Disclosure of Invention
Therefore, the invention provides the work order intelligent generation system based on the cloud platform, which can solve the problem that a large number of invalid work orders are processed by service end personnel.
In order to achieve the above object, the present invention provides a work order intelligent generation system based on a cloud platform, comprising:
the interaction unit comprises an information acquisition module used for acquiring work order information input by a user, an information verification module connected with the information acquisition module and used for judging whether input information of each definition item of the user is compliant according to intersection of a preset illegal character element set and input character sets of each definition item, and a manual verification module connected with the information verification module and used for manually judging the input information of the user definition item transmitted by the information verification module;
the work order making unit comprises a simulation work order making module which is connected with the information checking module and used for generating a simulation work order according to the work order information transmitted by the information checking module so as to enable a user to confirm the work order information, and a work order generating module which is connected with the transaction unit and used for generating the work order according to the simulation work order information confirmed by the user when the user finishes payment within the payment time limit and respectively transmitting the work order to the user and the server;
The safety management unit comprises a transaction safety management module which is connected with the simulated work order making module and used for judging whether the current network environment safety of the user is detected according to the transaction amount of the simulated work order, a network environment safety detection module which is connected with the transaction safety management module and used for judging whether the current network environment of the user is safe according to the network environment risk value, and an abnormal behavior monitoring module which is connected with the data storage unit and used for judging whether the user has abnormal behaviors according to the number of the simulated work orders of the user on the same day and the total transaction amount stored by the data storage unit;
the transaction unit is respectively connected with the transaction safety management module and the network environment safety detection module and is used for judging whether to generate a work order according to whether a user finishes payment within a user payment time limit;
the data storage unit is respectively connected with the transaction unit, the network environment safety detection module and the simulated work order making module and is used for recording and storing the simulated work order of which the user does not finish paying.
Further, the information verification module presets an offending character element set as A, and judges whether the input information of the ith custom item is compliant according to the intersection of the offending character element A and the input character set Bi of the ith custom item, wherein,
If it isThe information verification module judges the compliance of the input information of the ith user-defined item;
if it isThe information verification module carries out secondary judgment on whether the input information of the ith custom item is compliant according to the proportion of the illegal characters in the input character set Bi of the ith custom item to the total characters in the set Bi;
wherein i=1, 2, …, n, n is the number of custom items of work order information entered by the user.
Further, the information verification module presets a first threshold value of the violation character ratio as v1, presets a second threshold value of the violation character ratio as v2, and judges whether the input information of the ith custom item is compliant or not according to the proportion v of the violation character in the input character set Bi of the ith custom item to the total characters in the set Bi, wherein,
if v is smaller than v1, the information verification module judges the input information compliance of the ith user-defined item;
if v1 is less than or equal to v2, the information verification module transmits the input information of the ith user-defined item to the manual auditing module;
if v is more than or equal to v2, the information verification module judges that the input information of the ith user-defined item is illegal, and the information input interface prompts a user to modify the input information of the ith user-defined item.
Further, when the information verification module transmits the input information of the ith user-defined item to the manual auditing module, the information verification module measures the judging time length of the manual auditing module, and judges whether the input information of the ith user-defined item is in compliance or not according to the judging result of the manual auditing module and the judging time length of the manual auditing module,
If the judging time length of the manual auditing module is lower than the preset manual auditing time length limit value and the judging result of the manual auditing module is compliance, the information checking module judges that the input information of the ith user-defined item is compliance;
if the judging duration of the manual auditing module is higher than the preset manual auditing duration limit value, the information checking module judges that the input information of the ith user-defined item is compliant, and the information checking module cancels the judgment of the manual auditing module on the current input information of the ith user-defined item;
and if the judging time length of the manual auditing module is lower than the preset manual auditing time length limit value and the judging result of the manual auditing module is illegal, the information checking module judges that the input information of the ith user-defined item is illegal.
Further, the transaction safety management module obtains the transaction amount M of the simulated work order according to the information of the simulated work order, and the transaction safety management module judges whether to detect the safety of the current network environment of the user according to the transaction amount M of the simulated work order, wherein,
if M is less than or equal to M1, the transaction security management module judges that the security of the current network environment of the user is not detected, and the user jumps to the transaction unit;
If M is more than M1, the transaction security management module sends a user privacy service protocol to the user, wherein the user privacy service protocol comprises a confidentiality risk level quantification value, an integrity risk level quantification value and an availability risk level quantification value of the user at the current IP address, when the user privacy service protocol passes, the network environment security detection module detects the network environment risk of the user at the current IP address, and when the user privacy service protocol does not pass, the user jumps to the transaction unit;
and M1 is a first standard value of transaction amount preset by the transaction security management module.
Further, the network environment security detection module obtains a confidentiality risk level quantized value Na, an integrity risk level quantized value Nb and an availability risk level quantized value Nc of a user at a current IP address, presets confidentiality weight Wa, preset integrity weight Wb, preset availability weight Wc, sets a network environment risk value R=WaxNa+Wb xNb+wc x Nc, and adjusts the confidentiality weight Wa according to a transaction amount M of a simulation work order,
If M1 < M2, the network environment security detection module adjusts the confidentiality weight Wa to Wa 'so that Wa' = [1+ (M-M1) × (M2-M1)/(M1×M2)] 0.5 ×Wa;
If M is more than or equal to M2, the network environment security detection module adjusts confidentiality weight Wa to Wa ', so that Wa' = [1+ (M-M2)/M ]. Times.Wa;
and M2 is a second standard value of the transaction amount preset by the transaction security management module.
Further, the network environment security detection module presets a maximum threshold value of the network environment risk value as R0, and judges whether the current network environment of the user is safe or not according to a comparison result of the network environment risk value R and the maximum threshold value of the network environment risk value R0,
if R is less than R0, the network environment safety detection module judges that the current network environment is safe, and the user jumps to the traffic unit;
if R is more than or equal to R0, the network environment safety detection module judges that the current network environment has risks, the network environment safety detection module prompts the network environment risks for the user, and the data storage unit records and stores the simulation work order confirmed by the user when the transaction is interrupted.
Further, the transaction unit presets a user payment time limit value tu, and adjusts the user payment time limit value tu according to the transaction amount M of the simulated work order, wherein,
If M < M1, the transaction unit does not adjust the user payment time limit, and the transaction unit sets a user payment time limit tu1=tu;
if M1 is less than or equal to M2, the transaction unit adjusts the user payment time limit tu to tu2, so that tu2=min { [1+ (M2-M1)/M ] × [1+ (M-M1)/M ] ×tu,2×tu };
if M > M2, the transaction unit adjusts the user payment time limit tu to tu3 such that tu3=min { tu×M/M2,5×tu }.
Further, the transaction unit starts timing from the user entering the transaction unit, and the work order generation module determines whether to generate a work order according to whether the user has completed payment within the user payment time limit tux, x=1, 2,3,
if tq is less than or equal to tux, the work order generation module generates a work order according to the simulation work order information confirmed by the user and sends the generated work order to the user and the server respectively;
if tq is more than tux, the work order generation module judges that the work order is not generated, and the data storage unit records and stores the simulated work order confirmed by the user;
where tq is the time that the user spends from entering the transaction unit to the payment completion.
Further, the abnormal behavior monitoring module obtains the user current day simulated work order quantity K stored in the data storage unit, obtains the total transaction amount Q of the user current day simulated work order stored in the data storage unit, and judges whether the user has abnormal behaviors according to the user current day simulated work order quantity K and the total transaction amount Q stored in the data storage unit, wherein,
If K is less than K1, the abnormal behavior monitoring module judges that the user does not have abnormal behaviors;
if K1 is more than or equal to K2 and (K/K1) x (Q/Q0) is less than 1, the abnormal behavior monitoring module judges that abnormal behaviors exist in the user, takes the simulated work order storage time closest to the current time as a time starting point, and judges that the user cannot use the work order intelligent generation system in T0;
if K1 is not less than K2 and not less than K1 and (K/K1) x (Q/Q0) is not less than 1, the abnormal behavior monitoring module judges that the user does not have abnormal behavior;
if K is more than K2, the abnormal behavior monitoring module judges that abnormal behaviors exist in the user, and takes the simulated work order storage time closest to the current time as a time starting point, and the abnormal behavior monitoring module judges that the user cannot use the work order intelligent generation system in T0;
wherein, K1 is a first threshold value of the number of the user daily analog worksheets stored in the data storage unit preset by the abnormal behavior monitoring module, K2 is a second threshold value of the number of the user daily analog worksheets stored in the data storage unit preset by the abnormal behavior monitoring module, Q0 is a total transaction amount limit value of the user daily analog worksheets stored in the data storage unit preset by the abnormal behavior monitoring module, and T0 is a system locking time of the abnormal behavior user preset by the abnormal behavior monitoring module.
Compared with the prior art, the invention has the beneficial effects that the information verification module can be arranged to judge the violations of the custom item work order information input by the user, reduce the processing amount of the invalid work order by the server, avoid the malicious attack to the server through the custom item information to a certain extent, realize the purification of the transaction environment, and detect the current transaction environment of the user on the premise that the transaction amount is large and the user agrees to the privacy service agreement so as to carry out risk reminding on the current transaction environment of the user.
Particularly, the invention divides the input information of the custom item into three types by setting the first threshold value of the ratio of the illegal characters and the second threshold value of the ratio of the illegal characters, when the ratio of the illegal characters is extremely small, the system can judge that the system misjudges single character or a plurality of characters, when the ratio of the illegal characters is relatively large, the information checking module can judge that the input information of the custom item is illegal, the processing capacity of a service end personnel on an invalid work order is reduced, and when the ratio of the illegal characters is greater than or equal to the first threshold value of the ratio of the illegal characters and is smaller than the second threshold value of the ratio of the illegal characters, the manual checking module can carry out secondary judgment on the input information of the custom item, and the system misjudgment can be avoided.
In particular, in order to avoid the situation that the manual auditing module cannot audit the input information of the custom item to be judged in time due to the fact that an auditing person is not on duty, the invention sets the manual auditing time limit value to prescribe the manual auditing time, so that the time consumed by a user on the system can be reduced, the use experience of the user can be improved, meanwhile, the efficiency of generating a work order can also be improved, and when the judging time of the manual auditing module exceeds the manual auditing time limit value, the judgment of the manual auditing module on the current input information of the custom item is canceled, and the invalid auditing of the auditing person can be avoided.
In particular, the invention judges whether to inquire whether the user agrees to detect the safety of the current network environment according to the transaction amount of the simulation work order confirmed by the user, can provide the user with a function option for confirming whether the current network environment is safe or not when the transaction amount is large, detects the safety of the network environment of the user as an unnecessary option, can respect the willingness of the user, ensures the network privacy of the user and improves the use experience of the user on the system.
In particular, the invention presets the initial values of confidentiality weight, integrity weight and availability weight, adjusts the confidentiality weight according to the transaction amount of the simulated work order, and the higher the transaction amount is, the higher the confidentiality weight is, the larger the amplification factor of the calculation result of the network environment risk value is, so that the judgment rule of the network environment safety according to different transaction amounts can be changed, the transaction risk prompt of the user is more in line with the current transaction condition, and the risk prompt is more referential to the user.
In particular, the invention limits the payment time of the user according to the transaction amount of the simulated work order, when the transaction amount is large, the user payment time limit value is properly increased, so that more abundant time can be provided for the fund transfer of the user, and meanwhile, the situation that too many users stay in the transaction unit at the same time to cause the breakdown of the server of the transaction unit can be avoided by setting the user payment time limit value.
In particular, the invention judges whether the user has abnormal behavior according to the number of the user daily simulated worksheets and the total transaction amount stored by the data storage unit, can avoid the server from being crashed caused by malicious worksheets, and realizes the protection of the system by limiting the use time of the user on the system when the number of the user daily simulated worksheets is extremely large and the total transaction amount of the user daily simulated worksheets is smaller.
Detailed Description
In order that the objects and advantages of the invention will become more apparent, the invention will be further described with reference to the following examples; it should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are merely for explaining the technical principles of the present invention, and are not intended to limit the scope of the present invention.
It should be noted that, in the description of the present invention, terms such as "upper," "lower," "left," "right," "inner," "outer," and the like indicate directions or positional relationships based on the directions or positional relationships shown in the drawings, which are merely for convenience of description, and do not indicate or imply that the apparatus or elements must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, it should be noted that, in the description of the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those skilled in the art according to the specific circumstances.
Referring to fig. 1 and 2, fig. 1 is a schematic diagram of a work order intelligent generation system architecture based on a cloud platform according to an embodiment of the present invention, and fig. 2 is a schematic diagram of a work order intelligent generation system disassembly based on a cloud platform according to an embodiment of the present invention, where the work order intelligent generation system includes:
the interaction unit comprises an information acquisition module used for acquiring work order information input by a user, an information verification module connected with the information acquisition module and used for judging whether input information of each definition item of the user is compliant according to intersection of a preset illegal character element set and input character sets of each definition item, and a manual verification module connected with the information verification module and used for manually judging the input information of the user definition item transmitted by the information verification module;
the work order making unit comprises a simulation work order making module which is connected with the information checking module and used for generating a simulation work order according to the work order information transmitted by the information checking module so as to enable a user to confirm the work order information, and a work order generating module which is connected with the transaction unit and used for generating the work order according to the simulation work order information confirmed by the user when the user finishes payment within the payment time limit and respectively transmitting the work order to the user and the server;
The safety management unit comprises a transaction safety management module which is connected with the simulated work order making module and used for judging whether the current network environment safety of the user is detected according to the transaction amount of the simulated work order, a network environment safety detection module which is connected with the transaction safety management module and used for judging whether the current network environment of the user is safe according to the network environment risk value, and an abnormal behavior monitoring module which is connected with the data storage unit and used for judging whether the user has abnormal behaviors according to the number of the simulated work orders of the user on the same day and the total transaction amount stored by the data storage unit;
the transaction unit is respectively connected with the transaction safety management module and the network environment safety detection module and is used for judging whether to generate a work order according to whether a user finishes payment within a user payment time limit;
the data storage unit is respectively connected with the transaction unit, the network environment safety detection module and the simulated work order making module and is used for recording and storing the simulated work order of which the user does not finish paying.
Specifically, the invention sets up the information check module, can carry on the rule breaking judgement to the user-defined item work order information that the user inputs, can reduce the handling capacity of the invalid work order of the server, and can avoid the malicious attack to the server through the user-defined item information to a certain extent, realize the purification to the trade environment, the invention sets up the network environment security detection module, can detect the present trade environment of user under the precondition that the trade amount is great and users agree to the privacy service agreement, in order to carry on the risk warning to the present trade environment of user, the invention can store the work order information that the user of trade is suspended through setting up the data storage unit, can ensure that the user does not need to repeatedly input work order information when using the said system again, the invention sets up the unusual behavior monitoring module, can judge whether the user has unusual behavior according to the work order quantity and work order total amount that all trade were suspended of user's trade of the present day, in order to avoid attacking or maliciously swiping the system of the said system.
Referring to fig. 3, which is a schematic diagram of working logic of an interaction unit of a work order intelligent generation system based on a cloud platform according to an embodiment of the present invention, when the information acquisition module acquires that no shortage exists in work order information entered by a user, the information verification module performs information verification on a user-defined item of work order information entered by the user, the information verification module presets a set of offending character elements as a, and the information verification module determines whether the entered information of the ith user-defined item is compliant according to an intersection of the offending character elements a and an entered character set Bi of the ith user-defined item,
if it isThe information verification module judges the compliance of the input information of the ith user-defined item;
if it isThe information verification module carries out secondary judgment on whether the input information of the ith custom item is compliant according to the proportion of the illegal characters in the input character set Bi of the ith custom item to the total characters in the set Bi;
wherein i=1, 2, …, n, n is the number of custom items of work order information entered by the user.
With continued reference to fig. 3, when the intersection of the set Ai and the set Bi is a non-empty set, the information verification module presets a first threshold v1 for the offending character and a second threshold v2 for the offending character, and the information verification module performs secondary determination on whether the input information of the ith custom item is compliant according to the proportion v of the offending character in the total characters in the set Bi in the input character set Bi of the ith custom item,
If v is smaller than v1, the information verification module judges the input information compliance of the ith user-defined item;
if v1 is less than or equal to v2, the information verification module transmits the input information of the ith user-defined item to the manual auditing module;
if v is more than or equal to v2, the information verification module judges that the input information of the ith user-defined item is illegal, and the information input interface prompts a user to modify the input information of the ith user-defined item.
Specifically, the first threshold value of the offending character and the second threshold value of the offending character are not limited in this embodiment, but the first threshold value v1=3% of the offending character is preferable, and the second threshold value v2=12% of the offending character is preferable.
Specifically, the method divides the input information of the custom item into three types by setting the first threshold value of the ratio of the illegal characters and the second threshold value of the ratio of the illegal characters, when the ratio of the illegal characters is extremely small, the system can judge that the system misjudges single characters or a plurality of characters, when the ratio of the illegal characters is relatively large, the information checking module can judge that the input information of the custom item is illegal, the processing capacity of a service end personnel on an invalid work order is reduced, and when the ratio of the illegal characters is greater than or equal to the first threshold value of the ratio of the illegal characters and smaller than the second threshold value of the ratio of the illegal characters, the manual checking module can carry out secondary judgment on the input information of the custom item, and the system misjudgment can be avoided.
With continued reference to fig. 3, when the information verification module transmits the input information of the ith user-defined item to the manual review module, the information verification module measures the determination time length of the manual review module, and determines whether the input information of the ith user-defined item is compliant according to the determination result of the manual review module and the determination time length of the manual review module,
if the judging time length of the manual auditing module is lower than the preset manual auditing time length limit value and the judging result of the manual auditing module is compliance, the information checking module judges that the input information of the ith user-defined item is compliance;
if the judging duration of the manual auditing module is higher than the preset manual auditing duration limit value, the information checking module judges that the input information of the ith user-defined item is compliant, and the information checking module cancels the judgment of the manual auditing module on the current input information of the ith user-defined item;
and if the judging time length of the manual auditing module is lower than the preset manual auditing time length limit value and the judging result of the manual auditing module is illegal, the information checking module judges that the input information of the ith user-defined item is illegal.
Specifically, the manual auditing duration limit is not limited, the maximum character number of the custom item entry information is set to 120 words in the embodiment, and the manual auditing duration limit tp0 = 12s is preferred.
Specifically, in order to avoid the situation that the manual auditing module cannot audit the input information of the custom item to be judged in time due to the fact that an auditing person is not on duty, the invention sets the manual auditing time limit value to prescribe the manual auditing time, so that the time consumed by a user on the system can be reduced, the use experience of the user can be improved, meanwhile, the efficiency of generating a work order can also be improved, and when the judging time of the manual auditing module exceeds the manual auditing time limit value, the judgment of the manual auditing module on the current input information of the custom item is canceled, and the invalid auditing of the auditing person can be avoided.
Referring to fig. 4, which is a schematic diagram of a workflow diagram of a cloud platform-based intelligent work order generation system, a transaction unit and a work order making unit according to an embodiment of the present invention, when the information verification module determines that the input information of all the custom items is in compliance, the simulation work order making module generates a simulation work order according to the work order information transmitted by the information verification module and sends the simulation work order to a user, when the user confirms the simulation work order, the transaction safety management module obtains the transaction amount M of the simulation work order according to the information of the simulation work order, and the transaction safety management module determines whether to detect the security of the current network environment of the user according to the transaction amount M of the simulation work order,
If M is less than or equal to M1, the transaction security management module judges that the security of the current network environment of the user is not detected, and the user jumps to the transaction unit;
if M is more than M1, the transaction security management module sends a user privacy service protocol to the user, wherein the user privacy service protocol comprises a confidentiality risk level quantification value, an integrity risk level quantification value and an availability risk level quantification value of the user at the current IP address, when the user privacy service protocol passes, the network environment security detection module detects the network environment risk of the user at the current IP address, and when the user privacy service protocol does not pass, the user jumps to the transaction unit;
and M1 is a first standard value of transaction amount preset by the transaction security management module.
Specifically, when M > M1, the transaction security management module inquires whether the user agrees to detect the current network environment security, when the user does not agree to detect the current network environment security, the user jumps to the transaction unit, when the user agrees to detect the current network environment security, the transaction security management module sends a user privacy service agreement to the user, and when the user does not agree to the user privacy service agreement, the user jumps to the transaction unit.
Specifically, the invention judges whether to inquire whether the user agrees to detect the safety of the current network environment according to the transaction amount of the simulation work order confirmed by the user, can provide the user with a function option for confirming whether the current network environment is safe or not when the transaction amount is large, detects the safety of the network environment of the user as an unnecessary option, can respect the willingness of the user, ensures the network privacy of the user and improves the use experience of the user on the system.
The network environment security detection module obtains a confidentiality risk level quantized value Na, an integrity risk level quantized value Nb and an availability risk level quantized value Nc of a user at a current IP address, presets confidentiality weight Wa, integrity weight Wb and availability weight Wc, sets network environment risk value R=WaxNa+Wb x Nb+wc x Nc, and adjusts confidentiality weight Wa according to transaction amount M of a simulation work order,
if M1 < M2, the network environment security detection module adjusts the confidentiality weight Wa to Wa 'so that Wa' = [1+ (M-M1) × (M2-M1)/(M1×M2)] 0.5 ×Wa;
If M is more than or equal to M2, the network environment security detection module adjusts confidentiality weight Wa to Wa ', so that Wa' = [1+ (M-M2)/M ]. Times.Wa;
And M2 is a second standard value of the transaction amount preset by the transaction security management module.
Specifically, the embodiment does not limit the obtaining modes of the confidentiality risk level quantization value, the integrity risk level quantization value and the availability risk level quantization value of the user at the current IP address, and the CASS system preferably quantizes the confidentiality risk level, the integrity risk level and the availability risk level of the user at the current IP address.
Specifically, the confidentiality weight, the integrity weight and the initial value of the availability weight are preset, the confidentiality weight is adjusted according to the transaction amount of the simulated work order, the higher the transaction amount is, the higher the confidentiality weight is, the larger the amplification factor of the calculation result of the network environment risk value is, the judgment rule of the network environment safety can be changed according to different transaction amounts, the transaction risk prompt of the user is more accordant with the current transaction condition, and the risk prompt is more referential to the user.
The network environment safety detection module presets a maximum threshold value of the network environment risk value as R0, and judges whether the current network environment of the user is safe or not according to a comparison result of the network environment risk value R and the maximum threshold value of the network environment risk value R0, wherein,
If R is less than R0, the network environment safety detection module judges that the current network environment is safe, and the user jumps to the traffic unit;
if R is more than or equal to R0, the network environment safety detection module judges that the current network environment has risks, the network environment safety detection module prompts the network environment risks for the user, and the data storage unit records and stores the simulation work order confirmed by the user when the transaction is interrupted.
Specifically, when the network environment security detection module judges that the current network environment has risks, the network environment security detection module inquires whether the user continues to trade, when the user selects to continue to trade, the user jumps to the trade unit, when the user selects to stop trade, the data storage unit records and stores the simulation work order confirmed by the user, and the user jumps to the information input interface.
The transaction unit presets a user payment time limit value tu, and adjusts the user payment time limit value tu according to the transaction amount M of the simulated work order, wherein,
if M < M1, the transaction unit does not adjust the user payment time limit, and the transaction unit sets a user payment time limit tu1=tu;
if M1 is less than or equal to M2, the transaction unit adjusts the user payment time limit tu to tu2, so that tu2=min { [1+ (M2-M1)/M ] × [1+ (M-M1)/M ] ×tu,2×tu };
If M > M2, the transaction unit adjusts the user payment time limit tu to tu3 such that tu3=min { tu×M/M2,5×tu }.
Specifically, the invention limits the payment time of the user according to the transaction amount of the simulated work order, when the transaction amount is large, the user payment time limit value is properly increased, so that more abundant time can be provided for the fund transfer of the user, and meanwhile, the situation that too many users stay in the transaction unit at the same time to cause the breakdown of the server of the transaction unit can be avoided by setting the user payment time limit value.
The transaction unit starts timing from the user entering the transaction unit, the work order generation module determines whether to generate a work order according to whether the user finishes paying within the user payment time limit tux, x=1, 2,3,
if tq is less than or equal to tux, the work order generation module generates a work order according to the simulation work order information confirmed by the user and sends the generated work order to the user and the server respectively;
if tq is more than tux, the work order generation module judges that the work order is not generated, and the data storage unit records and stores the simulated work order confirmed by the user;
where tq is the time that the user spends from entering the transaction unit to the payment completion.
The abnormal behavior monitoring module acquires the user current day simulated work order quantity K stored in the data storage unit, acquires the total transaction amount Q of the user current day simulated work order stored in the data storage unit, and judges whether the user has abnormal behaviors according to the user current day simulated work order quantity K and the total transaction amount Q stored in the data storage unit, wherein,
If K is less than K1, the abnormal behavior monitoring module judges that the user does not have abnormal behaviors;
if K1 is more than or equal to K2 and (K/K1) x (Q/Q0) is less than 1, the abnormal behavior monitoring module judges that abnormal behaviors exist in the user, takes the simulated work order storage time closest to the current time as a time starting point, and judges that the user cannot use the work order intelligent generation system in T0;
if K1 is not less than K2 and not less than K1 and (K/K1) x (Q/Q0) is not less than 1, the abnormal behavior monitoring module judges that the user does not have abnormal behavior;
if K is more than K2, the abnormal behavior monitoring module judges that abnormal behaviors exist in the user, and takes the simulated work order storage time closest to the current time as a time starting point, and the abnormal behavior monitoring module judges that the user cannot use the work order intelligent generation system in T0;
wherein, K1 is a first threshold value of the number of the user daily analog worksheets stored in the data storage unit preset by the abnormal behavior monitoring module, K2 is a second threshold value of the number of the user daily analog worksheets stored in the data storage unit preset by the abnormal behavior monitoring module, Q0 is a total transaction amount limit value of the user daily analog worksheets stored in the data storage unit preset by the abnormal behavior monitoring module, and T0 is a system locking time of the abnormal behavior user preset by the abnormal behavior monitoring module.
Specifically, in this embodiment, the first threshold value and the second threshold value of the number of analog worksheets on the same day are not limited, in this embodiment, k1=50 and k2=100 are preferable, in this embodiment, the limit value of the total transaction amount of the analog worksheets on the same day is not limited, in this embodiment, q0=20000 is preferable, in this embodiment, the system lock time is not limited, and t0=12 h is preferable.
Specifically, the invention judges whether the user has abnormal behavior according to the number of the user daily simulated worksheets and the total transaction amount stored by the data storage unit, can avoid the server from being crashed caused by malicious worksheets, and realizes the protection of the system by limiting the use time of the user on the system when the number of the user daily simulated worksheets is extremely large and the total transaction amount of the user daily simulated worksheets is smaller.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will be within the scope of the present invention.
The foregoing description is only of the preferred embodiments of the invention and is not intended to limit the invention; various modifications and variations of the present invention will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.