Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method and device, computer equipment and computer readable storage medium

A data processing and computer program technology, applied in the field of data processing, can solve data risk control and other problems, achieve the effect of reducing operating costs, reducing the time of review process, and simple operation

Pending Publication Date: 2021-02-26
深圳依时货拉拉科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the embodiment of the present application is to provide a data processing method, device, system, computer equipment and computer-readable storage medium, aiming to solve the problem of data risk control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, computer equipment and computer readable storage medium
  • Data processing method and device, computer equipment and computer readable storage medium
  • Data processing method and device, computer equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] figure 2 A flowchart of a data processing method according to Embodiment 1 of the present application is schematically shown. It can be understood that this method embodiment can be executed in the mobile terminal 13, and the flowchart of this method embodiment is not used to limit the sequence of execution steps.

[0037] Such as figure 2 As shown, the data processing method may include steps S200-S206, wherein:

[0038] Step S200, obtain the service request of the user, and obtain user data according to the service request, and the user data includes: user role, IP, device fingerprint, event type, map track and / or service type;

[0039] Wherein, the acquisition of the business processing rules corresponding to the risk control detection results includes:

[0040] According to the risk control detection results, different user behavior data are divided into high, medium and low risk levels.

[0041] Step S202, performing risk control detection according to the bu...

Embodiment 2

[0056] image 3 A flowchart of a data processing method according to Embodiment 2 of the present application is schematically shown. It can be understood that this method embodiment can be executed in the server 12, and the flowchart of this method embodiment is not used to limit the sequence of execution steps.

[0057] Such as image 3 As shown, sensitive word detection service, event reporting service, blacklist service, case center, operation tools, etc. The DFA algorithm is used in the scheme to match sensitive words. In computer theory, a definite finite state automaton or a definite finite automaton is an automaton that can realize state transition. For a given state belonging to the automaton and a character belonging to the automaton alphabet, it can transfer to the next state (this state can be the previous state) according to the transition function given in advance.

[0058] Define a non-equivalence relation: The following steps can get this set N:

[0059] I...

Embodiment 3

[0069] Figure 4 A schematic structural diagram of a data processing device according to Embodiment 3 of the present application is schematically shown. The data processing device may be divided into one or more program modules, and one or more program modules are stored in a storage medium and executed by one or more processors to complete the embodiments of the present application. The program modules referred to in the embodiments of the present application refer to a series of computer program instruction segments capable of accomplishing specific functions. The following description will specifically introduce the functions of each program module in this embodiment.

[0070] Such as Figure 4 As shown, the data processing apparatus 400 may include a first acquisition module 400, a detection module 402, a second acquisition module 404, and a processing module 406, wherein,

[0071] The first receiving module 400 is configured to obtain a user's service request, and obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data processing method, device and system, computer equipment and a computer readable storage medium, and the method comprises the steps: obtaining a business request of a user, and obtaining user data according to the business request; performing risk control detection according to the service request; obtaining a business processing rule correspondingto the risk control detection result; and processing the service request according to the service processing rule. According to the embodiment, safety guarantee is provided for normal operation of theplatform, various violation operation behaviors are discovered in time, platform loss is reduced, and operation cost is reduced; the practicability is high, the operation is simple, the SOP auditingprocess is standardized, and the auditing process time of an operator can be greatly shortened; a configuration interface for customizing the auditing rule is provided, and the auditing rule can be adjusted in real time according to the change of the risk control rule.

Description

technical field [0001] The embodiments of the present application relate to the video field of data processing, and in particular, to a data processing method, device, computer equipment, and computer-readable storage medium. Background technique [0002] At present, there are two risk control methods, one is client-side risk control, and the other is single-service risk control system. [0003] For client-side risk control, integrate risk control strategies and rule processing into the client-side application, quickly identify the system information and user operations where the client is located, and intercept illegal operations in real time. [0004] The advantage is that it can run offline on a stand-alone machine without the intervention of the server. The operation is simple and the interception speed is fast. [0005] Disadvantages: It is difficult to iteratively update policies and rules. If an update is required, it needs to be updated together with the client. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06Q10/06G06F16/242
CPCG06F21/554G06Q10/0635G06F16/2433
Inventor 林宝鹏李鹏
Owner 深圳依时货拉拉科技有限公司