CN114862396A - Wind control method for sharing service platform, electronic equipment and storage medium - Google Patents

Wind control method for sharing service platform, electronic equipment and storage medium Download PDF

Info

Publication number
CN114862396A
CN114862396A CN202210604331.0A CN202210604331A CN114862396A CN 114862396 A CN114862396 A CN 114862396A CN 202210604331 A CN202210604331 A CN 202210604331A CN 114862396 A CN114862396 A CN 114862396A
Authority
CN
China
Prior art keywords
information
risk
merchant
free
wind control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210604331.0A
Other languages
Chinese (zh)
Inventor
张亚梅
董超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Side Cloud Beijing Information Service Co ltd
Original Assignee
Side Cloud Beijing Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Side Cloud Beijing Information Service Co ltd filed Critical Side Cloud Beijing Information Service Co ltd
Priority to CN202210604331.0A priority Critical patent/CN114862396A/en
Publication of CN114862396A publication Critical patent/CN114862396A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a wind control method, electronic equipment and a storage medium for sharing a service platform, wherein the method comprises the following steps: performing interface security verification on the service request; if the service request passes the interface security verification, performing risk analysis according to the service information; if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center; if the service information is judged to have no risk, corresponding service processing is carried out according to the service information; after the business processing is finished, carrying out risk analysis on the historical order information; and if the risk orders are found in the historical order information, processing the risk orders, and storing the risk orders to a wind control data center. In the embodiment of the application, risk analysis is performed from the dimensions of the current business and the historical order, wherein interface security verification and risk analysis of business information are performed on the current business respectively to form a complete wind control system.

Description

Wind control method for sharing service platform, electronic equipment and storage medium
Technical Field
The present application relates to the field of shared service technologies, and in particular, to a wind control method, an electronic device, and a storage medium for a shared service platform.
Background
The shared service platform is used for helping enterprises to use shared products provided by remote digital talents (non-enterprise employees) in a large scale, and provides a series of tools and services around matching, delivery, settlement and guarantee in the process, so that the enterprises are helped to quickly solve the problems encountered in production and operation. Both the merchant and the free-job owner may register as users of the shared service platform. The free caretaker can also receive and complete the task issued by the merchant so as to obtain corresponding reward.
Because the shared service platform relates to key information such as commission settlement, reward issue and the like, in order to avoid loss to merchants or free occupations, the wind control management in the shared service platform is particularly important.
However, the shared service platform involves more processes or links, and the wind control management of the shared service platform in the prior art is not perfect.
Disclosure of Invention
In view of this, the present application provides a wind control method, an electronic device, and a storage medium for a shared service platform, so as to solve the problem in the prior art that only wind control management of the shared service platform is not perfect.
In a first aspect, an embodiment of the present application provides a method for controlling wind for sharing a service platform, including:
responding to a service request of a user, and performing interface security verification on the service request, wherein the service request comprises service information, and the user is a merchant and/or a free-job operator of the shared service platform;
if the service request passes the interface security verification, performing risk analysis on the service information according to a preset first wind control strategy;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information;
after the business processing is finished, carrying out risk analysis on historical order information according to a preset second wind control strategy;
and if a risk order is found in the historical order information, processing the risk order, and storing the risk order to the wind control data center.
In a possible implementation manner, if it is determined that the service information has a risk, rejecting the service request, marking the service information as risk information, and storing the risk information in a wind-controlled data center includes:
if the business information is judged to have risks, judging whether wind control personnel need to be notified or not according to a wind control personnel triggering rule;
if the wind control personnel do not need to be notified, the service request is rejected, the service information is marked as risk information, and the risk information is stored in a wind control data center;
if the wind control personnel need to be notified, the wind control personnel are notified, and the wind control personnel judge whether the business information has risks;
if the wind control personnel judge that the business information has risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in the wind control data center;
and if the wind control personnel judge that the service information has no risk, performing corresponding service processing according to the service information.
In one possible implementation, the method further includes:
evaluating the risk level of the merchant and/or the free-job operator to obtain the risk level of the merchant and/or the free-job operator;
storing the risk level of the merchant and/or the free-employee to the wind-controlled data center.
In a possible implementation manner, the assessing the risk level of the merchant and/or the free-employee to obtain the risk level of the merchant and/or the free-employee includes:
and evaluating the risk level of the merchant and/or the free-job operator through a scoring card algorithm to obtain the risk level of the merchant and/or the free-job operator.
In a possible implementation manner, the business request of the user includes a network access request of the merchant and/or the free employee, where the network access request of the merchant and/or the free employee includes network access information of the merchant and/or the free employee, and the performing risk analysis on the business information according to a preset first wind control policy includes:
performing identity authentication on the merchant and/or the free-job dealer according to third-party identity authentication information in the wind control data center;
if the merchant and/or the free-job provider do not pass the identity authentication, judging that the network access information of the merchant and/or the free-job provider has a risk;
if the merchant and/or the free employee passes the identity verification, performing compliance verification on the merchant and/or the free employee according to compliance information of the merchant and/or the free employee stored in the wind control data center;
if the business and/or the free-position dealer fail to pass the compliance verification, judging that the network access information of the business and/or the free-position dealer has risks;
if the merchant and/or the free-job dealer pass the compliance verification, judging that the network access information of the merchant and/or the free-job dealer has no risk;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the network access information of the merchant and/or the free employee is judged to have risks, rejecting the network access request of the merchant and/or the free employee, marking the network access information of the merchant and/or the free employee as risk network access information, and storing the risk network access information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the network access information of the merchant and/or the free professional is judged to have no risk, allowing the merchant and/or the free professional to access the network and accessing the shared service platform.
In a possible implementation manner, the service request of the user includes a task issuing request of the merchant, where the task issuing request includes a task to be issued, and performing risk analysis on the service information according to a preset first wind control policy includes:
performing risk analysis on the task to be issued according to a sensitive word judgment rule and a task quota rule in the wind control data center;
if the sensitive words are judged not to exist in the task to be issued according to the sensitive word judgment rule, and the task to be issued is judged not to exceed the task quota according to the task quota rule, determining that the task to be issued does not have risks;
if the sensitive words in the task to be issued are judged according to the sensitive word judgment rule, or the task to be issued is judged to exceed the task quota according to the task quota rule, determining that the task to be issued has risks;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the task to be issued is judged to have risks, rejecting the task issuing request of the merchant, marking the task to be issued as risk task information, and storing the risk task information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the task to be issued is judged to have no risk, the task to be issued is issued on the shared service platform.
In a possible implementation manner, the service request of the user includes a task getting request of the free employee, where the task getting request includes a task to be got and an employment agreement signed between the free employee and a merchant corresponding to the task to be got, and the risk analysis of the service information according to a preset first wind control policy includes:
judging whether the recruitment agreements signed between the free staff and the merchants corresponding to the tasks to be picked have risks or not according to the recruitment agreement risk checking rules;
if the risk exists in the recruitment agreement signed between the free employee and the merchant corresponding to the task to be picked up, determining that the task to be picked up has the risk;
if the fact that the risk does not exist in the recruitment agreement signed between the free employee and the merchant corresponding to the task to be picked up is judged, it is determined that the risk does not exist in the task to be picked up;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the task to be picked up is judged to have risks, rejecting a task picking request of the free staff, marking the recruitment protocol as risk recruitment protocol information, and storing the risk recruitment protocol information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the task to be picked up is judged to have no risk, allowing the free caretaker to pick up the task to be picked up.
In a possible implementation manner, the service request of the user includes a task delivery request of the free-job provider, where the task delivery request includes delivery content, and performing risk analysis on the service information according to a preset first wind control policy includes:
judging whether the delivered content has risks or not according to a delivered content risk judgment rule;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the delivery content is judged to have risks, rejecting a task delivery request of the free job dealer, marking the delivery content as risk delivery content information, and storing the risk delivery content information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the delivery content is judged to have no risk, allowing the free occupational to deliver the delivery content.
In a possible implementation manner, the service request of the user includes a settlement request of the merchant, where the settlement request includes settlement information, and performing risk analysis on the service information according to a preset first wind control policy includes:
judging whether the settlement information has risks according to a settlement information risk judgment rule;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the settlement information is judged to have risks, rejecting the settlement request of the merchant, marking the settlement information as risk settlement information, and storing the risk settlement information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the settlement information is judged to have no risk, the settlement is finished according to the settlement information.
In a possible implementation manner, the historical order information is historical order information associated with the business information; or, the historical order information accords with the preset historical order screening rule.
In a second aspect, an embodiment of the present application provides an electronic device, including:
a processor;
a memory;
and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions which, when executed by the electronic device, cause the electronic device to perform the method of any of the first aspects.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, where the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method in any one of the first aspects.
By adopting the technical scheme provided by the embodiment of the application, the method has the following advantages:
1. and respectively carrying out risk analysis from the dimensionality of the current business and the dimensionality of the historical order, wherein interface safety verification and the risk analysis of business information are respectively carried out on the current business, and the risk information is stored in a wind control data center to provide data support for subsequent risk analysis, so that a complete wind control system is formed, and the transaction risk is reduced.
2. By carrying out risk analysis on the historical orders, the risk coefficient of the historical orders is greatly reduced, and guarantee is provided for legal compliance of trading.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a schematic view of a scenario of a shared service platform according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of a wind control method for a shared service platform according to an embodiment of the present disclosure
Fig. 3 is a schematic flow chart of another wind control method for a shared service platform according to an embodiment of the present disclosure;
fig. 4 is a schematic flow chart of another wind control method for a shared service platform according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely a relationship that describes an associated object, meaning that three relationships may exist, e.g., A and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Referring to fig. 1, a scene diagram of a shared service platform provided in the embodiment of the present application is shown. As shown in fig. 1, the application scenario includes a server 110, a merchant terminal 120, and a discretionary person terminal 130. Merchant terminal 120 and discretionary person terminal 130 are each communicatively coupled to server 110. The communication connection may be a wired communication connection or a wireless communication connection, which is not limited in the embodiments of the present application.
The server 110 may carry a shared service platform, where users in the shared service platform include merchants and free-job owners, and the merchants may register in the shared service platform through the merchant terminals 120 to issue tasks; the liberty officer can register in the shared service platform through the liberty officer terminal 130 to receive and complete the tasks issued by the merchants to obtain corresponding rewards.
The merchant terminal 120 is a terminal device used by a merchant, and the free-employee terminal 130 is a terminal device used by a free-employee. It should be noted that, the following description refers to the shared service platform sending information or instruction to the merchant, which means the shared service platform sending information or instruction to the merchant terminal 120; the shared service platform receives information or an instruction sent by the merchant, which means that the shared service platform receives the information or the instruction sent by the merchant terminal 120; the shared service platform sends information or instructions to the free occupational, namely the shared service platform sends information or instructions to the free occupational terminal 130; the shared service platform receives the information or the instruction sent by the discretionary employee, which means that the shared service platform receives the information or the instruction sent by the discretionary employee terminal 130. The embodiments of the present application do not specifically limit the types of the merchant terminal 120 and the discretionary actor terminal 130. For example, merchant terminal 120 and discretionary person terminal 130 may be cell phones, tablets, desktop computers, wearable devices, and the like.
For ease of illustration, in other portions of this document, the process by which a merchant issues a task, and the free-caretaker receives and completes the task, and thereby obtains a corresponding reward, may be referred to as an "order" or a "trade"; "platform" may also be referred to as a "system"; "information" may also be referred to as "data".
It should be noted that fig. 1 is only an exemplary illustration, and should not be taken as a limitation of the scope of the present application. For example, merchant a and merchant B, free employee a and free employee B are shown in fig. 1. It is understood that a greater number of merchants and free-workers may be registered in the shared service platform, and the number of merchants and free-workers is not particularly limited in the embodiments of the present application.
The shared service platform is used for helping enterprises to use shared products provided by remote digital talents (non-enterprise employees) in a large scale, and provides a series of tools and services around matching, delivery, settlement and guarantee in the process, so that the enterprises are helped to quickly solve the problems encountered in production and operation. In the prior art, only part of the processes or links in the shared service platform are subjected to risk control, and wind control management is not perfect.
In order to solve the problems, the application provides a full-platform wind control scheme, which is used for performing risk analysis from the dimensions of the current business and the historical orders respectively, wherein the current business is subjected to interface security verification and risk analysis of business information respectively, and the risk information is stored in a wind control data center to provide data support for subsequent risk analysis, so that a complete wind control system is formed, and the transaction risk is reduced. The following detailed description is made with reference to the accompanying drawings.
Referring to fig. 2, a schematic flow chart of a wind control method for a shared service platform provided in an embodiment of the present application is shown. The method can be applied to the application scenario shown in fig. 1, as shown in fig. 2, which mainly includes the following steps.
Step S210: and responding to a service request of a user, and performing interface security verification on the service request, wherein the service request comprises service information.
The user related to the embodiment of the application can be a merchant or a free-employee, namely, the business request can be a business request sent by the merchant to the shared service platform and can also be a business request sent by the free-employee to the shared service platform.
The business request related to the embodiment of the application can be a network access request of a merchant and/or a free employee, a task issuing request of the merchant, a task getting request of the free employee, a task delivery request of the free employee, a settlement request of the merchant and the like. The network access request can be understood as a request for accessing the shared service platform or a request for establishing a communication connection with the shared service platform.
In the embodiment of the application, after the shared service platform receives a service request of a user, in order to ensure the interface security, the interface security verification is firstly performed. The interface security verification comprises signature verification, authority verification, anti-replay verification and the like.
In one possible implementation, the signature verification is based on token implementation. Specifically, when a user logs in a shared service platform for the first time, the shared service platform generates a token for the user according to the information logged in by the user; the service request sent to the shared service platform by the user each time comprises a token; and after receiving the service request of the user, the shared service platform acquires the token in the service request, decodes the token to acquire the key, and passes signature verification if the key is correct. The token generation method mainly comprises the following steps.
Step S211: parameters are requested.
The request parameters specifically include:
secret: a user password for the user to request login; clientId: a client ID, a client to which the current token belongs; userId: the user's ID, which indicates from which user the current token is authorized; scope: the authority range, which allows the exchanged user to be protected by the resource range; outTime: an expiration time for controlling the life cycle of the token; tokenType: and the types of tokens adopt different verification measures.
Step S212: a source string is constructed.
The method for constructing the source string specifically comprises the following steps:
obtaining a Uniform Resource Identifier (URI) to be requested; generating a JS Object Notation (JSON) string by using the request parameters; and splicing the URI, the JSON string and the secret key to obtain a source string.
Step S213: generating a token.
The token generation method specifically comprises the following steps:
generating a header: the header consists of two parts, the type of token is 'JWT', and the name of the algorithm is HMAC SHA 256;
generating Payload: the source string is obtained by base64 coding the source string constructed in the way;
signature: the encrypted header, the encrypted payload, and a secret key secret are signed (the signature algorithm is the algorithm specified in the header), and token is obtained.
In one possible implementation, the permission verification includes: the platform provides button-level authority security management, a user who successfully logs in the platform can acquire user authority, if a functional behavior triggered by the user is received, whether the user authorizes to operate the triggered behavior is verified, and if not, the user is prompted to be unauthorized.
In one possible implementation, the anti-idempotent validation includes: for different behaviors such as user mistaken touch, malicious repeated attack behaviors of hackers, overtime retry in normal requests and the like, the system adopts a redis lock to perform anti-replay processing. The reds lock is used for generating an md5 ciphertext according to an external request parameter and an internal method name, then storing the md5 ciphertext into the reds as a key, and ensuring that only one response is given to a batch request and the rest is intercepted by applying a setnx command.
Step S220: and if the service request passes the interface security verification, performing risk analysis on the service information according to a preset first wind control strategy.
In the embodiment of the application, the service request comprises service information, and after the service request is subjected to interface security verification, risk analysis is further performed on the service information according to a preset first wind control strategy. The first wind control policy may be a wind control policy stored in a wind control data center, and in the process of performing risk analysis on the service information based on the first wind control policy, other information stored in the data center may also be used, for example, third-party identity verification information, compliance information, risk information, behavior information, wind control information, and the like.
And the third-party identity authentication information is used for performing identity authentication on the merchant and/or the free occupation.
Compliance information for compliance verification of the merchant and/or the freelance. For example, the compliance information may include business nature of the merchant, credit rating, legal credit, risk rating, merchant black and white list, etc.; age of free job, historical service orders, risk rating, free job black and white list, etc.
And the risk information is the risk information exhausted in the wind control process. For example, the risk information may include risk networking information, risk mission information, risk employment agreement family information, risk delivery content information, risk settlement information, risk order information, and the like.
And the behavior information is statistical behavior data of the merchants and/or the free-job owners on the shared service platform.
And the wind control information is wind control data of wind control personnel based on laws and regulations and personal research and maintenance systems, and comprises merchant quota, free occupational person quota, sensitive word stock, risk terms and the like.
The following describes in detail a process of risk analysis of the service information according to the first wind control policy with reference to different service requests.
In a possible implementation manner, the service request is a network access request of a merchant, the network access request of the merchant includes network access information of the merchant, and the network access information of the merchant may be business license name, legal identification number, registration address and other identity information of the merchant. Specifically, the risk analysis of the business information according to a preset first wind control strategy comprises the following steps.
Step S2211: and carrying out identity authentication on the merchant according to the third party identity authentication information in the wind control data center.
The third party authentication information refers to authentication information acquired from a third party platform, and the third party platform has authority, namely, the third party platform has the identification capability of the merchant identity information. Because the network access information of the commercial tenant comprises the identity information of the commercial tenant, the third party identity authentication information can be compared with the identity information of the commercial tenant, and the identity authentication of the commercial tenant is realized. In some possible implementation manners, the third-party authentication information may be synchronized to the wind control data center, and then the third-party authentication information is called in the wind control data center.
It can be understood that if the third party authentication information does not match the identity information of the merchant, it indicates that the merchant does not pass the authentication, and then the process goes to step S2212; if the third party authentication information matches with the identity information of the merchant, it indicates that the merchant passes the authentication, and then the process goes to step S2213.
Step S2212: if the merchant does not pass the identity authentication, the network access information of the merchant is judged to have risks, then the network access request of the merchant is refused in the subsequent steps, the network access information of the merchant is marked as the risk network access information, and the risk network access information is stored in the wind control data center.
Step S2213: and if the merchant passes the identity verification, performing compliance verification on the merchant according to the compliance information of the merchant stored in the wind control data center.
In the embodiment of the application, the wind control data center stores compliance information of each merchant. Specifically, the compliance information may be business operation nature, credit rating, legal credit, risk level, black and white list of the merchant, and the like of the merchant. That is, the compliance verification of the merchant can be performed through the information of the business operation property, the credit rating, the credit investigation of the legal person, the risk level and the like of the merchant. In the specific implementation, a corresponding compliance screening rule can be set, the compliance information of the merchant is compared with the compliance screening rule, if the enterprise operating property, the credit rating, the credit investigation of the legal person, the risk level, the black and white list of the merchant and the like of the merchant meet the requirements of the compliance screening rule, the merchant is determined to pass compliance verification, and the step S2215 is performed; if the business operation property, the credit rating, the credit investigation of the legal person, the risk level, the black-white list of the merchant and the like of the merchant do not meet the requirements of the compliance screening rule, determining that the merchant does not pass the compliance verification, and entering step S2214.
Step S2214: if the merchant does not pass the compliance verification, the network access information of the merchant is judged to have risks, then the network access request of the merchant is refused in the subsequent steps, the network access information of the merchant is marked as risk network access information, and the risk network access information is stored in a wind control data center.
Step S2215: and if the merchant passes the compliance verification, judging that the network access information of the merchant has no risk, and allowing the merchant to access the network and the shared service platform in the subsequent steps.
In a possible implementation manner, when the service request is a network access request of a merchant, the network access information of the merchant can be directly compared with the risk network access information stored in the wind control data center, and if the network access information of the merchant is matched with the risk network access information stored in the wind control data center, the network access information of the merchant is judged to have a risk; and if the network access information of the merchant is not matched with the risk network access information stored in the wind control data center, executing the step S2211 to the step S2215.
That is to say, in the embodiment of the application, whether the network access information of the merchant has a risk is judged based on the risk network access information stored in the wind control data center; and when the network access information of the commercial tenant is judged to have no risk based on the risk network access information stored in the wind control data center, further judging the network access information of the commercial tenant by combining the steps S2211-S2215. And carrying out risk judgment on the network access information of the commercial tenant based on the risk network access information stored in the wind control data center, so that the data processing amount of the shared service platform can be reduced.
In a possible implementation manner, the service request is a network access request of a free employee, the network access request of the free employee includes network access information of the free employee, and the network access information of the free employee may be identity information of the free employee, such as a name, a mobile phone number, an identity card number, a bank card number, and the like of the free employee. Specifically, the risk analysis of the business information according to a preset first wind control strategy comprises the following steps.
Step S2221: and carrying out identity authentication on the free-job dealer according to the third-party identity authentication information in the wind control data center.
The third party identity authentication information refers to identity authentication information acquired from a third party platform, and the third party platform has authority, namely the identity authentication information has the identification capability of the identity information of the free occupations. Because the network access information of the free employee comprises the identity information of the free employee, the identity authentication information of the third party can be compared with the identity information of the free employee, and the identity authentication of the free employee is realized. In some possible implementation manners, the third-party authentication information may be synchronized to the wind control data center, and then the third-party authentication information is called in the wind control data center.
It can be understood that if the third party identity authentication information does not match the identity information of the free employee, it indicates that the free employee does not pass the identity authentication, and then the process goes to step S2222; if the third party identity authentication information matches the identity information of the free employee, it indicates that the free employee passes the identity authentication, and then the process goes to step S2223.
Step S2222: and if the free employee does not pass the identity authentication, judging that the network access information of the free employee has risks, further rejecting the network access request of the free employee in the subsequent steps, marking the network access information of the free employee as risk network access information, and storing the risk network access information to the wind control data center.
Step S2223: and if the free employee passes the identity verification, performing compliance verification on the free employee according to the compliance information of the free employee stored in the wind control data center.
In the embodiment of the application, the wind control data center stores compliance information of each free employee, and specifically, the compliance information may be an age of the free employee, a historical service order, a risk level, a black and white list of the free employee, and the like. That is, compliance verification can be performed on the free occupational through information such as age of the free occupational, historical service orders, risk level, black and white list of the free occupational, and the like. In specific implementation, a corresponding compliance screening rule can be set, compliance information of the free job can be compared with the compliance screening rule, and if the age, the historical service order, the risk level, the black-and-white list of the free job and the like of the free job meet the requirements of the compliance screening rule, the free job is determined to pass compliance verification, and the step S2225 is executed; if the age, the historical service order, the risk level, the black-and-white list of the free employee, etc. of the free employee do not meet the requirements of the compliance screening rule, it is determined that the free employee does not pass the compliance verification, and the process proceeds to step S2224.
Step S2224: and if the free employee does not pass the compliance verification, judging that the network access information of the free employee has risks, further rejecting the network access request of the free employee in the subsequent steps, marking the network access information of the free employee as risk network access information, and storing the risk network access information to the wind control data center.
Step S2225: and if the free job owner passes the compliance verification, judging that the network access information of the free job owner has no risk, and allowing the free job owner to access the network and the shared service platform in the subsequent steps.
In a possible implementation manner, when the service request is a network access request of a free employee, network access information of the free employee can be directly compared with risk network access information stored in a wind control data center, and if the network access information of the free employee is matched with the risk network access information stored in the wind control data center, the network access information of the free employee is judged to have a risk; and if the network access information of the free employee is not matched with the risk network access information stored in the wind control data center, executing the step S2221 to the step S2225.
That is to say, in the embodiment of the application, whether the network access information of the free-job employee has a risk is judged based on the risk network access information stored in the wind control data center; and when the fact that the network access information of the free employee does not have risks is judged based on the risk network access information stored in the wind control data center, further judgment is conducted on the network access information of the free employee in combination with the steps S2221 to S2225. And carrying out risk judgment on the network access information of the free employees based on the risk network access information stored in the wind control data center, so that the data processing amount of the shared service platform can be reduced.
It can be understood that after the merchant accesses the shared service platform, the task can be issued through the shared service platform. Correspondingly, the service request in step S220 may be a task issuing request of the merchant, where the task issuing request includes a task to be issued. Specifically, the risk analysis of the business information according to a preset first wind control strategy comprises the following steps.
Step S2231: and performing risk analysis on the tasks to be issued according to sensitive word judgment rules and task quota rules in the wind control data center.
Specifically, the wind control data center also stores merchant quota and sensitive word stock. The shared service platform can judge whether the sensitive words in the sensitive word library exist in the task to be issued according to the sensitive word judgment rule; and judging whether the task to be issued exceeds the limit of the commercial tenant or not according to the task limit rule. The merchant quota may be a quota of the number of tasks issued by the merchant or a quota of commission corresponding to the tasks issued by the merchant.
If the shared service platform judges that the sensitive words in the sensitive word library exist in the task to be issued according to the sensitive word judgment rule or judges that the task to be issued exceeds the limit of the commercial tenant according to the task limit rule, judging that the task to be issued has risks, and entering step S2233; if the shared service platform judges that the sensitive words in the sensitive word library do not exist in the task to be issued according to the sensitive word judgment rule and judges that the task to be issued does not exceed the limit of the commercial tenant according to the task limit rule, it is judged that the task to be issued does not have risks, and the process enters step S2232.
Step S2232: and determining that the task to be issued has no risk, and then issuing the task on the shared service platform.
In specific implementation, the sharing service platform can share the task to the free-job operator in a two-dimensional code mode.
Step S2233: and determining that the task to be issued has risk, further rejecting a task issuing request of a merchant in the subsequent steps, marking the task to be issued as risk task information, and storing the risk task information to a wind control data center.
In a possible implementation manner, when the service request is a request for issuing a task by a merchant, the task to be issued by the merchant can be directly compared with risk task information stored in the wind-controlled data center, and if the task to be issued by the merchant is matched with the risk task information stored in the wind-controlled data center, it is determined that the task issued by the merchant has a risk; and if the to-be-issued task of the merchant is not matched with the risk task information stored in the wind control data center, executing the steps S2231 to S2233.
That is to say, in the embodiment of the application, whether a task to be issued by a merchant has a risk is judged based on risk task information stored in a wind control data center; and when the risk task information stored in the wind control data center is used for judging that the task to be issued of the merchant has no risk, the task to be issued of the merchant is further judged by combining the steps S2231 to S2233. And carrying out risk judgment on the to-be-issued task of the merchant based on the risk task information stored in the wind control data center can reduce the data processing amount of the shared service platform.
It can be understood that after the business issues the task on the shared service platform, the free-job operator can pick up the task on the shared service platform. Correspondingly, the service request in step S220 may be a task getting request of a free employee, where the task getting request includes a task to be got and an employment agreement signed between the free employee and a merchant corresponding to the task to be got. Specifically, the risk analysis of the business information according to a preset first wind control strategy comprises the following steps.
Step S2241: and judging whether the recruitment agreements signed between the free staff and the merchants corresponding to the tasks to be picked have risks or not according to the recruitment agreement risk checking rules.
In specific implementation, the free-job operator can obtain tasks on the shared service platform in a two-dimensional code scanning mode and sign an employment agreement. The shared service platform can carry out risk investigation on the employment agreement according to the set employment agreement risk investigation rule, and then judges whether risks exist.
Specifically, the wind control data center also stores risk terms. The shared service platform can judge whether risk terms stored in the wind control data center exist in the employment agreement or not according to the employment agreement risk investigation rule. If the shared service platform judges that the risk terms stored in the wind control data center exist in the employment agreement, judging that the employment agreement has risks, and entering the step S2242; and if the shared service platform judges that the risk terms stored in the wind control data center do not exist in the employment agreement, judging that the employment agreement does not have risks, and entering the step S2243. Step S2242: and determining that the task to be picked has risks, further rejecting a task picking request of the free staff in subsequent steps, marking the recruitment protocol as risk recruitment protocol information, and storing the risk recruitment protocol information to the wind control data center.
Step S2243: and determining that the task to be picked does not have risk, and allowing the free caretaker to pick the task to be picked in the subsequent step.
In a possible implementation manner, when the business request is a task getting request of a free employee, the employment agreement signed between the free employee and the merchant can be directly compared with the risk employment agreement information stored in the wind control data center, and if the employment agreement signed between the free employee and the merchant is matched with the risk employment agreement information stored in the wind control data center, the circumstance that the employment agreement signed between the free employee and the merchant has a risk is judged; and if the recruitment agreement signed between the free employee and the merchant is not matched with the risk recruitment agreement information stored in the wind control data center, executing the step S2241 to the step S2243.
That is to say, in the embodiment of the present application, it is first determined whether there is a risk in the employment agreement signed between the free professional and the merchant based on the risk employment agreement information stored in the wind control data center; and when judging that the recruitment agreement signed between the free employee and the merchant has no risk based on the risk recruitment agreement information stored in the wind control data center, further judging the recruitment agreement information signed between the free employee and the merchant by combining the steps S2241 and S2243. It can be understood that risk judgment of the employment agreement information signed between the free employee and the merchant based on the risk employment agreement information stored in the wind control data center can reduce the data processing amount of the shared service platform. It can be understood that the free-job operator needs to deliver the task to the merchant after picking up the task and completing the corresponding task. Accordingly, the service request in step S220 may be a task delivery request of the free-job operator, which includes the delivery content. Specifically, the risk analysis of the service information according to a preset first wind control strategy comprises the following steps.
Step S2251: and judging whether the delivered content has risks or not according to the delivered content risk judgment rule.
Specifically, the shared service platform may judge whether the delivery content has the sensitive word in the sensitive word bank according to the delivery content risk judgment rule. If the sensitive words in the sensitive word bank exist in the delivery content, judging that the delivery content has risks, rejecting a task delivery request of the free job owner in subsequent steps, marking the delivery content as risk delivery content information, and storing the risk delivery content information to a wind control data center; and if the delivery content is judged to have no sensitive words in the sensitive word bank, judging that the delivery content has no risk, and allowing the free-job operator to deliver the delivery content in the subsequent step.
In one possible implementation, when the business request is a mission delivery request of a free-job operator, the delivery content of the free-job operator can be directly compared with risk delivery content information stored in the wind-controlled data center. If the delivery content of the free job owner is matched with the risk delivery content information stored in the wind control data center, judging that the delivery content of the free job owner has risks; if the delivery content of the free-job dealer does not match the risk delivery content information stored in the wind control data center, the step S2251 is executed.
That is to say, in the embodiment of the present application, it is first determined whether there is a risk in the delivery content of the free-job dealer based on the risk delivery content information stored in the wind control data center; when it is determined that the delivery content of the free employee is not at risk based on the risk delivery content information stored in the wind-controlled data center, the delivery content of the merchant is further determined in combination with the step S2251. And carrying out risk judgment on the delivery content of the merchant based on the risk delivery content information stored in the wind control data center can reduce the data processing amount of the shared service platform.
It is understood that after the free caretaker delivers the task, the merchant confirms the delivery, and then the merchant can initiate a settlement request to the shared service platform. Accordingly, the service request in step S220 may be a settlement request of the merchant, and the settlement request includes settlement information. Specifically, the risk analysis of the service information according to a preset first wind control strategy comprises the following steps.
Step S2261: and judging whether the settlement information has risks according to the settlement information risk judgment rule.
In one possible implementation, the settlement information may include the identity information of the merchant, the identity information of the free-job provider (i.e., the identity information of both parties to the transaction), and the settlement amount. This judge whether there is a risk in settlement information according to settlement information risk judgment rule, specifically include: and carrying out identity verification on the merchant, carrying out identity verification on the free-job operator, and judging whether the settlement amount exceeds the limit of the merchant. If the merchant fails the identity authentication, or the free-standing trader fails the identity authentication, or the settlement amount exceeds the limit of the merchant, determining that the settlement information has a risk, further rejecting the settlement request of the merchant in the subsequent steps, marking the settlement information as risk settlement information, and storing the risk settlement information to the wind control data center; and determining that the merchant passes the identity authentication, the free occupational person passes the identity authentication, and the settlement amount exceeds the limit of the merchant, determining that the settlement information has no risk, and further completing settlement according to the settlement information in the subsequent steps.
In a possible implementation manner, when the service request is a settlement request of the merchant, the settlement information of the merchant may be directly compared with the risk settlement information stored in the wind-controlled data center. If the settlement information of the merchant is matched with the risk settlement information stored in the wind control data center, judging that the settlement information of the merchant has risks; if the settlement information of the merchant is not matched with the risk settlement information stored in the wind control data center, the step S2261 is executed again.
That is to say, in the embodiment of the present application, it is first determined whether the settlement information of the merchant is risky based on the risk settlement information stored in the wind control data center; and when the risk settlement information of the merchant is judged to have no risk based on the risk settlement information stored in the wind control data center, further judging the settlement information of the merchant by combining the step S2261. And risk judgment is carried out on the settlement information of the merchant based on the risk settlement information stored in the wind control data center, so that the data processing amount of the shared service platform can be reduced.
Step S230: and if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in the wind control data center.
Specifically, when the business request is a network access request of a merchant, if the network access information of the merchant is judged to have risks, the network access request of the merchant is rejected, the network access information of the merchant is marked as risk network access information, and the risk network access information is stored in a wind control data center. Specifically, key information in the risk networking information can be stored in the wind control data center. For example, the business license name, the legal identification number, the registration address, etc. of the merchant in the risk networking information may be used.
And when the business request is a network access request of the free employee, if the network access information of the free employee is judged to have risks, the network access request of the free employee is refused, the network access information of the free employee is marked as risk network access information, and the risk network access information is stored in the wind control data center. Specifically, key information in the network access information can be stored in the wind control data center. For example, the name, mobile phone number, identification card number, bank card number, etc. of the free-job operator in the network access information may be used.
And when the business request is a task issuing request of the merchant, if the task to be issued is judged to have risks, rejecting the task issuing request of the merchant, marking the task to be issued as risk task information, and storing the risk task information to the wind control data center. Specifically, the key information in the task to be published can be stored in the wind control data center. For example, the task name of the task to be issued, the identity information of the merchant corresponding to the task to be issued, and the like may be used.
And when the business request is a task getting request of the free employee, if the task to be got and the recruitment agreement signed between the free employee and the merchant corresponding to the task to be got are judged to have risks, rejecting the task getting request of the free employee, marking the recruitment agreement as risk recruitment agreement information, and storing the risk recruitment agreement information to the wind control data center. In particular, critical information in the labor agreement may be stored to the wind control data center. For example, the name of the agreement with the agreement, the identity information of the merchant and the free employee corresponding to the agreement with the agreement, and the like can be used.
And when the service request is a task delivery request of the free job provider, if the delivery content is judged to have risk, rejecting the task delivery request of the free job provider, marking the delivery content as risk delivery content information, and storing the risk delivery content information to the wind control data center. In particular, key information in the delivered content may be stored to a wind-controlled data center. For example, the name of the delivered content, the identity information of the free-job provider corresponding to the delivered content, and the like may be used.
And when the business request is a settlement request of the merchant, if the settlement information is judged to have risks, rejecting the settlement request of the merchant, marking the settlement information storage as the risk settlement information, and sending the risk settlement information to the wind control data center. Specifically, key information in the settlement information may be stored to the wind-controlled data center. For example, the transaction order number of the settlement information, the identity information of the merchant and the free employee corresponding to the settlement information, and the like can be used.
Step S240: and if the service information is judged to have no risk, performing corresponding service processing according to the service information.
Specifically, when the service request is a network access request of the merchant, if it is determined that the network access information of the merchant has no risk, the merchant is allowed to access the network and access the shared service platform.
And when the business request is a network access request of the free occupations, if the fact that the network access information of the free occupations does not have risks is judged, allowing the free occupations to access the network and accessing the shared service platform.
And when the business request is a task issuing request of the merchant, if the task to be issued is judged to have no risk, issuing the task to be issued on the shared service platform.
And when the business request is a task getting request of the free job owner, if the task to be got and the recruitment agreement signed between the free job owner and the merchant corresponding to the task to be got are judged to have no risk, allowing the free job owner to get the task to be got.
For example, when the business request is a task delivery request of the free-job provider, if it is determined that there is no risk in delivering the content, the free-job provider is allowed to deliver the delivered content.
And when the service request is a settlement request of the merchant, if the settlement information is judged to have no risk, the settlement is finished according to the settlement information.
Step S250: after the business processing is finished, risk analysis is carried out on the historical order information according to a preset second wind control strategy.
In the embodiment of the application, after the corresponding service processing is completed, post-event wind control tracking can be performed according to a second wind control strategy, that is, risk analysis is performed on historical order information, so that the risk coefficient of the completed transaction of the platform is reduced to the minimum.
For example, when a certain historical order is completed, it is confirmed that there is no risk in the historical order according to the determination rules from step S210 to step S240. However, over time, the risk level of the user corresponding to the historical order changes (the risk level of the merchant and/or the free-employee corresponding to the historical order increases), resulting in the historical order being at risk. Thus, by performing a rolling analysis of historical orders, the risk factor that the platform has completed a transaction may be minimized.
In one possible implementation, the historical order information may be historical order information associated with the business information. Here, the historical order information associated with the business information may be understood as "all historical order information of the merchant and the free-job operator associated with the business information".
In another possible implementation manner, the historical order information may be historical order information that meets a preset historical order screening rule. Specifically, the historical order screening rule may be a historical order screening rule triggered based on the behavior information of the user. For example, if the transaction volume of a certain merchant on the shared service platform increases steeply, the historical order information is all the historical order information associated with the two transaction parties; or, if a free-job operator issues for many months under the same merchant, the historical order information is all the historical order information associated with both parties of the transaction. The term "issue" as used herein refers to the fact that after the free occupations pick up the tasks on the platform, the free occupations complete the tasks and make delivery on the platform, and the merchants give the free occupations an order for completing settlement.
It can be understood that, in this step, the amount of data involved in the "risk analysis of historical order information" is larger than the "risk analysis of business information" in step S220 described above. If the amount of data of the wind control analysis is larger and the response time of the platform is longer, if the risk analysis is performed on the historical order information in step S220, the waiting time of the user may be too long, which may result in poor user experience. Therefore, only the business information is subjected to risk analysis in step S220. In addition, after the business processing is finished, the post-affair wind control tracking is carried out, so that the user experience is not influenced, and the risk coefficient of the finished transaction can be reduced to the maximum extent.
In one possible implementation, the second wind control policy may be a wind control rule stored in a wind control data center or a wind control rule customized by a wind control person. Specifically, the second wind control strategy may include: the trade company quota rule, the free job applicant age rule, the province limit rule, the free job applicant quota rule, the task quota rule, the trade company black and white list, the free job applicant black and white list, the risk level of both parties in the trade, the historical risk trade, etc. In one possible implementation, the order analysis is based on hadoop + kafka implementation. Specifically, kafka is used to send data from a data source to a data analysis module to pull data. And (4) data analysis is based on hadoop big data processing, and the risk orders are graded and stored in a wind control data center.
Step S260: and if the risk order is found in the associated information of the business information, processing the risk order, and storing the risk order to the wind control data center.
The risk order is processed, so that users related to the risk order can be further investigated and risk can be evaluated for wind control personnel, and the risk is not specifically limited in the embodiment of the application.
In the embodiment of the application, risk analysis is performed from the dimensions of the current business and the historical orders, wherein interface security verification and risk analysis of business information are performed on the current business, and the risk information is stored in a wind control data center to provide data support for subsequent risk analysis, so that a complete wind control system is formed, and transaction risk is reduced. In addition, risk analysis is carried out on the historical orders through wind control tracking, so that the risk coefficient of the historical orders is greatly reduced, and guarantee is provided for legal transaction compliance.
In some possible implementation manners, in order to improve accuracy and efficiency of the wind control judgment, the wind control judgment can be completed together by cooperation of a shared service platform and wind control personnel. The following description is made with reference to the accompanying drawings.
Referring to fig. 3, a schematic flow chart of another wind control method for a shared service platform according to an embodiment of the present application is provided. The method can be applied to the application scenario shown in fig. 1, as shown in fig. 3, which mainly includes the following steps.
Step S301: and the user sends a service request to the shared service platform.
Step S302: and the sharing service platform performs interface security verification on the service request.
Step S303: and if the service request passes the interface security verification, the shared service platform carries out risk analysis on the service information.
Step S304: the shared service platform judges whether the business information has risks, and if so, the step S305 is executed; if the determination result is negative, the process proceeds to step S310.
Step S305: the shared service platform judges whether the wind control personnel need to be notified according to the wind control personnel triggering rule, and if the judgment result is yes, the step S306 is executed; if the determination result is negative, the process proceeds to step S308.
In one possible implementation, the wind control personnel triggering rule may include a preset traffic type. In step S304, if it is determined that the service information has a risk, further determining whether the service type corresponding to the service information matches the preset service type in this step; if the service type corresponding to the service information is matched with the preset service type, judging that wind control personnel need to be notified; otherwise, judging that the wind control personnel do not need to be informed. In a specific implementation, the preset service type may be set as a more important service type, such as "settlement request". That is to say, for the more important service request, after the shared service platform judges that there is a risk, the wind control personnel further confirms that the accuracy of the judgment result can be improved. Step S306: and informing the wind control personnel.
Step S307: judging whether the business information has risks by wind control personnel, and if so, entering step S308 and step S309; if the determination result is negative, the process proceeds to step S310.
Step S308: the service request is rejected.
Step S309: and storing the risk information to a wind control data center.
Step S310: and if the risk does not exist, performing service processing.
Step S311: and after the business processing is finished, performing post-event wind control tracking.
Step S312: the shared service platform determines whether there is a risk, and if so, the process goes to step S313 and step S309.
Step S313: and informing the wind control personnel.
Step S314: and carrying out wind control treatment by wind control personnel.
In the embodiment of the application, the shared service platform firstly carries out preliminary judgment on the risk, and then the wind control personnel further confirms the risk, so that the accuracy and the efficiency of wind control judgment can be improved.
It should be noted that, in fig. 3, it is emphasized that the shared service platform and the wind control staff cooperate to complete the process of the wind control determination, and for details of a specific scheme in the implementation manner shown in fig. 3, reference may be made to the description of the implementation manner shown in fig. 2, and for brevity of description, details are not described here again.
Referring to fig. 4, a schematic flow chart of another wind control method for a shared service platform according to an embodiment of the present application is provided. As shown in fig. 4, the method further includes the following steps based on the implementation shown in fig. 2.
Step S410: evaluating the risk level of the merchant and/or the free-job operator to obtain the risk level of the merchant and/or the free-job operator;
step S420: the risk ratings of the merchant and/or the free-job officer are stored to a wind-controlled data center.
In a specific implementation, a scoring card algorithm may be used to score the merchant and/or the free-job trader, so as to determine the risk level of the merchant and/or the free-job trader. The scoring card algorithm is described in detail below with respect to the free-job operator as an example.
For ease of understanding, the following first illustrates the discretionary worker scoring card model, which is shown in Table one.
Table one:
Figure BDA0003670736540000151
wherein "single person" means a single free-employee. The score decision time variables for the free-job officer are as above: the single person continuously issues months in the same enterprise, and the single person issuing amount is larger than the historical maximum value. Then, the free-employee score is equal to the benchmark score + the month score continuously issued by a single person in the same business + the maximum historical score of the single person issued in a single month. In the scoring card algorithm, the score of each free-job operator is divided into a plurality of sub-modules, and the sum of the scores of the sub-modules and the benchmark score are added together to form the final score.
The following describes a process of generating a free career rating card model.
1. And (4) preparing data.
The data of the free occupational rating card model includes free occupational statistics.
2. And (6) carrying out box separation.
The binning algorithm is to discretize each field according to different modes. There are many modes of binning, including supervised and unsupervised modes.
Supervision and box separation are carried out: and finding out the large segmentation points of the IV by training a binary tree model to realize box separation.
Unsupervised binning: and performing box separation by using equal-frequency and equal-distance modes.
The binning results from binning need to be evaluated and binning is continuously adjusted. The evaluation is to calculate the WOE and IV indicators. The WOE is calculated as shown in equation one.
The formula I is as follows:
Figure BDA0003670736540000161
WOE refers to the ratio of the group of low-risk users to all low-risk users, and WOE can also be understood as the ratio of low-risk users to high-risk users in the current bin, and the difference of this ratio in all samples (i.e. the ratio of our random low-risk users to high-risk users). The larger the WOE, the greater the difference, the greater the likelihood of a high-risk user in the current group, and the smaller the WOE, the smaller the difference, the less likely the sample in this group will respond. When the ratio of high-risk users to low-risk users in the bin is equal to the ratio of random high-risk users to random low-risk users, it is indicated that the bin has no prediction capability, i.e. WOE is 0.
The value of WOE ultimately affects the value of IV, which is calculated as shown in equation two.
The formula II is as follows:
Figure BDA0003670736540000162
the larger the value of IV, the more important the binning mode is in predicting the result, so the purpose of binning is to raise the IV value of each group of binned results as much as possible.
3. And (4) a scoring algorithm.
The scoring algorithm is actually a logistic regression model, and as the logistic regression model has the advantages of simplicity, stability, strong interpretability, mature technology, easiness in detection and deployment and the like, the system selects the logistic regression algorithm, weights the model coefficients and the corresponding boxed WOE values, and the scoring algorithm is shown as a formula III.
The formula III is as follows:
Score=A-B(θ 01 x 1 +…+θ n x n )
wherein, the variable x i Is the in-mold variable that appears in the final model. Since all of the in-mode variables are WOE encoded, each variable can be written (θ) i ω ijij The form of equation three is transformed into equation four.
The formula four is as follows:
Figure BDA0003670736540000171
finally, the free career score card model is obtained and is shown in the table II.
Table two:
Figure BDA0003670736540000172
wherein, A-B theta 0 Is a reference point, θ i Coefficient of the i-th variable in the logical regression, ω ij Value of the j-th binned WOE for the ith variable, δ ij Is a 0, 1 logical variable, when delta ij Taking the jth sub-box as 1 for the argument i, when delta ij 0 means that the argument i is not taken for the jth bin. And finally obtaining the free occupational scoring card model.
And scoring the free caregivers according to the free caregivers scoring card model so as to determine the risk level of the free caregivers. Based on the same principle, a merchant scoring card model can be obtained, and merchants can be scored according to the merchant scoring card model, so that the risk level of the merchants is determined.
In the embodiment of the application, the merchant and/or the free-employee can be scored according to a scoring card algorithm, and the scores of the merchant and/or the free-employee are stored in the wind control data center, so that data support is provided for wind control judgment of the platform.
In the embodiment of the present application, the data sources of the wind-controlled data center mainly include: merchant/discretionary behavior data, transaction data, third party shared data, and offline data import.
Wherein, the data that wind accuse data center stored mainly includes: third party authentication information, compliance information, risk information, behavior information, wind control information, and the like.
And the third-party identity authentication information is used for performing identity authentication on the merchant and/or the free occupation.
Compliance information for compliance verification of the merchant and/or the freelance. For example, the compliance information may include business nature of the merchant, credit rating, legal credit, risk rating, merchant black and white list, etc.; age of free job, historical service orders, risk rating, free job black and white list, etc.
And the risk information is the risk information exhausted in the wind control process. For example, the risk information may include risk networking information, risk mission information, risk employment agreement family information, risk delivery content information, risk settlement information, risk order information, and the like.
And the behavior information is statistical behavior data of the merchants and/or the free-job owners on the shared service platform.
And the wind control information is wind control data of wind control personnel based on laws and regulations and personal research and maintenance systems, and comprises merchant quota, free occupational person quota, sensitive word stock, risk terms and the like.
In addition, in order to facilitate the use of data, the wind control data center needs to perform corresponding data preprocessing after acquiring the data. The method specifically comprises the following data processing modes.
And (3) data correctness checking: and checking whether the data id is repeated, whether the field type is in compliance, and the like.
And (3) data quality assurance: for outlier analysis in the data, the 3s igma principle can be used.
Repeated value processing: for data meeting the requirements, for example, multiple orders placed by the same enterprise id are reasonable and can be directly placed; and deleting one piece of data which does not meet the requirement, such as order id and order state.
And (3) processing null values in the data: according to different strategy selections, the method can comprise the following steps:
1) directly deleting, for example, key field information in order data, such as trade first party id and trade second party id are missing, and such data can be meaningless to judge and can be directly deleted; for another example, if the missing amount of a field is too large, the data is discarded directly, otherwise, a large amount of noise may be brought in, and the result is adversely affected.
2) And (4) mean filling, for example, in the case that the transaction amount in the order is lost, searching all the same party A id, the same party B id and the order in the same recruitment category, calculating the mean value, and filling the null value.
And carrying out identity normalization processing on the cleaning data according to the user identification in the cleaning data to obtain a user data set with the same user identification.
And adding service theme labels to the user data in the user data set according to the type of the wind control service, such as label personal qualification, personal transaction and personal quota waiting.
And providing a data support interface according to the data characteristics required by different services.
Corresponding to the embodiment, the application further provides the electronic equipment. It is understood that the electronic device may be the server shown in fig. 1.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. As shown in fig. 5, the electronic device 500 may include: a processor 510, a memory 520, and a communication unit 530. The components communicate over one or more buses, and those skilled in the art will appreciate that the configuration of the servers shown in the figures are not meant to limit embodiments of the present invention, and may be in the form of buses, stars, more or fewer components than those shown, some components in combination, or a different arrangement of components.
The communication unit 530 is configured to establish a communication channel so that the storage device can communicate with other devices. Receiving the user data sent by other devices or sending the user data to other devices.
The processor 510, which is a control center of the storage device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and/or processes data by operating or executing software programs and/or modules stored in the memory 520 and calling data stored in the memory. The processor may be composed of Integrated Circuits (ICs), for example, a single packaged IC, or a plurality of packaged ICs connected to the same or different functions. For example, processor 510 may include only a Central Processing Unit (CPU). In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
The memory 520 may be implemented by any type of volatile or non-volatile storage device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The execution instructions in the memory 520, when executed by the processor 510, enable the electronic device 500 to perform some or all of the steps in the above-described method embodiments.
In a specific implementation, the present invention further provides a computer storage medium, where the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments of the calling method provided by the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, as for the device embodiment and the terminal embodiment, since they are basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the terminal embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
The above-described embodiments of the present application do not limit the scope of the present application.

Claims (12)

1. A wind control method for sharing a service platform is characterized by comprising the following steps:
responding to a service request of a user, and performing interface security verification on the service request, wherein the service request comprises service information, and the user is a merchant and/or a free-job operator of the shared service platform;
if the service request passes the interface security verification, performing risk analysis on the service information according to a preset first wind control strategy;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information;
after the business processing is finished, carrying out risk analysis on historical order information according to a preset second wind control strategy;
and if a risk order is found in the historical order information, processing the risk order, and storing the risk order to the wind control data center.
2. The method of claim 1, wherein if it is determined that the service information is at risk, rejecting the service request, marking the service information as risk information, and storing the risk information in a wind control data center comprises:
if the business information is judged to have risks, judging whether wind control personnel need to be notified or not according to a wind control personnel triggering rule;
if the wind control personnel do not need to be notified, the service request is rejected, the service information is marked as risk information, and the risk information is stored in a wind control data center;
if the wind control personnel need to be notified, the wind control personnel are notified, and the wind control personnel judge whether the business information has risks;
if the wind control personnel judge that the business information has risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in the wind control data center;
and if the wind control personnel judge that the service information has no risk, performing corresponding service processing according to the service information.
3. The method of claim 1, further comprising:
evaluating the risk level of the merchant and/or the free-job operator to obtain the risk level of the merchant and/or the free-job operator;
storing the risk level of the merchant and/or the free-employee to the wind-controlled data center.
4. The method according to claim 3, wherein the assessing the risk level of the merchant and/or the free-employee to obtain the risk level of the merchant and/or the free-employee comprises:
and evaluating the risk level of the merchant and/or the free-job operator through a scoring card algorithm to obtain the risk level of the merchant and/or the free-job operator.
5. The method according to claim 1, wherein the business request of the user includes a network access request of the merchant and/or the free employee, the network access request of the merchant and/or the free employee includes network access information of the merchant and/or the free employee, and the performing risk analysis on the business information according to a preset first wind control policy includes:
performing identity authentication on the merchant and/or the free-job dealer according to third-party identity authentication information in the wind control data center;
if the merchant and/or the free-job provider do not pass the identity authentication, judging that the network access information of the merchant and/or the free-job provider has a risk;
if the merchant and/or the free employee passes the identity verification, performing compliance verification on the merchant and/or the free employee according to compliance information of the merchant and/or the free employee stored in the wind control data center;
if the merchant and/or the free-job dealer fail to pass the compliance verification, judging that the networking information of the merchant and/or the free-job dealer has risks;
if the merchant and/or the free-job dealer pass the compliance verification, judging that the network access information of the merchant and/or the free-job dealer has no risk;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the network access information of the merchant and/or the free employee is judged to have risks, rejecting the network access request of the merchant and/or the free employee, marking the network access information of the merchant and/or the free employee as risk network access information, and storing the risk network access information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the network access information of the merchant and/or the free occupational person is judged to have no risk, allowing the merchant and/or the free occupational person to access the network and accessing the shared service platform.
6. The method according to claim 5, wherein the service request of the user includes a task issuing request of the merchant, the task issuing request includes a task to be issued, and the performing risk analysis on the service information according to a preset first wind control policy includes:
performing risk analysis on the task to be issued according to a sensitive word judgment rule and a task quota rule in the wind control data center;
if the sensitive words are judged not to exist in the task to be issued according to the sensitive word judgment rule, and the task to be issued is judged not to exceed the task quota according to the task quota rule, determining that the task to be issued does not have risks;
if the sensitive words exist in the tasks to be issued according to the sensitive word judgment rule or the tasks to be issued exceed the task quota according to the task quota rule, determining that the tasks to be issued have risks;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the task to be issued is judged to have risks, rejecting the task issuing request of the merchant, marking the task to be issued as risk task information, and storing the risk task information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the task to be issued is judged to have no risk, the task to be issued is issued on the shared service platform.
7. The method according to claim 6, wherein the business request of the user includes a task getting request of the free employee, the task getting request includes a task to be got and an employment agreement signed between the free employee and a merchant corresponding to the task to be got, and the risk analysis of the business information according to a preset first wind control policy includes:
judging whether the recruitment agreements signed between the free staff and the merchants corresponding to the tasks to be picked have risks or not according to the recruitment agreement risk checking rules;
if the risk exists in the recruitment agreement signed between the free employee and the merchant corresponding to the task to be picked up, determining that the task to be picked up has the risk;
if the fact that the risk does not exist in the recruitment agreement signed between the free employee and the merchant corresponding to the task to be picked up is judged, it is determined that the risk does not exist in the task to be picked up;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the task to be picked up is judged to have risks, rejecting a task picking request of the free staff, marking the recruitment protocol as risk recruitment protocol information, and storing the risk recruitment protocol information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the task to be picked up is judged to have no risk, allowing the free caretaker to pick up the task to be picked up.
8. The method according to claim 7, wherein the business request of the user comprises a task delivery request of the free-job provider, the task delivery request comprises delivery content, and the risk analysis of the business information according to a preset first wind control policy comprises:
judging whether the delivered content has risks or not according to a delivered content risk judgment rule;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the delivery content is judged to have risks, rejecting a task delivery request of the free job dealer, marking the delivery content as risk delivery content information, and storing the risk delivery content information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the delivery content is judged to have no risk, allowing the free occupational to deliver the delivery content.
9. The method according to claim 8, wherein the service request of the user includes a settlement request of the merchant, the settlement request includes settlement information, and the performing risk analysis on the service information according to a preset first wind control policy includes:
judging whether the settlement information has risks according to a settlement information risk judgment rule;
if the business information is judged to have risks, the business request is rejected, the business information is marked as risk information, and the risk information is stored in a wind control data center, wherein the steps of: if the settlement information is judged to have risks, rejecting the settlement request of the merchant, marking the settlement information as risk settlement information, and storing the risk settlement information to the wind control data center;
if the service information is judged to have no risk, corresponding service processing is carried out according to the service information, and the method comprises the following steps: and if the settlement information is judged to have no risk, the settlement is finished according to the settlement information.
10. The method of claim 1, wherein the historical order information is historical order information associated with the business information; or, the historical order information accords with the preset historical order screening rule.
11. An electronic device, comprising:
a processor;
a memory;
and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed by the electronic device, cause the electronic device to perform the method of any of claims 1 to 10.
12. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method of any one of claims 1 to 10.
CN202210604331.0A 2022-05-31 2022-05-31 Wind control method for sharing service platform, electronic equipment and storage medium Pending CN114862396A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210604331.0A CN114862396A (en) 2022-05-31 2022-05-31 Wind control method for sharing service platform, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210604331.0A CN114862396A (en) 2022-05-31 2022-05-31 Wind control method for sharing service platform, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114862396A true CN114862396A (en) 2022-08-05

Family

ID=82641644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210604331.0A Pending CN114862396A (en) 2022-05-31 2022-05-31 Wind control method for sharing service platform, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114862396A (en)

Similar Documents

Publication Publication Date Title
US11710055B2 (en) Processing machine learning attributes
US20220038446A1 (en) Identity Proofing and Portability on Blockchain
US20180097790A1 (en) Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph
US20170331828A1 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
CN110264288A (en) Data processing method and relevant apparatus based on information discriminating technology
US10609087B2 (en) Systems and methods for generation and selection of access rules
CN105593867A (en) Method for evaluating document
CN112532392B (en) Key processing method, device, equipment and storage medium
CN111709603A (en) Service request processing method, device and system based on wind control
US20210351927A1 (en) System, method and computer program product for mitigating customer onboarding risk
CN110264222A (en) Responsible investigation method, apparatus and terminal device based on data acquisition
CA3148430A1 (en) Safe logon
CN111899100A (en) Service control method, device and equipment and computer storage medium
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN111476640A (en) Authentication method, system, storage medium and big data authentication platform
CN112702410B (en) Evaluation system, method and related equipment based on blockchain network
CN111047146B (en) Risk identification method, device and equipment for enterprise users
CN108573004A (en) Based on insurance business information processing method and device
JP7176158B1 (en) LEARNING MODEL EVALUATION SYSTEM, LEARNING MODEL EVALUATION METHOD, AND PROGRAM
CN115577983A (en) Enterprise task matching method based on block chain, server and storage medium
CN114862396A (en) Wind control method for sharing service platform, electronic equipment and storage medium
CN114358543A (en) Information processing method and device
CN105427143B (en) Method and device for carrying out system security control
CN113190200A (en) Exhibition data security protection method and device
CN116611093B (en) Method and equipment for authorizing use of database resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination