CN116521542A - Method and device for service object unlimited, storage medium and electronic equipment - Google Patents

Method and device for service object unlimited, storage medium and electronic equipment Download PDF

Info

Publication number
CN116521542A
CN116521542A CN202310466465.5A CN202310466465A CN116521542A CN 116521542 A CN116521542 A CN 116521542A CN 202310466465 A CN202310466465 A CN 202310466465A CN 116521542 A CN116521542 A CN 116521542A
Authority
CN
China
Prior art keywords
service
test
service object
parameter
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310466465.5A
Other languages
Chinese (zh)
Inventor
陈嘉茵
石翼
胡圻圻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AlipayCom Co ltd
Original Assignee
AlipayCom Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AlipayCom Co ltd filed Critical AlipayCom Co ltd
Priority to CN202310466465.5A priority Critical patent/CN116521542A/en
Publication of CN116521542A publication Critical patent/CN116521542A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

Abstract

The specification discloses a method, a device, a storage medium and an electronic device for service object de-limiting, wherein the method comprises the following steps: and receiving a de-limit request sent by the service object, and sending test information to the service object according to the de-limit request, so that the service object executes test service according to the received test information. And then, determining the gateway request parameters of the test tasks executed by the service objects as target parameters, and acquiring the gateway request parameters of the historical services executed by the historical service objects as historical parameters. And then judging whether to carry out the limitation solving on the business object according to the historical parameters and the target parameters, and accurately determining whether the platform of the business object for executing the test business is the platform for actually executing the business, so that whether the business object is a risk business object can be accurately judged, and the limitation solving on the business object is more accurately carried out.

Description

Method and device for service object unlimited, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and apparatus for service object de-limiting, a storage medium, and an electronic device.
Background
With the development of technology, application (APP) and website applications are becoming more and more widespread. Meanwhile, security of private data is also receiving a great deal of attention. With the development of applications and websites, the applications and websites can provide more and more functions. With market segments, service providers that provide support for business execution, such as service providers that provide payment functionality, are emerging. In this scenario, an enterprise is a party that uses functionality provided by a service provider to execute a service, i.e., a service object.
Currently, service providers can provide a function of executing a service for an enterprise on a service platform, or provide a function of executing a service in a program developed by the enterprise itself. However, regardless of the manner in which the function of executing the service is provided, an enterprise may be subject to a violation. The service provider may restrict the enterprise from using the function execution services it provides. Such as the service provider limiting the amount of transactions that the business uses its provided payment instrument per day, and may also limit the business's individual maximum transaction amount, or even prohibit the business from using the payment instrument.
Meanwhile, an enterprise (i.e., business object) may apply for de-restriction after being restricted. However, the service provider needs to check whether the enterprise can release the restriction, distinguish the inauguration enterprise from the normal enterprise, accurately release the restriction of the normal enterprise, and avoid releasing the restriction of the inauguration enterprise.
Therefore, how to accurately de-limit business objects is a highly desirable problem.
Disclosure of Invention
The present disclosure provides a method, an apparatus, a storage medium, and an electronic device for service object de-limiting, so as to partially solve the foregoing problems in the prior art.
The technical scheme adopted in the specification is as follows:
the specification provides a method for service object de-limiting, which comprises the following steps:
receiving a de-limit request sent by a business object;
according to the unlimited request, test information is sent to the service object, so that the service object executes test service according to the test information;
determining gateway request parameters of the test service executed by the service object as target parameters, and acquiring gateway request parameters of historical service executed by the service object in history as historical parameters;
and judging whether to carry out the deblocking on the business object according to the historical parameters and the target parameters.
Optionally, test information is sent to the service object, so that the service object executes test service according to the test information, and the method specifically includes:
randomly generating a test value required by executing test service, and sending the test value to the service object so that the service object generates gateway request parameters according to the test value;
and receiving gateway request parameters of the test service sent by the service object, and sending a page for executing the test service to the service object according to the gateway request parameters so as to enable the service object to execute the test service.
Optionally, according to the gateway request parameter, sending a page for executing the test service to the service object, which specifically includes:
and judging whether the service object has the authority to execute the designated service according to the gateway request parameters, and if so, sending a page for executing the test service to the service object.
Optionally, determining a gateway request parameter of the test service executed by the service object as a target parameter specifically includes:
responding to the test service identifier submitted by the service object, and determining a test service corresponding to the test service identifier;
And determining gateway request parameters of the test service as target parameters.
Optionally, determining whether to perform the deblocking on the business object specifically includes:
judging whether the target parameter is matched with the history parameter according to the history parameter;
if yes, the service object is subjected to limitation removing so that the service object executes the service;
otherwise, the service object is not subjected to the solution, and a matching result obtained after the target parameter and the history parameter are matched is used as a reject result to be sent to the service object.
Optionally, the gateway request parameter further includes a service value;
judging whether to carry out the deblocking on the business object or not specifically comprises the following steps:
judging whether the business value contained in the target parameter is consistent with the test value or not according to the test value;
if yes, the service object is subjected to limitation removing so that the service object executes the service;
otherwise, the service object is not subjected to the limitation removing, and the judging result of the inconsistent service value and the testing value is sent to the service object as a reject result.
Optionally, the gateway request parameter further includes a service platform identifier, where the service platform identifier is at least one of a site identifier for executing a service by the service object and an application identifier for executing a service by the service object;
Judging whether to carry out the deblocking on the business object or not specifically comprises the following steps:
determining patrol data corresponding to the service platform identification from a patrol library according to the service platform identification contained in the target parameter;
judging whether the business platform corresponding to the business platform identifier has risk or not according to the inspection data;
if yes, the service object is not subjected to limitation removal, and the judgment result of the risk of the service platform is sent to the service object as a reject result;
otherwise, the business object is subjected to the deblocking so that the business object executes the business.
Optionally, the gateway request parameter further includes a service platform identifier, where the service platform identifier is at least one of a site identifier for executing a service by the service object and an application identifier for executing a service by the service object;
judging whether the target parameter is matched with the history parameter or not specifically comprises the following steps:
and judging whether the service platform identifier contained in the target parameter is the same as the service platform identifier contained in the history parameter.
The present specification provides a service object de-limiting apparatus, including:
the receiving module is used for receiving the unlimited request sent by the business object;
The sending module is used for sending test information to the service object according to the unlimited request sent by the service object, so that the service object executes test service according to the test information;
the determining module is used for determining gateway request parameters of the test service executed by the service object as target parameters and acquiring gateway request parameters of historical service executed by the service object historically as historical parameters;
and the limitation-solving module is used for judging whether to carry out limitation solving on the business object according to the history parameter and the target parameter.
Optionally, the sending determining module is specifically configured to randomly generate a test value required for executing a test service, and send the test value to the service object, so that the service object generates a gateway request parameter according to the test value; and receiving gateway request parameters of the test service sent by the service object, and sending a page for executing the test service to the service object according to the gateway request parameters so as to enable the service object to execute the test service.
Optionally, the sending module is specifically configured to determine, according to the gateway request parameter, whether the service object has authority to execute the specified service, and if so, send a page for executing the test service to the service object.
Optionally, the determining module is specifically configured to determine, in response to a test service identifier submitted by the service object, a test service corresponding to the test service identifier; and determining gateway request parameters of the test service as target parameters.
Optionally, the threshold module is specifically configured to determine, according to the history parameter, whether the target parameter is matched with the history parameter; if yes, the service object is subjected to limitation removing so that the service object executes the service; otherwise, the service object is not subjected to the solution, and a matching result obtained after the target parameter and the history parameter are matched is used as a reject result to be sent to the service object.
Optionally, the gateway request parameter further includes a service value;
the threshold solving module is specifically configured to determine, according to the test value, whether a service value included in the target parameter is consistent with the test value; if yes, the service object is subjected to limitation removing so that the service object executes the service; otherwise, the service object is not subjected to the limitation removing, and the judging result of the inconsistent service value and the testing value is sent to the service object as a reject result.
Optionally, the gateway request parameter further includes a service platform identifier, where the service platform identifier is at least one of a site identifier for executing a service by the service object and an application identifier for executing a service by the service object;
the threshold module is specifically configured to determine, according to a service platform identifier included in the target parameter, inspection data corresponding to the service platform identifier from an inspection library; judging whether the business platform corresponding to the business platform identifier has risk or not according to the inspection data; if yes, the service object is not subjected to limitation removal, and the judgment result of the risk of the service platform is sent to the service object as a reject result; otherwise, the business object is subjected to the deblocking so that the business object executes the business.
Optionally, the gateway request parameter further includes a service platform identifier, where the service platform identifier is at least one of a site identifier for executing a service by the service object and an application identifier for executing a service by the service object;
the threshold module is specifically configured to determine whether a service platform identifier included in the target parameter is the same as a service platform identifier included in the history parameter.
The present specification provides a computer readable storage medium storing a computer program which when executed by a processor implements the method of business object de-limiting described above.
The present specification provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method of business object de-limiting as described above when executing the program.
The above-mentioned at least one technical scheme that this specification adopted can reach following beneficial effect:
in the service object limitation removing method provided by the specification, a limitation removing request sent by a service object is received, and test information is sent to the service object according to the limitation removing request, so that the service object executes test service according to the received test information. And then, determining the gateway request parameters of the test tasks executed by the service objects as target parameters, and acquiring the gateway request parameters of the historical services executed by the historical service objects as historical parameters. And then, judging whether to carry out the deblocking on the business object according to the historical parameters and the target parameters.
As can be seen from the above method, in the method, the gateway request parameter of the test service executed by the service object according to the test information is determined as the target parameter, and the gateway request parameter of the history service executed by the service object is determined as the history parameter. And then, determining whether to carry out the limitation solving on the service object according to the historical parameters and the target parameters, and accurately determining whether the platform of the service object for executing the test service is the platform for actually executing the service, so that whether the service object is a risk service object can be accurately judged, and the limitation solving on the service object is more accurately carried out.
Drawings
The accompanying drawings, which are included to provide a further understanding of the specification, illustrate and explain the exemplary embodiments of the present specification and their description, are not intended to limit the specification unduly. Attached at
In the figure:
FIG. 1 is a flow chart of a method for business object de-limiting provided in the present specification;
FIG. 2 is a schematic diagram of a merchandise order page provided in the present disclosure;
FIG. 3 is a schematic diagram of a payment page provided in the present specification;
FIG. 4 is a schematic diagram of an apparatus for business object de-limiting provided in the present specification;
fig. 5 is a schematic view of the electronic device corresponding to fig. 1 provided in the present specification.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the present specification more apparent, the technical solutions of the present specification will be clearly and completely described below with reference to specific embodiments of the present specification and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present specification. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
The embodiments of the present disclosure provide a method, an apparatus, a storage medium, and an electronic device for service object de-limiting, and in the following, with reference to the drawings, the technical solutions provided by each embodiment of the present disclosure are described in detail.
Fig. 1 is a flow chart of a business object de-limiting method provided in the present specification, specifically including the following steps:
s100: and receiving a de-limit request sent by the business object.
In this specification, a device for performing an unlimited operation on a service object, that is, a service provider provided to a function required for the service object to perform a service, receives a unlimited request sent by the service object. The device for performing the deblocking on the business object may be a server for performing the deblocking on the business object, or a device such as a mobile phone, a personal computer (Personal Computer, PC) or the like capable of performing the aspects of the present specification. For convenience of explanation, the following description will be made with the server as the execution subject.
A business object may be a business, group, or individual performing a business on a business platform using functionality provided by a service provider, such as someone operating a clothing store as a merchant on a business platform of shopping software, the merchant may provide a payment instrument for a buyer purchasing clothing at the clothing store, which may be provided by the service provider to a payment instrument used by the merchant. The business object may also be an enterprise, a group or an individual executing a business by using a function provided by a service provider through a program developed by the user, for example, when the user charges a video member on video software developed by a certain enterprise, the user may pay by using a payment tool provided by the enterprise for the user, and the payment tool may be provided by the service provider to the payment tool used by the enterprise, which is not specifically limited in this specification.
The business platform may be a platform that provides only business objects to perform business, such as an application or website that provides a vending place for merchants, such as a store operated on-line by merchants. The service platform may also be a platform developed by the service object itself and used for executing the service on the service platform, such as video software developed by a certain enterprise, which is not specifically limited in this specification.
Since the traffic object may have an offence when executing a service using a function provided by the service provider, the service provider may limit the traffic object having the offence. Such as the service provider limiting the amount of transactions that the business uses its provided payment instrument per day, and may also limit the business's individual maximum transaction amount, or even prohibit the business from using the payment instrument. After being limited by the service provider, the business object may apply for a de-limitation from the service provider, i.e., the business object may send a de-limitation request to the service provider, the de-limitation request indicating that the business object wants to de-limit.
S102: and sending test information to the service object according to the unlimited request, so that the service object executes test service according to the test information.
And the server sends test information to the service object according to the received unlimited request sent by the service object, so that the service object executes test service according to the test information. The test information may be a test value, for example, a test value of 100 is sent to the merchant applying for the release of the restriction, so that the merchant can purchase the commodity with a value of 100 as a platform of the merchant where the buyer actually operates. The test information may also be a test task, such as sending a test task to a merchant applying for a release of restrictions to purchase toothbrushes, so that the merchant can purchase toothbrushes as a buyer in a store that the buyer actually manages.
Specifically, in order to verify whether the platform for executing the test service by the service object is the platform for actually executing the service, the server may send the test value required by the test service to the service object for which the restriction is released according to the received restriction release request, so that the service object executes the test service according to the test value. Meanwhile, because the test value is a value randomly generated by the server, there may be no service corresponding to the test value on the platform for the service object to execute the service, so that the original service cannot be executed as the test service, and the service object may be required to modify the original service on the service platform according to the test value, so as to obtain the test service. Or the service object can generate the test service with the value being the test value on the service platform according to the test value. For example, the test value is 100, and assuming that the online store of the merchant does not have a commodity with a value of 100, the merchant can modify the price of the existing commodity in the online store to 100, or the merchant can put up a commodity with a value of 100 in the online store, so that the merchant can purchase a commodity with a value of 100 in the online store.
Therefore, the server can receive the threshold-release request sent by the service object, randomly generate a test value required by executing the test service according to the threshold-release request, and send the test value to the service object, so that the service object generates gateway request parameters according to the test value. And then, receiving gateway request parameters of the test service sent by the service object, and sending a page for executing the test service to the service object according to the gateway request parameters so as to enable the service object to execute the test service. The gateway request parameter is a parameter generated by the service object according to the test value and sent to the server when the test service starts to be executed by the test value, and the gateway request parameter at least comprises a service identifier and a service object identifier. The test service identifier is a service identifier of the test service which is randomly generated when the service object generates gateway information according to the test value, and can be a number, such as 123, a letter, such as abc, or a combination of the number and the letter, such as 1 a.
For example, a merchant sends a solution request to a server, and the server randomly generates a value as a test value required for executing a test service according to the solution request sent by the merchant, and sends the test value to the merchant. Assuming that the test value is 100, the test business is to make the merchant as a buyer to make a transaction with the transaction amount of 100 in the online store actually operated by the merchant, i.e. to purchase a commodity with the value of 100 in the online store. Assuming that the online store does not have a commodity with a value of 100, the merchant may modify the price of the commodity existing in the online store to 100, or the merchant may put a commodity with a value of 100 on the online store, so that the merchant may purchase a commodity with a value of 100 in the online store. When the merchant performs a test transaction, an order for purchasing a commodity with a value of 100 is generated first, as shown in fig. 2, fig. 2 is a schematic diagram of a commodity order page provided in the present specification, the order in fig. 2 is identified as 123, and the merchant is identified as 1. The merchant then clicks the "pay" button and sends the merchant identification 1 and the order identification (i.e., test service identification) to the server as gateway request parameters. Then, the server sends a page for executing the test service, that is, a page for the merchant to pay the commodity, that is, a cash desk page, to the merchant according to the received gateway request parameter, as shown in fig. 3, fig. 3 is a schematic diagram of a payment page provided in the present specification, and the merchant can click a "confirm" button to pay.
S104: determining gateway request parameters of the test service executed by the service object as target parameters, and acquiring gateway request parameters of historical service executed by the service object in history as historical parameters.
The server may determine, in a gateway request parameter database, a gateway request parameter of a test service executed by the service object as a target parameter, and acquire, as a history parameter, a gateway request parameter of a history service executed by the service object historically, where the gateway request parameter database is a gateway request parameter stored by the server when all service objects execute the service using a function provided by the gateway request parameter database. Both the history service and the test service are services executed by the service object, but the history service does not include the test service.
Specifically, the server may determine, in response to the test service identifier submitted by the service object, a test service corresponding to the test service identifier. And then, determining gateway request parameters of the test service in the gateway request parameter database as target parameters. And the server can determine the historical service corresponding to the service object identifier according to the service object identifier in the gateway request parameter database, and take the gateway request parameter of the determined historical service as the historical parameter. The service object identifier required for determining the history parameter can be the service object identifier in the gateway request parameter sent by the service object, so that after the gateway request parameter sent by the service object is received, the history service executed by the service object corresponding to the service object identifier can be determined according to the service object identifier in the gateway request parameter, and the gateway request parameter of the history service is used as the history parameter. After the service object identifier required by the history parameter is determined, the service object identifier in the gateway request parameter of the test service determined according to the test service identifier, that is, the service object identifier in the determined target parameter, may also be the service object identifier in the test service after the service object submits the test service identifier.
Therefore, the process of determining the target parameter and the history parameter by the server may not be sequential, the server may determine the gateway request parameter of the test service corresponding to the test service identifier according to the test service identifier, as the target parameter, and then determine the gateway request parameter of the history service corresponding to the service object identifier according to the service object identifier, as the history parameter. The server may also determine, as the history parameter, a gateway request parameter of the history service corresponding to the service object identifier according to the service object identifier in the gateway request parameter. And then determining the gateway request parameters of the test service corresponding to the test service identifier according to the test service identifier in the received gateway request parameters, wherein the gateway request parameters are used as target parameters, and the specification is not particularly limited.
Continuing to use the above example, the server responds to the test service identifier (i.e. 123) submitted by the merchant, determines the test service corresponding to the test service identifier, and takes the gateway request parameter of the test service as the target parameter. And the server determines the historical service corresponding to the merchant identifier 1 according to the merchant identifier (i.e. 1), and takes the gateway request parameter of the determined historical service as the historical parameter.
S106: and judging whether to carry out the deblocking on the business object according to the historical parameters and the target parameters.
Because the history parameter is the gateway request parameter corresponding to the service executed by the service object in history, the target parameter is the gateway request parameter of the executed test service according to the test value sent by the server by the service object in order to remove the restriction. When the history parameter is matched with the target parameter, the platform of the service object for executing the test service can be determined to be the platform for actually executing the service, and the service object does not use a fake platform (namely, the platform not actually executing the service by the service object) for executing the test service, so that the aim of removing the limit is fulfilled. Therefore, the server can judge whether to carry out the limitation solving on the service object according to the matching result of the history parameter and the target parameter, if so, the limitation solving is carried out on the service object so as to enable the service object to execute the service, otherwise, the limitation solving is not carried out on the service object.
Specifically, the server may determine whether the target parameter is matched with the history parameter according to the history parameter, if yes, perform solution limitation on the service object so that the service object executes the service, otherwise, do not perform solution limitation on the service object, and send a matching result obtained after the target parameter is matched with the history parameter to the service object as a reject result. The server may send the conclusion information that the target parameter is not matched with the history parameter as a reject result to the service object, or may send the fact that the target parameter is not matched with the history parameter, which information is specifically in the history parameter, as a reject result to the service object, which is not specifically limited in the specification.
Because of possible violations of the business object, the service provider may limit the business object to use the functions it provides, such as the service provider may limit the number of transactions that the merchant performs per day using the payment instrument it provides, and may limit the merchant's single maximum transaction amount, or even prohibit the merchant from using the payment instrument. However, after the service object applies for the limitation, that is, after the server performs the limitation on the service object, the service object may use the function provided by the service provider in the subsequent process of executing the service.
In addition, since the test value is a value randomly generated by the server, there may be no service corresponding to the test value on the platform for the service object to execute the service, so that the original service cannot be executed as the test service, and the service object may be required to modify the original service on the service platform according to the test value, so as to obtain the test service. Alternatively, the service object may generate a test service with a test value on the service platform according to the test value. However, the two modes can be executed only when the service platform is the platform for actually executing the service by the service object, so that whether the platform for executing the test service by the service object is the platform for actually executing the service can be verified according to the test value, thereby judging whether the service object can be unqualified.
Therefore, when judging whether to perform the de-limiting on the service object, the server can judge whether to perform the de-limiting on the service object according to the test value, if so, the service object is subjected to the de-limiting so as to enable the service object to execute the service, otherwise, the service object is not subjected to the de-limiting. Specifically, the server may determine, according to the test value, whether the service value included in the target parameter is consistent with the test value, and if so, perform solution on the service object, so that the service object executes the service. Otherwise, the service object is not subjected to the limitation removing, and the judgment result that the service value is inconsistent with the test value is used as a reject result to be sent to the service object. The gateway request parameters further comprise service values, the service values are service values of the service actually executed by the service object, and the service values contained in the target parameters are service values of the test service actually executed by the service object.
In addition, since the business object or the business platform for executing the business by the business object may have risks, for example, if a merchant sells illegal commodities by operating a store on a certain shopping software, the merchant is a risk merchant, and the store operated by the merchant is also a risk store. Further, if the video software managed by the enterprise contains illegal or non-compliant content, the video software is at risk. When the business object or the business platform of the business object executing the business has risks, the server should not carry out the limitation solving on the business object, so that whether the business object can be subjected to the limitation solving can be judged by judging whether the business object or the business platform of the business object executing the business has risks or not.
Therefore, when judging whether to carry out the de-limiting on the service object, the server can determine the inspection information of the service object from the inspection library, judge whether to carry out the de-limiting on the service object according to the inspection information, if so, carry out the de-limiting on the service object so as to enable the service object to execute the service, otherwise, not carry out the de-limiting on the service object. Specifically, the server may determine, from the inspection library, inspection data corresponding to the service platform identifier according to the service platform identifier included in the target parameter, and then determine, according to the inspection data, whether the service platform corresponding to the service platform identifier has a risk, if so, not to perform a solution to the service object, and send the determination result of the risk of the service platform to the service object as a rejection result, otherwise, perform a solution to the service object, so that the service object executes the service.
The gateway request parameter further includes a service platform identifier, where the service platform identifier is at least one of a site identifier for executing a service by a service object and an application identifier for executing a service by a service object, for example, a webpage identifier for selling goods by a merchant, and for example, an identifier of video software developed by the enterprise. The inspection data can be inspection results of whether the service platform is at risk or not after inspection of the service platform, or information recorded during inspection of the service platform, such as inspection video or inspection record, etc., and the specification is not particularly limited, and only needs to judge whether the service platform corresponding to the service platform identifier is at risk or not according to the inspection data.
The above method for determining whether to perform the solution to the business object is three, and the server may use any one of the above three methods, may also use any two methods, may also use the above three methods, and the present specification is not limited specifically.
According to the method, the gateway request parameters of the test service corresponding to the test service identifier are determined as target parameters in the test service identifier submitted by the service object, and the gateway request parameters of the history service corresponding to the service object are determined as history parameters. And judging whether the platform for executing the test service by the service object is the platform for actually executing the service according to the service value, the historical parameter and the target parameter, so that the service object is prevented from executing the test service by using a fake platform, the limitation is removed, and the possibility that the service object has risks is reduced. Whether the platform for the service object to execute the test service is the platform for the service object to actually execute the service or not can be accurately determined, the service object is rapidly subjected to limitation elimination, and better experience can be brought to the service object. Meanwhile, the server also judges whether the service platform has risks according to the inspection data corresponding to the service platform identification determined from the inspection library, so that whether the service object is a risk service object can be accurately judged, and the service object is more accurately subjected to threshold solving. And when the service object is not subjected to limitation removal, the server sends the reasons for the non-limitation removal of the service object to the service object, so that the service object can clearly know the reasons for the non-limitation removal of the service object, and the service object can normalize the behavior of the service object.
When the step S106 determines whether the target parameter is matched with the history parameter, the server may determine whether the service platform identifier included in the target parameter is the same as the service platform identifier included in the history parameter. Therefore, when the service platform identifier contained in the target parameter is the same as the service platform identifier contained in the history parameter, the service object can be subjected to limitation solving so as to enable the service object to execute the service, otherwise, the service object is not subjected to limitation solving, and a matching result obtained after the target parameter and the history parameter are matched is sent to the service object as a reject result. The gateway request parameter also comprises a service platform identifier.
In the step S100, the service object may first determine a solution provided by the server, select a solution from the solutions, and send a solution request to the server. The steps S100 to S106 are a solution for performing the solution for the service object in the present specification. The service object can also select other solution, the service object can submit service certificates of a plurality of executed services to the server, the service certificates can comprise information such as service identification, occurrence time, service content and the like, and the service certificates can be pictures or text information.
In step S104, the server obtains the gateway request parameters of the historical service corresponding to the service object in history, and when the gateway request parameters are used as the historical parameters, since there are a plurality of service platforms on which the service object has executed the service, the historical gateway request parameters that the server may obtain may be the historical parameters corresponding to a plurality of service platforms. Based on this, when judging whether the target parameter is matched with the history parameter in the step S106, it may be determined whether the service platform identifier included in the history parameter is the same as the service platform identifier included in the target parameter for each history parameter in sequence, and when any service platform identifier included in the history parameter is the same as the service platform identifier included in the target parameter, the target parameter is matched with the history parameter.
When the server determines the inspection information of the service object from the inspection library in step S106, if the server cannot determine the inspection information of the service object from the inspection library, that is, the inspection library does not include the inspection information of the service object, the server may send an inspection instruction for the service object to the inspection personnel, so that the inspection personnel inspect the service object according to the received inspection instruction. Specifically, the server can determine the inspection data corresponding to the service platform identifier from the inspection library according to the service platform identifier contained in the target parameter, and if the server cannot determine the inspection data corresponding to the service platform identifier, the server sends an inspection instruction containing the service platform identifier to an inspection personnel so that the inspection personnel can inspect the service platform corresponding to the service platform identifier.
In the step S106 in the present specification, three methods for determining whether to perform the limitation solving for the service object are provided, wherein the first method is to determine whether to match the target parameter with the history parameter according to the history parameter, if yes, to perform the limitation solving for the service object, otherwise, not to perform the limitation solving for the service object, and send the matching result obtained after the matching between the target parameter and the history parameter to the service object as a reject result. And secondly, judging whether the business value contained in the target parameter is consistent with the test value according to the test value, if so, performing limitation solving on the business object, otherwise, not performing limitation solving on the business object, and sending a judging result of inconsistent business value and test value to the business object as a reject result. Thirdly, according to the service platform identification contained in the target parameter, determining inspection data corresponding to the service platform identification from the inspection library, judging whether the service platform corresponding to the service platform identification has risks according to the inspection data, if so, not performing limitation solving on the service object, and sending the judging result of the risk of the service platform to the service object as a reject result, otherwise, performing limitation solving on the service object.
Based on the three judging methods, the server can adopt one of the three judging methods at will to judge whether to carry out the solution limit on the business object. The server can also adopt two kinds of the two kinds at will to judge whether to carry out the solution limit to the business object. For example, the server may adopt the first method and the second method of the above three methods to determine whether to perform the deblocking on the service object. Therefore, the server can judge the second judging method again when the first judging method is established, and can carry out the limitation solving on the business object when the second judging method is also established. Specifically, the server may determine whether the target parameter and the history parameter are matched according to the history parameter, if yes, continue to determine whether to perform the deblocking on the service object according to the test value, otherwise, not perform the deblocking on the service object, and send a matching result obtained after the target parameter and the history parameter are matched to the service object as a reject result.
When judging whether to carry out the limitation solving on the service object according to the test value, the server can judge whether the service value contained in the target parameter is consistent with the test value according to the test value, if so, the limitation solving is carried out on the service object, otherwise, the limitation solving is not carried out on the service object, and the judgment result of the inconsistent service value and the test value is used as a rejection result to be sent to the service object. Of course, any two other judging methods may be judged according to the above-mentioned process, and will not be described herein, and the specific two judging methods are firstly judged and then judged, which is not specifically limited in this specification.
The server may also adopt the above three judging methods to judge whether to perform the de-limiting on the service object, so the server may continue to use the third judging method to judge whether to perform the de-limiting on the service object after the first judging method and the second judging method are completed and both the judging methods are established. Specifically, the server may determine whether to perform the de-limiting on the service object according to the test value, determine whether the service value included in the target parameter is consistent with the test value according to the test value, if yes, determine routing inspection information of the service object from the routing inspection library, continuously determine whether to perform the de-limiting on the service object according to the routing inspection information, and if not, not perform the de-limiting on the service object, and send a determination result that the service value is inconsistent with the test value to the service object as a rejection result.
When determining the inspection information of the service object from the inspection library, and continuously judging whether to carry out the unlimited operation on the service object according to the inspection information, the server can determine inspection data corresponding to the service platform identifier from the inspection library according to the service platform identifier contained in the target parameter, and then judge whether the service platform corresponding to the service platform identifier has risks according to the inspection data, if so, the service object is not subjected to the unlimited operation, and the judgment result of the risk of the service platform is used as a reject result to be sent to the service object, otherwise, the service object is subjected to the unlimited operation.
By adopting the three judging methods, whether the service object is subjected to the restriction solving is judged, so that the service object can be more accurately determined that the test service is not executed by using a fake platform, the probability of risk of the platform for actually executing the service by the service object is very low, and the restriction on the service object can be removed.
In the above step S102, since not all the service objects can use the function execution service provided by the service provider, the service objects need to be authorized by the service provider before the function execution service provided by the service provider can be used. Meanwhile, the service object applying for the removal of the restriction may not originally use the authority of a certain function provided by the service provider, and the service object may only request the server to remove the restriction in order to remove the flow of applying for the removal of the restriction, so it is required to determine whether the service object has the authority to execute the service using the function provided by the service provider. Therefore, when the page for executing the test service is sent to the service object according to the gateway request parameter, the server can judge whether the service object has the authority for executing the designated service according to the gateway request parameter, if so, the page for executing the test service is sent to the service object. The service is designated as a function execution service that can use the service provider, for example, the service provider provides the merchant with a payment tool, so the server needs to determine whether the merchant has the right to use the payment tool provided by the service provider.
When the service object does not have authority to execute the designated service, the server may transmit a notification message informing the service object that it has no authority so that the service object knows that it has no authority to execute the service using the function provided by the service provider.
In this specification, the gateway request parameter is a parameter generated by a service object according to a test value and sent to a server when the test service starts to be executed with the test value, the gateway request parameter may include a request source, a request site, service information and a return site, the request source may include information such as a service object identifier, a service platform identifier and a key of the service object, the request site may include address information such as APP, a website and an applet, the service information may include information such as a service value, a service object name and a service identifier, and the return site may be an address entered after the service execution, including an address entered after the service execution succeeds and an address entered after the service execution fails.
In this specification, a link for executing a service may be generated when a service object executes the service, that is, the service object enters a platform of a service provider through a platform for actually executing the service, and executes the service on the platform of the service provider using a function provided by the service provider. Therefore, the server can acquire the data of the platform before the service object enters the platform of the service provider, judge whether the service object can be unqualified according to the acquired data according to the steps S100-S106, the data of the platform acquired by the server corresponds to the gateway request parameters in the process, and the test service starts to be executed on the platform before the service object enters the platform of the service provider. According to the steps S100 to S106, the server may determine, according to the acquired data, whether the platform on which the test service is executed is the platform on which the service object actually executes the service. When the platform data of the service object actually executing the service is obtained according to the obtained data, that is, the test service starts to be executed on the platform of the service object actually executing the service, the server can perform the de-limiting on the service object.
The above method for service object limitation solving provided for one or more embodiments of the present specification further provides a corresponding device for service object limitation solving based on the same thought, as shown in fig. 4.
Fig. 4 is a schematic diagram of a device for service object de-limiting provided in the present specification, specifically including:
a receiving module 200, configured to receive a de-limiting request sent by a service object;
a sending module 202, configured to send test information to a service object according to a de-limit request sent by the service object, so that the service object executes a test service according to the test information;
a determining module 204, configured to determine a gateway request parameter of the test service executed by the service object as a target parameter, and obtain a gateway request parameter of a historical service executed by the service object historically as a historical parameter;
and the de-limiting module 206 is configured to determine whether to de-limit the service object according to the history parameter and the target parameter.
Optionally, the sending module 202 is specifically configured to randomly generate a test value required for executing a test service, and send the test value to the service object, so that the service object generates a gateway request parameter according to the test value; and receiving gateway request parameters of the test service sent by the service object, and sending a page for executing the test service to the service object according to the gateway request parameters so as to enable the service object to execute the test service.
Optionally, the sending module 202 is specifically configured to determine, according to the gateway request parameter, whether the service object has authority to execute the specified service, and if so, send a page for executing the test service to the service object.
Optionally, the determining module 204 is specifically configured to determine, in response to a test service identifier submitted by the service object, a test service corresponding to the test service identifier; and determining gateway request parameters of the test service as target parameters.
Optionally, the solution limit module 206 is specifically configured to determine, according to the history parameter, whether the target parameter is matched with the history parameter; if yes, the service object is subjected to limitation removing so that the service object executes the service; otherwise, the service object is not subjected to the solution, and a matching result obtained after the target parameter and the history parameter are matched is used as a reject result to be sent to the service object.
Optionally, the gateway request parameter further includes a service value;
the threshold module 206 is specifically configured to determine, according to the test value, whether a service value included in the target parameter is consistent with the test value; if yes, the service object is subjected to limitation removing so that the service object executes the service; otherwise, the service object is not subjected to the limitation removing, and the judging result of the inconsistent service value and the testing value is sent to the service object as a reject result.
Optionally, the gateway request parameter further includes a service platform identifier, where the service platform identifier is at least one of a site identifier for executing a service by the service object and an application identifier for executing a service by the service object;
the threshold module 206 is specifically configured to determine, from a patrol library, patrol data corresponding to a service platform identifier according to the service platform identifier included in the target parameter; judging whether the business platform corresponding to the business platform identifier has risk or not according to the inspection data; if yes, the service object is not subjected to limitation removal, and the judgment result of the risk of the service platform is sent to the service object as a reject result; otherwise, the business object is subjected to the deblocking so that the business object executes the business.
Optionally, the gateway request parameter further includes a service platform identifier, where the service platform identifier is at least one of a site identifier for executing a service by the service object and an application identifier for executing a service by the service object;
the de-limiting module 206 is specifically configured to determine whether the service platform identifier included in the target parameter is the same as the service platform identifier included in the history parameter.
The present specification also provides a computer readable storage medium storing a computer program operable to perform the method of business object de-limiting described above and shown in fig. 1.
The present specification also provides a schematic structural diagram of the electronic device shown in fig. 5. At the hardware level, the electronic device includes a processor, an internal bus, a network interface, a memory, and a non-volatile storage, as illustrated in fig. 5, although other hardware required by other services may be included. The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to implement the method for service object solution shown in fig. 1.
Of course, other implementations, such as logic devices or combinations of hardware and software, are not excluded from the present description, that is, the execution subject of the following processing flows is not limited to each logic unit, but may be hardware or logic devices.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable Gate Array, FPGA)) is an integrated circuit whose logic function is determined by the programming of the device by a user. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but not just one of the hdds, but a plurality of kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), lava, lola, myHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present specification.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the present specification may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing is merely exemplary of the present disclosure and is not intended to limit the disclosure. Various modifications and alterations to this specification will become apparent to those skilled in the art. Any modifications, equivalent substitutions, improvements, or the like, which are within the spirit and principles of the present description, are intended to be included within the scope of the claims of the present description.

Claims (18)

1. A method of business object de-limiting, comprising:
receiving a de-limit request sent by a business object;
according to the unlimited request, test information is sent to the service object, so that the service object executes test service according to the test information;
determining gateway request parameters of the test service executed by the service object as target parameters, and acquiring gateway request parameters of historical service executed by the service object in history as historical parameters;
And judging whether to carry out the deblocking on the business object according to the historical parameters and the target parameters.
2. The method of claim 1, sending test information to the service object, so that the service object executes a test service according to the test information, specifically comprising:
randomly generating a test value required by executing test service, and sending the test value to the service object so that the service object generates gateway request parameters according to the test value;
and receiving gateway request parameters of the test service sent by the service object, and sending a page for executing the test service to the service object according to the gateway request parameters so as to enable the service object to execute the test service.
3. The method of claim 2, according to the gateway request parameter, sending a page for executing the test service to the service object, specifically comprising:
and judging whether the service object has the authority to execute the designated service according to the gateway request parameters, and if so, sending a page for executing the test service to the service object.
4. The method of claim 1, determining gateway request parameters of the test service executed by the service object as target parameters, specifically comprising:
Responding to the test service identifier submitted by the service object, and determining a test service corresponding to the test service identifier;
and determining gateway request parameters of the test service as target parameters.
5. The method of claim 1, wherein determining whether to de-limit the business object comprises:
judging whether the target parameter is matched with the history parameter according to the history parameter;
if yes, the service object is subjected to limitation removing so that the service object executes the service;
otherwise, the service object is not subjected to the solution, and a matching result obtained after the target parameter and the history parameter are matched is used as a reject result to be sent to the service object.
6. The method of claim 2, the gateway request parameter further comprising a traffic value;
judging whether to carry out the deblocking on the business object or not specifically comprises the following steps:
judging whether the business value contained in the target parameter is consistent with the test value or not according to the test value;
if yes, the service object is subjected to limitation removing so that the service object executes the service;
otherwise, the service object is not subjected to the limitation removing, and the judging result of the inconsistent service value and the testing value is sent to the service object as a reject result.
7. The method of claim 1, the gateway request parameter further comprising a service platform identification, the service platform identification being at least one of a site identification of the service object executing a service and an application identification of the service object executing a service;
judging whether to carry out the deblocking on the business object or not specifically comprises the following steps:
determining patrol data corresponding to the service platform identification from a patrol library according to the service platform identification contained in the target parameter;
judging whether the business platform corresponding to the business platform identifier has risk or not according to the inspection data;
if yes, the service object is not subjected to limitation removal, and the judgment result of the risk of the service platform is sent to the service object as a reject result;
otherwise, the business object is subjected to the deblocking so that the business object executes the business.
8. The method of claim 5, wherein the gateway request parameter further comprises a service platform identifier, the service platform identifier being at least one of a site identifier of the service object executing a service and an application identifier of the service object executing a service;
judging whether the target parameter is matched with the history parameter or not specifically comprises the following steps:
And judging whether the service platform identifier contained in the target parameter is the same as the service platform identifier contained in the history parameter.
9. An apparatus for business object de-limiting, comprising:
the receiving module is used for receiving the unlimited request sent by the business object;
the sending module is used for sending test information to the service object according to the unlimited request sent by the service object, so that the service object executes test service according to the test information;
the determining module is used for determining gateway request parameters of the test service executed by the service object as target parameters and acquiring gateway request parameters of historical service executed by the service object historically as historical parameters;
and the limitation-solving module is used for judging whether to carry out limitation solving on the business object according to the history parameter and the target parameter.
10. The apparatus of claim 9, wherein the sending module is specifically configured to randomly generate a test value required for executing a test service, and send the test value to the service object, so that the service object generates a gateway request parameter according to the test value; and receiving gateway request parameters of the test service sent by the service object, and sending a page for executing the test service to the service object according to the gateway request parameters so as to enable the service object to execute the test service.
11. The apparatus of claim 10, wherein the sending module is specifically configured to determine, according to the gateway request parameter, whether the service object has authority to execute the specified service, and if so, send a page for executing the test service to the service object.
12. The apparatus of claim 9, wherein the determining module is specifically configured to determine, in response to a test service identifier submitted by the service object, a test service corresponding to the test service identifier; and determining gateway request parameters of the test service as target parameters.
13. The apparatus of claim 9, wherein the threshold module is specifically configured to determine, according to the history parameter, whether the target parameter matches the history parameter; if yes, the service object is subjected to limitation removing so that the service object executes the service; otherwise, the service object is not subjected to the solution, and a matching result obtained after the target parameter and the history parameter are matched is used as a reject result to be sent to the service object.
14. The apparatus of claim 10, the gateway request parameter further comprising a traffic value;
the threshold solving module is specifically configured to determine, according to the test value, whether a service value included in the target parameter is consistent with the test value; if yes, the service object is subjected to limitation removing so that the service object executes the service; otherwise, the service object is not subjected to the limitation removing, and the judging result of the inconsistent service value and the testing value is sent to the service object as a reject result.
15. The apparatus of claim 9, the gateway request parameter further comprising a service platform identification, the service platform identification being at least one of a site identification of the service object performing a service and an application identification of the service object performing a service;
the threshold module is specifically configured to determine, according to a service platform identifier included in the target parameter, inspection data corresponding to the service platform identifier from an inspection library; judging whether the business platform corresponding to the business platform identifier has risk or not according to the inspection data; if yes, the service object is not subjected to limitation removal, and the judgment result of the risk of the service platform is sent to the service object as a reject result; otherwise, the business object is subjected to the deblocking so that the business object executes the business.
16. The apparatus of claim 13, the gateway request parameter further comprising a service platform identification, the service platform identification being at least one of a site identification of the service object performing a service and an application identification of the service object performing a service;
the threshold module is specifically configured to determine whether a service platform identifier included in the target parameter is the same as a service platform identifier included in the history parameter.
17. A computer readable storage medium storing a computer program which, when executed by a processor, implements the method of any of the preceding claims 1-8.
18. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the preceding claims 1-8 when the program is executed.
CN202310466465.5A 2023-04-26 2023-04-26 Method and device for service object unlimited, storage medium and electronic equipment Pending CN116521542A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310466465.5A CN116521542A (en) 2023-04-26 2023-04-26 Method and device for service object unlimited, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310466465.5A CN116521542A (en) 2023-04-26 2023-04-26 Method and device for service object unlimited, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN116521542A true CN116521542A (en) 2023-08-01

Family

ID=87405925

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310466465.5A Pending CN116521542A (en) 2023-04-26 2023-04-26 Method and device for service object unlimited, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN116521542A (en)

Similar Documents

Publication Publication Date Title
CN110503435B (en) Transaction early warning method, device and equipment based on blockchain
CN110992162A (en) Resource processing method, device, equipment and system
CN109003071B (en) Payment method, device and equipment
CN110390182B (en) Method, system and equipment for determining applet category
CN111784356B (en) Payment verification method, device, equipment and storage medium
CN113222667B (en) Equity sharing processing method and device
TWI741555B (en) Method and device for displaying unique identifier of digital object
CN108596581B (en) Verification method and device for resource transfer and electronic payment verification method and device
CN114819012A (en) Graphic code checking method and device
CN113421081A (en) Payment processing method and device
CN109308573A (en) A kind of business risk control method, device and electronic equipment based on risk point
CN112416725A (en) Pressure testing method and device
CN112910896A (en) Account authentication method, device, equipment and medium
CN111310137A (en) Block chain associated data evidence storing method and device and electronic equipment
CN107483534B (en) Service processing method and device
CN116521542A (en) Method and device for service object unlimited, storage medium and electronic equipment
CN111523138B (en) Method, device and system for protecting private data and electronic equipment
CN112434347B (en) Rental business processing method, device, equipment and system
CN112308545A (en) Account binding method and device
CN111242731B (en) Service execution method and device
CN111798235A (en) Method and device for storing wind control information
CN109559212B (en) Tax refund processing method, device, equipment and system
CN112596781A (en) Service execution and service configuration method and device
CN111429132B (en) Service processing method and device
CN111310239B (en) Digital information batch distribution method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination