Movatterモバイル変換


[0]ホーム

URL:


TWI665899B - Area-based risk control method and equipment - Google Patents

Area-based risk control method and equipment
Download PDF

Info

Publication number
TWI665899B
TWI665899BTW106101929ATW106101929ATWI665899BTW I665899 BTWI665899 BTW I665899BTW 106101929 ATW106101929 ATW 106101929ATW 106101929 ATW106101929 ATW 106101929ATW I665899 BTWI665899 BTW I665899B
Authority
TW
Taiwan
Prior art keywords
network
behavior event
area
risk control
risk
Prior art date
Application number
TW106101929A
Other languages
Chinese (zh)
Other versions
TW201828671A (en
Inventor
王維強
郭亮
馮力國
費斌傑
蔣博贇
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司filedCritical香港商阿里巴巴集團服務有限公司
Priority to TW106101929ApriorityCriticalpatent/TWI665899B/en
Publication of TW201828671ApublicationCriticalpatent/TW201828671A/en
Application grantedgrantedCritical
Publication of TWI665899BpublicationCriticalpatent/TWI665899B/en

Links

Landscapes

Abstract

Translated fromChinese

本發明公開了一種基於區域的風險控制方法和設備,包括:獲取目標用戶在第一網路區域中產生的第一行為事件;根據行為事件與區域轉移規則之間的映射關係,確定第一行為事件對應的區域轉移規則;根據區域轉移規則,確定目標用戶在設定時間內將第一行為事件由第一網路區域轉移至的第二網路區域;根據第一行為事件和預設的風險控制策略,調整第二網路區域的風險控制等級。基於行為事件對應的區域轉移規則,能夠根據第一網路區域中產生的第一行為事件,有效地預估到第一行為事件轉移至的第二網路區域,及時有效調整第二網路區域的風險控制策略,避免風險控制策略滯後於風險事件發生的情形,實現對風險事件的精確控制,提升網際網路資訊互動的網路安全性。The invention discloses a region-based risk control method and device, including: acquiring a first behavior event generated by a target user in a first network region; and determining the first behavior according to a mapping relationship between the behavior event and a region transfer rule. Regional transfer rules corresponding to events; according to the regional transfer rules, determine the target user to transfer the first behavior event from the first network area to the second network area within the set time; according to the first behavior event and the preset risk control Strategy to adjust the level of risk control in the second network area. Based on the regional transfer rule corresponding to the behavior event, the second network area to which the first behavior event is transferred can be effectively estimated according to the first behavior event generated in the first network area, and the second network area can be adjusted in a timely and effective manner. Risk control strategy, to avoid the risk control strategy lagging behind the occurrence of risk events, to achieve precise control of risk events, and improve the network security of Internet information interaction.

Description

Translated fromChinese
基於區域的風險控制方法和設備   Area-based risk control method and equipment  

本發明涉及網際網路資訊處理技術領域,尤其涉及一種基於區域的風險控制方法和設備。The present invention relates to the technical field of Internet information processing, and in particular, to a region-based risk control method and device.

隨著科學技術的發展,網際網路技術給人們的生產和生活帶來了極大的便利。然而,在現實生活中,人們確定做任何一件事情都存在風險,只是事情不同,所面對的風險大小不同而已,因此在決定做任何一件事情之前,往往會對該做的事情進行風險控制。例如:針對一種新產品,在決定生產該新產品之前,需要對該新產品是否能夠帶來收益進行風險控制。一般地,產品生產者根據生產其他產品的經驗,預估可能出現的風險事件,並對可能出現的風險事件進行風險控制。With the development of science and technology, Internet technology has brought great convenience to people's production and life. However, in real life, people are sure that there is a risk in doing anything. It is just that things are different and the risks they face are different. Therefore, before deciding to do anything, they often risk doing it. control. For example, for a new product, before deciding to produce the new product, it is necessary to perform risk control on whether the new product can bring benefits. Generally, the product manufacturer estimates the possible risk events based on the experience of producing other products, and performs risk control on the possible risk events.

但是,透過網際網路技術構建的資訊互動平臺屬於虛擬空間,與現實生活所屬的實體空間不同,那麼對於資訊互動平臺中發生的事件進行風險控制的方式與對現實生活中發生的事件進行風險控制的方式不同。However, the information interactive platform constructed through Internet technology belongs to a virtual space, which is different from the physical space to which real life belongs, so the risk control method for events occurring in the information interactive platform and the risk control of events occurring in real life In a different way.

在現有的風險控制系統中,通常採用區域化方式進行 風險控制。具體地,針對某一個地區,按照地理位置將該地區劃分成為多個不同區域,為劃分得到的不同區域指定風險控制策略,並利用這些風險控制策略對該地區進行風險控制。例如:A地區中的一個區域出現網際網路資訊互動平臺中大量用戶資訊洩漏事件,那麼針對該區域將採取高級別的風險控制策略,這樣降低該區域再次出現用戶資訊洩漏的風險。In existing risk control systems, regional approaches are often used for risk control. Specifically, for a certain area, the area is divided into a plurality of different areas according to the geographical location, risk control strategies are designated for the different areas obtained by the division, and risk control is performed on the area by using these risk control strategies. For example, if there is a large number of user information leakage events in the Internet information interactive platform in area A, a high-level risk control strategy will be adopted for this area, so as to reduce the risk of user information leakage in this area again.

然而,由於風險本身存在多變的特性,那麼現有的風險控制系統中所採用的風險控制方式相對比較固定,不能夠靈活地適應網際網路資訊互動平臺的發展需要,使得風險控制策略的實施往往滯後於風險事件的發生,導致網際網路資訊互動平臺的網路安全性比較差,也就是說,網際網路資訊互動平臺的風險控制精度比較低。However, due to the variable nature of risk itself, the risk control methods used in existing risk control systems are relatively fixed and cannot flexibly adapt to the development needs of Internet information interactive platforms, making the implementation of risk control strategies often Lagging behind the occurrence of risk events, the Internet security of the Internet information interactive platform is relatively poor, that is, the risk control accuracy of the Internet information interactive platform is relatively low.

有鑑於此,本發明實施例提供了一種基於區域的風險控制方法和設備,用於解決現有技術中網際網路資訊互動平臺的風險控制精度比較低的問題。In view of this, embodiments of the present invention provide a region-based risk control method and device, which are used to solve the problem of relatively low risk control accuracy of the Internet information interactive platform in the prior art.

一種基於區域的風險控制方法,包括:獲取目標用戶在第一網路區域中產生的第一行為事件,其中,所述第一行為事件屬於設定時間內產生頻率高於設定門限值的行為事件;根據行為事件與區域轉移規則之間的映射關係,確定所述第一行為事件對應的區域轉移規則; 根據所述區域轉移規則,確定所述目標用戶在所述設定時間內將所述第一行為事件由所述第一網路區域轉移至的第二網路區域;根據所述第一行為事件和預設的風險控制策略,調整所述第二網路區域的風險控制等級。An area-based risk control method includes: acquiring a first behavior event generated by a target user in a first network area, wherein the first behavior event belongs to a behavior event with a frequency higher than a set threshold within a set time; Determine a region transfer rule corresponding to the first behavior event according to a mapping relationship between the behavior event and a region transfer rule; and determine the target user to transfer the first behavior within the set time according to the region transfer rule The event is transferred from the first network area to the second network area; the risk control level of the second network area is adjusted according to the first behavior event and a preset risk control strategy.

一種基於區域的風險控制設備,包括:獲取單元,用於獲取目標用戶在第一網路區域中產生的第一行為事件,其中,所述第一行為事件屬於第一設定時間內產生頻率高於設定門限值的行為事件;確定單元,用於根據行為事件與區域轉移規則之間的映射關係,確定所述第一行為事件對應的區域轉移規則;以及根據所述區域轉移規則,確定所述目標用戶在所述第一設定時間內將所述第一行為事件由所述第一網路區域轉移至的第二網路區域;控制單元,用於根據所述第一行為事件和預設的風險控制策略,調整所述第二網路區域的風險控制等級。An area-based risk control device includes: an obtaining unit, configured to obtain a first behavior event generated by a target user in a first network area, wherein the first behavior event belongs to a frequency higher than a first set time. A behavior event that sets a threshold value; a determining unit configured to determine a region transfer rule corresponding to the first behavior event according to a mapping relationship between the behavior event and a region transfer rule; and determine the target according to the region transfer rule The user transfers the first behavior event from the first network area to the second network area within the first set time; a control unit, configured to: according to the first behavior event and a preset risk A control strategy to adjust a risk control level of the second network area.

本發明有益效果如下:本發明實施例獲取目標用戶在第一網路區域中產生的第一行為事件,所述第一行為事件屬於第一設定時間內產生頻率高於設定門限值的行為事件;根據行為事件與區域轉移規則之間的映射關係,確定所述第一行為事件對應的區域轉移規則;根據所述區域轉移規則,確定所述目標用戶在所述設定時間內將所述第一行為事件由所述第一網路區域轉移至的第二網路區域;根據所述第一行為事件和預 設的風險控制策略,調整所述第二網路區域的風險控制等級。這樣,基於行為事件對應的區域轉移規則,能夠根據第一網路區域中產生的第一行為事件,有效地預估到第一行為事件轉移至的第二網路區域,並能夠及時有效地調整第二網路區域的風險控制策略,避免風險控制策略滯後於風險事件發生的情形,實現對風險事件的精確控制,提升網際網路資訊互動平臺的網路安全性。The beneficial effects of the present invention are as follows: An embodiment of the present invention acquires a first behavior event generated by a target user in a first network area, where the first behavior event belongs to a behavior event with a frequency higher than a set threshold within a first set time; Determine a region transfer rule corresponding to the first behavior event according to a mapping relationship between the behavior event and a region transfer rule; and determine the target user to transfer the first behavior within the set time according to the region transfer rule The event is transferred from the first network area to the second network area; the risk control level of the second network area is adjusted according to the first behavior event and a preset risk control strategy. In this way, based on the region transfer rule corresponding to the behavior event, the second network region to which the first behavior event is transferred can be effectively estimated based on the first behavior event generated in the first network region, and the timely and effective adjustment can be made. The risk control strategy of the second network area prevents the risk control strategy from lagging behind the occurrence of risk events, realizes precise control of risk events, and improves the network security of the Internet information interactive platform.

31‧‧‧獲取單元31‧‧‧Get Unit

32‧‧‧確定單元32‧‧‧ Confirmation unit

33‧‧‧控制單元33‧‧‧Control unit

為了更清楚地說明本發明實施例中的技術方案,下面將對實施例描述中所需要使用的圖式作簡要介紹,顯而易見地,下面描述中的圖式僅僅是本發明的一些實施例,對於本領域的普通技術人員來講,在不付出創造性勞動性的前提下,還可以根據這些圖式獲得其他的圖式。In order to explain the technical solution in the embodiments of the present invention more clearly, the drawings used in the description of the embodiments are briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. Those of ordinary skill in the art can obtain other schemes according to these schemes without paying creative labor.

圖1為本發明實施例提供的一種基於區域的風險控制方法的流程示意圖;圖2為確定行為事件與區域轉移規則之間的映射關係的流程示意圖;圖3為本發明實施例提供的一種基於區域的風險控制設備的結構示意圖。FIG. 1 is a schematic flowchart of a region-based risk control method according to an embodiment of the present invention; FIG. 2 is a schematic flowchart of determining a mapping relationship between a behavior event and a regional transfer rule; and FIG. 3 is a diagram based on an embodiment of the present invention. Schematic diagram of regional risk control equipment.

為了實現本發明的目的,本發明實施例提供了一種基於區域的風險控制方法和設備,獲取目標用戶在第一網路 區域中產生的第一行為事件,所述第一行為事件屬於第一設定時間內產生頻率高於設定門限值的行為事件;根據行為事件與區域轉移規則之間的映射關係,確定所述第一行為事件對應的區域轉移規則;根據所述區域轉移規則,確定所述目標用戶在所述設定時間內將所述第一行為事件由所述第一網路區域轉移至的第二網路區域;根據所述第一行為事件和預設的風險控制策略,調整所述第二網路區域的風險控制等級。這樣,基於行為事件對應的區域轉移規則,能夠根據第一網路區域中產生的第一行為事件,有效地預估到第一行為事件轉移至的第二網路區域,並能夠及時有效地調整第二網路區域的風險控制策略,避免風險控制策略滯後於風險事件發生的情形,實現對風險事件的精確控制,提升網際網路資訊互動平臺的網路安全性。In order to achieve the purpose of the present invention, embodiments of the present invention provide a region-based risk control method and device, to obtain a first behavior event generated by a target user in a first network area, where the first behavior event belongs to a first setting A behavior event with a frequency higher than a set threshold is generated within time; a region transfer rule corresponding to the first behavior event is determined according to a mapping relationship between the behavior event and a region transfer rule; and the target is determined according to the region transfer rule The user transfers the first behavior event from the first network region to the second network region within the set time; and adjusts the first behavior event according to the first behavior event and a preset risk control strategy. Second, the level of risk control in the network area. In this way, based on the region transfer rule corresponding to the behavior event, the second network region to which the first behavior event is transferred can be effectively estimated based on the first behavior event generated in the first network region, and the timely and effective adjustment can be made. The risk control strategy of the second network area prevents the risk control strategy from lagging behind the occurrence of risk events, realizes precise control of risk events, and improves the network security of the Internet information interactive platform.

下面結合說明書圖式對本發明各個實施例作進一步地詳細描述。顯然,所描述的實施例僅僅是本發明一部分實施例,而不是全部的實施例。基於本發明中的實施例,本領域普通技術人員在沒有做出創造性勞動前提下所獲得的所有其它實施例,都屬於本發明保護的範圍。The embodiments of the present invention will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

圖1為本發明實施例提供的一種基於區域的風險控制方法的流程示意圖。所述方法可以如下所示。FIG. 1 is a schematic flowchart of a region-based risk control method according to an embodiment of the present invention. The method can be shown as follows.

步驟101:獲取目標用戶在第一網路區域中產生的第一行為事件。Step 101: Obtain a first behavior event generated by a target user in a first network area.

其中,所述第一行為事件屬於第一設定時間內產生頻率高於設定門限值的行為事件。The first behavior event belongs to a behavior event with a frequency higher than a set threshold within a first set time.

在步驟101中,本發明實施例中將第一網路區域作為區域轉移的起始目標,從資料庫中獲取目標用戶在第一設定時間內在第一網路區域中產生的至少一種類型的第一行為事件。In step 101, in the embodiment of the present invention, the first network area is used as a starting target of the area transfer, and at least one type of first generation generated by the target user in the first network area within the first set time is obtained from the database. A behavior event.

這裡的第一行為事件可以是目標用戶在網際網路資訊互動平臺上發起的訂購行為事件,也可以是目標用戶在網際網路資訊互動平臺上發起的支付行為事件,還可以是目標用戶在網際網路資訊互動平臺上發起的網路交易行為事件等等。The first behavior event here can be a subscription behavior event initiated by the target user on the Internet information interactive platform, or a payment behavior event initiated by the target user on the Internet information interactive platform, or it can be the target user's Internet behavior. Internet transaction behavior events initiated on online information interactive platforms, etc.

當獲取到目標用戶在第一網路區域內產生的至少一種類型的第一行為事件時,確定每一種類型的第一行為事件的產生頻率。When at least one type of first behavior event generated by the target user in the first network area is obtained, a generation frequency of each type of first behavior event is determined.

進一步地,確定每一種類型的第一行為事件的產生頻率是否高於設定門限值,將產生頻率高於設定門限值的第一行為事件作為觸發調整關聯網路區域的風險控制等級的依據。Further, it is determined whether the frequency of occurrence of each type of first behavior event is higher than a set threshold, and the first behavior event whose frequency is higher than the set threshold is used as a basis for triggering the adjustment of the risk control level of the associated network area.

需要說明的是,本發明實施例中所描述的“第一設定時間”對應的時間長度與後續描述的“第二設定時間”對應的時間長度可以相同,也可以不同,這裡不做限定;這裡的“第一”和“第二”沒有其他特殊含義,僅僅用於區分不同的設定時間。It should be noted that the time length corresponding to the "first set time" described in the embodiment of the present invention and the time length corresponding to the "second set time" described later may be the same or different, which is not limited here; here "First" and "Second" have no other special meanings and are only used to distinguish different set times.

關於設定門限值的大小可以根據實際需要確定,也可以根據實驗資料確定,這裡對於大小取值不做限定。The size of the set threshold can be determined according to actual needs, or it can be determined based on experimental data. There is no limitation on the size.

步驟102:根據行為事件與區域轉移規則之間的映射 關係,確定所述第一行為事件對應的區域轉移規則。Step 102: Determine a region transfer rule corresponding to the first behavior event according to a mapping relationship between the behavior event and the region transfer rule.

在步驟102中,首先,介紹一下行為事件與區域轉移規則之間的映射關係的確定方式。In step 102, first, a manner of determining a mapping relationship between a behavior event and a region transfer rule is introduced.

在本發明實施例中,行為事件與區域轉移規則之間的映射關係的確定方式可以採用下面描述的方式,也可以採用其他方式,這裡對於其他方式不做具體限定。In the embodiment of the present invention, a manner for determining a mapping relationship between a behavior event and a region transfer rule may be the manner described below, or other manners, and other manners are not specifically limited here.

具體地,如圖2所示,為確定行為事件與區域轉移規則之間的映射關係的流程示意圖。Specifically, as shown in FIG. 2, it is a schematic flowchart of determining a mapping relationship between a behavior event and a region transfer rule.

S21:獲取第二設定時間內用戶產生目標行為事件的環境資料。S21: Acquire environmental data of a target behavior event generated by a user within a second set time.

其中,所述環境資料包含現實空間資料和/或虛擬空間資料。The environmental data includes real space data and / or virtual space data.

在S21中,獲取第二設定時間內用戶產生目標行為事件的環境資料可以理解為提取該用戶的歷史資料,這一歷史資料包含目標行為事件、產生該目標行為事件的環境資料以及產生該目標行為事件的時間。In S21, obtaining the environmental data of the target behavior event generated by the user within the second set time can be understood as extracting the historical data of the user. This historical data includes the target behavior event, the environmental data that generated the target behavior event, and the target behavior. The time of the event.

在得到該歷史資料時,從獲取的歷史資料中選擇出產生該目標行為事件的時間滿足第二設定時間的目標行為事件以及產生滿足第二設定時間的目標行為事件的環境資料。When the historical data is obtained, from the obtained historical data, the target behavior event whose time when the target behavior event is generated satisfies a second set time and the environmental data which generates the target behavior event which meets the second set time are selected.

本發明實施例中所涉及到的環境資料包含現實空間資料和/或虛擬空間資料,其中,現實空間資料可以是指基於定位服務(英文:Location Based Services;縮寫:LBS)獲取的用戶所使用的終端設備的位置資訊;也可以 是指用戶所使用的終端設備所在的城市資訊、區域碼等;虛擬空間資料可以是指網路之間的協定(英文:Internet Protocol;縮寫:IP)位址;也可以是指唯一素材識別碼(英文:Unique Material Identifier;縮寫:UMID);還可以是WiFi位址等等。The environmental data involved in the embodiment of the present invention includes real space data and / or virtual space data, where the real space data may refer to those used by users obtained by Location Based Services (English: Location Based Services; abbreviation: LBS). Location information of the terminal equipment; it may also refer to the city information and area code of the terminal equipment used by the user; virtual space data may refer to the Internet Protocol (English: Internet Protocol; abbreviation: IP) address; It can also refer to a unique material identifier (English: Unique Material Identifier; abbreviation: UMID); it can also be a WiFi address and so on.

可選地,在獲取環境資料之後,需要對環境資料進行轉化,例如:對於現實空間資料,採用資料分析等方式將其現實空間資料按照空間維度轉換成為一個網格點,例如:目標行為事件發生的現實空間資料為LBS,那麼可以將獲取到的LBS轉換成為地理位置為XXXXXX的點;對於虛擬空間資料,同樣採用資料分析等方式將其虛擬空間資料按照空間維度轉換成為一個網格點,例如:目標行為事件發生的虛擬空間資料為IP位址(128.10.2.21),那麼可以將獲取到的IP位址轉換成為128.10.2.0。Optionally, after acquiring the environmental data, it is necessary to transform the environmental data. For example, for real-world data, data analysis is used to transform the real-world data into a grid point according to the spatial dimension. For example, a target behavior event occurs. The real spatial data is LBS, then the obtained LBS can be converted into a point with a geographical location of XXXXXX; for virtual spatial data, data analysis is also used to convert its virtual spatial data into a grid point according to the spatial dimension, such as : The virtual space data of the target behavior event is the IP address (128.10.2.21), then the obtained IP address can be converted into 128.10.2.0.

這裡需要說明的是,網格點屬於多維空間網路,即設定多維空間網路中包含多個維度,每一個維度可以從1到任意,將轉化得到的網格點映射在多維空間網路中,即每一網格點在多維空間網路中對應一個唯一的多維空間位置。What needs to be explained here is that the grid points belong to a multi-dimensional space network, that is, the multi-dimensional space network is set to include multiple dimensions, and each dimension can be from 1 to any. The transformed grid points are mapped to the multi-dimensional space network. , That is, each grid point corresponds to a unique multidimensional space position in the multidimensional space network.

S22:根據所述環境資料,分析得到所述用戶產生所述目標行為事件的區域轉移規則。S22: According to the environmental data, analyze and obtain a region transfer rule for the user to generate the target behavior event.

其中,所述區域轉移規則中包含至少兩個網路區域,且所述至少兩個網路區域中區域重合度大於設定閾值。The area transfer rule includes at least two network areas, and the degree of area overlap in the at least two network areas is greater than a set threshold.

在S22中,可選地,所述第二設定時間被劃分為至少 兩個時間區間,所述至少兩個時間區間內包含的時間點連續。In S22, optionally, the second set time is divided into at least two time intervals, and the time points included in the at least two time intervals are continuous.

具體地,第一步,按照所述目標行為事件的產生時間,將所述環境資料劃分為至少兩組,其中,每一組中包含的所述環境資料的產生時間屬於一個時間區間。Specifically, in the first step, the environmental data is divided into at least two groups according to the generation time of the target behavior event, wherein the generation time of the environmental data included in each group belongs to a time interval.

第二步,將所述至少兩組中每一組包含的所述環境資料聚合得到不同的網路區域。The second step is to aggregate the environmental data contained in each of the at least two groups to obtain different network areas.

具體地,將所述至少兩組中每一組包含的所述環境資料聚合得到不同的網路區域,包括:針對每一組中包含的所述環境資料,執行:將其中一組中包含的所述環境資料轉化為多維空間網路中的網格點,並確定所述多維空間網路中的各個網格點之間的關聯關係;其中,所述關聯關係基於各個網格點在多維空間網路中的坐標位置關係確定。Specifically, aggregating the environmental data included in each of the at least two groups to obtain different network areas includes: for the environmental data included in each group, executing: The environmental data is transformed into grid points in a multi-dimensional space network, and an association relationship between each grid point in the multi-dimensional space network is determined; wherein the association relationship is based on each grid point in a multi-dimensional space The coordinate position relationship in the network is determined.

利用所述關聯關係,將包含所述各個網格點的所述多維空間網路劃分成不同的網路區域。Using the association relationship, the multi-dimensional spatial network including the respective grid points is divided into different network regions.

例如:根據圖形聚類的算法和所述關聯關係,將包含所述各個網格點的所述多維空間網路劃分成不同的網路區域。For example, the multi-dimensional spatial network including each grid point is divided into different network regions according to a graph clustering algorithm and the association relationship.

再例如:根據關聯規則和所述關聯關係,將包含所述各個網格點的所述多維空間網路劃分成不同的網路區域。For another example, the multi-dimensional spatial network including each grid point is divided into different network regions according to an association rule and the association relationship.

第三步,從所述至少兩組聚合得到的網路區域中選擇其中兩組。In a third step, two groups are selected from the network areas obtained by the aggregation of the at least two groups.

第四步,分別從選擇的每一組聚合得到的網路區域中 選擇一個網路區域,計算選擇的兩個網路區域的區域重合度。In the fourth step, a network area is selected from the selected network areas obtained by the aggregation of each group, and the area overlap of the two selected network areas is calculated.

需要說明的是,這裡的區域重合度指的是兩個網路區域中所包含的相同的坐標位置點所形成區域占兩個網路區域的比例。It should be noted that the area coincidence degree here refers to the ratio of the area formed by the same coordinate position points included in the two network areas to the two network areas.

第五步,當計算得到的區域重合度大於設定閾值時,確定選擇的兩個網路區域之間滿足區域轉移規則。In the fifth step, when the calculated area coincidence degree is greater than a set threshold, it is determined that the selected network area satisfies the area transfer rule.

這裡需要說明的是,第三步至第五步可以多次執行,直至確定出所述至少兩組聚合得到的網路區域中所有滿足區域轉移規則的至少兩個網路區域。It should be noted here that steps 3 to 5 may be performed multiple times until at least two network areas satisfying the area transfer rule in the network areas obtained by the aggregation of the at least two groups are determined.

也就是說,透過計算重合度,確定出目標行為事件在第二設定時間內產生的區域轉移規則,並且能夠確定目標行為事件在滿足區域轉移規則的這些區域內發生的穩定性,同時意味著,目標行為事件一旦在滿足區域轉移規則的這些區域中任意一個區域產生,那麼可以預先預計出在滿足區域轉移規則的這些區域中其他區域產生的可能性增大,及時對其他區域的風險控制策略進行調整,避免風險控制策略滯後於風險事件的情形,有效地提升風險控制的精確度。That is to say, by calculating the coincidence degree, the regional transition rules generated by the target behavior event within the second set time can be determined, and the stability of the target behavior event in these regions that satisfy the regional transition rule can be determined, meanwhile, Once the target behavior event is generated in any of these areas that meet the regional transfer rules, it is possible to predict in advance that the probability of the occurrence of other areas in these areas that meet the regional transfer rules will increase, and timely carry out risk control strategies in other areas. Adjust to avoid the risk control strategy lagging behind the risk event and effectively improve the accuracy of risk control.

S23:根據分析得到的區域轉移規則,建立目標行為事件與所述區域轉移規則之間的映射關係。S23: Establish a mapping relationship between the target behavior event and the regional transfer rule according to the regional transfer rule obtained through analysis.

在本發明實施例中,在得到行為事件與區域轉移規則之間的映射關係之後,可以在資料庫中根據行為事件的不同,分別建立不同行為事件與確定的區域轉移規則之間的 映射關係。In the embodiment of the present invention, after obtaining the mapping relationship between the behavior event and the region transfer rule, a mapping relationship between different behavior events and the determined region transfer rule may be established in the database according to different behavior events.

在獲取到第一行為事件時,根據建立的目標行為事件與區域轉移規則之間的映射關係,得到第一行為事件對應的區域轉移規則。When the first behavior event is obtained, according to the established mapping relationship between the target behavior event and the region transfer rule, the region transfer rule corresponding to the first behavior event is obtained.

步驟103:根據所述區域轉移規則,確定所述目標用戶在所述設定時間內將所述第一行為事件由所述第一網路區域轉移至的第二網路區域。Step 103: Determine, according to the area transfer rule, that the target user transfers the first behavior event from the first network area to a second network area within the set time.

在步驟103中,在步驟102中,確定第一行為事件的區域轉移規則,即得到的區域轉移規則中包含除第一網路區域之外的至少一個第二網路區域,那麼將包含在區域轉移規則中的至少一個第二網路區域作為所述目標用戶在所述設定時間內將所述第一行為事件由所述第一網路區域轉移至的目標網路區域。In step 103, in step 102, a region transfer rule of the first behavior event is determined, that is, the obtained region transfer rule includes at least one second network area other than the first network area, and then the area transfer rule is included in the area. At least one second network area in the transfer rule serves as the target network area to which the target user transfers the first behavior event from the first network area within the set time.

步驟104:根據所述第一行為事件和預設的風險控制策略,調整所述第二網路區域的風險控制等級。Step 104: Adjust the risk control level of the second network area according to the first behavior event and a preset risk control strategy.

在步驟104中,具體地,若所述第一行為事件的風險等級小於設定風險等級,則根據預設的風險控制策略,降低所述第二網路區域的風險控制等級;若所述第一行為事件的風險等級大於設定風險等級,則根據預設的風險控制策略,提高所述第二網路區域的風險控制等級。In step 104, specifically, if the risk level of the first behavioral event is less than a set risk level, the risk control level of the second network area is reduced according to a preset risk control strategy; The risk level of the behavior event is greater than the set risk level, and the risk control level of the second network area is increased according to a preset risk control strategy.

需要說明的是,所述第一行為事件的風險等級可以透過該第一行為事件發生之後所造成的危害程度確定其的風險等級,一般風險等級可以分為低等級、中等級和高等 級。危害程度嚴重對應的風險等級為高等級;危害程度中等對應的風險等級為中等級;危害程度小或者沒有對應的風險等級為低等級。It should be noted that the risk level of the first behavioral event can be determined by the degree of harm caused after the first behavioral event occurs, and the general risk level can be divided into a low level, a medium level, and a high level. The level of risk corresponding to a severe level of hazard is high; the level of risk corresponding to a level of hazard is medium; the level of risk is low or there is no corresponding level of risk.

當所述第一行為事件的風險等級小於設定風險等級時,確定所述第一行為事件屬於低風險事件;當所述第一行為事件的風險等級大於設定風險等級時,確定所述第一行為事件屬於高風險事件。When the risk level of the first behavior event is less than the set risk level, it is determined that the first behavior event is a low-risk event; when the risk level of the first behavior event is greater than the set risk level, the first behavior is determined Events are high-risk events.

可選地,根據所述第一行為事件和預設的風險控制策略,分別對確定的區域轉移規則中包含的所有網路區域進行風險控制調整,例如:若所述第一行為事件屬於低風險事件,則將確定的區域轉移規則中包含的所有網路區域的風險控制策略調整為寬鬆(或者,降低風險控制等級);若所述第一行為事件屬於低風險事件,則將確定的區域轉移規則中包含的所有網路區域的風險控制策略調整為收緊(或者,提高風險控制等級)。Optionally, according to the first behavior event and a preset risk control strategy, risk control adjustments are performed on all network areas included in the determined area transfer rule, for example, if the first behavior event is of low risk Event, the risk control strategy of all network areas included in the determined area transfer rule is adjusted to be loose (or the risk control level is reduced); if the first behavior event belongs to a low-risk event, the determined area is transferred The risk control strategies of all network areas included in the rules are adjusted to tighten (or, increase the level of risk control).

透過本發明實施例的方案,獲取目標用戶在第一網路區域中產生的第一行為事件,所述第一行為事件屬於第一設定時間內產生頻率高於設定門限值的行為事件;根據行為事件與區域轉移規則之間的映射關係,確定所述第一行為事件對應的區域轉移規則;根據所述區域轉移規則,確定所述目標用戶在所述設定時間內將所述第一行為事件由所述第一網路區域轉移至的第二網路區域;根據所述第一行為事件和預設的風險控制策略,調整所述第二網路區域的風險控制等級。這樣,基於行為事件對應的區域轉移規 則,能夠根據第一網路區域中產生的第一行為事件,有效地預估到第一行為事件轉移至的第二網路區域,並能夠及時有效地調整第二網路區域的風險控制策略,避免風險控制策略滯後於風險事件發生的情形,實現對風險事件的精確控制,提升網際網路資訊互動平臺的網路安全性。Through the solution of the embodiment of the present invention, a first behavior event generated by a target user in the first network area is obtained, and the first behavior event belongs to a behavior event with a frequency higher than a set threshold within a first set time; The mapping relationship between the event and the area transfer rule determines the area transfer rule corresponding to the first behavior event; and according to the area transfer rule, determines that the target user uses the first behavior event by the set time. Adjusting a risk control level of the second network area according to the first behavior event and a preset risk control strategy, to a second network area to which the first network area is transferred. In this way, based on the region transfer rule corresponding to the behavior event, the second network region to which the first behavior event is transferred can be effectively estimated according to the first behavior event generated in the first network region, and the timely and effective adjustment can be made The risk control strategy of the second network area prevents the risk control strategy from lagging behind the occurrence of risk events, realizes precise control of risk events, and improves the network security of the Internet information interactive platform.

圖3為本發明實施例提供的一種基於區域的風險控制設備的結構示意圖,所述風險控制設備包括:獲取單元31、確定單元32和控制單元33,其中:獲取單元31,用於獲取目標用戶在第一網路區域中產生的第一行為事件,其中,所述第一行為事件屬於第一設定時間內產生頻率高於設定閾值的行為事件;確定單元32,用於根據行為事件與區域轉移規則之間的映射關係,確定所述第一行為事件對應的區域轉移規則;以及根據所述區域轉移規則,確定所述目標用戶在所述第一設定時間內將所述第一行為事件由所述第一網路區域轉移至的第二網路區域;控制單元33,用於根據所述第一行為事件和預設的風險控制策略,調整所述第二網路區域的風險控制等級。FIG. 3 is a schematic structural diagram of an area-based risk control device according to an embodiment of the present invention. The risk control device includes an obtaining unit 31, a determining unit 32, and a control unit 33. The obtaining unit 31 is configured to obtain a target user. A first behavior event generated in a first network area, wherein the first behavior event belongs to a behavior event with a frequency higher than a set threshold within a first set time; and a determining unit 32 is configured to transfer the area according to the behavior event and the area A mapping relationship between rules to determine a region transfer rule corresponding to the first behavior event; and to determine, according to the region transfer rule, that the target user removes the first behavior event from the first behavior event within the first set time. The second network area to which the first network area is transferred; the control unit 33 is configured to adjust a risk control level of the second network area according to the first behavior event and a preset risk control strategy.

具體地,所述控制單元33,具體用於若所述第一行為事件屬於低風險事件,根據預設的風險控制策略,降低所述第二網路區域的風險控制等級;若所述第一行為事件屬於高風險事件,根據預設的風險控制策略,提高所述第二網路區域的風險控制等級。Specifically, the control unit 33 is specifically configured to reduce the risk control level of the second network area according to a preset risk control strategy if the first behavior event belongs to a low-risk event; The behavior event is a high-risk event, and the risk control level of the second network area is increased according to a preset risk control strategy.

具體地,所述確定單元32透過以下方式確定行為事 件與區域轉移規則之間的映射關係:獲取第二設定時間內用戶產生目標行為事件的環境資料,其中,所述環境資料包含現實空間資料和/或虛擬空間資料;根據所述環境資料,分析得到所述用戶產生所述目標行為事件的區域轉移規則,其中,所述區域轉移規則中包含至少兩個網路區域,且所述至少兩個網路區域中區域重合度大於設定閾值;根據分析得到的所述區域轉移規則,建立所述目標行為事件與所述區域轉移規則之間的映射關係。Specifically, the determining unit 32 determines the mapping relationship between the behavior event and the region transfer rule in the following manner: obtaining environmental data of the target behavior event generated by the user within the second set time, wherein the environmental data includes real-space data and And / or virtual space data; and according to the environmental data, an area transfer rule generated by the user to generate the target behavior event is obtained, where the area transfer rule includes at least two network areas, and the at least two The degree of area coincidence in the network area is greater than a set threshold; and a mapping relationship between the target behavior event and the area transfer rule is established according to the area transfer rule obtained through analysis.

可選地,所述第二設定時間被劃分為至少兩個時間區間,所述至少兩個時間區間內包含的時間點連續;所述確定單元32根據所述環境資料,分析得到所述用戶產生所述目標行為事件的區域轉移規則,包括:按照所述目標行為事件的產生時間,將所述環境資料劃分為至少兩組,其中,每一組中包含的所述環境資料的產生時間屬於一個時間區間;將所述至少兩組中每一組包含的所述環境資料聚合得到不同的網路區域;從所述至少兩組聚合得到的網路區域中選擇其中兩組;分別從選擇的每一組聚合得到的網路區域中選擇一個網路區域,計算選擇的兩個網路區域的區域重合度;當計算得到的區域重合度大於設定閾值時,確定選擇 的兩個網路區域之間滿足區域轉移規則。Optionally, the second set time is divided into at least two time intervals, and the time points included in the at least two time intervals are continuous; and the determining unit 32 analyzes and obtains the user generated information according to the environmental data. The regional transfer rule of the target behavior event includes: dividing the environmental data into at least two groups according to the generation time of the target behavior event, wherein the generation time of the environmental data included in each group belongs to one Time interval; aggregating the environmental data contained in each of the at least two groups to obtain different network regions; selecting two of the network regions from the aggregation of the at least two groups of the network regions; Select a network area from a group of aggregated network areas and calculate the area overlap of the two selected network areas. When the calculated area overlap is greater than a set threshold, determine the area between the two selected network areas. Meet regional transfer rules.

具體地,所述確定單元32將所述至少兩組中每一組包含的所述環境資料聚合得到不同的網路區域,包括:針對每一組中包含的所述環境資料,執行:將其中一組中包含的所述環境資料轉化為多維空間網路中的網格點,並確定所述多維空間網路中的各個網格點之間的關聯關係;利用所述關聯關係,將包含所述各個網格點的所述多維空間網路劃分成不同的網路區域。Specifically, the determining unit 32 aggregates the environmental data included in each of the at least two groups to obtain different network areas, and includes: for the environmental data included in each group, executing: The environmental data included in a group is transformed into grid points in a multi-dimensional space network, and an association relationship between each grid point in the multi-dimensional space network is determined; using the association relationship, the The multi-dimensional space network of each grid point is divided into different network regions.

需要說明的是,本發明實施例提供的風險控制設備可以透過軟體方式實現,也可以透過硬體方式實現,這裡不做限定。It should be noted that the risk control device provided by the embodiment of the present invention may be implemented by software or hardware, which is not limited herein.

本發明實施例提供的風險控制設備基於行為事件對應的區域轉移規則,能夠根據第一網路區域中產生的第一行為事件,有效地預估到第一行為事件轉移至的第二網路區域,並能夠及時有效地調整第二網路區域的風險控制策略,避免風險控制策略滯後於風險事件發生的情形,實現對風險事件的精確控制,提升網際網路資訊互動平臺的網路安全性。The risk control device provided by the embodiment of the present invention can effectively predict the second network area to which the first behavior event is transferred based on the first behavior event generated in the first network area based on the region transfer rule corresponding to the behavior event. , And can timely and effectively adjust the risk control strategy of the second network area, avoid the risk control strategy lagging behind the occurrence of risk events, achieve precise control of risk events, and improve the network security of the Internet information interactive platform.

本領域的技術人員應明白,本發明的實施例可提供為方法、裝置(設備)、或電腦程式產品。因此,本發明可採用完全硬體實施例、完全軟體實施例、或結合軟體和硬體方面的實施例的形式。而且,本發明可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括 但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。Those skilled in the art should understand that the embodiments of the present invention may be provided as a method, an apparatus (device), or a computer program product. Therefore, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, the present invention may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to magnetic disk memory, CD-ROM, optical memory, etc.) containing computer-usable code therein. .

本發明是參照根據本發明實施例的方法、裝置(設備)和電腦程式產品的流程圖和/或方塊圖來描述的。應理解可由電腦程式指令實現流程圖和/或方塊圖中的每一流程和/或方塊、以及流程圖和/或方塊圖中的流程和/或方塊的結合。可提供這些電腦程式指令到通用電腦、專用電腦、嵌入式處理器或其他可編程資料處理設備的處理器以產生一個機器,使得透過電腦或其他可編程資料處理設備的處理器執行的指令產生用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的裝置。The present invention is described with reference to flowcharts and / or block diagrams of methods, devices (equipment) and computer program products according to embodiments of the present invention. It should be understood that each flow and / or block in the flowchart and / or block diagram, and a combination of the flow and / or block in the flowchart and / or block diagram can be implemented by computer program instructions. These computer program instructions can be provided to the processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to generate a machine, so that the instructions generated by the processor of the computer or other programmable data processing device can be used to generate instructions. A device for realizing the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.

這些電腦程式指令也可儲存在能引導電腦或其他可編程資料處理設備以特定方式工作的電腦可讀記憶體中,使得儲存在該電腦可讀記憶體中的指令產生包括指令裝置的製造品,該指令裝置實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能。These computer program instructions may also be stored in a computer-readable memory that can guide a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory generate a manufactured article including a command device, The instruction device realizes a function specified in a flowchart or a plurality of processes and / or a block or a block of a block diagram.

這些電腦程式指令也可裝載到電腦或其他可編程資料處理設備上,使得在電腦或其他可編程設備上執行一系列操作步驟以產生電腦實現的處理,從而在電腦或其他可編程設備上執行的指令提供用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的步驟。These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of operating steps can be performed on the computer or other programmable device to generate a computer-implemented process, which can be executed on the computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.

儘管已描述了本發明的較佳實施例,但本領域內的技 術人員一旦得知了基本創造性概念,則可對這些實施例作出另外的變更和修改。所以,申請專利範圍意欲解釋為包括較佳實施例以及落入本發明範圍的所有變更和修改。Although the preferred embodiments of the present invention have been described, those skilled in the art can make additional changes and modifications to these embodiments once they learn the basic inventive concepts. Therefore, the scope of patent application is intended to be construed as including the preferred embodiments and all changes and modifications that fall within the scope of the invention.

顯然,本領域的技術人員可以對本發明進行各種修改和變型而不脫離本發明的範圍。這樣,倘若本發明的這些修改和變型屬於本發明申請專利範圍及其等同技術的範圍之內,則本發明也意圖包含這些修改和變型在內。Obviously, those skilled in the art can make various modifications and variations to the present invention without departing from the scope of the present invention. In this way, if these modifications and variations of the present invention fall within the scope of the patent application for the present invention and the scope of equivalent technology, the present invention also intends to include these modifications and variations.

Claims (10)

Translated fromChinese
一種基於區域的風險控制方法,其特徵在於,包括:獲取目標用戶在第一網路區域中產生的第一行為事件,其中,該第一行為事件屬於第一設定時間內產生頻率高於設定門限值的行為事件;根據行為事件與區域轉移規則之間的映射關係,確定該第一行為事件對應的區域轉移規則;根據該區域轉移規則,確定該目標用戶在該第一設定時間內將該第一行為事件由該第一網路區域轉移至的第二網路區域;根據該第一行為事件和預設的風險控制策略,調整該第二網路區域的風險控制等級。An area-based risk control method, comprising: obtaining a first behavior event generated by a target user in a first network area, wherein the first behavior event belongs to a first set time and a frequency of occurrence is higher than a set threshold; Value behavior event; according to the mapping relationship between the behavior event and the area transfer rule, determine the area transfer rule corresponding to the first behavior event; and according to the area transfer rule, determine that the target user A behavior event is transferred from the first network area to a second network area; the risk control level of the second network area is adjusted according to the first behavior event and a preset risk control strategy.如申請專利範圍第1項的風險控制方法,其中,根據該第一行為事件和預設的風險控制策略,調整該第二網路區域的風險控制等級,包括:若該第一行為事件的風險等級小於設定風險等級,則根據預設的風險控制策略,降低該第二網路區域的風險控制等級;若該第一行為事件的風險等級大於設定風險等級,則根據預設的風險控制策略,提高該第二網路區域的風險控制等級。For example, the risk control method of the first patent application scope, wherein adjusting the risk control level of the second network area according to the first behavior event and a preset risk control strategy includes: if the risk of the first behavior event If the level is lower than the set risk level, the risk control level of the second network area is reduced according to the preset risk control strategy; if the risk level of the first behavior event is greater than the set risk level, the pre-set risk control strategy is used, Increase the risk control level of the second network area.如申請專利範圍第1或2項的風險控制方法,其中,透過以下方式確定行為事件與區域轉移規則之間的映射關係:獲取第二設定時間內用戶產生目標行為事件的環境資料,其中,該環境資料包含現實空間資料和/或虛擬空間資料;根據該環境資料,分析得到該用戶產生該目標行為事件的區域轉移規則,其中,該區域轉移規則中包含至少兩個網路區域,且該至少兩個網路區域中區域重合度大於設定閾值;根據分析得到的該區域轉移規則,建立該目標行為事件與該區域轉移規則之間的映射關係。For example, the risk control method of the first or second scope of the patent application, wherein the mapping relationship between behavioral events and regional transfer rules is determined by: obtaining environmental data of the target behavioral event generated by the user within the second set time, wherein the The environmental data includes real space data and / or virtual space data; according to the environmental data, an area transfer rule for the user to generate the target behavior event is obtained through analysis. The area transfer rule includes at least two network areas, and the at least The degree of area overlap in the two network areas is greater than a set threshold; according to the analysis of the area transfer rule, a mapping relationship between the target behavior event and the area transfer rule is established.如申請專利範圍第3項的風險控制方法,其中,該第二設定時間被劃分為至少兩個時間區間,該至少兩個時間區間內包含的時間點連續;根據該環境資料,分析得到該用戶產生該目標行為事件的區域轉移規則,包括:按照該目標行為事件的產生時間,將該環境資料劃分為至少兩組,其中,每一組中包含的該環境資料的產生時間屬於一個時間區間;將該至少兩組中每一組包含的該環境資料聚合得到不同的網路區域;從該至少兩組聚合得到的網路區域中選擇其中兩組;分別從選擇的每一組聚合得到的網路區域中選擇一個網路區域,計算選擇的兩個網路區域的區域重合度;當計算得到的區域重合度大於設定閾值時,確定選擇的兩個網路區域之間滿足區域轉移規則。For example, the risk control method of the third scope of the patent application, wherein the second set time is divided into at least two time intervals, and the time points included in the at least two time intervals are continuous; according to the environmental data, the user is obtained through analysis. The regional transfer rule that generates the target behavior event includes: dividing the environmental data into at least two groups according to the generation time of the target behavior event, wherein the generation time of the environmental data included in each group belongs to a time interval; Aggregate the environmental data contained in each of the at least two groups to obtain different network areas; select two of the network areas from the aggregated areas of the at least two groups; and separately obtain the network obtained from each of the selected aggregates. Select a network area in the road area, and calculate the area coincidence degree of the two selected network areas. When the calculated area coincidence degree is greater than a set threshold, it is determined that the area transition rule is satisfied between the two selected network areas.如申請專利範圍第4項的風險控制方法,其中,將該至少兩組中每一組包含的該環境資料聚合得到不同的網路區域,包括:針對每一組中包含的該環境資料,執行:將其中一組中包含的該環境資料轉化為多維空間網路中的網格點,並確定該多維空間網路中的各個網格點之間的關聯關係;利用該關聯關係,將包含該各個網格點的該多維空間網路劃分成不同的網路區域。For example, the risk control method of the fourth scope of the patent application, wherein the environmental data included in each of the at least two groups is aggregated to obtain different network areas, including: for the environmental data included in each group, executing : Transform the environmental data contained in one group into grid points in the multi-dimensional space network, and determine the relationship between the grid points in the multi-dimensional space network; using the relationship, the The multi-dimensional spatial network of each grid point is divided into different network regions.一種基於區域的風險控制設備,其特徵在於,包括:獲取單元,用於獲取目標用戶在第一網路區域中產生的第一行為事件,其中,該第一行為事件屬於第一設定時間內產生頻率高於設定門限值的行為事件;確定單元,用於根據行為事件與區域轉移規則之間的映射關係,確定該第一行為事件對應的區域轉移規則;以及根據該區域轉移規則,確定該目標用戶在該第一設定時間內將該第一行為事件由該第一網路區域轉移至的第二網路區域;控制單元,用於根據該第一行為事件和預設的風險控制策略,調整該第二網路區域的風險控制等級。An area-based risk control device, comprising: an obtaining unit configured to obtain a first behavior event generated by a target user in a first network area, wherein the first behavior event is generated within a first set time; A behavior event with a frequency higher than a set threshold; a determining unit for determining a region transfer rule corresponding to the first behavior event according to a mapping relationship between the behavior event and the region transfer rule; and determining the target according to the region transfer rule The user transfers the first behavior event from the first network area to the second network area within the first set time; the control unit is configured to adjust according to the first behavior event and a preset risk control strategy The level of risk control for this second network area.如申請專利範圍第6項的風險控制設備,其中,該控制單元,具體用於若該第一行為事件的風險等級小於設定風險等級,則根據預設的風險控制策略,降低該第二網路區域的風險控制等級;若該第一行為事件屬於高風險事件的風險等級大於設定風險等級,則根據預設的風險控制策略,提高該第二網路區域的風險控制等級。For example, the risk control device in the sixth scope of the patent application, wherein the control unit is specifically configured to reduce the second network according to a preset risk control strategy if the risk level of the first behavior event is less than a set risk level. Regional risk control level; if the risk level of the first behavior event belonging to a high-risk event is greater than a set risk level, the risk control level of the second network area is increased according to a preset risk control strategy.如申請專利範圍第6或7項的風險控制設備,其中,該確定單元透過以下方式確定行為事件與區域轉移規則之間的映射關係:獲取第二設定時間內用戶產生目標行為事件的環境資料,其中,該環境資料包含現實空間資料和/或虛擬空間資料;根據該環境資料,分析得到該用戶產生該目標行為事件的區域轉移規則,其中,該區域轉移規則中包含至少兩個網路區域,且該至少兩個網路區域中區域重合度大於設定閾值;根據分析得到的該區域轉移規則,建立該目標行為事件與該區域轉移規則之間的映射關係。For example, the risk control device of the scope of application for patent 6 or 7, wherein the determining unit determines the mapping relationship between the behavior event and the area transfer rule in the following manner: obtaining environmental data of the target behavior event generated by the user within the second set time, Wherein, the environmental data includes real space data and / or virtual space data; according to the environmental data, an analysis is made to obtain a region transfer rule for the target behavior event generated by the user, wherein the region transfer rule includes at least two network regions, And the degree of area coincidence in the at least two network areas is greater than a set threshold; according to the area transfer rule obtained through analysis, a mapping relationship between the target behavior event and the area transfer rule is established.如申請專利範圍第8項的風險控制設備,其中,該第二設定時間被劃分為至少兩個時間區間,該至少兩個時間區間內包含的時間點連續;該確定單元根據該環境資料,分析得到該用戶產生該目標行為事件的區域轉移規則,包括:按照該目標行為事件的產生時間,將該環境資料劃分為至少兩組,其中,每一組中包含的該環境資料的產生時間屬於一個時間區間;將該至少兩組中每一組包含的該環境資料聚合得到不同的網路區域;從該至少兩組聚合得到的網路區域中選擇其中兩組;分別從選擇的每一組聚合得到的網路區域中選擇一個網路區域,計算選擇的兩個網路區域的區域重合度;當計算得到的區域重合度大於設定閾值時,確定選擇的兩個網路區域之間滿足區域轉移規則。For example, the risk control device of the eighth patent application scope, wherein the second set time is divided into at least two time intervals, and the time points included in the at least two time intervals are continuous; the determination unit analyzes according to the environmental data Obtaining a regional transfer rule for the user to generate the target behavior event includes: dividing the environmental data into at least two groups according to the generation time of the target behavior event, wherein the generation time of the environmental data included in each group belongs to one Time interval; aggregating the environmental data contained in each of the at least two groups to obtain different network regions; selecting two of the network regions from the aggregation of the at least two groups of aggregations; and aggregating from each of the selected groups respectively One network area is selected from the obtained network areas, and the area overlap degree of the two selected network areas is calculated. When the calculated area coincidence degree is greater than a set threshold, it is determined that the selected two network areas satisfy the area transfer. rule.如申請專利範圍第9項的風險控制設備,其中,該確定單元將該至少兩組中每一組包含的該環境資料聚合得到不同的網路區域,包括:針對每一組中包含的該環境資料,執行:將其中一組中包含的該環境資料轉化為多維空間網路中的網格點,並確定該多維空間網路中的各個網格點之間的關聯關係;利用該關聯關係,將包含該各個網格點的該多維空間網路劃分成不同的網路區域。For example, the risk control device in the ninth scope of the patent application, wherein the determining unit aggregates the environmental data included in each of the at least two groups to obtain different network areas, including: for the environment included in each group Data, execution: transform the environmental data contained in one group into grid points in a multi-dimensional space network, and determine the relationship between the grid points in the multi-dimensional space network; using the relationship, The multi-dimensional space network including the respective grid points is divided into different network regions.
TW106101929A2017-01-192017-01-19 Area-based risk control method and equipmentTWI665899B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
TW106101929ATWI665899B (en)2017-01-192017-01-19 Area-based risk control method and equipment

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
TW106101929ATWI665899B (en)2017-01-192017-01-19 Area-based risk control method and equipment

Publications (2)

Publication NumberPublication Date
TW201828671A TW201828671A (en)2018-08-01
TWI665899Btrue TWI665899B (en)2019-07-11

Family

ID=63960113

Family Applications (1)

Application NumberTitlePriority DateFiling Date
TW106101929ATWI665899B (en)2017-01-192017-01-19 Area-based risk control method and equipment

Country Status (1)

CountryLink
TW (1)TWI665899B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070239807A1 (en)*2006-03-282007-10-11Morgan Timothy SSiebel CRM LOV/MLOV remapping tool
US20070244748A1 (en)*2006-04-172007-10-18Tony SmithDomains template management system
CN102088754A (en)*2010-12-062011-06-08中国人民解放军信息工程大学Network access behavior-based access control method and system for wireless local area network
US8761768B2 (en)*2009-10-222014-06-24Cisco Technology, Inc.Systems and methods for classifying user equipment and selecting tracking areas
CN104038929A (en)*2014-05-092014-09-10宇龙计算机通信科技(深圳)有限公司Network access anomaly identification method and network access anomaly identification device
CN104184819A (en)*2014-08-292014-12-03城云科技(杭州)有限公司Multi-hierarchy load balancing cloud resource monitoring method
CN104469848A (en)*2014-11-062015-03-25中国科学院计算技术研究所 A Method of Load Balancing Between Heterogeneous Access Networks
US20160127401A1 (en)*2014-10-302016-05-05Splunk Inc.Capture triggers for capturing network data

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070239807A1 (en)*2006-03-282007-10-11Morgan Timothy SSiebel CRM LOV/MLOV remapping tool
US20070244748A1 (en)*2006-04-172007-10-18Tony SmithDomains template management system
US8761768B2 (en)*2009-10-222014-06-24Cisco Technology, Inc.Systems and methods for classifying user equipment and selecting tracking areas
CN102088754A (en)*2010-12-062011-06-08中国人民解放军信息工程大学Network access behavior-based access control method and system for wireless local area network
CN104038929A (en)*2014-05-092014-09-10宇龙计算机通信科技(深圳)有限公司Network access anomaly identification method and network access anomaly identification device
CN104184819A (en)*2014-08-292014-12-03城云科技(杭州)有限公司Multi-hierarchy load balancing cloud resource monitoring method
US20160127401A1 (en)*2014-10-302016-05-05Splunk Inc.Capture triggers for capturing network data
CN104469848A (en)*2014-11-062015-03-25中国科学院计算技术研究所 A Method of Load Balancing Between Heterogeneous Access Networks

Also Published As

Publication numberPublication date
TW201828671A (en)2018-08-01

Similar Documents

PublicationPublication DateTitle
CN103826237B (en)A kind of method for building up of the continuously location privacy protection model based on location-based service
CN111598359B (en)Logistics station site selection method and system
WO2023134184A1 (en)Information processing system, method, and apparatus, device, and storage medium
WO2017028738A1 (en)Region-based risk control method and device
CN104133857A (en)New method for digging business process model on the basis of configuration constraint
CN103970879A (en)Method and system for regulating storage positions of data blocks
CN103631898A (en)Multimedia social network reputation value calculating method based on strong and weak contact feedback
CN119046580B (en) A method for determining the PLP protection range of double-branch non-equal-height photovoltaic stations based on the rolling ball method
CN108563915B (en)Vehicle digital simulation test model construction system and method, and computer program
CN111400969B (en)Method for accelerating generation of unstructured right-angle grid
TWI665899B (en) Area-based risk control method and equipment
CN105608732A (en)Triangular mesh model optimization method
CN104915053A (en)Position determining method and device for interface controls
CN102930589B (en)A kind of non-structural cartesian mesh intersection modification method
CN104484900A (en)Meteorological element interpolation assessment method based on Delaunay triangle network
CN107644233A (en)FILTERSIM analogy methods based on Cluster Classification
CN115544634B (en) A method and system for spatial coordinate transformation of an oil and gas field-level digital twin model
CN115221557A (en)Vehicle track data protection method and system based on differential privacy, computer equipment and storage medium
CN116963087A (en)Base station site selection method, base station site selection device, computer equipment and storage medium
CN116188565A (en) Location area detection method, device, device, storage medium and program product
CN114021853A (en)Wind power prediction method and device, electronic equipment and storage medium
CN114862615A (en) Method, device and computer equipment for aggregation of distributed power resources
CN117954113B (en)Information borrowing method and system based on elastic priori and proportional priori principles
Sabor et al.Adaptive random testing through dynamic partitioning by localization with distance and enlarged input domain
CN104657476A (en)On-line analytical processing method and system

[8]ページ先頭

©2009-2025 Movatter.jp