CN114417334A - Blacklist management and control mechanism generation method, apparatus, device and storage medium - Google Patents

Blacklist management and control mechanism generation method, apparatus, device and storage medium Download PDF

Info

Publication number
CN114417334A
CN114417334A CN202210059401.9A CN202210059401A CN114417334A CN 114417334 A CN114417334 A CN 114417334A CN 202210059401 A CN202210059401 A CN 202210059401A CN 114417334 A CN114417334 A CN 114417334A
Authority
CN
China
Prior art keywords
blacklist
service
information
control
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210059401.9A
Other languages
Chinese (zh)
Inventor
陈恩员
张涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An E Wallet Electronic Commerce Co Ltd
Original Assignee
Ping An E Wallet Electronic Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An E Wallet Electronic Commerce Co Ltd filed Critical Ping An E Wallet Electronic Commerce Co Ltd
Priority to CN202210059401.9A priority Critical patent/CN114417334A/en
Publication of CN114417334A publication Critical patent/CN114417334A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Virology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application is applicable to the technical field of artificial intelligence, and provides a blacklist management and control mechanism generation method, a device, equipment and a storage medium, wherein the method comprises the following steps: when the access user is identified to be added to the blacklist list, initiating a blacklist control mechanism to generate an instruction, wherein the instruction generated by the blacklist control mechanism contains target service scene information, and the target service scene information is service scene information corresponding to the blacklist list; acquiring target blacklist management and control configuration information correspondingly adapted to the target service scene information from a strategy database preset at the rear end of the service system according to the target service scene information; and reading a control logic file preset in the service system and called by different scenes, modifying the control logic file according to the target blacklist control configuration information, and generating a target blacklist control mechanism for behavior control of the access user. The method is used for generating the blacklist control mechanism, the maintenance cost is low, and the blacklist control mechanism can be flexibly configured in the service system.

Description

Blacklist management and control mechanism generation method, apparatus, device and storage medium
Technical Field
The present application relates to the field of artificial intelligence technologies, and in particular, to a method, an apparatus, a device, and a storage medium for generating a blacklist management and control mechanism.
Background
With the rapid development of internet technology, the way of online transaction processing through a service system is widely applied in various industries and fields. In the application process of the service system, the service system generally needs to be updated or upgraded continuously to adapt to different service requirements or service scenarios. At present, many companies utilize a blacklist mechanism to control user behaviors for some services with fund flow, for example, in a travel reimbursement service system, when a user does not perform operations such as payment and repayment within a specified time, the user is pulled into a blacklist, and a service scene and a reimbursement scene cannot be normally used after the user enters the blacklist. However, as the number of service types of the business system increases, a blacklist management and control mechanism corresponding to various different scenarios needs to be added in the business system. In the existing business system for reimbursement for travel, the mode of adding corresponding blacklist management and control mechanisms aiming at different scenes is that the front end performs mapping management and control according to different scenes, one secondary development treatment is needed when one scene is added, the secondary development treatment of each added scene needs to change business logic in the business system, the maintenance cost is high, management and control documents and management and control modes in different blacklist management and control mechanisms are various, if the management and control documents and management and control modes need to be modified, business codes need to be modified at the front end, and the modification difficulty is high and the modification is inflexible.
Disclosure of Invention
In view of this, embodiments of the present application provide a method, an apparatus, a device, and a storage medium for generating a blacklist management and control mechanism, which can solve the problems that, due to various service scenes, each new added scene needs to change service logic in a service system, maintenance cost is high, management and control schemes and management and control methods in the management and control mechanism are various, modification difficulty is high, and modification is not flexible.
A first aspect of an embodiment of the present application provides a method for generating a blacklist management and control mechanism, including:
when an access user is identified to be added to a blacklist list, initiating a blacklist control mechanism to generate an instruction, wherein the instruction generated by the blacklist control mechanism contains target service scene information, and the target service scene information is service scene information corresponding to the blacklist list;
acquiring target blacklist management and control configuration information correspondingly adapted to the target service scene information from a strategy database preset at the rear end of a service system according to the target service scene information;
and reading a control logic file preset in a service system and called by different scenes, modifying the control logic file according to the target blacklist control configuration information, and generating a target blacklist control mechanism for behavior control of the access user.
With reference to the first aspect, in a first possible implementation manner of the first aspect, before the step of obtaining, according to the target service scenario information, target blacklist management and control configuration information correspondingly adapted to the target service scenario information from a policy database preset at a back end of a service system, the method further includes:
acquiring first service scene information set based on a newly added service scene;
inputting the first service scene information into a control strategy configuration model preset at the rear end of a service system for strategy configuration processing so as to generate first blacklist control configuration information correspondingly adapted to the newly added service scene;
storing the first service scene information and the first blacklist control configuration information in the preset policy database, and establishing an association relationship between the first service scene information and the first blacklist control configuration information in the preset policy database.
With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner of the first aspect, after the step of storing the first service scenario information and the first blacklist management and control configuration information in the preset policy database, the method further includes:
and setting a corresponding blacklist list at the front end of the service system according to the first service scene information, wherein the blacklist list is used for recording users in the service system which meet the condition of entering the blacklist, wherein the condition is included in the first service scene information.
With reference to the first possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, before the step of inputting the first service scenario information into a control policy configuration model preset at a back end of a service system to perform policy configuration processing, so as to generate first blacklist control configuration information correspondingly adapted to a newly added service scenario, the method further includes:
constructing training samples for training a management and control strategy configuration model, wherein each training sample comprises service scene information corresponding to one service scene and blacklist management and control configuration information;
and a neural network model is built in advance by adopting an encoding-decoding framework, the business scene information contained in the training sample is used as the input of a model encoding part, the blacklist control configuration information contained in the training sample data is used as the output of a model decoding part, and the neural network model is trained, so that a control strategy configuration model for generating the blacklist control configuration information according to the business scene information is generated.
With reference to the first aspect, in a fourth possible implementation manner of the first aspect, the initiating a blacklist control mechanism to generate an instruction when the access user is identified to be added to a blacklist, where the instruction generated by the blacklist control mechanism includes target service scenario information, and before the step of identifying the service scenario information corresponding to the blacklist, the method includes:
responding to an access request of an access user, and acquiring identity identification information of the access user;
and traversing all blacklists set in a service system according to the identity identification information of the access user, identifying whether the identity identification information of the access user exists in the blacklists, and if so, identifying the access user as a blacklist user.
With reference to the fourth possible implementation manner of the first aspect, in a fifth possible implementation manner of the first aspect, the traversing all blacklists set in a service system according to the identity information of the access user, identifying whether the identity information of the access user exists in a blacklist, and if so, after the step of identifying the access user as a blacklist user, further includes:
and acquiring service scene information corresponding to the blacklist as target service scene information according to the blacklist where the access user is located.
With reference to the first aspect, in a sixth possible implementation manner of the first aspect, when it is identified that the access user is added to a blacklist, initiating a blacklist management and control mechanism to generate an instruction, where the blacklist management and control mechanism generates the instruction, where the instruction includes target service context information, and before the step of identifying the service context information corresponding to the blacklist, the method further includes:
collecting behavior information of a registered user of a service system;
comparing the behavior information of the service system registered user with the blacklist entering condition information corresponding to the blacklist set by the service system, and judging whether the service system registered user meets the blacklist entering condition;
and if so, adding the service system registered user to the blacklist, and recording the identity identification information of the service system registered user in the blacklist.
A second aspect of the present embodiment provides a blacklist management and control mechanism generation apparatus, including:
the instruction initiating module is used for initiating a blacklist control mechanism to generate an instruction when an access user is identified to be added to a blacklist, wherein the blacklist control mechanism generates the instruction which contains target service scene information, and the target service scene information is service scene information corresponding to the blacklist;
the strategy acquisition module is used for acquiring target blacklist management and control configuration information correspondingly adapted to the target service scene information from a strategy database preset at the rear end of a service system according to the target service scene information;
and the mechanism generation module is used for reading a control logic file preset in a service system and called by different scenes, modifying the control logic file according to the target blacklist control configuration information, and generating a target blacklist control mechanism for behavior control of the access user.
A third aspect of embodiments of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the electronic device, where the processor, when executing the computer program, implements the steps of the blacklist management mechanism generation method provided in the first aspect.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps of the blacklist management and control mechanism generation method provided in the first aspect.
The method, the device, the equipment and the storage medium for generating the blacklist management and control mechanism have the following beneficial effects:
when an access user is identified to be added to a blacklist, a blacklist control mechanism generation instruction is initiated, wherein the blacklist control mechanism generation instruction comprises target service scene information, and the target service scene information is service scene information corresponding to the blacklist; acquiring target blacklist management and control configuration information correspondingly adapted to the target service scene information from a strategy database preset at the rear end of a service system according to the target service scene information; reading control logic files called by different scenes in a preset blacklist plug-in, modifying the control logic files in the blacklist plug-in according to the target blacklist control configuration information, and generating a target blacklist control mechanism for behavior control of the access user. The method for generating the blacklist management and control mechanism has the advantages of low maintenance cost, small modification difficulty, flexible configuration and no need of changing the original service logic of the system, and can solve the problems of high maintenance cost, large modification difficulty, inflexibility and the like of the management and control mechanism due to various service scenes of the service system and various management and control documents and management and control modes in the management and control mechanism.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart illustrating an implementation of a method for generating a blacklist management and control mechanism according to an embodiment of the present application;
fig. 2 is a schematic diagram of a process of generating blacklist management and control configuration information for a newly added service scenario in a blacklist management and control mechanism generation method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a method for training a management and control policy configuration model in a blacklist management and control mechanism generation method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a method for determining whether an access user is a blacklist user in a method for generating a blacklist management and control mechanism according to an embodiment of the present application;
fig. 5 is a schematic flowchart of a method for adding a blacklist user in a method for generating a blacklist management and control mechanism according to an embodiment of the present application;
fig. 6 is a block diagram of an infrastructure of a blacklist management and control mechanism generation apparatus according to an embodiment of the present application;
fig. 7 is a block diagram of a basic structure of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The blacklist management and control mechanism generation method provided by the application is mainly applied to a scene that a business system with a fund flow direction controls user behaviors.
Referring to fig. 1, fig. 1 is a flowchart illustrating an implementation of a method for generating a blacklist management and control mechanism according to an embodiment of the present application. The details are as follows:
s11: when an access user is identified to be added to a blacklist, initiating a blacklist control mechanism to generate an instruction, wherein the instruction generated by the blacklist control mechanism contains target service scene information, and the target service scene information is service scene information corresponding to the blacklist.
In this embodiment, at the front end of the service system, corresponding blacklists are set for different service scenarios, that is, a plurality of blacklists are set in the service system, and each blacklist is set with a corresponding condition for entering a blacklist based on a service scenario, so that a behavior of a user in the service system is controlled by the blacklist. The behavior of the user in the service system is characterized by the relevant service operation executed by the user in the service system. In this embodiment, the service system stores user data of users, and the user in the service system, which stores the user data, is a user who has registered in the service system and performed a service operation. The method comprises the steps of presetting a timed data monitoring rule in a service system, setting the timed data monitoring rule to perform data monitoring on user data of each registered user in the service system at intervals of a preset time period, judging whether the registered user meets the condition of entering each blacklist or not based on the user data, and adding the registered user to the blacklist list if the registered user meets the condition of entering a certain blacklist, wherein the blacklist list is any one of a plurality of blacklist lists set by the service system. Based on the blacklist set by the service system, when a user accesses the service system, the user is the access user, whether the access user is currently recorded in a certain blacklist can be determined by inquiring the blacklist set by the service system, and if so, the access user is identified as the blacklist user. In this embodiment, in the case that the access user is a blacklist user, the access user may be added to the blacklist. Therefore, when it is recognized that the access user is added to the blacklist, the service system may automatically initiate a blacklist management and control mechanism generation instruction, and the blacklist management and control mechanism generation instruction carries target service scenario information, where the target service scenario information is service scenario information corresponding to the blacklist to which the access user is added, and includes a service scenario type of the blacklist and a condition for entering the blacklist.
S12: and acquiring target blacklist management and control configuration information correspondingly adapted to the target service scene information from a policy database preset at the rear end of a service system according to the target service scene information.
The method comprises the steps that a strategy database is preset at the rear end of a service system, and various blacklist management and control configuration information applied to different service scenes is stored in the strategy database. In the policy database, for each kind of blacklist management and control configuration information, corresponding service scene information representing a service scene is configured, that is, one kind of blacklist management and control configuration information corresponds to one kind of service scene information. In this embodiment, after obtaining the target service context information corresponding to the blacklist where the access user is located, the target blacklist management and control configuration information corresponding to the target service context information may be obtained from the policy database based on the corresponding relationship between the blacklist management and control configuration information and the service context information in the policy database.
S13: and reading a control logic file preset in a service system and called by different scenes, modifying the control logic file according to the target blacklist control configuration information, and generating a target blacklist control mechanism for behavior control of the access user.
At the front end of a service system, a blacklist plug-in unit which is universal for multiple scenes is pre-established, and a control logic file which is used for different scenes to call is configured in the blacklist plug-in unit. The management and control logic file can form a blacklist management and control execution method applied to different scenes by configuring different blacklist management and control configuration information. In this embodiment, after the back end of the service system obtains the target blacklist management and control configuration information, the back end of the service system may be triggered to call a blacklist plug-in which is general for multiple scenes and is pre-established at the front end of the service system, and a management and control logic file for different scenes in the blacklist plug-in is read and obtained from the blacklist plug-in. Illustratively, the blacklist plug-in is built by using a Spring framework, and Spring is a lightweight Java development framework. The blacklist plug-in unit maintains policy configuration information by Spring in a unified way, a service configuration class (ServiceConfig) provides configuration information of an interface and an implementation class, and a service analysis class (ServiceRevoler) is responsible for creating a specific implementation class. The front end of the service system is built and generated based on javascript, and a unified logic processing scheme is provided through consumption strategy configuration.
Based on the called blacklist plug-in, according to the target blacklist control configuration information, the control document information and the control mode information in the target blacklist control configuration information are respectively configured to the configuration blocks corresponding to the control document and the control mode in the control logic file, so that modification of the control logic file is completed, and a target blacklist control mechanism corresponding to the target service scene information is generated. The modified management and control logic file is recorded as the blacklist management and control execution method for behavior management and control of the access user, and the business system can realize behavior control of the access user based on the target blacklist management and control mechanism by operating the modified management and control logic file. For example, in a newly added car blacklist scenario in a business system for reimbursement in travel, when the business system runs a modified control logic file, "you are a car blacklist user configured by the modified control logic file, and cannot initiate reimbursement," please pay the control document in time, and display a "payment removal" control mode button configured by the modified control logic file, so as to instruct a target customer to click the "payment removal" button, thereby instructing the access user to complete a corresponding payment operation.
As can be seen from the above, in the method for generating a blacklist control mechanism provided in this embodiment, a blacklist control mechanism generation instruction is initiated under the condition that the access user is identified as the blacklist user, and the blacklist plug-in is called based on the target service scene information included in the blacklist control mechanism generation instruction, and only the control logic file in the blacklist plug-in needs to be modified, the target blacklist control mechanism for behavior control on the access user can be generated, the service logic of the service system does not need to be modified, the maintenance cost is low, the influence of the service scene on the service logic is reduced, and the normal operation of the service system is effectively ensured.
In some embodiments of the present application, please refer to fig. 2, and fig. 2 is a schematic diagram illustrating a method process of generating blacklist management and control configuration information for a newly added service scenario in a method for generating a blacklist management and control mechanism according to an embodiment of the present application. The details are as follows:
s21: and acquiring first service scene information set based on the newly added service scene.
In this embodiment, a manager of the service system may configure corresponding blacklist management and control configuration information for a newly added service scenario in the service system at any time. Specifically, when a new service scenario of the service system needs to be accessed to a blacklist for management and control, a manager may input first service scenario information set based on the new service scenario, where the first service scenario information includes, but is not limited to, blacklist scenario type information of the new service scenario and information of a condition for entering the blacklist. For example, a new service blacklist scenario that needs to be added in the business system for travel reimbursement is as follows: when a certain customer does not pay corresponding fees in time within 7 days after the customer finishes using the vehicle, the travel reimbursement service system pulls the customer into a vehicle blacklist set based on the newly added vehicle scene. Based on the newly added service blacklist scene, in the first service scene information input by the manager, the blacklist scene type information is represented as a 'vehicle blacklist scene using' and the condition information entering the blacklist is 'unpaid in 7 days using the vehicle'.
S22: and inputting the first service scene information into a control strategy configuration model preset at the back end of the service system for strategy configuration processing so as to generate first blacklist control configuration information correspondingly adapted to the newly added service scene.
In this embodiment, after obtaining the first service scenario information, the first service scenario information is input into a control policy configuration model preset at the back end of the service system to perform policy configuration processing, so as to generate first blacklist control configuration information correspondingly adapted to the newly added service scenario. The first blacklist management and control configuration information comprises management and control case information and management and control mode information. For example, a new car blacklist scenario is added in the travel reimbursement service system, that is, the blacklist scenario type information included in the first service scenario information is a "car blacklist scenario for use" and the condition information of entering the car blacklist is "unpaid car cost". The control strategy configuration model can obtain two characteristics of 'car using' and 'unpaid' from the blacklist scene type information and the condition information of the entering car using blacklist, and then inputs the two characteristics into a neural network layer trained by the control strategy configuration model to perform strategy configuration processing, so that the generated control document is 'you are users using blacklists and cannot initiate reimbursement and please pay in time', and the generated control mode is 'payment removing'. At this time, the generated "you are the vehicle blacklist user, can not initiate reimbursement, please pay in time" and "pay off" can be used as the first blacklist management and control configuration information correspondingly adapted to the newly added service scenario. It should be noted that the management and control policy configuration model is a neural network model trained to a convergence state, and the management and control policy configuration model is trained to generate blacklist management and control configuration information correspondingly adapted to a newly added service scenario according to the service scenario information of the newly added service scenario.
S23: storing the first service scene information and the first blacklist control configuration information in the preset policy database, and establishing an association relationship between the first service scene information and the first blacklist control configuration information in the preset policy database.
In this embodiment, after obtaining the first blacklist management and control configuration information correspondingly adapted to the newly added service scenario based on the newly added service scenario, the obtained first blacklist management and control configuration information may be stored in a policy database preset at the back end of the service system. In this embodiment, the obtained blacklist management and control configuration information corresponding to the newly added service scenario may be stored in the policy database as a management and control policy item. The service scene information and the blacklist control configuration information of the corresponding service scene are recorded in each control strategy item, so that the incidence relation between the service scene information and the blacklist control configuration information is established for each control strategy item. In this embodiment, based on the preset policy database, when the service system needs to generate a blacklist management and control mechanism, the blacklist management and control configuration information corresponding to the service scene may be acquired from the policy database according to a specific service scene requirement, so that the management and control logic file in the blacklist plug-in is modified according to the acquired blacklist management and control configuration information, and the generation operation of the blacklist management and control mechanism is completed. Based on the embodiment, by configuring the blacklist management and control configuration information for the newly added service scenario by using the management and control policy configuration model, for the application scenario in which the service system with the fund flow direction controls the user behavior by using the blacklist management and control mechanism, the problems that the service logic needs to be changed in the service system when a new service scenario is added, the maintenance cost is high, the management and control scheme and the management and control method in the management and control mechanism are various, the modification difficulty is high, and the modification is inflexible and the like can be solved.
For example, in the policy database, the management and control policy items may be classified and stored according to service types, one service type may include one or more management and control policy items, and one management and control policy item corresponds to one service scenario. By classified storage, data can be rapidly screened, blacklist control configuration information corresponding to a service scene is obtained from a policy database, and the efficiency and accuracy of data acquisition are improved. For example, in a business system for reimbursement in travel, a car service adds a service scenario that is unpaid for 7 days, a train service adds a service scenario that is unpaid for 7 days, a reimbursement service adds a service scenario that is unpaid for 7 days, and a reimbursement service adds a service scenario that is unpaid for 7 days. Then, based on the four newly added service scenarios, when storing the management and control policy item in the policy database, the following is specific:
and acquiring service scene information and blacklist control configuration information corresponding to the service scene unpaid in the vehicle within 7 days based on the service scene unpaid in the vehicle within 7 days newly added with the vehicle service. The service scene information comprises condition information entering a blacklist, and is represented as 'service fee is not paid within 7 days by using a vehicle'; the blacklist control configuration information comprises control document information and control mode information, wherein the control document information indicates that 'you are users of the blacklist car and cannot initiate reimbursement and please pay in time', and the control mode information indicates 'payment removal'. And further, the condition information of entering the blacklist, which is expressed as 'unpaid service fee in 7 days of using the vehicle', and the control case information, which is expressed as 'you are users of the blacklist of using the vehicle, can not initiate reimbursement and please pay in time', and the control mode information, which is expressed as 'payment removal', are associated and bound, so that a control strategy item is formed. The management and control strategy items are newly added for the vehicle using service, and are correspondingly stored in the vehicle using service classification of the strategy database according to the service scene type.
And acquiring service scene information and blacklist control configuration information corresponding to the service scene which is not paid within 7 days of the train service charge newly added on the basis of the service scene which is not paid within 7 days of the train service charge. The service scene information comprises condition information entering a blacklist and is represented as 'train service fee is not paid within 7 days'; the blacklist control configuration information comprises control case information and control mode information, wherein the control case information indicates that 'you are a train blacklist user and cannot initiate reimbursement and please pay in time', and the control mode information indicates 'payment removal'. And further, the condition information of entering the blacklist, which is expressed as 'train service fee is not paid within 7 days', and the control case information, which is expressed as 'you are a train blacklist user, can not initiate reimbursement and please pay in time', and the control mode information, which is expressed as 'payment removal', are associated and bound, so that a control strategy item is formed. The management and control strategy items are newly added for the train service, and are correspondingly stored in the train service classification of the strategy database according to the service scene type.
And acquiring service scene information and blacklist control configuration information corresponding to the service scene of non-reimbursement within 7 days of reimbursement based on the service scene of non-reimbursement within 7 days of reimbursement newly added for reimbursement service. The service scene information comprises condition information entering a blacklist and is represented as 'non-payment within 7 days of reimbursement'; the blacklist control configuration information comprises control case information and control mode information, wherein the control case information indicates that 'you are blacklist users and cannot initiate reimbursement and please pay in time', and the control mode information indicates 'go to repayment'. And further, the conditional information of entering the blacklist, which is represented as 'no payment is reimbursed within 7 days of reimbursement', and the control case information, which is represented as 'you are users of the blacklist, can not initiate reimbursement and please pay timely', and the control mode information, which is represented as 'payment going', are associated and bound, so that a control strategy item is formed. And the management and control strategy items are correspondingly stored in the reimbursement service classification of the strategy database according to the service scene type as the management and control strategy items are newly added for reimbursement services.
And acquiring service scene information and blacklist control configuration information corresponding to the service scene of the real object non-transaction list in the specified time based on the service scene of the real object non-transaction list newly added in the reimbursement service. The service scene information comprises condition information entering a blacklist and is expressed as 'real object specified time non-intersection'; the blacklist management and control configuration information comprises management and control case information and management and control mode information, wherein the management and control case information indicates that 'you are blacklist users and cannot initiate reimbursement and please make a bill in time', and the management and control mode information indicates that 'go to the bill'. And further, the conditional information of entering the blacklist, which is represented as 'real object regular time non-payment', and the control scheme information, which is represented as 'you are blacklist users, can not initiate reimbursement and please pay for bills in time', and the control mode information, which is represented as 'payment removal', are associated and bound, so that a control strategy item is constructed. And the management and control strategy items are correspondingly stored in the reimbursement service classification of the strategy database according to the service scene type as the management and control strategy items are newly added for reimbursement services.
It can be understood that, when a new service scene is added to the travel reimbursement service system, after service scene information and blacklist management and control configuration information based on the new service scene are obtained, a management and control policy item can be constructed based on the above similar manner and stored in the policy database in a classified manner for the blacklist plugin set up at the front end.
In some embodiments of the present application, after the back end of the service system generates the first blacklist management and control configuration information correspondingly adapted to the newly added service scenario and stores the first blacklist management and control configuration information in the policy database, a corresponding blacklist list is correspondingly set at the front end of the service system according to the first service scenario information. The blacklist is used for recording the users which meet the condition of entering the blacklist and are included in the first service scene information in the service system. In this embodiment, for different service scenarios that require access to a blacklist for management and control, the service system sets corresponding blacklist lists according to service scenario information of the service scenarios, that is, when the service system sets a plurality of service scenarios that require access to a blacklist for management and control, the service system may set a plurality of blacklist lists. When the service system detects that one of the managed users meets the condition of entering a certain blacklist, the user is added into the blacklist. And if one user meets the entry conditions of a plurality of blacklists, adding the user to the plurality of blacklists respectively. It should be noted that the manner of adding the user to the blacklist is specifically to record the identity information of the user in the blacklist.
In some embodiments of the present application, please refer to fig. 3, and fig. 3 is a flowchart illustrating a method for training a management and control policy configuration model in a blacklist management and control mechanism generation method according to an embodiment of the present application. The details are as follows:
s31: constructing training samples for training a management and control strategy configuration model, wherein each training sample comprises service scene information corresponding to one service scene and blacklist management and control configuration information;
s31: and a neural network model is built in advance by adopting an encoding-decoding framework, the business scene information contained in the training sample is used as the input of a model encoding part, the blacklist control configuration information contained in the training sample data is used as the output of a model decoding part, and the neural network model is trained, so that a control strategy configuration model for generating the blacklist control configuration information according to the business scene information is generated.
In this embodiment, each training sample includes service scenario information and blacklist management and control configuration information corresponding to a service scenario. The service scene information specifically includes condition information for entering a blacklist, and the blacklist management and control configuration information specifically includes management and control case information and management and control mode information. Illustratively, the training samples may be obtained by collecting management and control data corresponding to a blacklist management and control mechanism previously created by a relevant service system for various different service scenarios, and by constructing the management and control data, or by manually constructing the management and control data. In this embodiment, a neural network model is built in advance by using an encoding-decoding (Encoder-Decoder) framework, and after a certain number of training samples are built, the neural network model is built by using the training samples to train the encoding-decoding (Encoder-Decoder) framework, for example, the neural network model may be built as a Sequence 2 Sequence (Sequence to Sequence) model based on a transform structure, in the model, the structure of an encoding portion includes a self-attention layer and a feedforward neural network layer, and the structure of a decoding portion includes a self-attention layer, an attention layer and a feedforward neural network layer. In this embodiment, a model built by an encoding-decoding (Encoder-Decoder) framework is trained by using service scene information contained in a training sample as input of a model encoding part and blacklist management and control configuration information contained in the training sample as output of a model decoding part, and the model is trained to a convergence state by using a large number of training samples, so that the model has the capability of generating blacklist management and control configuration information according to the service scene information, so that model training is completed, and a management and control strategy configuration model is obtained.
In some embodiments of the present application, please refer to fig. 4, where fig. 4 is a schematic flowchart of a method for identifying whether an access user is a blacklist user in a generation method of a blacklist management and control mechanism provided in the embodiments of the present application.
The details are as follows:
s41: responding to an access request of an access user, and acquiring identity identification information of the access user;
s42: and traversing a blacklist set by a service system according to the identity identification information of the access user, identifying whether the identity identification information of the access user exists in the blacklist, and identifying the access user as a blacklist user if the identity identification information of the access user exists in the blacklist.
In this embodiment, the visiting user initiates an access request to the business system by performing a related page operation (e.g., clicking a certain component in a page) in a display page at the front end of the business system. After the service system identifies the page operation of the user, in response to the access request of the access user, the service system obtains the identification information of the access user, such as name information or ID code information, from the user data of the access user stored in the service system. In this embodiment, when recording the blacklist user, the blacklist list specifically records the identity information of the blacklist user in the blacklist list. Therefore, after the identity identification information of the access user is obtained, whether the identity identification information of the access user exists in the blacklist is determined by traversing the blacklist set by the service system according to the identity identification information of the access user, and whether the access user is a blacklist user is identified. Specifically, the service system is provided with a plurality of blacklist lists, all the blacklist lists set by the service system can be traversed one by one according to the identity information of the access user, and the access user is identified as the blacklist user by identifying whether the identity information of the access user exists in any one or more blacklist lists in all the blacklist lists set by the service system, if so, the access user is identified as the blacklist user.
In some embodiments of the present application, in the service system, each blacklist is set for a service scenario, and each blacklist is set with a corresponding blacklist entry condition based on the service scenario. After the access user is identified as the blacklist user, the service scene information corresponding to the blacklist where the access user is located can be obtained and obtained as the target service scene information according to the blacklist where the access user is located.
In some embodiments of the present application, please refer to fig. 5, and fig. 5 is a schematic flow chart illustrating a method for adding a blacklist user in a generation method of a blacklist management and control mechanism according to an embodiment of the present application. The details are as follows:
s51: collecting behavior information of a registered user of a service system;
s52: comparing the behavior information of the service system registered user with the blacklist entering condition information corresponding to the blacklist set by the service system, and judging whether the service system registered user meets the blacklist entering condition;
s53: and if so, adding the service system registered user to the blacklist, and recording the identity identification information of the service system registered user in the blacklist.
In this embodiment, the service system stores the user data of the registered user, and for each registered user, the behavior information of the registered user can be collected by performing data analysis on the user data of the registered user. For example, in the user data of a certain registered user in the travel reimbursement service system, there is a record that data is about 12 months and 10 days for train trip, and no payment record for train service fee exists. When the current time is 12 months and 22 days, and the service system routinely monitors the user data of each registered user in the service system according to the preset timed data monitoring rule, the data exceeds 7 days through time comparison, and the collected behavior information of the registered user is 'train service fee is not paid for after the data exceeds 12 days'. In this embodiment, after obtaining the behavior information of the registered user, the behavior information of the registered user may be compared with the condition information of entering the blacklist corresponding to the blacklist set by the service system, so as to determine whether the registered user meets the condition of entering the blacklist, if so, the registered user is added to the blacklist, and the identity information of the registered user is recorded in the blacklist. For example, the behavior information of the registered user is collected as that the train service fee is not paid for more than 12 days, and the condition that the train service fee is not paid for within 7 days is set by the service system corresponding to the train blacklist list, namely the monitoring result judges that the registered user meets the condition of entering the train blacklist. At this time, the registered user is added to a train blacklist, and the identity information of the registered user is recorded in the train blacklist.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In some embodiments of the present application, please refer to fig. 6, and fig. 6 is a block diagram of an infrastructure of a blacklist management and control mechanism generation apparatus according to an embodiment of the present application. The apparatus in this embodiment comprises means for performing the steps of the method embodiments described above. The following description refers to the embodiments of the method. For convenience of explanation, only the portions related to the present embodiment are shown. As shown in fig. 6, the apparatus for generating a blacklist management and control mechanism includes: an instruction initiating module 61, a policy obtaining module 62 and a mechanism generating module 63. Wherein: the instruction initiating module 61 is configured to initiate a blacklist control mechanism to generate an instruction when it is identified that an access user is added to a blacklist, where the blacklist control mechanism generates an instruction that includes target service scenario information, and the target service scenario information is service scenario information corresponding to the blacklist. The policy obtaining module 62 is configured to obtain, according to the target service scenario information, target blacklist management and control configuration information correspondingly adapted to the target service scenario information from a policy database preset at a back end of a service system. The mechanism generating module 63 is configured to read a management and control logic file preset in a service system and used for different scenarios to be called, modify the management and control logic file according to the target blacklist management and control configuration information, and generate a target blacklist management and control mechanism for behavior management and control on the access user.
The blacklist control mechanism generation device corresponds to the blacklist control mechanism generation method one to one, which is not described herein again.
In some embodiments of the present application, please refer to fig. 7, and fig. 7 is a basic structural block diagram of an electronic device according to an embodiment of the present application. As shown in fig. 7, the electronic apparatus 7 of this embodiment includes: a processor 71, a memory 72 and a computer program 73, e.g. a program of a blacklist authority generation method, stored in said memory 72 and operable on said processor 71. The processor 71 executes the computer program 73 to implement the steps in the embodiments of the blacklist management and control mechanism generation method. Alternatively, the processor 71, when executing the computer program 73, implements the functions of the modules in the embodiment corresponding to the blacklist management and control mechanism generating device. Please refer to the description related to the embodiment, which is not repeated herein.
Illustratively, the computer program 73 may be divided into one or more modules (units) that are stored in the memory 72 and executed by the processor 71 to accomplish the present application. The one or more modules may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 73 in the electronic device 7. For example, the computer program 73 may be divided into an instruction initiating module, a policy obtaining module, and a mechanism generating module, and the specific functions of the modules are as described above.
The electronic device may include, but is not limited to, a processor 71, a memory 72. It will be appreciated by those skilled in the art that fig. 7 is merely an example of the electronic device 7, and does not constitute a limitation of the electronic device 7, and may include more or less components than those shown, or combine certain components, or different components, for example, the electronic device may also include input output devices, network access devices, buses, etc.
The Processor 71 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 72 may be an internal storage unit of the electronic device 7, such as a hard disk or a memory of the electronic device 7. The memory 72 may also be an external storage device of the electronic device 7, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 7. Further, the memory 72 may also include both an internal storage unit and an external storage device of the electronic device 7. The memory 72 is used for storing the computer program and other programs and data required by the electronic device. The memory 72 may also be used to temporarily store data that has been output or is to be output.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments. In this embodiment, the computer-readable storage medium may be nonvolatile or volatile.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A blacklist management and control mechanism generation method is characterized by comprising the following steps:
when an access user is identified to be added to a blacklist list, initiating a blacklist control mechanism to generate an instruction, wherein the instruction generated by the blacklist control mechanism contains target service scene information, and the target service scene information is service scene information corresponding to the blacklist list;
acquiring target blacklist management and control configuration information correspondingly adapted to the target service scene information from a strategy database preset at the rear end of a service system according to the target service scene information;
and reading a control logic file preset in a service system and called by different scenes, modifying the control logic file according to the target blacklist control configuration information, and generating a target blacklist control mechanism for behavior control of the access user.
2. The method for generating a blacklist management and control mechanism according to claim 1, wherein before the step of obtaining the target blacklist management and control configuration information correspondingly adapted to the target service scenario information from a policy database preset at a back end of a service system according to the target service scenario information, the method further comprises:
acquiring first service scene information set based on a newly added service scene;
inputting the first service scene information into a control strategy configuration model preset at the rear end of a service system for strategy configuration processing so as to generate first blacklist control configuration information correspondingly adapted to the newly added service scene;
storing the first service scene information and the first blacklist control configuration information in the preset policy database, and establishing an association relationship between the first service scene information and the first blacklist control configuration information in the preset policy database.
3. The method according to claim 2, wherein after the step of storing the first service scenario information and the first blacklist management and control configuration information in the preset policy database, the method further comprises:
and setting a corresponding blacklist list at the front end of the service system according to the first service scene information, wherein the blacklist list is used for recording users in the service system which meet the condition of entering the blacklist, wherein the condition is included in the first service scene information.
4. The method for generating the blacklist management and control mechanism according to claim 2, wherein before the step of inputting the first service scenario information into a management and control policy configuration model preset at a rear end of a service system for policy configuration processing to generate the first blacklist management and control configuration information correspondingly adapted to the newly added service scenario, the method further comprises:
constructing training samples for training a management and control strategy configuration model, wherein each training sample comprises service scene information corresponding to one service scene and blacklist management and control configuration information;
and a neural network model is built in advance by adopting an encoding-decoding framework, the business scene information contained in the training sample is used as the input of a model encoding part, the blacklist control configuration information contained in the training sample data is used as the output of a model decoding part, and the neural network model is trained, so that a control strategy configuration model for generating the blacklist control configuration information according to the business scene information is generated.
5. The method according to claim 1, wherein when it is identified that the access user is added to a blacklist, initiating a blacklist management and control mechanism generation instruction, where the blacklist management and control mechanism generation instruction includes target service context information, and before the step of identifying the service context information corresponding to the blacklist, the method includes:
responding to an access request of an access user, and acquiring identity identification information of the access user;
and traversing all blacklists set in a service system according to the identity identification information of the access user, identifying whether the identity identification information of the access user exists in the blacklists, and if so, identifying the access user as a blacklist user.
6. The method according to claim 5, wherein the step of traversing all blacklists set in a service system according to the identification information of the access user, identifying whether the identification information of the access user exists in a blacklist, and if so, identifying the access user as a blacklist user further includes:
and acquiring service scene information corresponding to the blacklist as target service scene information according to the blacklist where the access user is located.
7. The method according to claim 1, wherein when it is identified that the access user is added to a blacklist, initiating a blacklist management and control mechanism generation instruction, where the blacklist management and control mechanism generation instruction includes target service context information, and before the step of identifying the service context information corresponding to the blacklist, the method further includes:
collecting behavior information of a registered user of a service system;
comparing the behavior information of the service system registered user with the blacklist entering condition information corresponding to the blacklist set by the service system, and judging whether the service system registered user meets the blacklist entering condition;
and if so, adding the service system registered user to the blacklist, and recording the identity identification information of the service system registered user in the blacklist.
8. A blacklist management and control mechanism generating apparatus, wherein the blacklist management and control mechanism generating apparatus includes:
the instruction initiating module is used for initiating a blacklist control mechanism to generate an instruction when an access user is identified to be added to a blacklist, wherein the blacklist control mechanism generates the instruction which contains target service scene information, and the target service scene information is service scene information corresponding to the blacklist;
the strategy acquisition module is used for acquiring target blacklist management and control configuration information correspondingly adapted to the target service scene information from a strategy database preset at the rear end of a service system according to the target service scene information;
and the mechanism generation module is used for reading a control logic file preset in a service system and called by different scenes, modifying the control logic file according to the target blacklist control configuration information, and generating a target blacklist control mechanism for behavior control of the access user.
9. An electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 7 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202210059401.9A 2022-01-19 2022-01-19 Blacklist management and control mechanism generation method, apparatus, device and storage medium Pending CN114417334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210059401.9A CN114417334A (en) 2022-01-19 2022-01-19 Blacklist management and control mechanism generation method, apparatus, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210059401.9A CN114417334A (en) 2022-01-19 2022-01-19 Blacklist management and control mechanism generation method, apparatus, device and storage medium

Publications (1)

Publication Number Publication Date
CN114417334A true CN114417334A (en) 2022-04-29

Family

ID=81274011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210059401.9A Pending CN114417334A (en) 2022-01-19 2022-01-19 Blacklist management and control mechanism generation method, apparatus, device and storage medium

Country Status (1)

Country Link
CN (1) CN114417334A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117874311A (en) * 2024-01-31 2024-04-12 北京轻松怡康信息技术有限公司 Blacklist management method, blacklist management device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117874311A (en) * 2024-01-31 2024-04-12 北京轻松怡康信息技术有限公司 Blacklist management method, blacklist management device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN113034274A (en) Supply chain financial service system and method based on block chain and terminal equipment
CN108376364B (en) Payment system account checking method and device and terminal device
CN112712358B (en) Recommendation method and device for non-inductive payment mode and terminal equipment
CN109408067A (en) A kind of data managing method and server based on monomer applications
CN112434884A (en) Method and device for establishing supplier classified portrait
CN114417334A (en) Blacklist management and control mechanism generation method, apparatus, device and storage medium
CN112149977A (en) Post-loan risk monitoring and early warning method and system, computer equipment and storage medium
CN114218455A (en) Method, device, equipment and medium for quickly reading files
CN114971893B (en) Loan deduction mode flexible configuration method and system
CN111861691A (en) Enterprise income tax declaration method and device, storage medium and electronic equipment
CN111695077A (en) Asset information pushing method, terminal equipment and readable storage medium
CN111161088A (en) Bill processing method, device and equipment
US20220343358A1 (en) Automated auditing and recommendation systems and methods
CN113962817B (en) Abnormal person identification method and device, electronic equipment and storage medium
CN109191103A (en) A kind of data carding method and device
CN111429125B (en) Account management method and device, storage medium and electronic equipment
CN110956445B (en) Method and device for generating risk file
CN113592549A (en) Conversion rate prediction method and device and electronic equipment
CN113822704A (en) Method and device for calculating discount cost, electronic equipment and readable storage medium
CN113570412A (en) Mechanical lease management method, device and system based on safety engineering
CN112712610A (en) Vehicle diagnosis log processing method and device, terminal device and readable storage medium
CN111047303A (en) Carbon emission right transaction settlement method and system
CN111144848A (en) Highway engineering quantity standard list management system and method and computer
CN117076546B (en) Data processing method, terminal device and computer readable storage medium
CN113268230B (en) Feedback information generation method and device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination