CN109377236A - A kind of risk control method, equipment and storage medium based on fusing mechanism - Google Patents

A kind of risk control method, equipment and storage medium based on fusing mechanism Download PDF

Info

Publication number
CN109377236A
CN109377236A CN201811237523.2A CN201811237523A CN109377236A CN 109377236 A CN109377236 A CN 109377236A CN 201811237523 A CN201811237523 A CN 201811237523A CN 109377236 A CN109377236 A CN 109377236A
Authority
CN
China
Prior art keywords
service
risk control
post
fusing
prior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811237523.2A
Other languages
Chinese (zh)
Inventor
赵明鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Sheng Electronic Payment Services Ltd
Original Assignee
Shanghai Sheng Electronic Payment Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Sheng Electronic Payment Services Ltd filed Critical Shanghai Sheng Electronic Payment Services Ltd
Priority to CN201811237523.2A priority Critical patent/CN109377236A/en
Publication of CN109377236A publication Critical patent/CN109377236A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This application discloses a kind of risk control method, equipment and storage mediums based on fusing mechanism, are related to Internet technical field.The described method includes: receiving the service request of target service, the first business datum relevant to target service is obtained;Determine whether target service reaches the first blown state according to the first business datum;If so, being handled according to the corresponding risk control rule of the first blown state service request;Alternatively, if it is not, being handled according to the preset rule of risk control in advance service request.The risk control process of the application effectively avoids business interception and heavy losses as caused by access delay, system self problem etc., realizes effective risk control by setting blown state and corresponding processing rule.

Description

Risk control method and device based on fusing mechanism and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a risk control method and apparatus based on a fusing mechanism, and a storage medium.
Background
As third party payment institutions grow in development, risk management requirements and regulatory requirements continue to be strengthened. Each business and transaction requires filtering by the risk control system to eliminate various risks, meeting different regulatory and risk control requirements. However, the current risk control process still suffers from the following drawbacks: the phenomenon of congestion caused by tens of thousands of high-frequency transactions intensively accessing the same risk control system often occurs; secondly, after different business systems access the risk control system, the situation that a large number of normal transactions are influenced because a feedback result of the risk control system is not obtained within a specified time is also generated; thirdly, due to the occurrence of the situations of loopholes (bugs) of the risk control system, abnormal increase of transaction amount and the like, the situation that the return of the risk control system is delayed in time or misjudged sometimes occurs. For example, at a certain point in the morning, the transaction amount is increased abnormally, and the risk control system mistakenly intercepts hundreds of thousands of transactions for the system being attacked, which causes great influence on the service; for another example, due to an abnormality of the risk control system, the risk control result cannot be returned for a long time, and a lot of transactions are affected. Therefore, an effective risk control method is necessary to ensure smooth proceeding of each business and transaction.
Disclosure of Invention
In order to overcome the defects in the prior art, the application provides a risk control method and device based on a fusing mechanism and a storage medium.
In a first aspect, the present application provides a risk control method based on a fusing mechanism, including:
receiving a service request of a target service, and acquiring first service data related to the target service;
determining whether the target service reaches a first fusing state according to the first service data;
if so, processing the service request according to a risk control rule corresponding to the first fusing state; or,
and if not, processing the service request according to a preset prior risk control rule.
Optionally, the method further comprises:
acquiring second service data related to the target service;
determining whether the target service reaches a second fusing state according to the second service data;
if so, processing the service request according to a risk control rule corresponding to the second fusing state; or,
and if not, processing the service request according to a preset after-the-fact risk control rule.
Optionally, before the obtaining of the second service data related to the target service, the method further includes:
and determining that the service request passes the prior risk control based on a risk control rule corresponding to the first fusing state or the preset prior risk control rule.
Optionally, after receiving the service request of the target service, the method further includes:
determining the type of the target service;
the acquiring first service data related to the target service includes:
and acquiring the first service data corresponding to the type of the target service.
Optionally, the acquiring second service data related to the target service includes:
and acquiring the second service data corresponding to the type of the target service.
Optionally, the determining whether the target service reaches the second fusing state according to the second service data includes:
counting the second service data to obtain post statistical data volume;
determining whether the post-incident statistical data amount reaches a second fusing threshold;
if yes, determining that the target service reaches a second fusing state; or,
if not, determining that the target service does not reach the second fusing state.
Optionally, the post-event statistical data amount includes a plurality of post-event statistical characteristic values, the second fusing threshold includes a plurality of second sub-thresholds, and the risk factor corresponding to the risk control rule corresponding to the second fusing state includes a plurality of post-event risk factors, where the plurality of post-event statistical characteristic values correspond to the plurality of post-event risk factors respectively;
correspondingly, the processing the service request according to the risk control rule corresponding to the second fusing state includes one of the following situations:
when the plurality of post-event statistical characteristic values do not reach the corresponding second sub-threshold values, processing the service request according to all factors of the plurality of post-event risk factors;
when a part of the post-event statistical characteristic values reach the corresponding second sub-threshold, processing the service request according to post-event risk factors corresponding to the post-event statistical characteristic values which do not reach the corresponding second sub-threshold in the post-event risk factors;
and when all the post-event statistical characteristic values reach the corresponding second sub-threshold values, defaulting the service request to pass post-event risk control.
Optionally, the determining whether the target service reaches the first fusing state according to the first service data includes:
counting the first service data to obtain a prior statistical data volume;
determining whether the amount of prior statistics reaches a first fusing threshold;
if yes, determining that the target service reaches a first fusing state; or,
if not, determining that the target service does not reach the first fusing state.
Optionally, the prior statistical data amount includes a plurality of prior statistical feature values, the first fusing threshold includes a plurality of first sub-thresholds, and the risk factor corresponding to the risk control rule corresponding to the first fusing state includes a plurality of prior risk factors, where the plurality of prior statistical feature values correspond to the plurality of first sub-thresholds and the plurality of prior risk factors, respectively;
correspondingly, the processing the service request according to the risk control rule corresponding to the first fusing state includes one of the following situations:
when the plurality of prior statistical characteristic values do not reach the corresponding first sub-threshold, processing the service request according to all factors of the plurality of prior risk factors;
when part of the prior statistical characteristic values reach the corresponding first sub-threshold, processing the service request according to the prior risk factor corresponding to the prior statistical characteristic value which does not reach the corresponding first sub-threshold in the prior risk factors;
and when all the plurality of the prior statistical characteristic values reach the corresponding first sub-threshold, defaulting the service request to pass the prior risk control.
Optionally, when the target service reaches the first fusing state, the method further includes: and sending out fusing early warning information.
In a second aspect, it is proposed a risk control device based on a fusing mechanism, comprising:
one or more processors, storage devices to store one or more programs;
the one or more programs, when executed by the processor, implement the method as described in the first aspect of the application.
In a third aspect, it is proposed to provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method according to the first aspect of the application.
The application has the advantages that:
in the application, aiming at different business processes of each business, the risk control of each business is divided into pre-risk control and post-risk control, or only pre-risk control; and in each risk control process, the smooth operation of each service is ensured under the conditions that the service request access is overtime, the interception exception of the risk control system is increased, the risk control system has a bug (bug) and cannot repair the bug by self and the like by setting the corresponding fusing state and the fusing processing rule.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a method for pre-risk control based on a fusing mechanism according to an embodiment of the present application;
FIG. 2 is a flowchart of a method for controlling risk after events based on a fusing mechanism according to an embodiment of the present disclosure;
FIG. 3 is a block diagram of a risk control device based on a fusing mechanism according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
According to an embodiment of the present application, a risk control method based on a fusing mechanism is proposed, which may be performed by a risk control device. Wherein the risk control device may be a server, for example. As shown in fig. 1, includes:
step 101: and receiving a service request of a target service, and acquiring first service data related to the target service.
Specifically, a service request of a target service sent by a service end may be received, where the target service may include at least one of registering an account, real name of the account, binding a bank card, binding a mobile phone number, cancelling the account, placing an order, paying a fee, unbinding the bank card, and cancelling the order.
In one example, after receiving the service request of the target service, the method further includes: determining the type of the target service; for example, the type of targeted service may be order placement, payment, and the like.
Correspondingly, acquiring first service data related to the target service may include: and acquiring first service data corresponding to the type of the target service.
In the present application, according to the difference of the business process of each target business, the risk control includes prior risk control and posterior risk control, or only includes prior risk control. The former risk control is mostly risk control of the first fusing state and the service information not related to the third party, and the later risk control is mostly risk control of the second fusing state and the service information related to the third party. The first service data is specifically data required for determining whether the target service reaches the first fusing state in the prior risk control, and includes the number of service requests, the feedback time of the prior risk evaluation result of the service requests, the number of times of repeatedly binding and releasing the card for the same Internet Protocol (IP) address, and the like.
For example, the type of the target service is payment, and the first service data may include access time of each payment request, feedback time of a pre-risk control result of each payment request, and the like.
Step 102: determining whether the target service reaches a first fusing state according to the acquired first service data, if so, executing step 103; otherwise step 104 is performed.
Determining whether the target service reaches the first fusing state according to the acquired first service data may include: counting the acquired first service data to obtain the amount of the previously counted data; determining whether the obtained beforehand statistical data amount reaches a first fusing threshold value; if yes, determining that the target service reaches a first fusing state; or, if not, determining that the target service does not reach the first fusing state.
The counting the acquired first service data to obtain the prior statistical data amount may include: and counting the acquired first service data to obtain a plurality of prior statistical characteristic values.
It should be noted that, for different target services, the corresponding prior statistical characteristic values may be the same or different. For example, the type of the target service is payment, and the corresponding prior statistical characteristic value includes the number of times of paying for access every 5 minutes, the number of times of paying requests with the return time of the prior risk control result exceeding 0.05 seconds, and the like.
Further, the first fusing threshold includes a first minimum threshold corresponding to the plurality of pre-statistical characteristic values; correspondingly, determining whether the obtained amount of the prior statistical data reaches the first fusing threshold may include: determining whether the plurality of the pre-statistical characteristic values obtained through statistics reach a corresponding first minimum threshold value, and if so, determining that the target service reaches a first fusing state; or, if not, determining that the target service does not reach the first fusing state.
For example, the type of the target service is payment, the first service data such as the access time of each acquired payment request and the feedback time of the prior risk control result of each payment request are counted, characteristic values such as that the payment access exceeds 2000 times per 5 minutes and the payment request exceeds 30 times per 0.05 second of the return time of the prior risk control result are obtained, the characteristic values all exceed the corresponding first minimum threshold, and the payment access exceeds 1500 times per 5 minutes and the return time of the prior risk control result exceeds 20 times per 0.05 second, and it is determined that the payment service reaches the first fusing state.
Further, when the target service reaches the first blown state, the method may further include: and sending out fusing early warning information.
Specifically, the fusing early warning information can be sent out by sending a mail to a prestored mailbox address or sending a short message to a prestored telephone number, so as to prompt related personnel.
Step 103: and processing the received service request according to a risk control rule corresponding to the first fusing state.
In this application, the first fusing threshold further includes a plurality of first sub-thresholds, where the plurality of first sub-thresholds are greater than corresponding first minimum thresholds; the risk factors corresponding to the risk control rule corresponding to the first fusing state comprise a plurality of prior risk factors, and the plurality of prior statistical characteristic values respectively correspond to the plurality of first sub-thresholds and the plurality of prior risk factors;
correspondingly, step 103 includes one of the following situations:
when the counted multiple prior statistical characteristic values do not reach the corresponding first sub-threshold, processing the service request according to all factors of the multiple prior risk factors;
when part of the counted multiple prior statistical characteristic values reach the corresponding first sub-threshold, processing the service request according to the prior risk factor corresponding to the prior statistical characteristic value which does not reach the corresponding first sub-threshold among the multiple prior risk factors;
and when the plurality of statistical prior statistical characteristic values reach the corresponding sub-threshold values, the default service request is controlled through the prior risk.
For example, the type of the target service is payment, and the corresponding prior risk factors include risk factor 1 and risk factor 2; risk factor 1 corresponds to the number of visits paid every 5 minutes, the corresponding first sub-threshold being 5000 times; the risk factor 2 corresponds to the number of times that the return time of the prior risk control result exceeds 0.05 second, and the corresponding first sub-threshold value is 60 times; when the payment access is calculated to be about 3000 times per 5 minutes and the payment request with the prior risk control result return time exceeding 0.05 second is about 40 times, judging that the payment requests do not reach the corresponding first sub-threshold value, and processing the service request according to the risk factor 1 and the risk factor 2; when the payment access is counted to be more than 5000 times per 5 minutes and the payment request with the prior risk control result return time of more than 0.05 second is counted to be about 50 times, the service request is processed according to the risk factor 2; and when the counted payment access exceeds 5000 times per 5 minutes and the payment request with the prior risk control result return time exceeding 0.05 second exceeds 60 times, judging that the corresponding first sub-threshold values are reached, and controlling the default service request through the prior risk.
Further, the processing of the service request according to the risk factor may specifically be: releasing the service request according to a release rule corresponding to the risk factor, wherein the released service request is controlled by default through the prior risk so as to avoid the condition that the prior risk control result is returned to delay or excessive interception is caused by a leak (bug) of the system, so that the major loss of the service is caused; the releasing rule can be set according to the requirement, for example, when a certain condition is met, the corresponding number of service requests are released.
Step 104: and processing the received service request according to a preset risk control rule in advance.
Specifically, risk assessment is performed on the received service request according to a preset advance risk control rule, and an obtained assessment result is returned to the service end as an advance risk control result.
Further, when the target service of the received service request only includes the prior risk control, according to the service flow of the target service, after performing risk assessment on the received service request according to a preset prior risk control rule, the method may further include returning an obtained assessment result as a prior risk control result to the third-party organization. For example, if the target service of the received service request is a binding card, which only includes the prior risk control, the risk control result through the prior risk control is returned to the third-party payment mechanism, so that the third-party payment mechanism can perform the binding operation on the corresponding bank card.
It should be noted that, for different target services, the preset advance risk control rules may be different or the same; for example, where the target business is payment, the pre-existing risk control rules include risk assessment of the authenticity of the order, the IP address of the order placed (whether on a blacklist, etc.), etc.; for another example, the target business is a bound bank card, and the advance risk control rule includes risk assessment of identity information of a card binding person, an IP address corresponding to a card binding request and the like.
Further, when the risk control of the target service further includes a post risk control, correspondingly, the method further includes: determining whether the service request passes the pre-risk control or not based on a risk control rule corresponding to the first fusing state or a preset pre-risk control rule, and when determining that the service request passes the pre-risk control, as shown in fig. 2, executing the following operations:
step 201: and acquiring second service data related to the target service.
Specifically, the second service data corresponding to the type of the target service is obtained.
Further, the second service data is specifically data required for determining whether the target service reaches the second fusing state in the later risk control, and includes the number of service requests subjected to earlier risk control, the later risk control result feedback time of the service requests, and the like.
Step 202: and determining whether the target service reaches a second fusing state according to the second service data, if so, executing step 203, and if not, executing step 204.
Determining whether the target service reaches a second fusing state according to second service data comprises the following steps: counting the second service data to obtain post statistical data volume; determining whether the obtained post-event statistical data quantity reaches a second fusing threshold value; if yes, determining that the target service reaches a second fusing state; or, if not, determining that the target service does not reach the second fusing state.
The counting the second service data to obtain the post statistical data amount may include: counting the second service data to obtain a plurality of post statistical characteristic values;
it should be noted that, for different target services, the corresponding post statistical characteristic values may be the same or different. For example, the type of the target service is payment, and the corresponding post statistical characteristic value includes the number of times of payment requests passing the pre-risk control every 5 minutes, the number of times of payment requests with the return time of the post-risk control result exceeding 0.05 second, and the like.
Further, the second fusing threshold includes a second minimum threshold corresponding to the plurality of post-event statistical characteristic values; correspondingly, determining whether the obtained post-event statistical data amount reaches the second fusing threshold may include: determining whether the plurality of post-event statistical characteristic values obtained through statistics reach a corresponding second minimum threshold value, and if yes, determining that the target service reaches a second fusing state; or, if not, determining that the target service does not reach the second fusing state.
For example, the type of the target service is payment, and the second service data, such as the time when each acquired payment request passes the pre-risk control, the feedback time of the post-risk control result of each current payment request, and the like, are counted to obtain characteristic values, such as that the payment request passing the pre-risk control exceeds 1500 times every 5 minutes, the post-risk control result return time of each current payment request exceeds 20 times in 0.05 seconds, and the like, and the payment requests passing the pre-risk control 1000 times every 5 minutes and the post-risk control result return time exceeds 15 times in 0.05 seconds, which all exceed the corresponding second minimum threshold, so that the payment service is determined to reach the second fusing state.
Step 203: and processing the service request according to a risk control rule corresponding to the second fusing state.
In this application, the second fusing threshold further includes a plurality of second sub-thresholds, where the plurality of second sub-thresholds are greater than corresponding second minimum thresholds; the risk factors corresponding to the risk control rule corresponding to the second fusing state include a plurality of risk factors, and the plurality of pre-statistical characteristic values correspond to the plurality of second sub-thresholds and the plurality of risk factors respectively.
Correspondingly, the service request is processed according to the risk control rule corresponding to the second fusing state, which includes one of the following situations:
when the obtained plurality of post-affair statistical characteristic values do not reach the corresponding second sub-threshold value, processing the received service request according to all factors of the plurality of risk factors;
when a part of the obtained post-event statistical characteristic values reach the corresponding sub-threshold, processing the service request according to the risk factor corresponding to the post-event statistical characteristic value which does not reach the corresponding sub-threshold in the plurality of risk factors;
and when all the obtained multiple post-event statistical characteristic values reach the corresponding sub-threshold values, defaulting the service request to pass post-event risk control.
For example, the type of the target service is payment, and the corresponding prior risk factors include risk factor 3 and risk factor 4; the risk factor 3 corresponds to the number of times of payment requests passing the pre-risk control every 5 minutes, and the corresponding second sub-threshold value is 4000 times; the risk factor 2 corresponds to the number of times that the return time of the risk control result after the incident exceeds 0.05 second, and the corresponding second sub-threshold is 50 times; when the payment requests passing the pre-risk control in every 5 minutes are counted to exceed 3000 times and the payment requests passing the pre-risk control result return time of over 0.05 second exceed 30 times, judging that the payment requests do not reach the corresponding second sub-threshold, and processing the service requests according to risk factors 3 and 4; when the payment request passing the pre-risk control in every 5 minutes exceeds 4000 times and the payment request passing the post-risk control result return time exceeding 0.05 second exceeds 40 times, processing the service request according to the risk factor 3; and when the counted payment requests passing the pre-risk control every 5 minutes exceed 4000 times and the counted payment requests passing the post-risk control result return time exceeds 50 times, judging that the corresponding second sub-threshold values are reached and defaulting the service requests to pass the post-risk control.
Further, the processing of the service request according to the after-event risk factors may specifically be: releasing the service request according to a release rule corresponding to the post-event risk factor, wherein the default passed service request is subjected to post-event risk control so as to avoid the condition that the post-event risk control result is returned to delay or excessive interception is caused by the BUG of the system, so that the major loss of the service is caused; the releasing rule can be set according to the requirement, for example, when a certain condition is met, the corresponding number of service requests are released.
Step 204: and processing the service request according to a preset after-the-fact risk control rule.
Specifically, risk assessment is carried out on a received service request which passes pre-risk control according to a preset post-risk control rule, an obtained assessment result is used as a post-risk control result, and the post-risk control result is returned to a service end;
further, according to the business process of the target business, after the risk assessment is performed on the received business request according to the preset risk control rule in advance, the obtained assessment result can be used as a risk control result and returned to the third-party organization.
For example, if the type of the target service is unpaid, the post risk control result through the post risk control is returned to the service terminal and the third party payment system, so that the service terminal can determine that the service request passes the risk control, and the third party payment system can perform the payment operation.
It should be noted that, for different target services, the preset after-event risk control rules may be different or the same; for example, the target business is payment, and the post-event risk control rule includes risk assessment of identity information of the payer, validity of the payment information, and the like.
Therefore, aiming at different business processes of each business, the risk control of each business is divided into pre-risk control and post-risk control, or only pre-risk control; and in each risk control process, the smooth operation of each service is ensured under the conditions of overtime service request access, abnormally increased risk control system interception, incapability of self-repairing the risk control system due to bug occurrence and the like by setting corresponding fusing states and processing rules.
According to the embodiment of the application, a risk control device based on a fusing mechanism is further provided. The risk control device may include a module or a unit capable of executing the steps of the methods shown in fig. 1 and fig. 2, and the module or the unit may be implemented by software, hardware or a combination of software, and the present application is not limited thereto. Illustratively, as shown in fig. 3, a risk control device includes:
the receiving module is used for receiving a service request of a target service;
the first acquisition module is used for acquiring first service data related to the target service;
the first determining module is used for determining whether the target service reaches a first fusing state according to the first service data;
the first processing module before the event is used for processing the service request according to a risk control rule corresponding to the first fusing state when the first determining module determines that the first determining module is positive;
and the second pre-processing module is used for processing the service request according to a preset pre-risk control rule when the first determining module determines that the service request is negative.
According to an embodiment of the application, the system further comprises: the second obtains module, second and confirms module, first after-event processing module and second after-event processing module, wherein:
the second acquisition module is used for acquiring second service data related to the target service;
the second determining module is used for determining whether the target service reaches a second fusing state according to the second service data;
the first post-event processing module is used for processing the service request according to a risk control rule corresponding to the second fusing state when the second determining module determines that the second fusing state is positive;
and the second post-processing module is used for processing the service request according to a preset post-risk control rule when the second determining module determines that the service request is negative.
According to an embodiment of the application, the system further comprises: a third determination module;
a third determining module, configured to determine that the service request passes risk control in advance based on a risk control rule corresponding to the first fusing state or the preset risk control rule in advance;
the second obtaining module is specifically configured to obtain second service data related to the target service when the third determining module determines that the service request passes risk control in advance.
According to an embodiment of the application, the system further comprises: a fourth determination module;
a fourth determining module, configured to determine a type of the target service;
the first obtaining module is specifically configured to obtain the first service data corresponding to the type of the target service;
and the second obtaining module is specifically configured to obtain the first service data corresponding to the type of the target service.
According to an embodiment of the present application, the first determining module is specifically configured to:
counting the first service data to obtain a prior statistical data volume;
determining whether the amount of prior statistics reaches a first fusing threshold;
if yes, determining that the target service reaches a first fusing state; or,
if not, determining that the target service does not reach the first fusing state.
Further, the prior statistical data amount includes a plurality of prior statistical characteristic values, the first fusing threshold includes a plurality of first sub-thresholds, and the risk factor corresponding to the risk control rule corresponding to the first fusing state includes a plurality of prior risk factors, where the plurality of prior statistical characteristic values correspond to the plurality of first sub-thresholds and the plurality of prior risk factors, respectively;
correspondingly, the first transaction processing module is specifically configured to:
when the plurality of prior statistical characteristic values do not reach the corresponding first sub-threshold, processing the service request according to all factors of the plurality of prior risk factors;
when part of the prior statistical characteristic values reach the corresponding first sub-threshold, processing the service request according to the prior risk factor corresponding to the prior statistical characteristic value which does not reach the corresponding first sub-threshold in the prior risk factors;
and when all the plurality of the prior statistical characteristic values reach the corresponding first sub-threshold, defaulting the service request to pass the prior risk control.
According to an embodiment of the present application, the second determining module is specifically configured to:
counting the second service data to obtain post statistical data volume;
determining whether the post-incident statistical data amount reaches a second fusing threshold;
if yes, determining that the target service reaches a second fusing state; or,
if not, determining that the target service does not reach the second fusing state.
Further, the post-event statistical data amount includes a plurality of post-event statistical characteristic values, the second fusing threshold includes a plurality of second sub-thresholds, and the risk factors corresponding to the risk control rule corresponding to the second fusing state include a plurality of post-event risk factors, where the plurality of post-event statistical characteristic values correspond to the plurality of post-event risk factors, respectively;
correspondingly, the first post-event processing module is specifically configured to:
when the plurality of post-event statistical characteristic values do not reach the corresponding second sub-threshold values, processing the service request according to all factors of the plurality of post-event risk factors;
when a part of the post-event statistical characteristic values reach the corresponding second sub-threshold, processing the service request according to post-event risk factors corresponding to the post-event statistical characteristic values which do not reach the corresponding second sub-threshold in the post-event risk factors;
and when all the post-event statistical characteristic values reach the corresponding second sub-threshold values, defaulting the service request to pass post-event risk control.
According to an embodiment of the application, the system further comprises: an early warning module;
and the early warning module is used for sending out the fusing early warning information when the first determining module determines that the target service reaches the first fusing state.
According to an embodiment of the present application, there is also provided a risk control device based on a fusing mechanism, including but not limited to: at least one processor, at least one storage device; wherein the storage means stores program code executable by the processor to cause the processor to perform the steps of the above-described risk control method based on a fusing mechanism.
Further, the storage device may include a readable medium in the form of a volatile memory unit, such as a random access memory unit (RAM) and/or a cache memory unit, and may further include a read only memory unit (ROM).
According to an embodiment of the present application, a computer-readable medium is also proposed, on which a computer program (i.e. a program product) is stored, which, when being executed by a processor, implements the above-mentioned risk control method based on a fusing mechanism.
Further, the computer-readable storage medium includes, but is not limited to: phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory, or other optical or magnetic storage media, which are not described in detail herein.
Through the above description of the embodiments, those skilled in the art will readily understand that the embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiment of the present invention.
It should be noted that, in the present application, all the embodiments are described in a related manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment is mainly described as a difference from the other embodiments. Especially for the device embodiment, since it is basically similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A risk control method based on a fusing mechanism is characterized by comprising the following steps:
receiving a service request of a target service, and acquiring first service data related to the target service;
determining whether the target service reaches a first fusing state according to the first service data;
if so, processing the service request according to a risk control rule corresponding to the first fusing state; or,
and if not, processing the service request according to a preset prior risk control rule.
2. The method of claim 1, further comprising:
acquiring second service data related to the target service;
determining whether the target service reaches a second fusing state according to the second service data;
if so, processing the service request according to a risk control rule corresponding to the second fusing state; or,
and if not, processing the service request according to a preset after-the-fact risk control rule.
3. The method of claim 2, wherein before the obtaining the second service data related to the target service, further comprising:
and determining that the service request passes the prior risk control based on a risk control rule corresponding to the first fusing state or the preset prior risk control rule.
4. The method of claim 2, wherein after receiving the service request of the target service, further comprising:
determining the type of the target service;
the acquiring first service data related to the target service includes:
and acquiring the first service data corresponding to the type of the target service.
5. The method of claim 4, wherein the obtaining second service data related to the target service comprises:
and acquiring the second service data corresponding to the type of the target service.
6. The method according to any of claims 2 to 5, wherein the determining whether the target service reaches a second blown state according to the second service data comprises:
counting the second service data to obtain post statistical data volume;
determining whether the post-incident statistical data amount reaches a second fusing threshold;
if yes, determining that the target service reaches a second fusing state; or,
if not, determining that the target service does not reach the second fusing state.
7. The method according to claim 6, wherein the post-event statistical data amount includes a plurality of post-event statistical characteristic values, the second fusing threshold includes a plurality of second sub-thresholds, and the risk factor corresponding to the risk control rule corresponding to the second fusing state includes a plurality of post-event risk factors, wherein the plurality of post-event statistical characteristic values correspond to the plurality of post-event risk factors, respectively;
the processing the service request according to the risk control rule corresponding to the second fusing state includes one of the following situations:
when the plurality of post-event statistical characteristic values do not reach the corresponding second sub-threshold values, processing the service request according to all factors of the plurality of post-event risk factors;
when a part of the post-event statistical characteristic values reach the corresponding second sub-threshold, processing the service request according to post-event risk factors corresponding to the post-event statistical characteristic values which do not reach the corresponding second sub-threshold in the post-event risk factors;
and when all the post-event statistical characteristic values reach the corresponding second sub-threshold values, defaulting the service request to pass post-event risk control.
8. The method according to any one of claims 1 to 7, wherein the determining whether the target service reaches a first blown state according to the first service data comprises:
counting the first service data to obtain a prior statistical data volume;
determining whether the amount of prior statistics reaches a first fusing threshold;
if yes, determining that the target service reaches a first fusing state; or,
if not, determining that the target service does not reach the first fusing state.
9. The method according to claim 8, wherein the prior statistical data amount comprises a plurality of prior statistical characteristic values, the first fusing threshold comprises a plurality of first sub-thresholds, and the risk factor corresponding to the risk control rule corresponding to the first fusing state comprises a plurality of prior risk factors, wherein the plurality of prior statistical characteristic values correspond to the plurality of first sub-thresholds and the plurality of prior risk factors, respectively;
the processing the service request according to the risk control rule corresponding to the first fusing state includes one of the following situations:
when the plurality of prior statistical characteristic values do not reach the corresponding first sub-threshold, processing the service request according to all factors of the plurality of prior risk factors;
when part of the prior statistical characteristic values reach the corresponding first sub-threshold, processing the service request according to the prior risk factor corresponding to the prior statistical characteristic value which does not reach the corresponding first sub-threshold in the prior risk factors;
and when all the plurality of the prior statistical characteristic values reach the corresponding first sub-threshold, defaulting the service request to pass the prior risk control.
10. The method according to any of claims 1 to 9, wherein when the target traffic reaches the first blown state, the method further comprises:
and sending out fusing early warning information.
11. A risk control device based on a fusing mechanism, comprising:
one or more processors, storage devices to store one or more programs;
the one or more programs, when executed by the processor, implement the method of any of claims 1-10.
12. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-10.
CN201811237523.2A 2018-10-23 2018-10-23 A kind of risk control method, equipment and storage medium based on fusing mechanism Pending CN109377236A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811237523.2A CN109377236A (en) 2018-10-23 2018-10-23 A kind of risk control method, equipment and storage medium based on fusing mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811237523.2A CN109377236A (en) 2018-10-23 2018-10-23 A kind of risk control method, equipment and storage medium based on fusing mechanism

Publications (1)

Publication Number Publication Date
CN109377236A true CN109377236A (en) 2019-02-22

Family

ID=65401459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811237523.2A Pending CN109377236A (en) 2018-10-23 2018-10-23 A kind of risk control method, equipment and storage medium based on fusing mechanism

Country Status (1)

Country Link
CN (1) CN109377236A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110390593A (en) * 2019-07-03 2019-10-29 矩阵元技术(深圳)有限公司 The risk control method and device of digital cash transaction
CN110956544A (en) * 2019-11-14 2020-04-03 海南新软软件有限公司 Digital asset transaction risk control method and device
CN112015578A (en) * 2020-10-26 2020-12-01 上海富友支付服务股份有限公司 Wind control system and method based on pre-synchronous processing and post-asynchronous processing
CN112508581A (en) * 2021-02-05 2021-03-16 深圳华锐金融技术股份有限公司 Commission order risk control method, system, computer equipment and storage medium
CN112819631A (en) * 2021-02-10 2021-05-18 招联消费金融有限公司 Service data processing method and device, computer equipment and storage medium
CN114697060A (en) * 2020-12-29 2022-07-01 广州腾讯科技有限公司 Service control method, device and electronic equipment
CN115001956A (en) * 2022-05-24 2022-09-02 中国平安财产保险股份有限公司 Server cluster operation method, device, equipment and storage medium
CN117785628A (en) * 2023-12-04 2024-03-29 深圳市道旅旅游科技股份有限公司 Fusing triggering early warning method, server, medium and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108198071A (en) * 2017-11-30 2018-06-22 武汉旷腾信息技术有限公司 A kind of futures sales counter risk control method and system
CN108491304A (en) * 2018-03-06 2018-09-04 平安科技(深圳)有限公司 Electronic device, operation system risk control method and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108198071A (en) * 2017-11-30 2018-06-22 武汉旷腾信息技术有限公司 A kind of futures sales counter risk control method and system
CN108491304A (en) * 2018-03-06 2018-09-04 平安科技(深圳)有限公司 Electronic device, operation system risk control method and storage medium

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110390593A (en) * 2019-07-03 2019-10-29 矩阵元技术(深圳)有限公司 The risk control method and device of digital cash transaction
CN110956544B (en) * 2019-11-14 2023-04-11 海南新软软件有限公司 Digital asset transaction risk control method and device
CN110956544A (en) * 2019-11-14 2020-04-03 海南新软软件有限公司 Digital asset transaction risk control method and device
CN112015578A (en) * 2020-10-26 2020-12-01 上海富友支付服务股份有限公司 Wind control system and method based on pre-synchronous processing and post-asynchronous processing
CN112015578B (en) * 2020-10-26 2021-04-02 上海富友支付服务股份有限公司 Wind control system and method based on pre-synchronous processing and post-asynchronous processing
CN114697060B (en) * 2020-12-29 2024-05-07 广州腾讯科技有限公司 Service control method and device and electronic equipment
CN114697060A (en) * 2020-12-29 2022-07-01 广州腾讯科技有限公司 Service control method, device and electronic equipment
CN112508581A (en) * 2021-02-05 2021-03-16 深圳华锐金融技术股份有限公司 Commission order risk control method, system, computer equipment and storage medium
CN112819631B (en) * 2021-02-10 2023-12-08 招联消费金融有限公司 Service data processing method, device, computer equipment and storage medium
CN112819631A (en) * 2021-02-10 2021-05-18 招联消费金融有限公司 Service data processing method and device, computer equipment and storage medium
CN115001956A (en) * 2022-05-24 2022-09-02 中国平安财产保险股份有限公司 Server cluster operation method, device, equipment and storage medium
CN115001956B (en) * 2022-05-24 2023-06-16 中国平安财产保险股份有限公司 Method, device, equipment and storage medium for running server cluster
CN117785628A (en) * 2023-12-04 2024-03-29 深圳市道旅旅游科技股份有限公司 Fusing triggering early warning method, server, medium and equipment

Similar Documents

Publication Publication Date Title
CN109377236A (en) A kind of risk control method, equipment and storage medium based on fusing mechanism
US11075941B2 (en) Risk control method, risk control apparatus, electronic device, and storage medium
CN111988422A (en) Subscription method, device, server and storage medium of application service
CN105635044B (en) Information synchronization method and device
CN108492109B (en) Electronic device, dynamic code request processing method and storage medium
CN114218577A (en) API risk determination method, device, equipment and medium
US11838300B1 (en) Run-time configurable cybersecurity system
CN106612263A (en) Method and device used for processing application access request
CN112561506A (en) Live broadcast data processing method, system, device and medium based on virtual currency
CN116862236A (en) Risk scene assessment method, system, terminal equipment and storage medium
CN110197374B (en) Transaction interception control method and device
CN114221807B (en) Access request processing method, device, monitoring equipment and storage medium
US7991663B1 (en) System for volume and stress testing bank debit card processing systems
EP4052499A1 (en) Sim swap fraud detection
CN113905092B (en) Method, device, terminal and storage medium for determining reusable agent queue
WO2020000753A1 (en) Device security monitoring method and apparatus
CN114301711B (en) Anti-riot brushing method, device, equipment, storage medium and computer program product
CN115220714A (en) Development method and device of application programming interface
CN111507594B (en) Data processing method and device
CN113923260A (en) Method, device, terminal and storage medium for processing proxy environment
US20210209597A1 (en) Intelligent Systems for Identifying Transactions Associated with an Institution Impacted by an Event
CN114157482A (en) Service access control method, device, control equipment and storage medium
CN112767166A (en) Method and device for controlling risk of transaction behavior, computer equipment and storage medium
CN111027075A (en) Vulnerability protection method and device and electronic equipment
CN114461293B (en) Configuration file type open data acquisition method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination