used to execute executable modules, such as computer programs, stored in the memory 501.
Wherein the memory 501 stores computer executable instructions capable of being executed by the processor 500, the processor 500 executing the computer executable instructions to implement the methods described above.
Further, the memory 501 may include a high-speed random access memory (RAM, random Access Memory), and may further include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is implemented via at least one communication interface 503 (which may be wired or wireless), which may use the internet, a wide area network, a local network, a metropolitan area network, etc.
The data bus 502 may be an ISA data bus, a PCI data bus, or an EISA data bus, among others. The data bus may be classified into an address data bus, a data bus, a control data bus, and the like. For ease of illustration, only one double-headed arrow is shown in FIG. 5, but not only one data bus or one type of data bus.
The memory 501 is configured to store a program, and the processor 500 executes the program after receiving a program execution instruction, and the three-dimensional rendering method disclosed in any of the foregoing embodiments of the present invention may be applied to the processor 500 or implemented by the processor 500.
Further, the processor 500 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuitry in hardware or instructions in software in the processor 500. The processor 500 may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but may also be a digital signal processor (Digital Signal Processing, DSP for short), application specific integrated circuit (Application Specific Integrated Circuit, ASIC for short), off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA for short), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in the memory 501, and the processor 500 reads the information in the memory 501, and in combination with its hardware, performs the steps of the method described above.
In yet another possible implementation, the present embodiments also provide a computer-readable storage medium storing computer-executable instructions that, when invoked and executed by a processor, cause the processor to implement the method described above.
The data transmission device provided by the embodiment of the invention has the same technical characteristics as the data transmission method provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
The computer program product of the data transmission method and apparatus provided in the embodiments of the present invention includes a computer readable storage medium storing program codes, where the instructions included in the program codes may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment and will not be described herein.
It will be clear to those skilled in the art that, for convenience and brevity of description, reference may be made to the corresponding process in the foregoing method embodiment for the specific working process of the apparatus described above, which is not described herein again.
In addition, in the description of embodiments of the present invention, unless explicitly stated and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood by those skilled in the art in specific cases.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a ReaD-Only Memory (ROM), a RanDom Access Memory (RAM), a magnetic disk or an optical disk, or other various media capable of storing program codes.
In the description of the present invention, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above examples are only specific embodiments of the present invention for illustrating the technical solution of the present invention, but not for limiting the scope of the present invention, and although the present invention has been described in detail with reference to the foregoing examples, it will be understood by those skilled in the art that the present invention is not limited thereto: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (5)

1. A method of data transmission, the method comprising the steps of:
determining a risk source enterprise node; the risk source enterprise nodes are enterprise nodes with risk scores higher than a predetermined score threshold in the enterprise atlas;
marking the enterprise nodes passing through the risks in real time by using the node identifiers to obtain marked enterprise nodes;
when the risk source enterprise node exists in an enterprise graph comprising a ring structure, judging whether the current enterprise node to which the risk carried in the risk source enterprise node is conducted is a marked enterprise node according to a conducting processing rule, wherein the enterprise graph is a graph comprising a plurality of enterprise nodes and association relations thereof, the ring structure is a ring node structure formed by the enterprise nodes and the association relations thereof in the enterprise graph, and the ring structure comprises a subset of a set formed by the plurality of enterprise nodes; the conducting processing rule is a rule for controlling that repeated enterprise nodes cannot appear on the risk conducting path, and when the conducting processing rule is used, if the repeated enterprise nodes are encountered, risk conducting is terminated;
if the current enterprise node is the marked enterprise node, interrupting the conduction of the risk, taking the enterprise node before the next enterprise node as the tail end enterprise node of the risk conduction path according to the risk conduction direction, and acquiring a risk conduction path;
if the current enterprise node is not a marked enterprise node, the risk continues to conduct.
2. The method according to claim 1, wherein the method further comprises:
when a risk event occurs to the plurality of enterprise nodes in the enterprise graph, a risk score for the plurality of enterprise nodes increases.
3. A data conduction device, said device comprising:
the node determining module is used for determining the risk source enterprise node; the risk source enterprise nodes are enterprise nodes with risk scores higher than a predetermined score threshold in the enterprise atlas;
the marking module is used for marking the enterprise nodes passing through the risk in real time by using the node identifiers to obtain marked enterprise nodes;
the judging module is used for judging whether the current enterprise node to which the risk carried in the risk source enterprise node is conducted is a marked enterprise node according to a conducting processing rule when the risk source enterprise node exists in an enterprise graph comprising a ring structure, wherein the enterprise graph comprises a plurality of enterprise nodes and association relations thereof, the ring structure is a ring node structure formed by the enterprise nodes in the enterprise graph and the association relations thereof, and the ring structure comprises a subset of a set formed by the plurality of enterprise nodes; the conducting processing rule is a rule for controlling that repeated enterprise nodes cannot appear on the risk conducting path, and when the conducting processing rule is used, if the repeated enterprise nodes are encountered, risk conducting is terminated;
the interruption module is used for interrupting the conduction of the risk if the current enterprise node is a marked enterprise node, taking the enterprise node before the next enterprise node as the end enterprise node of the risk conduction path according to the risk conduction direction, and acquiring a risk conduction path;
and a continuing conduction module, configured to continue conducting the risk if the current enterprise node is not a marked enterprise node.
4. A server comprising a processor and a memory, the memory storing computer executable instructions executable by the processor, the processor executing the computer executable instructions to implement the method of any one of claims 1 to 2.
5. A computer readable storage medium storing computer executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of any one of claims 1 to 2.
CN202011572972.XA 2020-12-25 2020-12-25 Data transmission method and device Active CN112613763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011572972.XA CN112613763B (en) 2020-12-25 2020-12-25 Data transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011572972.XA CN112613763B (en) 2020-12-25 2020-12-25 Data transmission method and device

Publications (2)

Publication Number Publication Date
CN112613763A CN112613763A (en) 2021-04-06
CN112613763B true CN112613763B (en) 2024-04-16

Family

ID=75248044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011572972.XA Active CN112613763B (en) 2020-12-25 2020-12-25 Data transmission method and device

Country Status (1)

Country Link
CN (1) CN112613763B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488130A (en) * 2015-11-25 2016-04-13 成都数联铭品科技有限公司 Associated data visualization display method
CN105678446A (en) * 2015-12-31 2016-06-15 浙江图讯科技股份有限公司 Method used for enterprise safety production risk early warning
CN105930461A (en) * 2016-04-21 2016-09-07 成都数联铭品科技有限公司 Data processing method for realizing associated information node visualization tracking
CN105930465A (en) * 2016-04-21 2016-09-07 成都数联铭品科技有限公司 Data mining processing method
CN107784016A (en) * 2016-08-30 2018-03-09 北京京东尚科信息技术有限公司 Data syn-chronization control device and data synchronous system and method
CN108400935A (en) * 2018-02-11 2018-08-14 国家电网公司信息通信分公司 A kind of service path selection method, device and electronic equipment based on genetic algorithm
CN109240916A (en) * 2018-08-16 2019-01-18 中国平安人寿保险股份有限公司 Information output controlling method, device and computer readable storage medium
CN109299337A (en) * 2018-10-19 2019-02-01 南威软件股份有限公司 Graph searching method based on iteration
CN109583620A (en) * 2018-10-11 2019-04-05 平安科技(深圳)有限公司 Enterprise's potential risk method for early warning, device, computer equipment and storage medium
CN109685355A (en) * 2018-12-19 2019-04-26 重庆百行智能数据科技研究院有限公司 Business risk recognition methods, device and computer readable storage medium
CN110223168A (en) * 2019-06-24 2019-09-10 浪潮卓数大数据产业发展有限公司 A kind of anti-fraud detection method of label propagation and system based on business connection map
CN110503236A (en) * 2019-07-08 2019-11-26 中国平安人寿保险股份有限公司 Risk Forecast Method, device, equipment and the storage medium of knowledge based map
CN111598461A (en) * 2020-05-19 2020-08-28 北京海致星图科技有限公司 Enterprise knowledge graph-based real-time risk generalization and conduction analysis method
CN111784508A (en) * 2020-07-01 2020-10-16 北京知因智慧科技有限公司 Enterprise risk assessment method and device and electronic equipment
CN111784488A (en) * 2020-06-28 2020-10-16 中国工商银行股份有限公司 Enterprise capital risk prediction method and device
CN111861119A (en) * 2020-06-17 2020-10-30 国家计算机网络与信息安全管理中心 Enterprise risk data processing method and device based on enterprise risk associated graph
CN112115279A (en) * 2020-09-28 2020-12-22 中国建设银行股份有限公司 Risk control method and device based on knowledge graph

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488130A (en) * 2015-11-25 2016-04-13 成都数联铭品科技有限公司 Associated data visualization display method
CN105678446A (en) * 2015-12-31 2016-06-15 浙江图讯科技股份有限公司 Method used for enterprise safety production risk early warning
CN105930461A (en) * 2016-04-21 2016-09-07 成都数联铭品科技有限公司 Data processing method for realizing associated information node visualization tracking
CN105930465A (en) * 2016-04-21 2016-09-07 成都数联铭品科技有限公司 Data mining processing method
CN107784016A (en) * 2016-08-30 2018-03-09 北京京东尚科信息技术有限公司 Data syn-chronization control device and data synchronous system and method
CN108400935A (en) * 2018-02-11 2018-08-14 国家电网公司信息通信分公司 A kind of service path selection method, device and electronic equipment based on genetic algorithm
CN109240916A (en) * 2018-08-16 2019-01-18 中国平安人寿保险股份有限公司 Information output controlling method, device and computer readable storage medium
CN109583620A (en) * 2018-10-11 2019-04-05 平安科技(深圳)有限公司 Enterprise's potential risk method for early warning, device, computer equipment and storage medium
CN109299337A (en) * 2018-10-19 2019-02-01 南威软件股份有限公司 Graph searching method based on iteration
CN109685355A (en) * 2018-12-19 2019-04-26 重庆百行智能数据科技研究院有限公司 Business risk recognition methods, device and computer readable storage medium
CN110223168A (en) * 2019-06-24 2019-09-10 浪潮卓数大数据产业发展有限公司 A kind of anti-fraud detection method of label propagation and system based on business connection map
CN110503236A (en) * 2019-07-08 2019-11-26 中国平安人寿保险股份有限公司 Risk Forecast Method, device, equipment and the storage medium of knowledge based map
CN111598461A (en) * 2020-05-19 2020-08-28 北京海致星图科技有限公司 Enterprise knowledge graph-based real-time risk generalization and conduction analysis method
CN111861119A (en) * 2020-06-17 2020-10-30 国家计算机网络与信息安全管理中心 Enterprise risk data processing method and device based on enterprise risk associated graph
CN111784488A (en) * 2020-06-28 2020-10-16 中国工商银行股份有限公司 Enterprise capital risk prediction method and device
CN111784508A (en) * 2020-07-01 2020-10-16 北京知因智慧科技有限公司 Enterprise risk assessment method and device and electronic equipment
CN112115279A (en) * 2020-09-28 2020-12-22 中国建设银行股份有限公司 Risk control method and device based on knowledge graph

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
基于PDCA管理模式的钢铁企业全面风险管理研究;孙万幸;黄永生;荣洋;;企业改革与管理;20200725(第14期);全文 *
基于大数据的客户关联关系及风险预警研究;谭波;滕光进;王浩;;清华金融评论;20170805(第08期);全文 *
基于大数据的客户关联风险分析和挖掘;李小庆;;金融科技时代;20200410(第04期);全文 *

Also Published As

Publication number Publication date
CN112613763A (en) 2021-04-06

Similar Documents

Publication Publication Date Title
CN110275958B (en) Website information identification method and device and electronic equipment
CN111177445B (en) Standard primitive determination method, primitive identification method, device and electronic equipment
CN109033772B (en) Verification information input method and device
TWI761642B (en) Method, device and electronic device for determining decision-making strategy corresponding to business
CN111931731A (en) Question judging method and device, electronic equipment and storage medium
CN110535727A (en) Asset identification method and apparatus
CN110909361A (en) Vulnerability detection method and device and computer equipment
CN110855529B (en) Network information security monitoring method, device, server and readable storage medium
CN112613763B (en) Data transmission method and device
CN114297665A (en) Intelligent contract vulnerability detection method and device based on deep learning
CN110851207A (en) State transition management method and device, electronic equipment and computer readable storage medium
CN112350890A (en) Message processing method, device, server and storage medium
CN109189809B (en) Shareholder name association matching method and device
CN109145821B (en) Method and device for positioning pupil image in human eye image
CN110796394A (en) Marking method and device for node to be calibrated
CN110852091A (en) Method and device for monitoring wrongly written characters, electronic equipment and computer readable medium
CN112990092B (en) Legend identification method, computer device and readable storage medium
CN111382052A (en) Code quality evaluation method and device and electronic equipment
CN113304482A (en) Cloud game player portrait processing method, server and medium applied to cloud computing
CN112668798A (en) Method and device for determining process path and path planning platform
CN113033542A (en) Method and device for generating text recognition model
CN112613762A (en) Knowledge graph-based group rating method and device and electronic equipment
CN111343105A (en) Cutoff identification method and device based on deep learning
CN115277636B (en) Method and system for resolving universal domain name
CN111260618B (en) Method and device for constructing focus detection system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant