CN112633680A - Method, device and equipment for determining risk event policy and readable storage medium - Google Patents

Method, device and equipment for determining risk event policy and readable storage medium Download PDF

Info

Publication number
CN112633680A
CN112633680A CN202011524439.6A CN202011524439A CN112633680A CN 112633680 A CN112633680 A CN 112633680A CN 202011524439 A CN202011524439 A CN 202011524439A CN 112633680 A CN112633680 A CN 112633680A
Authority
CN
China
Prior art keywords
risk
layer group
determining
event
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011524439.6A
Other languages
Chinese (zh)
Other versions
CN112633680B (en
Inventor
朱晨鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN202011524439.6A priority Critical patent/CN112633680B/en
Publication of CN112633680A publication Critical patent/CN112633680A/en
Application granted granted Critical
Publication of CN112633680B publication Critical patent/CN112633680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of financial science and technology, and discloses a method, a device, equipment and a computer readable storage medium for determining a risk event strategy, wherein the method comprises the following steps: after receiving a risk event, determining a corresponding risk route from a preset risk layer group according to the condition of the risk event; determining at least one target risk group set designated by the risk route; and determining the execution sequence and priority of the pre-specified strategies in the target risk layer group. Therefore, the risk routing of the risk event is determined in the risk layer group, the target risk layer group is further determined, the execution sequence and the priority of the strategy are determined, the compatible processing of strategy conflict is achieved, and the processing efficiency of the risk event is improved.

Description

Method, device and equipment for determining risk event policy and readable storage medium
Technical Field
The present invention relates to the field of financial technology (Fintech), and in particular, to a method, an apparatus, a device, and a computer-readable storage medium for determining a policy of a risk event.
Background
With the development of computer technology, more and more technologies are applied in the financial field, and the traditional financial industry is gradually changing to financial technology (Fintech), but higher requirements are also put forward on the technologies due to the requirements of the financial industry on safety and real-time performance.
There are three main approaches to dealing with policy conflicts: one scheme is that the strategies are executed in series, and the strategy with higher priority is executed firstly; the other scheme is that the strategies are executed in series, and finally the strategy with higher priority is executed; a third approach is that the policies are executed in parallel, while the priority of each policy is manually specified.
However, when the scheme of serially executing policies is adopted, if multiple policies are hit for the same risk event, the result of one policy may override the results of the other policies. In addition, if the policy priority is to be adjusted, the execution order of the policies must be adjusted, and when there are multiple policies that need to be adjusted simultaneously, it is very easy to cause a configuration error of the policy execution order due to operational risk. Adjusting the execution order of any one policy has an impact on other policies, the more complex the decision-making system, the greater this impact. If a scheme of executing strategies in parallel is adopted, each strategy needs to be configured with a priority level independently, when a new strategy is added, all strategies with lower priority levels are affected, and the influence becomes uncontrollable in a complex decision system.
Disclosure of Invention
The invention provides a method, a device and equipment for determining a policy of a risk event and a computer readable storage medium, aiming at realizing compatible processing of policy conflict and improving the processing efficiency of the risk event.
In order to achieve the above object, the present invention provides a policy determination method for risk events, the method comprising:
after receiving a risk event, determining a corresponding risk route from a preset risk layer group according to the condition of the risk event;
determining at least one target risk group set designated by the risk route;
and determining the execution sequence and priority of the pre-specified strategies in the target risk layer group.
Optionally, after receiving the risk event, determining a corresponding risk route from a preset risk layer group according to a condition of the risk event, where the method further includes:
and constructing a risk layer group of the tree structure, wherein the risk layer group comprises a root layer group and at least one layer of sub-layer group.
Optionally, the constructing a risk layer group of the tree structure further includes:
and assigning a corresponding risk layer group for the preset strategy of the risk event.
Optionally, the determining an execution order and a priority of the pre-specified policy in the target risk group of layers includes:
determining a node where the target risk layer group is located, and determining an execution sequence of a pre-specified strategy in the target risk layer group based on the node; and
and judging the strategy type of the analysis strategy, and determining the priority according to the strategy type.
Optionally, the determining, based on the node, an execution order of the pre-specified policies in the target risk group of layers includes:
sequentially executing the designated strategies in each target risk layer group according to the sequence from the leaf node to the father node;
and if the number of the risk routes is more than 1, executing a plurality of strategies in the same target risk layer group in each risk route in parallel.
Optionally, judging the policy type of the policy, and determining the priority according to the policy type includes:
determining a node where a corresponding risk layer group is located based on the strategies, and judging the strategy types of the strategies according to the dependence relationship among the strategies in different risk layer groups;
if the policy type of the policy is independent of conflict, determining the priority as that the priority of a father node is higher than that of a leaf node; or
And if the strategy type of the strategy is dependent conflict, determining the priority that the priority of the leaf node is higher than that of the father node, and if a plurality of strategies exist in one risk layer group, executing the strategies belonging to the same risk layer group in parallel.
Optionally, the determining at least one target risk group specified by the risk route includes:
and based on a risk layer group of a tree structure, tracing from leaf nodes to root nodes of the risk route, and determining at least one risk layer group corresponding to the obtained at least one node as a target risk layer group appointed by the risk route.
In addition, to achieve the above object, the present invention further provides a policy determining apparatus for a risk event, including:
the first determining module is used for determining a corresponding risk route from a preset risk layer group according to the condition of the risk event after the risk event is received;
a second determining module, configured to determine at least one target risk layer group specified by the risk route;
and the third determining module is used for determining the execution sequence and the priority of the pre-specified strategies in the target risk layer group.
In addition, to achieve the above object, the present invention further provides a risk event policy determining apparatus, which includes a processor, a memory, and a risk event policy determining program stored in the memory, where the risk event policy determining program is executed by the processor to implement the steps of the risk event policy determining method described above.
In addition, to achieve the above object, the present invention further provides a computer readable storage medium, wherein the computer readable storage medium stores thereon a policy determination program for risk events, and the policy determination program for risk events is executed by a processor to implement the steps of the policy determination method for risk events as described above.
Compared with the prior art, the invention provides a strategy method, a strategy device, a strategy equipment and a computer readable storage medium for a risk event, wherein after the risk event is received, a corresponding risk route is determined from a preset risk layer group according to the condition of the risk event; determining at least one target risk group set designated by the risk route; and determining the execution sequence and priority of the pre-specified strategies in the target risk layer group. Therefore, the risk routing of the risk event is determined in the risk layer group, the target risk layer group is further determined, the execution sequence and the priority of the strategy are determined, the compatible processing of strategy conflict is achieved, and the processing efficiency of the risk event is improved.
Drawings
Fig. 1 is a hardware configuration diagram of a policy determination device for risk events according to embodiments of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a method for policy determination of risk events according to the present invention;
FIG. 3 is a schematic diagram of a risk layer group involved in the policy determination method for risk events according to the present invention;
fig. 4 is a functional block diagram of a first embodiment of the risk event policy determination apparatus of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The policy determining device for the risk event mainly related to the embodiment of the present invention refers to a network connection device capable of implementing network connection, and the policy determining device for the risk event may be a server, a cloud platform, or the like.
Referring to fig. 1, fig. 1 is a hardware structural diagram of a policy determination device for risk events according to embodiments of the present invention. In this embodiment of the present invention, the policy determining device for risk events may include a processor 1001 (e.g., a Central Processing Unit, CPU), a communication bus 1002, an input port 1003, an output port 1004, and a memory 1005. The communication bus 1002 is used for realizing connection communication among the components; the input port 1003 is used for data input; the output port 1004 is used for data output, the memory 1005 may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory), such as a magnetic disk memory, and the memory 1005 may optionally be a storage device independent of the processor 1001. Those skilled in the art will appreciate that the hardware configuration depicted in FIG. 1 is not intended to be limiting of the present invention, and may include more or less components than those shown, or some components in combination, or a different arrangement of components.
With continued reference to FIG. 1, the memory 1005 of FIG. 1, which is one type of readable computer readable storage medium, may include an operating system, a network communication module, an application module, and a policy determination program for risk events. In fig. 1, the network communication module is mainly used for connecting to a server and performing data communication with the server; and the processor 1001 may call the policy determination program of the risk event stored in the memory 1005 and execute the policy determination method of the risk event provided by the embodiment of the present invention.
The embodiment of the invention provides a policy determination method for a risk event.
Referring to fig. 2, fig. 2 is a flowchart illustrating a policy determination method for risk events according to a first embodiment of the present invention.
In this embodiment, the method for determining a policy of a risk event is applied to a device for determining a policy of a risk event, and the method includes:
step S101, after a risk event is received, determining a corresponding risk route from a preset risk layer group according to the condition of the risk event;
the risk event mainly refers to a pending event with a certain risk, such as loan, mortgage, insurance application, financial management project and the like, received by a financial institution such as a bank, an insurance company and the like. The condition of the risk event comprises basic information of the initiator and corresponding risk event details, wherein the basic information comprises a scholarly calendar, occupation, income, personal credit, property condition and the like, and the risk event details can be the amount, duration and the like of the loan, also can be the mortgage target and the amount, or the project and the application amount of the insurance.
The policy is a minimized policy enforcement module.
The risk layer group is a structured abstraction of the set of policies. On one hand, the strategy is a set of strategies, and all the strategies belonging to the same layer group have the same strategy priority and can be processed in parallel. On the other hand, the strategy is structured, the positions of the single strategies in the whole strategy framework are specified, tree structures are formed among the layer groups, and the positions of the layer groups determine the priority sets of the layer groups.
Before the step S101, the method further includes: and constructing a risk layer group of the tree structure, wherein the risk layer group comprises a root layer group and at least one layer of sub-layer group. The risk layer group is a layer group with a tree structure, and specifically, as shown in fig. 3, fig. 3 is a schematic view of a risk layer group related to the policy determination method for risk events of the present invention. The risk layer group comprises a root layer group L0, a sublayer group L1, a sublayer group L2 and a sublayer group L3. The sub-layer group L1 comprises a sub-layer group L1-1, a sub-layer group L1-2, a sub-layer group L1-3 … …, a sub-layer group L1-n, and n is the number of the sub-layer groups L1; the sub-layer group L1 comprises a sub-layer group L2-1, a sub-layer group L2-2, a sub-layer group L2-3 … …, a sub-layer group L2-m, and m is the number of the sub-layer groups L2; the sub-layer group L3 comprises a sub-layer group L3-1 and a sub-layer group L3-2. Fig. 3 is a schematic diagram of a risk layer group, and in the process of actually constructing the risk layer group, more or fewer sub-layer groups may be included, and the number of layers of the risk layer group may also be set as needed.
The risk layer group is a tree structure including a root node and a plurality of leaf nodes. Wherein the root node is a root layer group of the risk layer group, and the leaf nodes are respective sub-layer groups in the risk layer group.
Further, after the risk layer group is constructed, a corresponding risk layer group is specified for a preset strategy of the risk event. It will be appreciated that all policies for each risk event need to be assigned a corresponding set of risk layers. For example, if the risk event is a loan, the corresponding policy may include refusing the loan, agreeing to the loan, reevaluating the loan amount, and so on. If the risk event is an application, the corresponding strategy comprises accepting the application, refusing the application, replacing the application type and the like. It is noted that each tier group may include multiple policies, but each policy may specify only a single risk tier group. It will be appreciated that for the same risk event, if a policy for that risk event specifies multiple risk groups, the logic is not complied with, leading to confusion. In this embodiment, a certain node of the risk layer group of the tree structure may include a plurality of policies.
In this embodiment, the risk routing is an abstraction of risk events having the same processing method.
Based on the risk layer group with the appointed strategy, after receiving the risk event, acquiring the condition of the risk event, and determining one or more risk routes according to the condition. For a bank system, the risk routing is a processing process of a bank after receiving a risk event, such as searching a data source and acquiring a corresponding data source calculation model; the set to do for a risk event is the risk route. Risk routing is a distribution function that performs the processing and is a collection of things to do next. In a practical scenario, the condition of some personal risk events is simple and clear, and there may be only one risk route. However, for enterprises, because the influence factors are more, the condition of the risk event is more complex, and a plurality of risk routes can be determined based on different condition groups. Therefore, risk routes are determined based on the risk layer group with the tree structure, and corresponding routes can be found no matter how complex risk events are. And the risk routes of multiple risk events do not conflict with each other, and the risk routes of multiple risk events can be determined in parallel.
Step S102, determining at least one target risk layer group appointed by the risk route;
specifically, based on a risk layer group of a tree structure, tracing from a leaf node to a root node of the risk route, and determining at least one risk layer group corresponding to the obtained at least one node as a target risk layer group specified by the risk route. It is understood that the number of target risk layer groups for each risk event may be different, and the number of corresponding child nodes may also be different.
Referring to fig. 3, if the risk route for risk event a is sub-tier group L3-2 → sub-tier group L2-3 → sub-tier group L1-1 → root layer group L0, the corresponding target risk tier group includes: the target risk layer group number is 4, and 3 child nodes are provided, wherein the target risk layer group is L3-2, the child layer group is L2-3, the child layer group is L1-1, and the root layer group is L0. If the risk route for risk event B is sub-tier group L2-6 → sub-tier group L1-3 → root layer group L0, the corresponding target heel group comprises: the number of target risk layer groups is 3, and 2 child nodes exist in the sub-layer group L2-6, the sub-layer group L1-3 and the root layer group L0.
Step S103, determining the execution sequence and priority of the preassigned strategies in the target risk layer group
And after the target risk layer group is determined, one or more strategies pre-designated in the target risk layer group are obtained.
Specifically, a node where the target risk layer group is located is determined, and an execution sequence of a policy specified in advance in the target risk layer group is determined based on the node; and determining the nodes of the target risk layer groups based on the risk layer groups of the tree structure. For example, risk event a includes 3 children nodes in different hierarchy and one root node from leaf node to root node.
After determining the node where the target risk layer group is located, sequentially executing the designated strategies in each target risk layer group according to the sequence from the leaf node to the father node; that is, the policy corresponding to the leaf node is executed before the policy corresponding to the parent node. If each target risk layer group in the risk event a: the strategies corresponding to sub-layer group L3-2 → sub-layer group L2-3 → sub-layer group L1-1 → root layer group L0 are strategy A1, strategy A2, strategy A3 and strategy A4, respectively, and the execution sequence is strategy A1 → strategy A2 → strategy A3 → strategy A4.
And if the number of the risk routes is more than 1, executing a plurality of strategies in the same target risk layer group in each risk route in parallel. That is, if there are three risk routes in the risk event C and each risk route has three target risk layer groups from the child node to the root node, the policy that the three routes corresponding to the risk event C are in the same target risk layer group may be executed at the same time. That is, if the three target risk layer groups of the risk event C in the sublayer group L2 are the sublayer group L2-2, the sublayer group L2-5 and the sublayer group L2-6, respectively, the corresponding policies in the sublayer group L2-2, the sublayer group L2-5 and the sublayer group L2-6 may be executed simultaneously. Because the execution of a plurality of strategies in the same target risk layer group does not interfere with each other, the processing efficiency of the risk event can be improved through parallel execution.
After the execution sequence of each policy is determined, the priority of each policy also needs to be determined.
Specifically, the policy type of the risk policy is judged, and the priority is determined according to the policy type. The policy types include non-dependent conflicts and dependent conflicts. Dependency conflict means that there is a dependency relationship between the policies where result conflict occurs, and the result of one policy is premised on the result of another policy that is depended on. Independent conflict means that different strategies output different strategies for the same risk event independently, and the strategies are independent from each other and have no dependency relationship.
Specifically, a node where a corresponding risk layer group is located is determined based on a strategy, and the strategy type of the strategy is judged according to the dependency relationship among strategies in different risk layer groups; it can be understood that only the policies of the same risk route at different nodes have dependency or depended relationship, and no dependency or depended relationship exists between different risk routes.
If the policy type of the policy is independent of conflict, determining the priority as that the priority of a father node is higher than that of a leaf node; once the conflict occurs, the result of the corresponding strategy of the father node layer group is adopted, and the result is not influenced even if the conflicting father layer group strategy and the child layer group strategy are processed in parallel.
And if the strategy type of the strategy is dependent conflict, determining the priority that the priority of the leaf node is higher than that of the father node, and if a plurality of strategies exist in one risk layer group, executing the strategies belonging to the same risk layer group in parallel. For dependency conflicts, it needs to be determined together with the policy execution order and the priority of the risk layer group, and the policies of the sub-layer groups can be executed in parallel, but for the policies of the parent layer group, the policies to be relied upon are executed later than the sub-layer groups, and the policies to be relied upon are executed in the sub-layer groups and the policies to be relied upon are executed in the parent layer group. In this way, for policy conflicts, the risk layer group based on the tree shape does not directly configure the priority of a certain policy, but allocates the policy to the designated risk layer group, the risk layer group is in a tree structure, the priority of each risk layer group is determined through the parent-child path of the tree structure, and then the priority of the designated policy in the risk layer group is determined according to the priority of the risk layer group. By means of allocating risk layer groups of the strategies, the strategies can be executed in parallel instead of being executed in series, so that the method is suitable for large-data and high-concurrency service scenes.
According to the scheme, after the risk event is received, the corresponding risk route is determined from the preset risk layer group according to the condition of the risk event; determining at least one target risk group set designated by the risk route; and determining the execution sequence and priority of the pre-specified strategies in the target risk layer group. Therefore, the risk routing of the risk event is determined in the risk layer group, the target risk layer group is further determined, the execution sequence and the priority of the strategy are determined, the compatible processing of strategy conflict is achieved, and the processing efficiency of the risk event is improved.
In addition, the embodiment also provides a policy determination device for risk events. Referring to fig. 4, fig. 4 is a functional module diagram of a first embodiment of a policy determination apparatus for risk events according to the present invention.
In this embodiment, the policy determining apparatus for risk event is a virtual apparatus, and is stored in the memory 1005 of the policy determining apparatus for risk event shown in fig. 1, so as to implement all functions of the policy determining program for risk event: the risk routing module is used for determining a corresponding risk route from a preset risk layer group according to the condition of the risk event after the risk event is received; at least one target risk tier group for determining the risk route designation; for determining an execution order and priority of pre-specified policies in the target risk group of layers.
Specifically, the policy determination device for the risk event includes:
the first determining module is used for determining a corresponding risk route from a preset risk layer group according to the condition of the risk event after the risk event is received;
a second determining module, configured to determine at least one target risk layer group specified by the risk route;
and the third determining module is used for determining the execution sequence and the priority of the pre-specified strategies in the target risk layer group.
Further, the first determining module is further configured to:
and constructing a risk layer group of the tree structure, wherein the risk layer group comprises a root layer group and at least one layer of sub-layer group.
Further, the first determining module is further configured to:
and assigning a corresponding risk layer group for the preset strategy of the risk event.
Further, the third determining module is further configured to:
determining a node where the target risk layer group is located, and determining an execution sequence of a pre-specified strategy in the target risk layer group based on the node; and
and judging the strategy type of the analysis strategy, and determining the priority according to the strategy type.
Further, the third determining module is further configured to:
sequentially executing the designated strategies in each target risk layer group according to the sequence from the leaf node to the father node;
and if the number of the risk routes is more than 1, executing a plurality of strategies in the same target risk layer group in each risk route in parallel.
Further, the third determining module is further configured to:
determining a node where a corresponding risk layer group is located based on the strategies, and judging the strategy types of the strategies according to the dependence relationship among the strategies in different risk layer groups;
if the policy type of the policy is independent of conflict, determining the priority as that the priority of a father node is higher than that of a leaf node; or
And if the strategy type of the strategy is dependent conflict, determining the priority that the priority of the leaf node is higher than that of the father node, and if a plurality of strategies exist in one risk layer group, executing the strategies belonging to the same risk layer group in parallel.
Further, the second determining module is further configured to:
and based on a risk layer group of a tree structure, tracing from leaf nodes to root nodes of the risk route, and determining at least one risk layer group corresponding to the obtained at least one node as a target risk layer group appointed by the risk route.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, on which a policy determination program for a risk event is stored, and when the policy determination program for a risk event is executed by a processor, the steps of the policy determination method for a risk event are implemented.
Compared with the prior art, the method, the device, the equipment and the computer readable storage medium for determining the risk event strategy provided by the invention comprise the following steps: after receiving a risk event, determining a corresponding risk route from a preset risk layer group according to the condition of the risk event; determining at least one target risk group set designated by the risk route; and determining the execution sequence and priority of the pre-specified strategies in the target risk layer group. Therefore, the risk routing of the risk event is determined in the risk layer group, the target risk layer group is further determined, the execution sequence and the priority of the strategy are determined, the compatible processing of strategy conflict is achieved, and the processing efficiency of the risk event is improved.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a computer-readable storage medium (such as ROM/RAM, magnetic disk, and optical disk) as described above, and includes several instructions for enabling a terminal device to execute the method according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present invention and is not intended to limit the scope of the present invention, and all equivalent structures or flow transformations made by the present specification and drawings, or applied directly or indirectly to other related arts, are included in the scope of the present invention.

Claims (10)

1. A method for policy determination of risk events, the method comprising:
after receiving a risk event, determining a corresponding risk route from a preset risk layer group according to the condition of the risk event;
determining at least one target risk group set designated by the risk route;
and determining the execution sequence and priority of the pre-specified strategies in the target risk layer group.
2. The method according to claim 1, wherein after receiving a risk event, determining a corresponding risk route from a preset risk layer group according to a condition of the risk event, and before determining the corresponding risk route, further comprising:
and constructing a risk layer group of the tree structure, wherein the risk layer group comprises a root layer group and at least one layer of sub-layer group.
3. The method of claim 2, wherein the constructing a risk layer group of the tree structure further comprises:
and assigning a corresponding risk layer group for the preset strategy of the risk event.
4. The method of claim 1, wherein determining the execution order and priority of the pre-specified policies in the target risk group of layers comprises:
determining a node where the target risk layer group is located, and determining an execution sequence of a pre-specified strategy in the target risk layer group based on the node; and
and judging the strategy type of the analysis strategy, and determining the priority according to the strategy type.
5. The method of claim 4, wherein the determining an order of execution of the pre-specified policies in the target risk group of layers based on the node comprises:
sequentially executing the designated strategies in each target risk layer group according to the sequence from the leaf node to the father node;
and if the number of the risk routes is more than 1, executing a plurality of strategies in the same target risk layer group in each risk route in parallel.
6. The method of claim 4, wherein determining the policy type of the policy and determining the priority according to the policy type comprises:
determining a node where a corresponding risk layer group is located based on the strategies, and judging the strategy types of the strategies according to the dependence relationship among the strategies in different risk layer groups;
if the policy type of the policy is independent of conflict, determining the priority as that the priority of a father node is higher than that of a leaf node; or
And if the strategy type of the strategy is dependent conflict, determining the priority that the priority of the leaf node is higher than that of the father node, and if a plurality of strategies exist in one risk layer group, executing the strategies belonging to the same risk layer group in parallel.
7. The method of claim 2, wherein the determining at least one target risk group set specified by the risk route comprises:
and based on a risk layer group of a tree structure, tracing from leaf nodes to root nodes of the risk route, and determining at least one risk layer group corresponding to the obtained at least one node as a target risk layer group appointed by the risk route.
8. A risk event policy determination apparatus, comprising:
the first determining module is used for determining a corresponding risk route from a preset risk layer group according to the condition of the risk event after the risk event is received;
a second determining module, configured to determine at least one target risk layer group specified by the risk route;
and the third determining module is used for determining the execution sequence and the priority of the pre-specified strategies in the target risk layer group.
9. A risk event policy determination device, characterized in that the risk event policy determination device comprises a processor, a memory and a risk event policy determination program stored in the memory, which when executed by the processor implements the steps of the risk event policy determination method according to any of claims 1-7.
10. A computer-readable storage medium, on which a risk event policy determination program is stored, which when executed by a processor implements the steps of a risk event policy determination method according to any one of claims 1-7.
CN202011524439.6A 2020-12-21 2020-12-21 Method, device, equipment and readable storage medium for determining policy of risk event Active CN112633680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011524439.6A CN112633680B (en) 2020-12-21 2020-12-21 Method, device, equipment and readable storage medium for determining policy of risk event

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011524439.6A CN112633680B (en) 2020-12-21 2020-12-21 Method, device, equipment and readable storage medium for determining policy of risk event

Publications (2)

Publication Number Publication Date
CN112633680A true CN112633680A (en) 2021-04-09
CN112633680B CN112633680B (en) 2024-04-16

Family

ID=75320575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011524439.6A Active CN112633680B (en) 2020-12-21 2020-12-21 Method, device, equipment and readable storage medium for determining policy of risk event

Country Status (1)

Country Link
CN (1) CN112633680B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113888181A (en) * 2021-10-25 2022-01-04 支付宝(杭州)信息技术有限公司 Business processing and risk detection strategy system construction method, device and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875078A (en) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 transaction risk detection method, device and equipment
CN107797869A (en) * 2017-11-07 2018-03-13 携程旅游网络技术(上海)有限公司 Data flow risk control method, device, electronic equipment, storage medium
CN110009167A (en) * 2018-01-04 2019-07-12 阿里巴巴集团控股有限公司 Transaction risk policy recommendation method, apparatus, server and storage medium
WO2020042580A1 (en) * 2018-08-27 2020-03-05 平安科技(深圳)有限公司 Personnel grouping method and device, electronic device, and storage medium
CN111475144A (en) * 2020-04-13 2020-07-31 深圳前海微众银行股份有限公司 Wind control decision method, device, equipment and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875078A (en) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 transaction risk detection method, device and equipment
CN107797869A (en) * 2017-11-07 2018-03-13 携程旅游网络技术(上海)有限公司 Data flow risk control method, device, electronic equipment, storage medium
CN110009167A (en) * 2018-01-04 2019-07-12 阿里巴巴集团控股有限公司 Transaction risk policy recommendation method, apparatus, server and storage medium
WO2020042580A1 (en) * 2018-08-27 2020-03-05 平安科技(深圳)有限公司 Personnel grouping method and device, electronic device, and storage medium
CN111475144A (en) * 2020-04-13 2020-07-31 深圳前海微众银行股份有限公司 Wind control decision method, device, equipment and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113888181A (en) * 2021-10-25 2022-01-04 支付宝(杭州)信息技术有限公司 Business processing and risk detection strategy system construction method, device and equipment

Also Published As

Publication number Publication date
CN112633680B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CN108595157B (en) Block chain data processing method, device, equipment and storage medium
US7941804B1 (en) Allocating resources among tiered partitions of different types
CN108595268B (en) Data distribution method and device based on MapReduce and computer-readable storage medium
CN102073700B (en) Discovery method of complex network community
JPH0693681B2 (en) A method for selecting the route with the smallest weight in a communication network.
CN106981024B (en) Transaction limit calculation processing system and processing method thereof
CN111901249A (en) Service current limiting method, device, equipment and storage medium
CN105335855A (en) Transaction risk identification method and apparatus
CN105550225A (en) Index construction method and query method and apparatus
CN112241421A (en) Data blood margin determination method and device
CN109918369B (en) Data storage method and device
WO2017118335A1 (en) Mapping method and device
CN112633680A (en) Method, device and equipment for determining risk event policy and readable storage medium
US11797487B2 (en) Maintaining stable record identifiers in the presence of updated data records
CN115147092A (en) Resource approval method and training method and device of random forest model
US11531666B1 (en) Indexing partitions using distributed bloom filters
US7647592B2 (en) Methods and systems for assigning objects to processing units
CN117176638A (en) Routing path determining method and related components
CN112463058A (en) Fragmented data sorting method and device and storage node
EP4049214A1 (en) A method for analyzing data using a blockchain, a data provider and a data customer therefor
CN111951112A (en) Intelligent contract execution method based on block chain, terminal equipment and storage medium
CN107104829B (en) Physical equipment matching distribution method and device based on network topology data
CN113077344B (en) Block chain-based transaction method, device, electronic equipment and storage medium
CN112163024B (en) Configuration information export and import method based on hierarchical association structure
Sofianopoulou The process allocation problem: a survey of the application of graph-theoretic and integer programming approaches

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant