CN116664138A - Wind control method and system based on dynamic control in third party payment - Google Patents

Wind control method and system based on dynamic control in third party payment Download PDF

Info

Publication number
CN116664138A
CN116664138A CN202310896789.2A CN202310896789A CN116664138A CN 116664138 A CN116664138 A CN 116664138A CN 202310896789 A CN202310896789 A CN 202310896789A CN 116664138 A CN116664138 A CN 116664138A
Authority
CN
China
Prior art keywords
wind control
control rule
service request
chain
wind
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310896789.2A
Other languages
Chinese (zh)
Inventor
慕学海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Fuiou Payment Service Ltd By Share Ltd
Original Assignee
Shanghai Fuiou Payment Service Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Fuiou Payment Service Ltd By Share Ltd filed Critical Shanghai Fuiou Payment Service Ltd By Share Ltd
Priority to CN202310896789.2A priority Critical patent/CN116664138A/en
Publication of CN116664138A publication Critical patent/CN116664138A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules

Abstract

The application relates to a risk control method, which comprises the following steps: receiving a service request and forwarding the service request to a front-end risk control system; receiving the service request through the established communication link and forwarding the service request to a wind control system; analyzing the service request and constructing a corresponding wind control rule chain according to the analyzed internal message; sequentially executing the wind control rules in the wind control rule chain on the service request according to the wind control rule chain; and constructing a response message based on the result of executing the wind control rule chain so as to return to the service system.

Description

Wind control method and system based on dynamic control in third party payment
Technical Field
The application relates to the field of third party payment risk control, in particular to a merchant intelligent wind control method and system based on dynamic control in third party payment.
Background
With the vigorous development of electronic commerce in China, more and more netizens accept online payment, and third-party payment service institutions are also continuously emerging, so that the development of electronic commerce is promoted. The third party payment mode receives attention of each party as a position supplementing product of the position deficiency of the credit system of China, and focuses on the aspect of risks, so that the risk control of the third party payment is urgent.
The nonstandard network third party payment is easy to have some risks, not only affects the benefits of the public and banks, but also is unfavorable for the development of a payment system, and can also have some adverse effects on the development stability of economy and society, and the risk problem is needed to be accurately recognized and solved. The user not only considers convenience but also considers credit and security factors when selecting the third party payment software.
For example, the third party payment may include the following risks: risk of large amounts of retained funds, risk of impact of virtual currency on physical currency, risk of customer privacy disclosure, risk of transaction credit, and the like.
In order to combat these risks present in third party payments, many payment risk control systems have been developed.
The main current ways of payment risk control technology include:
1) The method comprises the steps of putting wind control rule parameters, business parameters and the like into a database, and accessing the database by a risk control system.
2) The system caching mode is used for placing the wind control rule parameters and the service parameters into a system memory, the efficient caching system can improve the energy absorption of the system, and the risk control system obtains the wind control rule parameters and the service parameters from the cache.
3) The method comprises the step of micro-servicing, wherein wind control rule parameters and business parameters are independently divided into a micro-service for remote call of a risk control system.
However, existing mainstream payment risk control techniques of these types also have some drawbacks and problems, including:
1) For a database read-write separation mechanism: the coupling between the system and the database is high, the transaction response time and the database performance are obviously reduced under the high-frequency request and high concurrency scene, and the database I/O pressure is high.
2) For distributed caching: cache middleware (such as Redis) may generate avalanche (so-called "brain-split" problem) under the conditions of high concurrency, data misoperation and the like, and has high bandwidth requirement under the conditions of large transaction amount and high concurrency, and a caller needs additional network overhead when accessing cache data.
3) For the micro-server approach: the information synchronization between the systems has the difference, and the communication pressure of the system IO and the network is larger.
Accordingly, there is a need to provide a dynamic control-based merchant intelligent wind control scheme for use in third party payments that overcomes the above-described drawbacks.
Disclosure of Invention
The present application relates to a dynamic control mechanism to allow pluggable wind control rules to be applied to different services and to dynamically load a chain of wind control rules.
According to a first aspect of the present application, there is provided a wind control method comprising:
receiving a service request and forwarding the service request to a front-end risk control system;
receiving the service request through the established communication link and forwarding the service request to a wind control system;
analyzing the service request and constructing a corresponding wind control rule chain according to the analyzed internal message;
sequentially executing the wind control rules in the wind control rule chain on the service request according to the wind control rule chain; and
constructing a response message based on the result of executing the wind control rule chain so as to return to the service system;
the analyzing the service request and constructing a corresponding wind control rule chain according to the analyzed internal message comprises the following steps:
analyzing the service request and converting the service request into an internal message format;
invoking an associated wind control rule from a wind control rule set of a wind control rule module based on the internal message format;
and processing the called wind control rule based on the service parameter associated with the internal message format in the service parameter module, and then constructing a wind control rule chain associated with the service request.
According to a second aspect of the present application, there is provided a risk control system comprising:
the wind control rule module is configured to store service sets of all wind control rules;
the business parameter module is configured to store parameters involved in all wind control rules; and
and the risk control system bus is configured to construct a corresponding wind control rule chain according to the service request to realize dynamic management of the wind control rule, wherein the construction of the corresponding wind control rule chain comprises the following steps:
analyzing the service request and converting the service request into an internal message format;
invoking an associated wind control rule from a set of wind control rules of the wind control rule module based on the internal message format;
processing the called wind control rule based on the parameters associated with the internal message format in the service parameter module to construct a wind control rule chain associated with the service request;
the risk control system bus is further configured to sequentially execute wind control rules in the wind control rule chain on the service request according to the wind control rule chain; and
and constructing a response message based on the result of executing the wind control rule chain so as to return to the service system.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Drawings
In order to describe the manner in which the above-recited and other advantages and features of the application can be obtained, a more particular description of the application briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the application and are not therefore to be considered to be limiting of its scope, the application will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
fig. 1 shows an overall schematic environmental block diagram of a risk control system according to an embodiment of the present application.
Fig. 2 shows a schematic flow chart of a risk control method according to an embodiment of the application.
Detailed Description
In general, the application provides a dynamic processing mode of a risk control system to solve the problem of flexibility of configuration of wind control rules and the problems of performance, coupling and reliability of the risk control system.
First, an overall schematic environmental block diagram of a risk control system according to an embodiment of the present application is described with reference to fig. 1.
As shown, the system of the present application is composed entirely of the following components:
1) A business system configured primarily for forwarding business requests received from users to and receiving results of processing the business requests from the risk control system front end.
2) The risk control system is arranged in front of the system, and the front of the risk control system is composed of a group of communication processes. The communication processes are responsible for establishing communication connection between the risk control system and the corresponding networking mechanism (service system) according to the communication line configuration information, receiving transaction messages from the communication ports, sending the transaction messages to the communication ports, monitoring the communication link state, and reporting the communication link state change. Upon discovery of a communication failure, the communication service module immediately reestablishes the communication link.
3) And the risk control system bus is mainly configured for constructing a corresponding wind control rule chain according to the received service request and loading the corresponding wind control rule chain in a persistent layer to realize dynamic management of the wind control rule. Specifically, the design mode of the dynamically managed wind control rule chain refers to forming a wind control rule chain by a plurality of wind control rules associated with the wind control rule chain according to the type of the service request so as to be sequentially applied to the processing process of the same service request. And each wind control rule on the wind control rule chain is responsible for respective business processing. Therefore, the wind control rule can be flexibly selected according to the service type, and is configured in a corresponding wind control rule chain, wherein the wind control rule chain can adopt a memory loading mode and allows service control and filtering according to the sequence of the wind control rule configuration. The configuration definition mode of the wind control rule chain is as follows:
after the wind control rule chain is constructed, the risk control system bus sequentially executes each wind control rule of the wind control rule chain on the basis of the wind control rule chain on the service request.
It should be appreciated that not all of the wind control rules in the chain of wind control rules corresponding to the service request need necessarily be executed. Because, when the previous wind control rule is executed, the service request may be found to be not in accordance with the requirement of the wind control rule and a result with risk is returned, which directly results in that the subsequent wind control rule does not need to be executed. That is, the risk control system bus can dynamically select whether the relevant remaining wind control rules in the wind control rule chain are executed and the execution sequence according to the actual execution result of the wind control rules.
And finally, the risk control system bus builds a response message based on the result of executing the wind control rule chain so as to return to the service system.
4) The wind control rule module is a set of various independent wind control rules, is mainly configured to store all the sets of wind control rules, and loads the sets into a system memory for being called when a wind control rule chain is constructed when the system is initialized. The wind control rules module can therefore be seen as a set of all wind control rules involved in the wind control of all traffic classes. They are stored centrally in a database, which constitutes the wind control rules module.
5) And a business parameter module. Similar to the wind control rule module, the service parameter module is a set of service parameters involved in various wind control rules, such as merchant information, terminal information, threshold parameters, and the like. The system is mainly configured to store all business parameters involved in the wind control rules, and load the set into a system memory for being called when the wind control rule chain is constructed during system initialization. In other words, the service parameter module stores the configured wind control parameter information, such as "d1_tx_param 173200|173500 D1" presentation parameter, which is used in the wind control rule, and this parameter limits the transaction time of day settlement.
Besides the wind control parameters, some threshold parameters are used when the wind control rule chain is dynamically adjusted to construct a wind control rule chain meeting the requirements, for example, according to historical transaction statistics, the event of the wind control rule chain of the merchant is triggered when the transaction amount of the merchant on a certain day increases by more than 30%. These parameters, also referred to as "configuration parameters", may be configured in advance by the air control specialist in accordance with service attributes or the like.
Therefore, the service parameter module not only prescribes the wind control parameters applied to the wind control rules, but also prescribes the configuration parameters for constructing a wind control rule chain. Also, by storing these parameters in a database, the service parameter module is further constructed.
The above parts of the system can realize synchronous interaction between the systems based on tcp/ip. And the above-described components/modules may communicate with each other via, for example, wired or wireless communication techniques (e.g., cable, USB, data line, bluetooth, NFC, cellular, local area network, wide area network, and internet, etc., communication techniques).
The risk control system bus, the wind control rule module and the business parameter module form the wind control system.
With an understanding of the system architecture of the wind control system, a schematic flow chart of a risk control method according to an embodiment of the application is described below in connection with fig. 2.
As shown, first, at step 202, a service request is received and forwarded to a risk control system front end. For example, the user may input a corresponding service request in the service system according to the own service requirement. The service request is forwarded by the service system to the risk control system front end.
As previously described, the business system provides various business applications for use by users. The service request may include various data related to the service, such as an organization number, a merchant number, an order amount, a destination route, a transaction code, and other necessary parameters. The service request may come from various applications running on the user-side system, such as e-commerce software, a banking website, a gaming application, a payment terminal application, and so on. Alternatively, the service request may come from corresponding various APPs installed on a mobile terminal such as a cell phone, tablet, or the like. The service request may be forwarded to the risk control system front-end in the form of a data message via, for example, an http communication protocol, such as a TCP/IP request.
Next, in step 204, the risk control system front-end receives the service request from the service system over the established communication link and forwards it to the wind control system.
Then, at step 206, the wind control system parses the service request and constructs a corresponding wind control rule chain according to the parsed message.
Specifically, after the wind control system receives the service request message, the wind control system parses the service request message, where parsing includes decrypting the message (for personal privacy and security, the service request is generally encrypted), and converting the message into an internal message format that can be processed by the wind control system. The internal message format includes the type of service, merchant, transaction amount, card number, issuing authority, channel number, and other data information.
The wind control system then invokes the associated wind control rule from the wind control rule set of the wind control rule module based on fields in the internal message of the converted service request, such as the service type (e.g., by parsing and identifying the service type code in the request), the merchant, and the like. As described above, in order to increase the processing speed, the wind control rule set may be loaded into the system memory during the initialization phase of the operation of the wind control system, so that the wind control system may directly call the wind control rules from the memory, thereby greatly improving the processing efficiency.
And then, the wind control system processes the called wind control rule based on the service parameters (including configuration parameters) which are loaded into the system memory and are associated with the internal message of the service request, and then constructs a wind control rule chain associated with the service request. The processing includes screening the invoked wind control rules based on the configuration parameters, applying the wind control parameters to the corresponding wind control rules, ordering the wind control rules, and the like. Specifically, the process includes:
1) After the service system requests the wind control system, the wind control system matches the wind control rule chain in the lower persistent layer according to the service codes, transaction amounts, card numbers and the like.
2) According to the counted merchant data, the wind control rule chain is adjusted by combining various threshold parameters, for example, compared with the counted merchant daily average transaction amount, if the fluctuation exceeds the daily average transaction amount threshold, the transaction amount early warning wind control rule is added on the matched wind control rule chain, the special personnel responsible for operating the merchant is informed in quasi-real time, the processing measures are selected after manual analysis, and the processing measures include, but are not limited to, adding the merchant wind control chain configuration transaction interception wind control rule and the like; and dynamically canceling the configuration of the wind control rule with high false killing rate in the merchant wind control rule chain according to the false killing rate statistics and the false killing threshold comparison result, and synchronizing the wind control rule into the persistence layer in real time.
3) According to the interception rate of the merchant wind control rule, dynamically adjusting the position of the wind control rule with high interception rate in the wind control chain, and synchronizing the position in the persistent layer in real time.
The built chain of wind control rules is maintained at the persistence layer.
How to select and build the chain of wind control rules is described in detail below in conjunction with the example code:
firstly, according to the basic function of the wind control rule related to the service type of the service request message, each wind control rule to form a wind control rule chain is automatically loaded from a wind control rule module (which can be stored in a system memory) so as to be called by a wind control system:
thus, the dynamic construction of the wind control rule chain aiming at the service request is completed. After the wind control rule chain is built, it may be loaded to the persistence tier.
Next, in step 208, the wind control system executes each wind control rule of the wind control rule chain in turn for the service request according to the wind control rule chain.
It should be appreciated that not all of the wind control rules in the chain of wind control rules corresponding to the service request need necessarily be executed. Because, when the previous wind control rule is executed, the service request may be found to be not in accordance with the requirement of the wind control rule and a result with risk is returned, which directly results in that the subsequent wind control rule does not need to be executed. That is, the wind control system can dynamically select whether the relevant remaining wind control rules in the wind control rule chain are executed or not and the execution sequence according to the actual execution result of the wind control rules.
Finally, in step 210, a response message is constructed based on the result of executing the wind control rule chain, so as to return to the service system.
In one embodiment, the method further includes preloading the wind control rule set in the wind control rule module and the parameter set in the service parameter module into the system memory when the wind control system is initialized to increase the wind control processing speed.
In a preferred embodiment, the method may further comprise the step of configuring and adjusting the wind control rule chain of the corresponding service.
The following is an example dynamic adjustment process for the wind control rules and wind control rule chains:
(1) Counting transaction amount, transaction amount and successful failure count of each period in each day of the last month of the commercial tenant;
(2) Counting the daily transaction amount, successful failure count and transaction place distribution of the bank card in the last month;
(3) Counting the interception rate of the wind control rule in the next month;
(4) Counting the probability of the transaction of the merchant being killed by the sub-control rule;
(5) Judging whether redundant and invalid wind control rules exist in the trade wind control rule chain of the commercial tenant or whether the wind control rules need to be added according to the statistical result and a preset threshold value;
(6) Dynamically adjusting the wind control rule chains corresponding to the merchants, such as adding, deleting, modifying and the like, and loading the wind control rule chains into a persistent layer in quasi-real time;
due to the variability of the business, the wind control rules must also be adjusted, for example:
(1) Whether the merchant is in a bill brushing state or not can be judged by counting the daily transaction number change of the merchant, and a number wind control rule is added into a wind control rule responsibility chain of the merchant when the merchant exceeds a threshold set according to historical experience;
(2) The change condition of the transaction amount can judge whether the risk of illegal transaction exists, and the transaction amount wind control rule is automatically added into a merchant amount wind control responsibility chain when the change condition exceeds the threshold set by a wind control special person;
(3) The successful failure count can judge whether the commercial tenant has trial-and-error risk or not, if the proportion reaches 20%, the threshold value set by the wind control speciality can be automatically and dynamically adjusted in the wind control responsibility chain, and after the near real-time validation, the commercial tenant transaction is intercepted;
(4) The wind control rules cannot be considered as the same as each other for all merchants, and the situation of false killing exists, so that the wind control rules in the merchant wind control rule chain can be adjusted through the false killing rate of statistical feedback.
Classification and functional description of wind control rules:
transaction right rules: judging whether the business authority is possessed by the merchant according to the message;
verification class rules: judging whether three payment elements are verified or not according to the corresponding service types;
real-time class rules: dynamically expanding, deleting, modifying the wind control rule according to the success and failure quantity proportion of different businesses of a merchant every day, and loading the wind control rule into a persistence layer in quasi-real time;
……。
the beneficial technical effects are as follows:
1. dynamically loading and expanding wind control rule chain configuration. And selecting a corresponding processing rule chain through information mapping of service types, merchants and the like. The wind control system can realize the templatization and the universality of the regular chain configuration.
2. And the system host memory is used for solving the network communication pressure caused by coupling of the cache and the cache storage system and high-frequency transaction.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be understood by those skilled in the relevant art that various changes in form and details may be made therein without departing from the spirit and scope of the application as defined by the appended claims. Thus, the breadth and scope of the present application as disclosed herein should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (10)

1. A risk control method, comprising:
receiving a service request and forwarding the service request to a front-end risk control system;
receiving the service request through the established communication link and forwarding the service request to a wind control system;
analyzing the service request and constructing a corresponding wind control rule chain according to the analyzed internal message;
sequentially executing the wind control rules in the wind control rule chain on the service request according to the wind control rule chain; and
constructing a response message based on the result of executing the wind control rule chain so as to return to the service system;
the analyzing the service request and constructing a corresponding wind control rule chain according to the analyzed internal message comprises the following steps:
analyzing the service request and converting the service request into an internal message format;
invoking an associated wind control rule from a wind control rule set of a wind control rule module based on the internal message format;
and processing the called wind control rule based on the service parameter associated with the internal message format in the service parameter module, and then constructing a wind control rule chain associated with the service request.
2. The risk control method of claim 1, further comprising:
and when the wind control system is initialized, preloading the wind control rule set in the wind control rule module and the service parameter set in the service parameter module into a system memory to accelerate the wind control processing speed.
3. The risk control method of claim 1, wherein the sequentially executing the wind control rules in the wind control rule chain on the service request according to the wind control rule chain comprises: and dynamically selecting whether the relevant residual wind control rules in the wind control rule chain are executed or not and the execution sequence according to the actual execution result of the wind control rules.
4. The risk control method of claim 1, wherein the constructed chain of wind control rules is loaded into a persistence tier.
5. The risk control method of claim 1, further comprising the step of dynamically adjusting a chain of wind control rules for a respective business, comprising:
(1) Counting transaction amount, transaction amount and successful failure count of each period in each day of the last month of the commercial tenant;
(2) Counting the daily transaction amount, successful failure count and transaction place distribution of the bank card in the last month;
(3) Counting the interception rate of the wind control rule in the next month;
(4) Counting the probability of the transaction of the merchant being killed by the sub-control rule;
(5) Judging whether redundant and invalid wind control rules exist in the trade wind control rule chain of the commercial tenant or whether the wind control rules need to be added according to the statistical result and a preset threshold value;
(6) And dynamically adjusting the addition, deletion and modification of the wind control rule chain corresponding to the merchant, and loading the wind control rule chain into the persistence layer in quasi-real time.
6. The risk control method of claim 1, further comprising the step of dynamically adjusting the wind control rules of the corresponding business, comprising:
(1) Judging whether the commercial tenant is in a bill brushing state or not by counting the daily transaction number change of the commercial tenant, and adding a number wind control rule into a wind control rule responsibility chain of the commercial tenant when the commercial tenant exceeds a threshold set according to historical experience;
(2) Judging whether the risk of illegal transaction exists or not according to the change condition of the transaction amount, and automatically adding a transaction amount wind control rule into a merchant amount wind control responsibility chain when the threshold value set by a wind control special person is exceeded;
(3) Judging whether the commercial tenant has trial-and-error risk or not by successfully losing the number of the breaks, automatically dynamically adjusting a threshold value set by a wind control special person in a wind control responsibility chain when the proportion reaches 20%, and intercepting commercial tenant transactions after the commercial tenant takes effect in quasi-real time;
(4) And adjusting the wind control rule in the merchant wind control rule chain through the false killing rate of the statistical feedback.
7. The risk control method of claim 1, wherein parsing the service request comprises: decrypting the message of the service request and converting the message into an internal message format which can be processed by the wind control system, wherein the internal message format comprises the service type, the merchant, the transaction amount, the card number, the card issuing mechanism, the channel number and other data information.
8. The risk control method of claim 1, wherein the processing the invoked wind control rule based on the business parameter associated with the internal message format in the business parameter module comprises: screening the called wind control rules based on the configuration parameters in the service parameters, applying the wind control parameters in the service parameters to the corresponding wind control rules, and sequencing the wind control rules.
9. A risk control system, comprising:
the wind control rule module is configured to store a set of all wind control rules;
the business parameter module is configured to store business parameters involved in all wind control rules; and
and the risk control system bus is configured to construct a corresponding wind control rule chain according to the service request to realize dynamic management of the wind control rule, wherein the construction of the corresponding wind control rule chain comprises the following steps:
analyzing the service request and converting the service request into an internal message format;
invoking an associated wind control rule from a set of wind control rules of the wind control rule module based on the internal message format;
processing the called wind control rule based on the parameters associated with the internal message format in the service parameter module to construct a wind control rule chain associated with the service request;
the risk control system bus is further configured to sequentially execute wind control rules in the wind control rule chain on the service request according to the wind control rule chain; and
and constructing a response message based on the result of executing the wind control rule chain so as to return to the service system.
10. The risk control system of claim 9, further comprising a system memory configured to pre-load a set of wind control rules for the wind control rule module and a set of business parameters for the business parameter module during initialization of the risk control system.
CN202310896789.2A 2023-07-21 2023-07-21 Wind control method and system based on dynamic control in third party payment Pending CN116664138A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310896789.2A CN116664138A (en) 2023-07-21 2023-07-21 Wind control method and system based on dynamic control in third party payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310896789.2A CN116664138A (en) 2023-07-21 2023-07-21 Wind control method and system based on dynamic control in third party payment

Publications (1)

Publication Number Publication Date
CN116664138A true CN116664138A (en) 2023-08-29

Family

ID=87717304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310896789.2A Pending CN116664138A (en) 2023-07-21 2023-07-21 Wind control method and system based on dynamic control in third party payment

Country Status (1)

Country Link
CN (1) CN116664138A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103279883A (en) * 2013-05-02 2013-09-04 携程计算机技术(上海)有限公司 Electronic-payment transaction risk control method and system
CN111429123A (en) * 2020-03-17 2020-07-17 深圳前海微众银行股份有限公司 Payment risk control method, device and readable storage medium
CN112015578A (en) * 2020-10-26 2020-12-01 上海富友支付服务股份有限公司 Wind control system and method based on pre-synchronous processing and post-asynchronous processing
CN114884964A (en) * 2022-07-11 2022-08-09 上海富友支付服务股份有限公司 Service wind control method and system based on Tuxedo architecture
CN115082058A (en) * 2022-07-25 2022-09-20 上海富友支付服务股份有限公司 Virtual account transaction management method and system based on dynamic control
CN115689752A (en) * 2022-11-03 2023-02-03 中国银行股份有限公司 Method, device and equipment for adjusting wind control rule and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103279883A (en) * 2013-05-02 2013-09-04 携程计算机技术(上海)有限公司 Electronic-payment transaction risk control method and system
CN111429123A (en) * 2020-03-17 2020-07-17 深圳前海微众银行股份有限公司 Payment risk control method, device and readable storage medium
CN112015578A (en) * 2020-10-26 2020-12-01 上海富友支付服务股份有限公司 Wind control system and method based on pre-synchronous processing and post-asynchronous processing
CN114884964A (en) * 2022-07-11 2022-08-09 上海富友支付服务股份有限公司 Service wind control method and system based on Tuxedo architecture
CN115082058A (en) * 2022-07-25 2022-09-20 上海富友支付服务股份有限公司 Virtual account transaction management method and system based on dynamic control
CN115689752A (en) * 2022-11-03 2023-02-03 中国银行股份有限公司 Method, device and equipment for adjusting wind control rule and storage medium

Similar Documents

Publication Publication Date Title
US6055567A (en) Distributed data accessing technique
US8825798B1 (en) Business event tracking system
US20120185378A1 (en) System and Method for Adaptive Selection of Bank Card for Payment
US11528340B2 (en) Providing financial events using a push framework
CN106204010A (en) A kind of channel access system
CN102077229A (en) System, method and apparatus for providing universal financial transaction gateway for mobile computing devices
CN110675159A (en) Financial market transaction advance risk control method and system and electronic equipment
WO2021221795A1 (en) Scalable and advanced analytics computing platform for distributed ledger data
CN112581045A (en) Data wind control system and method based on micro-service
KR100983478B1 (en) Method and system for making housekeeping account book using messaging service of mobile terminal
CN108055653A (en) cloud broadcasting method and system
CN112669157A (en) Transaction method, device and system based on block chain and readable storage medium
US11379191B2 (en) Presentation oriented rules-based technical architecture display framework
CN112991046A (en) Electronic resource limit control method, device, equipment and storage medium
US20150161722A1 (en) Dynamic look-up table for change order limits on customer accounts
US20230230056A1 (en) Transaction control management
CN116664138A (en) Wind control method and system based on dynamic control in third party payment
JP2022505665A (en) Context-based filtering within a subset of the network nodes that implement the trading system
US20220327523A1 (en) Systems and methods for generating and transmitting electronic transaction account information messages
US20230216866A1 (en) Exponentially smoothed categorical encoding to control access to a network resource
US20150161576A1 (en) System and method for financial transfers from a financial account using social media
CN111553783A (en) Bank direct insurance integration service platform based on internet WebAPI technology
CN114884964A (en) Service wind control method and system based on Tuxedo architecture
CN114240060A (en) Risk control method, risk processing system, risk processing device, server, and storage medium
CN111953540A (en) Message generation method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination