Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk control system and method based on pre-event synchronous processing and post-event asynchronous processing

A technology of asynchronous processing and synchronous processing, which is applied in the field of pre-event and post-event transaction risk control, and can solve problems such as high network requirements, difficult implementation, and inappropriate risk control business scenarios

Active Publication Date: 2020-12-01
SHANGHAI FUIOU PAYMENT SERVICE
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing mainstream methods in the technical field of transaction risk control include: (1) database read-write separation method, which puts risk control rules, risk control parameter configuration, transaction data, etc. into the database, but data synchronization has a certain degree of Delay, high-frequency requests and high-concurrency scenarios have a significant decline in database performance; (2) Distributed cache mode, which puts frequently accessed data into the NoSQL cache, and an efficient cache system can improve system performance. Obtain risk control parameters and risk control rules, but some NoSQLs have split-brain problems (such as redis), and the network requirements are high when the transaction volume is large; (3) Microservice RPC mode, using RPC intermediates such as dubbo and cloud The software realizes the call between services, and independently configures the risk control rules and risk control parameters into a microservice for the risk control system and transaction system to call. However, when there are many business systems, there will be service governance problems, and the network communication pressure is relatively high. and (4) CEP method, which is based on the compound event processing mode and has better performance and scalability. It is realized with the help of open source solutions such as Esper and Storm. Not suitable for risk control business scenarios
[0003] In order to solve the above technical problems, this disclosure proposes a transaction risk control processing method to solve the flexibility of risk control rules and parameter configuration, as well as the performance, coupling, reliability and other issues of the risk control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk control system and method based on pre-event synchronous processing and post-event asynchronous processing
  • Risk control system and method based on pre-event synchronous processing and post-event asynchronous processing
  • Risk control system and method based on pre-event synchronous processing and post-event asynchronous processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Various embodiments will be described in more detail below with reference to the accompanying drawings which form a part hereof and which show specific exemplary embodiments. Embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and these The scope of the embodiments is fully conveyed to those of ordinary skill in the art. Various embodiments may be implemented as methods, systems or devices. Accordingly, these embodiments may take the form of a hardware implementation, an entirely software implementation, or a combination of software and hardware aspects. Therefore, the following detailed description is not limiting.

[0037] The steps in each flowchart may be performed by hardware (eg, processors, engines, memories, circuits), software (eg, operating systems, applications, drivers, machine / p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a risk control system and method based on pre-event synchronous processing and post-event asynchronous processing. The system comprises a risk control system client and a riskcontrol system server. After the risk control system server receives the post-event request from the risk control system client, synchronous calling of the post-event risk control service is completed; and a transaction scheduling dynamic control component in the risk control system server processes the transaction data based on the risk control configuration data from a dynamic cache component in a responsibility chain design mode, and synchronously returns a processing result to the risk control system client. The risk control configuration data is loaded by adopting the dynamic cache component with a lock-free design. In addition, when the post-event request is received, a message is sent to a post-event risk control component asynchronously, so that the post-event risk control assembly carries out post-processing.

Description

technical field [0001] The present invention relates to the field of pre-event and post-event transaction risk control, in particular to a risk control system and method based on pre-event synchronous processing and post-event asynchronous processing. Background technique [0002] The existing mainstream methods in the technical field of transaction risk control include: (1) database read-write separation method, which puts risk control rules, risk control parameter configuration, transaction data, etc. into the database, but data synchronization has a certain degree of Delay, high-frequency requests and high-concurrency scenarios have a significant decline in database performance; (2) Distributed cache mode, which puts frequently accessed data into the NoSQL cache, and an efficient cache system can improve system performance. Obtain risk control parameters and risk control rules, but some NoSQLs have split-brain problems (such as redis), and the network requirements are h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/54G06Q20/32G06Q40/04
CPCG06F9/547G06Q20/3276G06Q40/04
Inventor 黄菲吴建英吴建平刘冬李阳杨士宏谢鹏施海娟宋文君谷西波孙筱晔
Owner SHANGHAI FUIOU PAYMENT SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products