WO2023116399A1 - 策略风险定位方法、装置、电子设备及存储介质 - Google Patents
策略风险定位方法、装置、电子设备及存储介质 Download PDFInfo
- Publication number
- WO2023116399A1 WO2023116399A1 PCT/CN2022/136438 CN2022136438W WO2023116399A1 WO 2023116399 A1 WO2023116399 A1 WO 2023116399A1 CN 2022136438 W CN2022136438 W CN 2022136438W WO 2023116399 A1 WO2023116399 A1 WO 2023116399A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- control
- detection
- strategy
- controls
- detection result
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000001514 detection method Methods 0.000 claims abstract description 247
- 230000004044 response Effects 0.000 claims abstract description 55
- 239000000203 mixture Substances 0.000 claims abstract description 12
- 230000006870 function Effects 0.000 claims description 38
- 230000001960 triggered effect Effects 0.000 claims description 27
- 238000012545 processing Methods 0.000 claims description 10
- 230000002159 abnormal effect Effects 0.000 description 13
- 238000012360 testing method Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000007689 inspection Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000011002 quantification Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 230000005856 abnormality Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000013139 quantization Methods 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/0486—Drag-and-drop
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
Definitions
- the present application relates to quantification components in the financial field, and in particular to a strategic risk positioning method, device, electronic equipment and storage medium.
- An object of the present application is to provide a policy risk location method, device, electronic device and storage medium, which can improve the security of the constructed policy.
- a strategic risk positioning method includes:
- the risk existing in the strategy is located.
- a strategy risk positioning device includes:
- a strategy building module configured to respond to a drag operation on a control in the canvas area, and build a strategy to be executed
- the global detection module is configured to detect the global composition of all controls in the canvas area in response to the triggering of the first strategy detection condition, and obtain the global detection result;
- the detection module within the control is configured to detect the internal parameters of each control in the canvas area in response to the triggering of the second strategy detection condition, and obtain the detection result within the control;
- the inter-control detection module is configured to detect the connection relationship between adjacent controls in the canvas area in response to the triggering of the third policy detection condition, and obtain the inter-control detection result;
- the risk positioning module is configured to locate the risks existing in the strategy based on the global detection result, the detection result within the control and the detection result between controls.
- the device is configured as:
- the device is configured as:
- the device is configured as:
- the device is configured as:
- vertex node control is not a start frame control
- the controls traversed along the path where the leaf node control is located are used as the island controls.
- the device is configured as:
- the leaf node controls belonging to the non-event box are located, and it is determined that the strategy has risks at the leaf node controls belonging to the non-event box.
- the device is configured as:
- the device is configured as:
- the logically illegal combination conditions in the policy are located, and it is determined that risks exist in the policy at the logically illegal combination conditions.
- the device is configured as:
- the wrong connection of the condition box is located, and it is determined that the strategy has a risk at the wrong connection.
- an electronic device including: one or more processors; a storage device for storing one or more programs, when the one or more programs are executed by the one or more When executed by multiple processors, the electronic device implements any one of the above embodiments.
- a computer program medium on which computer-readable instructions are stored, and when the computer-readable instructions are executed by the processor of the computer, the computer is made to execute any one of the above embodiments .
- a computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium.
- the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the methods provided in the various optional implementation manners above.
- the policy risk positioning method provided in this application can provide users with a visualized control operation approach, so that users can build a strategy to be run by dragging and dropping controls. And for the constructed strategy, this application locates its risks through global inspection, intra-control inspection and inter-control inspection, which improves the degree of perfection of risk positioning, thereby improving the security of the constructed strategy.
- Fig. 1 shows a flow chart of a method for strategic risk positioning according to an embodiment of the present application.
- Fig. 2 shows a schematic diagram of an island control according to an embodiment of the present application.
- Fig. 3 shows a schematic diagram of interaction between a user and a quantification component according to an embodiment of the present application.
- Fig. 4 shows a block diagram of an apparatus for strategic risk positioning according to an embodiment of the present application.
- Fig. 5 shows a hardware diagram of an electronic device according to an embodiment of the present application.
- This application provides a strategic risk positioning method, which is mainly applied to quantitative components in the financial field.
- the quantitative component in this application allows the user to drag and drop controls in the canvas area, and combine the connection between the controls to construct the corresponding strategy.
- Controls typically include start boxes, condition boxes, and event boxes.
- the completed strategy can be used for real trading or historical backtesting.
- Firm offer operation refers to the application of strategies to real trading scenarios and real-time trading.
- Historical backtesting refers to the use of historical data to test the effectiveness of strategies.
- Fig. 1 shows a flow chart of a strategic risk positioning method according to an embodiment of the present application.
- An exemplary executive body of the method is a quantification component, and the method includes:
- Step S110 building a strategy to be executed in response to the drag operation on the control in the canvas area
- Step S120 in response to the triggering of the first policy detection condition, detect the global composition of all controls in the canvas area, and obtain the global detection result;
- Step S130 in response to the triggering of the second strategy detection condition, detect the internal parameters of each control in the canvas area, and obtain the detection result in the control;
- Step S140 in response to the triggering of the third strategy detection condition, detect the connection relationship between adjacent controls in the canvas area, and obtain the detection result between controls;
- Step S150 based on the global detection results, the detection results within controls and the detection results between controls, locate the risks existing in the strategy.
- the quantitative component provides its canvas area to the user, so that the user can construct a strategy in it.
- the quantitative component constructs a corresponding strategy to be executed.
- the strategy is used to automatically perform transaction processing on the target.
- the quantization component detects the global composition of all controls in the canvas area, and obtains the global detection result. That is, take all controls in the canvas area as a detection object, detect the global composition of the detection object, and obtain the global detection result.
- the quantization component detects the internal parameters of each control in the canvas area, and obtains the detection result within the control. That is, each control in the canvas area is regarded as a detection object, and the internal parameters of each detection object are respectively detected to obtain the detection result in the control.
- the quantization component detects the connection relationship between adjacent controls in the canvas area, and obtains the detection results between controls. That is, a group of controls that are adjacent to each other in the canvas area are regarded as a pair of detection objects, respectively, and the connection relationship of each pair of detection objects is detected to obtain detection results between controls.
- the strategy risk positioning method provided by the present application can provide users with a visualized control operation approach, so that users can build a strategy to be run by dragging and dropping controls. And for the constructed strategy, this application locates its risks through global inspection, intra-control inspection and inter-control inspection, which improves the degree of perfection of risk positioning, thereby improving the security of the constructed strategy.
- the quantity of all controls in the canvas area is detected, and a global detection result describing the quantity of all controls is obtained. If the number of all controls described by the global detection result is greater than the preset control number threshold, it is determined that the strategy is at risk at all the number of controls.
- global detection is performed from the dimension of the number of controls. Specifically, after the first strategy detection condition is triggered, the quantity of all controls used to build strategies in the canvas area is detected. If the number of all controls is greater than the preset threshold of the number of controls, it means that too many controls are used to build the strategy, which exceeds the load of the quantitative component, so there is a risk. Further, after it is determined that the strategy has risks at the number of all controls, an error reminder can be triggered to remind the user that the strategy that needs to be built in the canvas area cannot run normally because the number of all controls exceeds the limit.
- the internal functions of each conditional control are traversed; based on the function name and parameter name of the internal function, the number of market targets used by all conditional controls in the canvas area is obtained to obtain A global detection result describing the number of available tickers. If the number of market targets described by the global detection result is greater than the preset target number threshold, it is determined that the strategy has risks in the number of market targets.
- global detection is performed from the dimension of the number of market indicators. Specifically, since the essence of the conditional control is to call the market data in the quantitative component, and the quantitative component needs to limit the frequency of the market data to protect the background, it is necessary to limit the number of market indicators used.
- the first strategy detection condition is triggered, detect all conditional controls in the canvas area, and then determine the number of market targets used by all conditional controls. If the number of market targets is greater than the preset target number threshold, it means that too many market targets are used to build the strategy, which will pose a threat to the background, so there is a risk. Further, after it is determined that the strategy has risks in the number of market symbols, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally because the number of all market symbols exceeds the limit.
- the island control isolated from the start frame of the policy is detected, and a global detection result describing the island control is obtained. Based on the island controls described by the global detection results, locate the island controls, and determine that the policy is at risk at the island controls.
- the global detection is performed from the dimension of the global topology. Specifically, after the first policy detection condition is triggered, the island control in the canvas area is detected. Referring to the island control circled by the dotted line box in FIG. 2 , the island control refers to a control that is isolated from the start box and has no direct or indirect connection relationship. The presence of siled controls is risky because they cannot function as part of the strategy you are building. Further, after it is determined that the strategy has risk at the island control, a warning reminder may be triggered to remind the user that the strategy constructed in the canvas area may be wrong due to the existence of the island control.
- the controls are traversed down step by step along the path where the start box is located, to obtain the traversed control set. Eliminate all controls in the traversed control collection from the canvas area, and use the remaining controls as island controls.
- the start box locate the start box as the root node control in the canvas area, and then traverse the controls step by step along the path where the start box is located.
- the traversed controls are directly or indirectly connected to the start box, and do not belong to island controls.
- the traversed control collection After traversing all the paths of the start box, the traversed control collection includes all controls that do not belong to the island control, and the controls that are not in the traversed control collection belong to the island control. Therefore, the traversed control collection is removed from all controls in the canvas area, and then the remaining controls are used as island controls.
- control is traversed step by step along the path where the leaf node control is located, until the vertex node control located at the vertex of the path where the leaf node control is located is traversed. If the vertex node control is not the start box, the controls traversed along the path where the leaf node control is located are regarded as island controls.
- the bottommost leaf node controls in the canvas area are located, and then move upward along the path where each leaf node control is located until the corresponding vertex node control is traversed.
- the vertex node control refers to the control that does not have a parent node and is located at the vertex of the path.
- there is an island control there are multiple vertex node controls in the canvas area, and only one vertex node control is the start box of the root node control.
- vertex node control of a certain leaf node control is not the start frame, it means that all controls from the leaf node control to its corresponding vertex node control are isolated from the start frame, so all traversed along the path where the leaf node control is located Controls are island controls.
- the node type of each leaf node control is detected, and a global detection result describing the leaf node controls belonging to the non-event box is obtained. Based on the leaf node controls belonging to the non-event box described by the global detection results, the leaf node controls belonging to the non-event box are located, and the strategy is determined to have risks at the leaf node controls belonging to the non-event box.
- the global detection is performed from the dimension of the leaf node control type.
- the end point of the path must be an event box. That is, the leaf node control must be an event box.
- the node type of each leaf node control in the canvas area is detected to determine which leaf node controls belong to the event box and which leaf node controls belong to the non-event box. Among them, the leaf node controls that belong to the non-event box will affect the normal operation of the strategy, and there are risks.
- an error reminder can be triggered to remind the user that the strategy built in the canvas area cannot work normally because the leaf node control does not belong to the event box.
- the first strategy detection condition includes: detection of a backtest operation on the strategy, detection of a real disk operation on the strategy, and detection of a logic verification operation on the strategy.
- any first policy detection condition can trigger global detection.
- the backtesting operation of the strategy by the user will trigger the global detection; the real operation of the strategy by the user will also trigger the global detection; the logic verification operation of the strategy by the user will also trigger the global detection.
- the in-control detection is performed from the dimension of strategy type and function type.
- the strategy type describes the account type corresponding to the user account, and the account type includes futures account and securities account.
- the functions used by each control have corresponding function types. Some function types are only applicable to futures accounts, some function types are only applicable to securities accounts, and some function types are applicable to both.
- the strategy type and function type are detected.
- the policy type is extracted from the start box to determine the account type; the functions used in the control are traversed to check the function type, and then compared with the account type to determine whether the two match. If they do not match, the normal operation of the policy will be affected, and there are risks. Further, after it is determined that there is a risk in the matching between the strategy type and the function type of the strategy, an error reminder can be triggered to remind the user that the strategy constructed in the canvas area may fail because the strategy type does not match the account type or because the function type does not match the account type. The account type does not match and cannot function properly.
- the internal parameters of each control are traversed; based on the global variables used by the internal parameters, the global variables missed by the control are determined, and the global variables that describe the global variables missed by the control are obtained. In-control detection results. Based on the global variables missed by the controls described by the within-control detection results, it is determined that the policy is at risk at the global variables missed by the controls.
- the detection within the control is performed from the dimension of the global variable. Specifically, after the second policy detection condition is triggered, internal parameters of each control are traversed. When traversing to controls belonging to the start box, build a global variable set according to the global variables defined in the start box; when traversing to other controls, remove the global variables used by other controls from the global variable set. After traversing all the controls, the remaining global variables in the global variable set belong to unused global variables, that is, the global variables omitted by the controls. There may be an operational risk if there are global variables that are missed by the controls. Further, after it is determined that the strategy has a risk in the global variable that the control omits, a warning reminder may be triggered to remind the user that the strategy constructed in the canvas area may be wrong due to the omission of the global variable.
- in-control detection is performed from the dimension of required parameters.
- the parameters that must be filled in are required parameters. If the required parameters are omitted, the normal operation of the strategy will be affected.
- a mapping table of required parameters is pre-configured. After the second strategy detection condition is triggered, traverse the internal parameters of each control to check whether the parameter is manually input and the value is empty. If it is in the mapping table, it means that the parameter is a required parameter that is missing, and there is a risk. Further, after it is determined that there is a risk in the missing required parameters of the strategy, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally due to the missing required parameters.
- the logical validity of the combination condition in the policy in response to the triggering of the second policy detection condition, based on the detected internal parameters of each control, determine the logical validity of the combination condition in the policy, and obtain the internal detection describing the logical validity of the combination condition result. Based on the logical validity of the combined conditions, the logically illegal combined conditions in the policy are located, and risks exist in the policy at the logically illegal combined conditions.
- the detection within the control is performed from the logical dimension of the combination condition. Specifically, after the second policy detection condition is triggered, the internal parameters of each control are detected, and then the sub-conditions used by the control are extracted therefrom. Furthermore, based on the logical relationship between the sub-conditions, it is detected whether the combined condition formed by combining multiple sub-conditions is logically legal. If the combined conditional logic is incomplete, it will cause errors in the operation of the strategy. Further, after it is determined that the strategy has a risk at the logically illegal combination condition, an error reminder can be triggered to remind the user that the strategy built in the canvas area cannot run normally due to the logically illegal combination condition.
- each sub-condition, logical symbol and parentheses are wrapped in a data structure named QCGAN (Quant Condition Group AST Node) in the combined condition, and enumerated values are used in QCAGN to identify its type. Types include: conditional, logical symbol, opening parenthesis, and closing parenthesis.
- QCGAN Quant Condition Group AST Node
- Types include: conditional, logical symbol, opening parenthesis, and closing parenthesis.
- the input order of QCAGN is fixed, so it is stored in an array, and a table is used to maintain the position of QCAGN in the following table and its corresponding error information. Every time an illegal QCAGN is judged, its subscript in the array and the corresponding error information are recorded in the table.
- the stack is used to judge the closure of left and right brackets: every time a left bracket is encountered, its array subscript is Push on the stack; each time a closing parenthesis is encountered, one is popped.
- the type of QCAGN processed this time and the previous QCAGN will be judged each time to determine whether the combination condition is logically legal. The judgment is as follows:
- the in-control detection is performed from the sub-condition dimension of the combination condition.
- Sub-conditions are an important part of combined conditions. If users create sub-conditions but do not use them, there is a risk of operating errors.
- a table for recording usage records of sub-conditions is maintained in the combined condition data structure. This table counts the number of subconditions used. After the second policy detection condition is triggered, refer to the table to locate sub-conditions with a count of 0, and determine that the strategy has risks at the sub-conditions with a count of 0. Further, after it is determined that the strategy has a risk at the sub-condition with a count of 0, a warning reminder can be triggered to remind the user that the strategy constructed in the canvas area may be wrong due to unused sub-conditions in the combined conditions.
- in-control detection is performed from the target dimension to which the signal condition applies.
- the essence of the signal condition is to call the market data through the quantitative component, but these market data are for specific targets. For example, there is no greek data for the stock underlying, and the greek data is only for the option underlying. An underlying that does not apply to the signal conditions will affect the proper functioning of the strategy.
- the signal condition corresponding to the function is encapsulated to obtain a function table for maintaining function information.
- the function information maintained in the function table includes the account type applicable to the function and the target type applicable to the function.
- the second policy detection condition After the second policy detection condition is triggered, query the target information of the signal condition, and compare the query target information with the function information maintained in the function table, so as to determine whether the target applicable to the signal condition is at risk. Further, after it is determined that the strategy is risky in the target to which the signal condition is applied, an error reminder can be triggered to remind the user that the strategy constructed in the canvas area cannot work normally due to the error in the target used in the signal condition.
- the in-control detection is performed from the underlying dimension to which the account condition applies.
- the essence of account conditions is to call account-related data through quantitative components, but accounts are also for specific targets. For example, stock accounts cannot call out the data of futures targets. Indices that do not apply to the account conditions will affect the normal operation of the strategy.
- the strategy type is extracted from the start box; the traversal control collects targets in the strategy, and compares them with the strategy type, so as to determine whether the targets applicable to the account conditions are risky. Further, after it is determined that the strategy is risky in the target where the account condition is applicable, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally due to the error in the target used by the account condition.
- the second policy detection condition includes: detection of an editing operation on the control.
- the editing operation includes editing the attribute bar and editing the combination condition window.
- the controls belonging to the condition box are detected, the definition of the exit link of the condition box is determined, and the detection result between controls describing the definition of the exit link is obtained. Based on the definition of the outlet connection described by the detection results between controls, the wrong connection of the condition box is located, and the risk of the strategy is determined at the wrong connection.
- connection lines generally at most two connection lines can be drawn from the exit of the condition box, and the user can edit the definitions of these two connection lines ("yes", "no"). If the two lines have the same definition, it will affect the normal operation of the policy. Specifically, after the second policy detection condition is triggered, the controls are traversed, and when the condition box is traversed, it is judged whether the definition of the connection at the exit is the same, so as to determine whether there is a wrong connection. Further, after it is determined that there is a risk in the wrong connection of the strategy, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally due to the wrong connection.
- the third policy detection condition includes: detection of a removal operation on the control, and detection of a connection operation on the control.
- Fig. 3 shows a schematic diagram of interaction between a user and a quantification component according to an embodiment of the present application.
- detecting the canvas area in the quantitative component is a necessary process leading to strategy backtesting and real-disk operation. If the user does not click the "Logic Check” button, but directly clicks the "Strategy Backtest” button or the “Real Offer” button, the system of the quantification component will also first test the strategy built in the canvas area, and then execute the strategy return after the test is passed. Test or actual operation.
- the user edits the canvas area to build a strategy. After editing, clicking the "logic test” button or the “strategy backtest” button or the “real run” button will trigger the strategy to be tested.
- the policy passes the test, the front-end reminder of the system passes, and the system enters the next stage; at the same time, since the policy logic passes the test, it means that there is no error affecting the normal operation of the policy. If the policy is detected to have the risk of error, optional, There will also be a warning reminder on the front end of the system.
- the front end of the system will give an error reminder (for example, by setting the color to display the control, or displaying an error mark " ⁇ " on the connection between two controls), and the user edits the canvas area again to remove the error.
- the system can simultaneously detect whether the policy is passed, and make a corresponding reminder according to the detection result.
- the abnormal parameters of this quantitative trading strategy can be measured according to the global detection results, internal detection results, and inter-control detection results, and when the abnormal parameters are greater than or equal to the preset abnormal threshold, the Rebuild the quantitative trading strategy this time, or remind the user whether to rebuild the quantitative strategy if there are many abnormalities in this time; when the abnormal parameters are less than the abnormal threshold, modify and improve the abnormalities and errors in the quantitative trading strategy this time.
- the abnormal parameter Para_ab is calculated by the following formula:
- ⁇ , ⁇ , and ⁇ represent the abnormal factors corresponding to each detection method.
- the user is directly suggested to rebuild the strategy when the abnormality is serious, avoiding the time cost of modifying a large number of abnormal problems, and improving the efficiency of quantitative trading strategy writing and operation.
- Fig. 4 shows a policy risk positioning device according to an embodiment of the present application, and the device includes:
- the strategy construction module 210 is configured to construct a strategy to be executed in response to a drag operation on the control in the canvas area;
- the global detection module 220 is configured to detect the global composition of all controls in the canvas area in response to the triggering of the first policy detection condition, and obtain a global detection result;
- the control internal detection module 230 is configured to detect the internal parameters of each control in the canvas area in response to the triggering of the second policy detection condition, and obtain the control internal detection result;
- the inter-control detection module 240 is configured to detect the connection relationship between adjacent controls in the canvas area in response to the triggering of the third policy detection condition, and obtain the inter-control detection result;
- the risk positioning module 250 is configured to locate the risks existing in the strategy based on the global detection results, the detection results within the control and the detection results between controls.
- the device is configured as:
- the device is configured as:
- the device is configured as:
- the device is configured as:
- vertex node control is not a start frame control
- the controls traversed along the path where the leaf node control is located are used as the island controls.
- the device is configured as:
- the leaf node controls belonging to the non-event box are located, and it is determined that the strategy has risks at the leaf node controls belonging to the non-event box.
- the device is configured as:
- the device is configured as:
- the logically illegal combination conditions in the policy are located, and it is determined that risks exist in the policy at the logically illegal combination conditions.
- the device is configured as:
- the wrong connection of the condition box is located, and it is determined that the strategy has a risk at the wrong connection.
- the electronic device 30 according to the embodiment of the present application will be described below with reference to FIG. 5 .
- the electronic device 30 shown in FIG. 5 is only an example, and should not limit the functions and scope of use of this embodiment of the present application.
- electronic device 30 takes the form of a general-purpose computing device.
- Components of the electronic device 30 may include but not limited to: at least one processing unit 310 , at least one storage unit 320 , and a bus 330 connecting different system components (including the storage unit 320 and the processing unit 310 ).
- the storage unit stores program codes, and the program codes can be executed by the processing unit 310, so that the processing unit 310 executes various exemplary methods according to the present application described in the description part of the above exemplary methods in this specification. Implementation steps. For example, the processing unit 310 may execute various steps as shown in FIG. 1 .
- the storage unit 320 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 3201 and/or a cache storage unit 3202 , and may further include a read-only storage unit (ROM) 3203 .
- RAM random access storage unit
- ROM read-only storage unit
- the storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including but not limited to: an operating system, one or more application programs, other program modules, and program data, Implementations of networked environments may be included in each or some combination of these examples.
- Bus 330 may represent one or more of several types of bus structures, including a memory cell bus or memory cell controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local area using any of a variety of bus structures. bus.
- the electronic device 30 can also communicate with one or more external devices 400 (such as keyboards, pointing devices, Bluetooth devices, etc.), and can also communicate with one or more devices that enable the user to interact with the electronic device 30, and/or communicate with Any device (eg, router, modem, etc.) that enables the electronic device 30 to communicate with one or more other computing devices. Such communication may occur through input/output (I/O) interface 350 .
- An input/output (I/O) interface 350 is connected to the display unit 340 .
- the electronic device 30 can also communicate with one or more networks (such as a local area network (LAN), a wide area network (WAN) and/or a public network such as the Internet) through the network adapter 360 .
- networks such as a local area network (LAN), a wide area network (WAN) and/or a public network such as the Internet
- network adapter 360 communicates with other modules of electronic device 30 via bus 330 .
- other hardware and/or software modules may be used in conjunction with electronic device 30, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives And data backup storage system, etc.
- the technical solutions according to the embodiments of the present application can be embodied in the form of software products, which can be stored in a non-volatile storage medium (which can be CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to make a computing device (which may be a personal computer, server, terminal device, or network device, etc.) execute the method according to the embodiment of the present application.
- a non-volatile storage medium which can be CD-ROM, U disk, mobile hard disk, etc.
- a computing device which may be a personal computer, server, terminal device, or network device, etc.
- a computer-readable storage medium on which computer-readable instructions are stored, and when the computer-readable instructions are executed by a processor of a computer, the computer is made to perform the above method Methods described in the Examples section.
- a program product for implementing the method in the above method embodiment which may adopt a portable compact disc read-only memory (CD-ROM) and include program codes, and may be used in a terminal devices, such as personal computers.
- CD-ROM portable compact disc read-only memory
- the program product of this application is not limited thereto.
- a readable storage medium may be any tangible medium that contains or stores a program, and the program can be used by or in combination with an instruction execution system, device, or device.
- the program product may reside on any combination of one or more readable media.
- the readable medium may be a readable signal medium or a readable storage medium.
- the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof. More specific examples (non-exhaustive list) of readable storage media include: electrical connection with one or more conductors, portable disk, hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the foregoing.
- a computer readable signal medium may include a data signal carrying readable program code in baseband or as part of a carrier wave. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
- a readable signal medium may also be any readable medium other than a readable storage medium that can transmit, propagate, or transport a program for use by or in conjunction with an instruction execution system, apparatus, or device.
- Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- Program codes for performing the operations of the present application can be written in any combination of one or more programming languages, including object-oriented programming languages—such as JAVA, C++, etc., as well as conventional procedural programming languages. Programming language - such as "C" or a similar programming language.
- the program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server to execute.
- the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device (for example, using an Internet service provider). business to connect via the Internet).
- LAN local area network
- WAN wide area network
- Internet service provider for example, using an Internet service provider
- the example implementations described here can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solutions according to the embodiments of the present application can be embodied in the form of software products, which can be stored in a non-volatile storage medium (which can be CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to make a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) execute the method according to the embodiment of the present application.
- a non-volatile storage medium which can be CD-ROM, U disk, mobile hard disk, etc.
- a computing device which may be a personal computer, a server, a mobile terminal, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- User Interface Of Digital Computer (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (15)
- 一种策略风险定位方法,所述方法包括:响应于在画布区域对于控件的拖拽操作,构建待运行的策略,所述策略用于自动对标的进行交易处理;响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果;响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果;响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险。
- 根据权利要求1所述的方法,其中,响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果,包括:响应于所述第一策略检测条件的触发,遍历各条件控件的内部函数;基于所述内部函数的函数名称以及参数名称,获取所述画布区域中所有条件控件所使用的行情标的的数量,得到描述有行情标的数量的全局检测结果;基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:若所述全局检测结果所描述的行情标的数量大于预设的标的数量阈值,则确定所述策略在行情标的数量处存在风险。
- 根据权利要求1所述的方法,其中,响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果,包括:响应于所述第一策略检测条件的触发,对与所述策略的开始框相隔离的孤岛控件进行检测,得到描述有孤岛控件的全局检测结果;基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述全局检测结果所描述的孤岛控件,定位所述孤岛控件,并确定所述策略在所述孤岛控件处存在风险。
- 根据权利要求3所述的方法,其中,对与所述策略的开始框相隔离的孤岛控件进行检测,包括:沿开始框所在路径向下逐级遍历控件,得到遍历到的控件集合;将所述遍历到的控件集合从所述画布区域中所有控件剔除,将剩余的控件作为所述孤岛控件。
- 根据权利要求3所述的方法,其中,对与所述策略的开始框相隔离的孤岛控件进行检测,包括:沿叶子节点控件所在路径向上逐级遍历控件,直到遍历到位于所述叶子节点控件所在路径的顶点的顶点节点控件;若所述顶点节点控件不是开始框控件,则将沿所述叶子节点控件所在路径遍历到的各控件作为所述孤岛控件。
- 根据权利要求1所述的方法,其中,响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果,包括:响应于所述第一策略检测条件的触发,对各叶子节点控件所属节点类型进行检测,得到描述有属于非事件框的叶子节点控件的全局检测结果;基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述全局检测结果所描述的属于非事件框的叶子节点控件,定位属于非事件框的叶子节点控件,并确定所述策略在属于非事件框的叶子节点控件处存在风险。
- 根据权利要求1所述的方法,其中,所述第一策略检测条件包括:检测到对所述策略所作的回测操作,检测到对所述策略所作的实盘运行操作,检测到对所述策略所作的逻辑检验操作。
- 根据权利要求1所述的方法,其中,响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果,包括:响应于所述第二策略检测条件的触发,遍历各控件的内部参数;基于所述内部参数使用到的全局变量,确定控件所遗漏的全局变量,得到描述有控件所遗漏的全局变量的控件内检测结果;基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述控件内检测结果所描述的控件所遗漏的全局变量,确定所述策略在所述控件所遗漏的全局变量处存在风险。
- 根据权利要求1所述的方法,其中,响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果,包括:响应于所述第二策略检测条件的触发,基于检测到的各控件的内部参数,确定所述策略中的组合条件的逻辑合法性,得到描述有所述组合条件的逻辑合法性的控件内检测结果;基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述组合条件的逻辑合法性,定位所述策略中的逻辑非法的组合条件,并确定所述策略在所述逻辑非法的组合条件处存在风险。
- 根据权利要求1所述的方法,其中,所述第二策略检测条件包括:检测到对控件所作的编辑操作。
- 根据权利要求1所述的方法,其中,响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果,包括:响应于所述第三策略检测条件的触发,对属于条件框的控件进行检测,确定条件框的出口连线的定义,得到描述有出口连线的定义的 控件间检测结果;基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述控件间检测结果所描述的出口连线的定义,定位条件框的错误连线,并确定所述策略在所述错误连线处存在风险。
- 根据权利要求1所述的方法,其中,所述第三策略检测条件包括:检测到对控件所作的移除操作,检测到对控件所作的连线操作。
- 一种策略风险定位装置,所述装置包括:策略构建模块,配置为响应于在画布区域对于控件的拖拽操作,构建待运行的策略;全局检测模块,配置为响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果;控件内检测模块,配置为响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果;控件间检测模块,配置为响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;风险定位模块,配置为基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险。
- 一种电子设备,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述电子设备实现如权利要求1至12中任一项所述的方法。
- 一种计算机可读存储介质,其上存储有计算机可读指令,当所述计算机可读指令被计算机的处理器执行时,使计算机执行权利要求1至12中任一项所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3241827A CA3241827A1 (en) | 2021-12-21 | 2022-12-05 | Policy risk positioning method and apparatus, electronic device, and storage medium |
AU2022417432A AU2022417432A1 (en) | 2021-12-21 | 2022-12-05 | Policy risk positioning method and apparatus, electronic device, and storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111575104.1 | 2021-12-21 | ||
CN202111575104.1A CN114237477B (zh) | 2021-12-21 | 2021-12-21 | 策略风险定位方法、装置、电子设备及存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023116399A1 true WO2023116399A1 (zh) | 2023-06-29 |
Family
ID=80760758
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/136438 WO2023116399A1 (zh) | 2021-12-21 | 2022-12-05 | 策略风险定位方法、装置、电子设备及存储介质 |
Country Status (4)
Country | Link |
---|---|
CN (1) | CN114237477B (zh) |
AU (1) | AU2022417432A1 (zh) |
CA (1) | CA3241827A1 (zh) |
WO (1) | WO2023116399A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117453534A (zh) * | 2023-10-10 | 2024-01-26 | 上海卡方信息科技有限公司 | 一种数据处理方法、装置、设备及可读存储介质 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114237477B (zh) * | 2021-12-21 | 2024-05-14 | 富途网络科技(深圳)有限公司 | 策略风险定位方法、装置、电子设备及存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8682773B1 (en) * | 2010-05-03 | 2014-03-25 | KnowVera, LLC | Methods and system for visually designing trading strategies and execution thereof |
US20150235318A1 (en) * | 2014-02-19 | 2015-08-20 | William Huan | Trading systems and methods |
CN110503556A (zh) * | 2019-08-28 | 2019-11-26 | 中国银行股份有限公司 | 交易策略模型的可视化配置方法及装置 |
CN113254003A (zh) * | 2021-07-19 | 2021-08-13 | 北京星火量化科技有限公司 | 量化交易策略的编辑方法及系统 |
CN114237477A (zh) * | 2021-12-21 | 2022-03-25 | 富途网络科技(深圳)有限公司 | 策略风险定位方法、装置、电子设备及存储介质 |
CN115053245A (zh) * | 2021-09-24 | 2022-09-13 | 富途网络科技(深圳)有限公司 | 创建量化交易策略的方法和装置 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8336085B2 (en) * | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
US7844530B2 (en) * | 2006-07-31 | 2010-11-30 | Insight Catastrophe Solutions | Apparatuses, methods, and systems for providing a risk scoring engine user interface |
US8650623B2 (en) * | 2007-01-17 | 2014-02-11 | International Business Machines Corporation | Risk adaptive information flow based access control |
US20160125535A1 (en) * | 2014-10-31 | 2016-05-05 | Trading Technologies International Inc. | Location-aware risk mitigation systems and methods |
CN110688107B (zh) * | 2019-09-26 | 2023-09-26 | 中国银行股份有限公司 | 量化交易策略的代码生成方法及装置 |
CN111176635A (zh) * | 2019-12-09 | 2020-05-19 | 深圳市博思恒业信息技术有限公司 | 模块化量化系统及其执行方法、电子设备 |
CN111583017A (zh) * | 2020-04-09 | 2020-08-25 | 上海淇毓信息科技有限公司 | 基于客群定位的风险策略生成方法、装置及电子设备 |
-
2021
- 2021-12-21 CN CN202111575104.1A patent/CN114237477B/zh active Active
-
2022
- 2022-12-05 WO PCT/CN2022/136438 patent/WO2023116399A1/zh active Application Filing
- 2022-12-05 CA CA3241827A patent/CA3241827A1/en active Pending
- 2022-12-05 AU AU2022417432A patent/AU2022417432A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8682773B1 (en) * | 2010-05-03 | 2014-03-25 | KnowVera, LLC | Methods and system for visually designing trading strategies and execution thereof |
US20150235318A1 (en) * | 2014-02-19 | 2015-08-20 | William Huan | Trading systems and methods |
CN110503556A (zh) * | 2019-08-28 | 2019-11-26 | 中国银行股份有限公司 | 交易策略模型的可视化配置方法及装置 |
CN113254003A (zh) * | 2021-07-19 | 2021-08-13 | 北京星火量化科技有限公司 | 量化交易策略的编辑方法及系统 |
CN115053245A (zh) * | 2021-09-24 | 2022-09-13 | 富途网络科技(深圳)有限公司 | 创建量化交易策略的方法和装置 |
CN114237477A (zh) * | 2021-12-21 | 2022-03-25 | 富途网络科技(深圳)有限公司 | 策略风险定位方法、装置、电子设备及存储介质 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117453534A (zh) * | 2023-10-10 | 2024-01-26 | 上海卡方信息科技有限公司 | 一种数据处理方法、装置、设备及可读存储介质 |
CN117453534B (zh) * | 2023-10-10 | 2024-05-07 | 上海卡方信息科技有限公司 | 一种数据处理方法、装置、设备及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CA3241827A1 (en) | 2023-06-29 |
AU2022417432A1 (en) | 2024-07-25 |
CN114237477B (zh) | 2024-05-14 |
CN114237477A (zh) | 2022-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2023116399A1 (zh) | 策略风险定位方法、装置、电子设备及存储介质 | |
AU2015201161B2 (en) | Event correlation | |
US7680645B2 (en) | Software feature modeling and recognition | |
US20170244733A1 (en) | Intrusion detection using efficient system dependency analysis | |
US11929985B2 (en) | Network-based authentication rule cleaning and optimization | |
US11119843B2 (en) | Verifying application behavior based on distributed tracing | |
CN112368994B (zh) | 日志型式分析设备及日志型式分析方法 | |
US20210397499A1 (en) | Method to efficiently evaluate a log pattern | |
US11809585B2 (en) | Systems and methods for computing database interactions and evaluating interaction parameters | |
CN111027984A (zh) | 业务订单的处理方法、系统、电子设备及计算机存储介质 | |
US20190154707A1 (en) | Smart Advisor for Blood Test Evaluation | |
US8090994B2 (en) | System, method, and computer readable media for identifying a log file record in a log file | |
US8225298B2 (en) | Tool for analyzing Siebel escripts | |
WO2024119806A1 (zh) | 策略编排方法、报文处理方法、装置、设备及系统 | |
CN111324516A (zh) | 自动记录异常事件的方法及装置、存储介质、电子设备 | |
CN104794040A (zh) | 业务监控方法、装置及系统 | |
WO2021172776A1 (en) | Bm return verification method and apparatus | |
KR100791307B1 (ko) | 요금 청구 가능한 자원을 결정하는 장치, 네트워킹된 컴퓨터 시스템, 컴퓨터 구현형 방법 및 컴퓨터 판독가능한 기록 매체 | |
CN112581282A (zh) | 估值结果损益变动监控方法、装置、电子设备及介质 | |
BRPI0621694A2 (pt) | arquivamento de adequação de capital e sistema e método de tributação | |
CN114580889A (zh) | 操作风险管控方法、装置、设备、介质和程序产品 | |
TWI397016B (zh) | 金融程式交易整體機制監控並自動異常排除之方法 | |
Gao et al. | On modeling contagion in the formation of operational risk loss | |
CN112214495B (zh) | 数据执行跟踪方法、装置和设备 | |
US12124599B2 (en) | Systems and methods for computing database interactions and evaluating interaction parameters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22909714 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 3241827 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: AU2022417432 Country of ref document: AU |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022417432 Country of ref document: AU Date of ref document: 20221205 Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11202404260P Country of ref document: SG |