CN113779569A - Risk behavior analysis method and system based on big data - Google Patents
Risk behavior analysis method and system based on big data Download PDFInfo
- Publication number
- CN113779569A CN113779569A CN202111097462.6A CN202111097462A CN113779569A CN 113779569 A CN113779569 A CN 113779569A CN 202111097462 A CN202111097462 A CN 202111097462A CN 113779569 A CN113779569 A CN 113779569A
- Authority
- CN
- China
- Prior art keywords
- fraud
- risk
- vector
- node data
- interception
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
According to the risk behavior analysis method and system based on big data provided by the embodiment of the invention, firstly, a plurality of fraud behavior node data with correlation are extracted based on fraud event data which is obtained in a service flow of a service application and covers fraud risk vectors, then, fraud positioning vectors corresponding to the fraud behavior node data are determined, then, if the fraud positioning vectors are matched with target requirements, fraud risk behaviors corresponding to the fraud behavior node data with correlation are determined, and finally, based on the fraud risk behaviors and the fraud event data of the service application flow, risk interception instruction sets related to the fraud risk behaviors and the fraud risk vectors are called, and the fraud positioning vectors are intercepted through an interception rule corresponding to the service application flow. Therefore, the intelligent prediction analysis can be carried out aiming at the fraud risk, the interception processing is carried out, and the reliability of the service operation can be improved.
Description
Technical Field
The invention relates to the technical field of big data, in particular to a risk behavior analysis method and system based on big data.
Background
How to carry out intelligent prediction analysis aiming at fraud risks and carry out interception processing, which can improve the reliability of service operation, is a technical problem to be solved urgently.
Disclosure of Invention
Based on the above problems, an embodiment of the present invention provides a risk behavior analysis method based on big data, including:
extracting a plurality of associated fraud behavior node data based on fraud event data which is obtained in a service flow of a service application and covers fraud risk vectors;
determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
determining fraud risk behaviors corresponding to the plurality of fraud behavior node data associated with the existence if the fraud positioning vector matches a target requirement; and calling a risk interception instruction set related to the fraud risk behaviors and the fraud risk vectors based on the fraud risk behaviors and the fraud event data of the service application flow, and intercepting the fraud positioning vectors through an interception rule corresponding to the service application flow.
Determining a fraud positioning vector corresponding to the fraud node data based on the plurality of fraud node data associated with the existence, including:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
Wherein determining fraud risk behavior corresponding to the plurality of fraud node data associated with the presence if the fraud positioning vector matches a target requirement comprises:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector;
and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
Matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix, wherein the fraud risk behaviors comprise:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
Wherein the method further comprises:
and generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
The invention also provides a risk behavior analysis system based on big data, which comprises:
the extraction module is used for extracting a plurality of fraud behavior node data with correlation based on the fraud event data which is obtained in the service flow of the service application and covers the fraud risk vector;
the determining module is used for determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
an interception module, configured to determine a fraud risk behavior corresponding to the plurality of fraud behavior node data associated with the existence if the fraud positioning vector matches a target requirement; and calling a risk interception instruction set related to the fraud risk behaviors and the fraud risk vectors based on the fraud risk behaviors and the fraud event data of the service application flow, and intercepting the fraud positioning vectors through an interception rule corresponding to the service application flow.
Wherein the determining module is specifically configured to:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
Wherein the intercepting module is specifically configured to:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
Wherein the intercepting module is further specifically configured to:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
The system further comprises:
and the execution module is used for generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
To sum up, in the risk analysis method and system based on big data provided in the embodiments of the present invention, first, based on the fraud event data covering the fraud risk vector obtained in the service flow of the service application, a plurality of relevant fraud node data are extracted, then, based on the plurality of relevant fraud node data, a fraud positioning vector corresponding to the fraud node data is determined, where the fraud positioning vector represents a relationship characteristic between the fraud risk vector and a plurality of set fraud positioning nodes, then, if the fraud positioning vector matches a target requirement, a fraud risk behavior corresponding to the plurality of relevant fraud node data is determined, and finally, based on the fraud risk behavior and the fraud event data of the service application flow, a risk interception instruction set associated with the fraud risk behavior and the fraud risk vector is retrieved, and intercepting the fraud positioning vector through an interception rule corresponding to the business application flow. Therefore, the reliability of service operation can be improved by carrying out intelligent prediction analysis on the fraud risk vector and carrying out interception processing on the fraud risk vector.
In order to make the aforementioned objects, features and advantages of the embodiments of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings are only some embodiments of the present invention, and therefore should not be considered as limiting the scope, and it is obvious for those skilled in the art that other related drawings can be obtained based on these drawings without inventive efforts.
FIG. 1 is a schematic flow chart of a big data-based risk behavior analysis method according to an embodiment of the present invention;
fig. 2 is a functional block diagram of a big data-based risk behavior analysis system according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by the scholars in the technical field, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow diagram of a risk behavior analysis method based on big data according to an embodiment of the present invention, where the abnormal behavior intercepting method may be executed by a monitoring server for providing a business application flow service, and executed by a background server for providing the business application flow service.
A server may include one or more processors, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. A server may also include any storage medium for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, the storage medium may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage medium may use any technology to store information. Further, any storage medium may provide volatile or non-volatile retention of information. Further, any storage medium may represent a fixed or removable component of a server. In one case, the server may perform any of the operations of the associated instructions when the processor executes the corresponding instructions stored in any storage medium or combination of storage media. The server also comprises one or more drive units for interacting with any storage medium, such as a hard disk drive unit, an optical disk drive unit, etc.
The server also includes input/output (I/O) for receiving various inputs (via the input unit) and for providing various outputs (via the output unit)). One particular output mechanism may include a presentation device and a corresponding Graphical User Interface (GUI). The server may also include one or more network interfaces for exchanging data with other devices via one or more communication units. One or more communication buses couple the above-described components together.
The communication unit may be implemented in any manner, e.g., over a local area network, a wide area network (e.g., the internet), a point-to-point connection, etc., or any combination thereof. The communication units may comprise any combination of hardwired links, wireless links, routers, gateway functions, etc., governed by any protocol or combination of protocols.
The detailed steps of the big data based risk behavior analysis method are introduced as follows.
In one possible implementation manner, for step 200, the determining, based on the plurality of fraud node data associated with the existence, a fraud positioning vector corresponding to the fraud node data includes:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
In one possible implementation, for step 300, if the fraud location vector matches a target requirement, determining fraud risk behaviors corresponding to the plurality of fraud node data associated with the presence includes:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
In one possible implementation, for step 300, matching fraud risk behaviors corresponding to the fraud migration segment matrix from a feature matching library based on the fraud migration segment matrix includes:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
In a possible implementation manner, the method according to this embodiment further includes:
and generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
Fig. 2 is a functional block diagram of an abnormal behavior intercepting system according to an embodiment of the present invention, where functions implemented by the abnormal behavior intercepting system may correspond to steps executed by the foregoing method. The abnormal behavior intercepting system may be understood as the server or a processor of the server, or may be understood as a component that is independent from the server or the processor and implements the functions of the present invention under the control of the server, as shown in fig. 2, and the functions of each functional module of the abnormal behavior intercepting system are described in detail below.
An extraction module 210, configured to extract, based on fraud event data that covers a fraud risk vector and is obtained in a service flow of a service application, a plurality of relevant fraud behavior node data;
a determining module 220, configured to determine, based on the associated multiple fraudulent conduct node data, a fraudulent location vector corresponding to the fraudulent conduct node data, where the fraudulent location vector represents a relationship feature between the fraud risk vector and multiple set fraudulent location nodes;
an intercepting module 230, configured to determine a fraud risk behavior corresponding to the plurality of fraud node data associated with the existence if the fraud positioning vector matches a target requirement; and calling a risk interception instruction set related to the fraud risk behaviors and the fraud risk vectors based on the fraud risk behaviors and the fraud event data of the service application flow, and intercepting the fraud positioning vectors through an interception rule corresponding to the service application flow.
In a possible implementation manner, the determining module is specifically configured to:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
In a possible implementation manner, the intercepting module is specifically configured to:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
In a possible implementation manner, the intercepting module is specifically further configured to:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
In one possible embodiment, the system further comprises:
and the execution module 240 is configured to generate interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activate and execute the interception execution information and the risk interception instruction set.
To sum up, in the risk analysis method and system based on big data provided in the embodiments of the present invention, first, based on the fraud event data covering the fraud risk vector obtained in the service flow of the service application, a plurality of relevant fraud node data are extracted, then, based on the plurality of relevant fraud node data, a fraud positioning vector corresponding to the fraud node data is determined, where the fraud positioning vector represents a relationship characteristic between the fraud risk vector and a plurality of set fraud positioning nodes, then, if the fraud positioning vector matches a target requirement, a fraud risk behavior corresponding to the plurality of relevant fraud node data is determined, and finally, based on the fraud risk behavior and the fraud event data of the service application flow, a risk interception instruction set associated with the fraud risk behavior and the fraud risk vector is retrieved, and intercepting the fraud positioning vector through an interception rule corresponding to the business application flow. Therefore, the reliability of service operation can be improved by carrying out intelligent prediction analysis on the fraud risk vector and carrying out interception processing on the fraud risk vector. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
Alternatively, all or part of the implementation may be in software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, or data center to another website site, computer, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that is integrated over one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any drawing credit or debit acknowledgement in the claims should not be construed as limiting the claim concerned.
Claims (10)
1. A risk behavior analysis method based on big data is characterized by comprising the following steps:
extracting a plurality of associated fraud behavior node data based on fraud event data which is obtained in a service flow of a service application and covers fraud risk vectors;
determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
and if the fraud positioning vector is matched with a target requirement, determining fraud risk behaviors corresponding to the plurality of fraud behavior node data with the association, calling risk interception instruction sets associated with the fraud risk behaviors and the fraud risk vector based on the fraud risk behaviors and fraud event data of the business application flow, and intercepting the fraud positioning vector through an interception rule corresponding to the business application flow.
2. The method according to claim 1, wherein the determining a fraud location vector corresponding to the fraud node data based on the plurality of fraud node data associated with the presence comprises:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
3. The method of claim 1, wherein determining fraud risk behavior corresponding to the plurality of fraud node data associated with the presence if the fraud positioning vector matches a target requirement comprises:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector;
and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
4. The method according to claim 3, wherein matching fraud risk behavior corresponding to the fraud migration segment matrix from a pre-configured feature matching library based on the fraud migration segment matrix comprises:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
5. The method of claim 1, further comprising:
and generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
6. A big-data-based risk behavior analysis system, comprising:
the extraction module is used for extracting a plurality of fraud behavior node data with correlation based on the fraud event data which is obtained in the service flow of the service application and covers the fraud risk vector;
the determining module is used for determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
and the interception module is used for determining fraud risk behaviors corresponding to the associated fraud behavior node data if the fraud positioning vector is matched with a target requirement, calling a risk interception instruction set associated with the fraud risk behaviors and the fraud risk vector based on the fraud risk behaviors and fraud event data of the service application flow, and intercepting the fraud positioning vector through an interception rule corresponding to the service application flow.
7. The system of claim 6, wherein the determination module is specifically configured to:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
8. The system of claim 6, wherein the interception module is specifically configured to:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
9. The system of claim 8, wherein the interception module is further specifically configured to:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
10. The system of claim 6, further comprising:
and the execution module is used for generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111097462.6A CN113779569A (en) | 2021-09-18 | 2021-09-18 | Risk behavior analysis method and system based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111097462.6A CN113779569A (en) | 2021-09-18 | 2021-09-18 | Risk behavior analysis method and system based on big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113779569A true CN113779569A (en) | 2021-12-10 |
Family
ID=78852313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111097462.6A Withdrawn CN113779569A (en) | 2021-09-18 | 2021-09-18 | Risk behavior analysis method and system based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113779569A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174231A (en) * | 2022-07-08 | 2022-10-11 | 哈尔滨悦道科技开发有限公司 | AI-Knowledge-Base-based network fraud analysis method and server |
-
2021
- 2021-09-18 CN CN202111097462.6A patent/CN113779569A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174231A (en) * | 2022-07-08 | 2022-10-11 | 哈尔滨悦道科技开发有限公司 | AI-Knowledge-Base-based network fraud analysis method and server |
CN115174231B (en) * | 2022-07-08 | 2024-01-02 | 北京基智科技有限公司 | Network fraud analysis method and server based on AI Knowledge Base |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109992473B (en) | Application system monitoring method, device, equipment and storage medium | |
JP6689283B2 (en) | Method and apparatus for assigning device fingerprints to internet devices | |
US10630399B2 (en) | Testing distributed applications that have an established exchange in an advanced message queuing protocol (AMQP) message broker | |
CN111598575A (en) | Business process control method and device, electronic equipment and readable storage medium | |
US10628210B2 (en) | System and method for enabling API interoperability | |
CN113779569A (en) | Risk behavior analysis method and system based on big data | |
CN113761526A (en) | Attack intention analysis method and system based on big data | |
CN115358873A (en) | Business scene configuration system, method, electronic equipment and storage medium | |
CN113360210A (en) | Data reconciliation method and device, computer equipment and storage medium | |
CN108647284A (en) | Record method and device, medium and the computing device of user behavior | |
CN110704273A (en) | Configuration information processing method and device, electronic equipment and storage medium | |
CN112732547A (en) | Service testing method and device, storage medium and electronic equipment | |
CN113032647B (en) | Data analysis system | |
WO2023140951A1 (en) | Configurable deployment of data science environments | |
CN113301054A (en) | Network security monitoring method and network security monitoring system | |
CN115037653A (en) | Service flow monitoring method and device, electronic equipment and storage medium | |
CN113297491A (en) | Service subscription information pushing method and system based on social network | |
CN113706221A (en) | Big data-based user interest prediction method and system | |
CN113298622A (en) | Method and system for processing e-commerce business orders based on machine learning | |
US11321481B1 (en) | Method for determining to grant or deny a permission request based on empirical data aggregation | |
CN114002247A (en) | Three-dimensional electron diffraction data acquisition method and system for electron beam sensitive crystal | |
CN114474150A (en) | Stability testing method and system for seven-axis robot | |
CN114444119A (en) | Security protection method and system based on electronic commerce | |
CN114448676A (en) | Information interception method and system applied to electronic commerce live broadcast | |
CN114465773A (en) | Threat identification method and system based on electronic commerce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211210 |
|
WW01 | Invention patent application withdrawn after publication |