Disclosure of Invention
Aiming at the problems in the prior art, the application provides a transaction risk monitoring method and a transaction risk monitoring device, which can improve the efficiency and accuracy of transaction risk monitoring and can realize cross-institution transaction risk monitoring.
In order to solve the technical problem, the present application provides the following technical solutions:
applying a flash log acquisition component, and sending a user operation information set to a flash data stream processing component through kafka message middleware;
generating a wind control index corresponding to the user operation information set based on the flink data stream processing component and the Drools rule engine;
and receiving a transaction request instruction, and carrying out risk monitoring on a transaction process corresponding to the transaction request instruction according to the wind control index.
Further, before the applying the flash log collecting component and sending the user operation information set to the flash data stream processing component via the kafka message middleware, the method further includes: and the application log component stores the operation information of a plurality of users into an application log to obtain the user operation information set.
Further, the kafka message middleware is distributed message middleware for caching and transmitting the user operation information set.
Further, before the receiving the transaction request instruction, the method further includes: and updating the wind control rule in the Drools rule engine according to a preset wind control adjustment rule.
In a second aspect, the present application provides a transaction risk monitoring device, comprising:
the transmission module is used for applying the flash log acquisition component and sending the user operation information set to the flash data stream processing component through the kafka message middleware;
the wind control index generation module is used for generating wind control indexes corresponding to the user operation information sets on the basis of the flink data stream processing component and the Drools rule engine;
and the risk monitoring module is used for receiving the transaction request instruction and carrying out risk monitoring on the transaction process corresponding to the transaction request instruction according to the wind control index.
Further, the transaction risk monitoring device further comprises: and the storage module is used for storing the operation information of a plurality of users into the application log by the application log component to obtain the user operation information set.
Further, the kafka message middleware is distributed message middleware for caching and transmitting the user operation information set.
Further, the transaction risk monitoring device further comprises: and the updating module is used for updating the wind control rules in the Drools rule engine according to preset wind control adjustment rules.
In a third aspect, the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the transaction risk monitoring method when executing the program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon computer instructions that, when executed, implement the transaction risk monitoring method.
According to the technical scheme, the application provides a transaction risk monitoring method and device. Wherein, the method comprises the following steps: applying a flash log acquisition component, and sending a user operation information set to a flash data stream processing component through kafka message middleware; generating a wind control index corresponding to the user operation information set based on the flink data stream processing component and the Drools rule engine; receiving a transaction request instruction, and performing risk monitoring on a transaction process corresponding to the transaction request instruction according to the wind control index, so that the efficiency and accuracy of transaction risk monitoring can be improved, and cross-institution transaction risk monitoring can be realized; specifically, risk transactions generated by the network points can be monitored in real time, the risk transactions are interrupted, and early warning is timely given out. The real-time distribution of data is realized in a distributed system, and cross-organization risk transaction can be effectively monitored.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Based on this, in order to improve efficiency and accuracy of transaction risk monitoring and enable monitoring of cross-institution transaction risk, an embodiment of the present application provides a transaction risk monitoring apparatus, which may be a server or a client device, where the client device may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), a vehicle-mounted device, an intelligent wearable device, and the like. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch and intelligent bracelet etc..
In practical applications, the transaction risk monitoring part may be performed on the server side as described above, or all operations may be performed in the client device. The selection may be specifically performed according to the processing capability of the client device, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. The client device may further include a processor if all operations are performed in the client device.
The client device may have a communication module (i.e., a communication unit), and may be communicatively connected to a remote server to implement data transmission with the server. The server may include a server on the task scheduling center side, and in other implementation scenarios, the server may also include a server on an intermediate platform, for example, a server on a third party server platform communicatively linked to the task scheduling center server. The server may include a single computer device, or may include a server cluster formed by a plurality of servers, or a server structure of a distributed apparatus.
The server and the client device may communicate using any suitable network protocol, including network protocols not yet developed at the filing date of this application. The network protocol may include, for example, a TCP/IP protocol, a UDP/IP protocol, an HTTP protocol, an HTTPS protocol, or the like. Of course, the network Protocol may also include, for example, an RPC Protocol (Remote Procedure Call Protocol), a REST Protocol (Representational State Transfer Protocol), and the like used above the above Protocol.
The following examples are intended to illustrate the details.
As shown in fig. 1, in order to improve efficiency and accuracy of transaction risk monitoring and to realize monitoring of cross-institution transaction risk, the embodiment provides a transaction risk monitoring method with a transaction risk monitoring device as an execution subject, which specifically includes the following steps:
step 100: and applying a flash log acquisition component to send the user operation information set to a flash data stream processing component through kafka message middleware.
Specifically, the user operation information set includes operation information of a plurality of users, and the operation information includes: logging in json request information, employee numbers, organization numbers, secret keys and operation time information; the kafka message middleware is distributed message middleware for caching and transmitting the user operation information set; the kafka message middleware is used as distributed high-throughput message middleware and is used for buffering and transmitting the sent operation information of the front-end user.
Step 200: and generating a wind control index corresponding to the user operation information set based on the flink data stream processing component and the Drools rule engine.
Specifically, the Drools rule engine can decouple codes and business logic, support Chinese and improve the convenience of rule writing; and dynamic rule loading is supported, and the rules can be adjusted online. After the data flow reaches the flink data flow processing component through the kafka message middleware, the simple event and complex event are analyzed and accumulated according to the current Drools rule engine, and the result is fed back to the transaction risk monitoring device. For example, after the system detects that the user has input an error password for 5 times continuously, the system triggers a wind control rule for freezing account login, and meanwhile, the transaction risk monitoring device stores the relevant information of the account into a redis or hbase wind control index storage component for front-end query.
Step 300: and receiving a transaction request instruction, and carrying out risk monitoring on a transaction process corresponding to the transaction request instruction according to the wind control index.
Referring to fig. 2, in order to further improve the reliability of the data in the transaction risk monitoring process, in an embodiment of the present application, beforestep 100, the method further includes:
step 001: and the application log component stores the operation information of a plurality of users into an application log to obtain the user operation information set.
In order to improve the flexibility, accuracy and application scenario universality of the transaction risk monitoring, in an embodiment of the present application, beforestep 300, the method further includes: and updating the wind control rule in the Drools rule engine according to a preset wind control adjustment rule.
Specifically, the wind control adjustment rule includes: the external environment data adjustment rule and the manual adjustment data rule can be set according to actual needs. Before executing the transaction process corresponding to the transaction request instruction, sending the transaction request information to a transaction risk monitoring device, judging whether a wind control index corresponding to the transaction request information exists in a redis/hbase wind control index storage component by using the transaction risk monitoring device, if so, intercepting the transaction request information and judging whether the transaction process corresponding to the transaction request instruction has transaction risk according to the wind control index, and if not, continuing executing the transaction process corresponding to the transaction request instruction. For example, the last request is a login operation request, the login operation request is sent to a corresponding transaction risk monitoring device before login, the transaction risk monitoring device searches whether frozen account wind control indexes of account information in the login operation request for drinks exist in a redis/hbase wind control index storage component, if yes, interception is carried out, and if not, next operation is continued.
In terms of software, in order to improve the efficiency and accuracy of transaction risk monitoring and enable monitoring of cross-institution transaction risks, the present application provides an embodiment of a transaction risk monitoring device for implementing all or part of the contents of the transaction risk monitoring method, and referring to fig. 3, the transaction risk monitoring device specifically includes the following contents:
and thetransmission module 10 is used for applying the flash log collection component and sending the user operation information set to the flash data stream processing component through the kafka message middleware.
And a wind controlindex generation module 20, configured to generate a wind control index corresponding to the user operation information set based on the flink data stream processing component and the Drools rule engine.
And therisk monitoring module 30 is used for receiving the transaction request instruction and carrying out risk monitoring on the transaction process corresponding to the transaction request instruction according to the wind control index.
Referring to fig. 4, in an embodiment of the present application, the transaction risk monitoring device further includes: and thestorage module 40 is used for storing the operation information of the plurality of users into the application log by the application log component to obtain the user operation information set.
In an embodiment of the present application, the kafka message middleware is a distributed message middleware that caches and transmits the user operation information set.
In an embodiment of the present application, the transaction risk monitoring apparatus further includes: and the updating module is used for updating the wind control rules in the Drools rule engine according to preset wind control adjustment rules.
The embodiment of the transaction risk monitoring apparatus provided in this specification may be specifically configured to execute the processing procedure of the embodiment of the transaction risk monitoring method, and its functions are not described herein again, and refer to the detailed description of the embodiment of the transaction risk monitoring method.
In order to further explain the present solution, the present application further provides a specific application example of a transaction risk monitoring device, referring to fig. 5, in the specific application example, a website channel application cluster includes a core transaction component, a log component and an FUME log collecting component, a real-time data wind control system can achieve transaction data acquisition, wind control index judgment and Hbase/Redis wind control index storage, a wind control index analysis system can achieve external data access, and monitoring index analysis and monitoring rule optimization specifically include the following contents:
the application writes all user operation information into an application log through a log component, and a flash log acquisition component sends the user operation information to kafka message middleware; and performing rule-based engine data calculation on the data stream by the flink data stream processing component, and delivering the calculation result index to an index storage component of the real-time data wind control system according to the relevant rule to finish one-time index accumulation.
The transaction risk monitoring device needs to submit request data to the wind control system before a core transaction component makes an actual request, the wind control system judges whether the operation is released or not according to real-time wind control indexes and wind control rules generated by depending on data streams, and feeds results back to the front-end application to complete real-time wind control interception. And simultaneously, feeding the result back to the wind control index analysis system.
Specifically, for high-risk operations that need to be immediately truncated, after the data stream flows through the rule engine, a real-time wind control indicator is generated, for example, if the wind control rule explicitly corresponds to the same user, and a-B-C transactions cannot continuously occur, then after the a-B transactions are detected in the data stream, information is delivered to the wind control component to inform the target user that C transactions cannot be generated any more, and then when the C transaction request of the target user passes through the wind control component, the C transaction request is truncated. For non-essential truncated low risk operations, after the data stream flows through the rules engine, the operation information is stored in a database for subsequent data analysis. The feedback of the result to the wind control index analysis system means that the feedback to the front end is accomplished by requesting the wind control component in the transaction section of the front end.
The wind control index analysis system accesses the component through external data, and not only needs to access the judgment result of the wind control index of the current day, but also needs to access external environment data and manual adjustment data; the monitoring index analysis component can optimize the monitoring rules by integrating and analyzing the data and submit the monitoring rules to the rule engine to correct the wind control rules timely.
According to the description, the transaction risk monitoring method and the transaction risk monitoring device provided by the application improve the efficiency and the accuracy of transaction risk monitoring, and can realize cross-institution transaction risk monitoring; specifically, risk transactions generated by the network points can be monitored in real time, interrupted and early warned in time; the real-time distribution of data is realized in a distributed system, and cross-organization risk transaction can be effectively monitored.
In terms of hardware, in order to improve efficiency and accuracy of transaction risk monitoring and achieve monitoring of cross-institution transaction risk, the present application provides an embodiment of an electronic device for implementing all or part of contents in the transaction risk monitoring method, where the electronic device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission among the transaction risk monitoring device, the user terminal and other related equipment; the electronic device may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the electronic device may be implemented with reference to the embodiments for implementing the transaction risk monitoring method and the embodiments for implementing the transaction risk monitoring apparatus, the contents of which are incorporated herein, and the repetition points are not described in detail.
Fig. 6 is a schematic block diagram of a system configuration of anelectronic device 9600 according to an embodiment of the present application. As shown in fig. 6, theelectronic device 9600 can include acentral processor 9100 and amemory 9140; amemory 9140 is coupled to thecentral processor 9100. Notably, this FIG. 6 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one or more embodiments of the present application, the transaction risk monitoring function can be integrated into thecentral processor 9100. Thecentral processor 9100 may be configured to control as follows:
step 100: and applying a flash log acquisition component to send the user operation information set to a flash data stream processing component through kafka message middleware.
Step 200: and generating a wind control index corresponding to the user operation information set based on the flink data stream processing component and the Drools rule engine.
Step 300: and receiving a transaction request instruction, and carrying out risk monitoring on a transaction process corresponding to the transaction request instruction according to the wind control index.
As can be seen from the above description, the electronic device provided in the embodiments of the present application can improve the efficiency and accuracy of transaction risk monitoring, and can implement cross-institution transaction risk monitoring.
In another embodiment, the transaction risk monitoring device may be configured separately from thecentral processor 9100, for example, the transaction risk monitoring device may be configured as a chip connected to thecentral processor 9100, and the transaction risk monitoring function is implemented by the control of the central processor.
As shown in fig. 6, theelectronic device 9600 may further include: acommunication module 9110, aninput unit 9120, anaudio processor 9130, adisplay 9160, and apower supply 9170. It is noted that theelectronic device 9600 also does not necessarily include all of the components shown in fig. 6; in addition, theelectronic device 9600 may further include components not shown in fig. 6, which may be referred to in the prior art.
As shown in fig. 6, acentral processor 9100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, whichcentral processor 9100 receives input and controls the operation of various components of theelectronic device 9600.
Thememory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And thecentral processing unit 9100 can execute the program stored in thememory 9140 to realize information storage or processing, or the like.
Theinput unit 9120 provides input to thecentral processor 9100. Theinput unit 9120 is, for example, a key or a touch input device.Power supply 9170 is used to provide power toelectronic device 9600. Thedisplay 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
Thememory 9140 may be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, etc. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes referred to as an EPROM or the like. Thememory 9140 could also be some other type of device.Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). Thememory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used to store application programs and functional programs or a flow for executing the operation of theelectronic device 9600 by thecentral processor 9100.
Thememory 9140 can also include adata store 9143, thedata store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. Thedriver storage portion 9144 of thememory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
Thecommunication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via anantenna 9111. The communication module (transmitter/receiver) 9110 is coupled to thecentral processor 9100 to supply input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality ofcommunication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to aspeaker 9131 and amicrophone 9132 via anaudio processor 9130 to provide audio output via thespeaker 9131 and receive audio input from themicrophone 9132, thereby implementing ordinary telecommunications functions. Theaudio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, theaudio processor 9130 is also coupled to thecentral processor 9100, thereby enabling recording of sounds locally through themicrophone 9132 and enabling sounds stored locally to be played through thespeaker 9131.
As can be seen from the above description, the electronic device provided in the embodiment of the present application can improve the efficiency and accuracy of transaction risk monitoring, and can implement cross-institution transaction risk monitoring.
An embodiment of the present application further provides a computer-readable storage medium capable of implementing all the steps in the transaction risk monitoring method in the foregoing embodiment, where the computer-readable storage medium stores a computer program, and the computer program implements all the steps of the transaction risk monitoring method in the foregoing embodiment when executed by a processor, for example, the processor implements the following steps when executing the computer program:
step 100: and applying a flash log acquisition component to send the user operation information set to a flash data stream processing component through kafka message middleware.
Step 200: and generating a wind control index corresponding to the user operation information set based on the flink data stream processing component and the Drools rule engine.
Step 300: and receiving a transaction request instruction, and carrying out risk monitoring on a transaction process corresponding to the transaction request instruction according to the wind control index.
As can be seen from the foregoing description, the computer-readable storage medium provided in the embodiments of the present application can improve efficiency and accuracy of transaction risk monitoring, and can implement cross-institution transaction risk monitoring.
In the present application, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Reference is made to the description of the method embodiments.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the present application are explained by applying specific embodiments in the present application, and the description of the above embodiments is only used to help understanding the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.