+

CN116614407A - Risk control method and device - Google Patents

Risk control method and device Download PDF

Info

Publication number
CN116614407A
CN116614407A CN202310716247.2A CN202310716247A CN116614407A CN 116614407 A CN116614407 A CN 116614407A CN 202310716247 A CN202310716247 A CN 202310716247A CN 116614407 A CN116614407 A CN 116614407A
Authority
CN
China
Prior art keywords
quality evaluation
service
evaluation information
target call
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310716247.2A
Other languages
Chinese (zh)
Inventor
白昊东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Blockchain Technology Shanghai Co Ltd filed Critical Ant Blockchain Technology Shanghai Co Ltd
Priority to CN202310716247.2A priority Critical patent/CN116614407A/en
Publication of CN116614407A publication Critical patent/CN116614407A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

One or more embodiments of the present disclosure provide a risk control method and apparatus, where the method includes: firstly, acquiring a plurality of single-point quality evaluation information of a plurality of service nodes in a target call chain, wherein each single-point quality evaluation information comprises quality evaluation information of service data generated by any service node aiming at a service processing call request, and different service data are acquired based on a target call request identifier; and then, carrying out full-link evaluation processing based on the plurality of single-point quality evaluation information to obtain full-link quality evaluation information corresponding to the target call request identifier, and carrying out risk prevention and control on the target call chain based on the full-link quality evaluation information.

Description

一种风险控制方法及装置A risk control method and device

技术领域technical field

本文件涉及互联网技术领域,尤其涉及一种风险控制方法及装置。This document relates to the field of Internet technology, in particular to a risk control method and device.

背景技术Background technique

目前,随着互联网技术的快速发展,对于为前端应用提供服务的后端服务器而言,其面临的网络风险越来越多,因此,需要对后端服务器进行风险评估,以提高其抗风险能力,确保其服务能力的稳定和高效。At present, with the rapid development of Internet technology, back-end servers that provide services for front-end applications are facing more and more network risks. Therefore, risk assessment of back-end servers is required to improve their anti-risk capabilities , to ensure the stability and efficiency of its service capabilities.

然而,随着风控技术的发展,越来越多的风控技术运用到风控领域里来,风控链路中接入的系统也越来越多,数据流转的节点也越来越多,跨网域、长链路流转业务的占比越来越高,但是,在风险评估的过程中均是以单个节点进行分析的,对其他节点的情况往往不得而知,这就导致其风险控制具有较大的局限性,经常造成误判和漏判等情况,影响业务的顺利进行和数据安全。However, with the development of risk control technology, more and more risk control technologies are applied to the field of risk control, more and more systems are connected to the risk control link, and more and more nodes are used for data transfer , the proportion of cross-network and long-link transfer business is getting higher and higher. However, in the process of risk assessment, it is analyzed on a single node, and the situation of other nodes is often unknown, which leads to its risk Control has relatively large limitations, often resulting in misjudgments and missed judgments, affecting the smooth progress of business and data security.

由此可知,需要提供一种更全面的风险控制方法,以减少误判、漏判等情况,提高风险控制的准确性。It can be seen from this that it is necessary to provide a more comprehensive risk control method to reduce misjudgments and missed judgments and improve the accuracy of risk control.

发明内容Contents of the invention

本说明书一个或多个实施例的目的是提供一种风险控制方法。该风险控制方法包括:The purpose of one or more embodiments of this specification is to provide a risk control method. The risk control method includes:

获取目标调用链中多个业务节点的多个单点质量评估信息;其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的所述业务节点对应的业务数据是基于所述业务处理调用请求对应的同一个目标调用请求标识所获取的。Obtain multiple single-point quality evaluation information of multiple service nodes in the target call chain; wherein, each of the single-point quality evaluation information includes the quality evaluation information of the service data generated by any of the service nodes for the service processing call request The service data corresponding to different service nodes is obtained based on the same target invocation request identifier corresponding to the service processing invocation request.

基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息。A full-link evaluation process is performed based on the multiple single-point quality evaluation information to obtain full-link quality evaluation information corresponding to the target invocation request identifier.

基于所述全链路质量评估信息,对所述目标调用链进行风险防控。Risk prevention and control is performed on the target call chain based on the full link quality assessment information.

本说明书一个或多个实施例的目的是提供一种风险控制装置。该风险控制装置包括:The purpose of one or more embodiments of this specification is to provide a risk control device. The risk control device includes:

单点评估信息获取模块,其获取目标调用链中多个业务节点的多个单点质量评估信息;其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的所述业务节点对应的业务数据是基于所述业务处理调用请求对应的同一个目标调用请求标识所获取的。A single-point evaluation information acquisition module, which obtains multiple single-point quality evaluation information of multiple service nodes in the target call chain; wherein, each of the single-point quality evaluation information includes any of the service nodes for the service processing call request. The generated service data quality evaluation information, and the service data corresponding to different service nodes are obtained based on the same target invocation request identifier corresponding to the service processing invocation request.

全链路评估信息确定模块,其基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息。A full-link evaluation information determination module, which performs full-link evaluation processing based on the multiple single-point quality evaluation information, and obtains full-link quality evaluation information corresponding to the target invocation request identifier.

调用链风控模块,其基于所述全链路质量评估信息,对所述目标调用链进行风险防控。A call chain risk control module, which implements risk prevention and control on the target call chain based on the full link quality assessment information.

本说明书一个或多个实施例的目的是提供一种风险控制设备,包括:处理器;以及被安排成存储计算机可执行指令的存储器。An object of one or more embodiments of the present specification is to provide a risk control device comprising: a processor; and a memory arranged to store computer-executable instructions.

所述计算机可执行指令在被执行时使所述处理器获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的所述业务节点对应的业务数据是基于所述业务处理调用请求对应的同一个目标调用请求标识所获取的;基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息;基于所述全链路质量评估信息,对所述目标调用链进行风险防控。When the computer-executable instructions are executed, the processor acquires multiple single-point quality assessment information of multiple service nodes in the target call chain, wherein each single-point quality assessment information includes any one of the service The quality evaluation information of the business data generated by the node for the service processing call request. The service data corresponding to different service nodes is obtained based on the same target call request identifier corresponding to the service process call request; based on the multiple The single-point quality evaluation information is processed for full link evaluation to obtain the full link quality evaluation information corresponding to the target call request identifier; based on the full link quality evaluation information, risk prevention and control is performed on the target call chain.

本说明书一个或多个实施例的目的是提供一种存储介质,用于存储计算机可执行指令。所述可执行指令在被处理器执行实现以下方法:获取目标调用链中多个业务节点的多个单点质量评估信息;其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的所述业务节点对应的业务数据是基于所述业务处理调用请求对应的同一个目标调用请求标识所获取的;基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息;基于所述全链路质量评估信息,对所述目标调用链进行风险防控。An object of one or more embodiments of the present specification is to provide a storage medium for storing computer-executable instructions. The executable instructions are executed by the processor to implement the following method: obtain multiple single-point quality assessment information of multiple service nodes in the target call chain; wherein, each of the single-point quality assessment information includes any one of the service node For the quality evaluation information of the service data generated by the service processing call request, the service data corresponding to the different service nodes is obtained based on the same target call request identifier corresponding to the service process call request; based on the multiple The single-point quality assessment information is subjected to full-link assessment processing to obtain full-link quality assessment information corresponding to the target call request identifier; based on the full-link quality assessment information, risk prevention and control is performed on the target call chain.

附图说明Description of drawings

为了更清楚地说明本说明书一个或多个实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书一个或多个中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate one or more embodiments of this specification or the technical solutions in the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, in the following description The accompanying drawings are only some embodiments described in one or more of the present specification, and those skilled in the art can also obtain other drawings according to these drawings without any creative effort.

图1为本说明书一个或多个实施例提供的风险控制系统的应用场景示意图;FIG. 1 is a schematic diagram of an application scenario of a risk control system provided by one or more embodiments of this specification;

图2为本说明书一个或多个实施例提供的风险控制方法的第一种流程示意图;Fig. 2 is a schematic flow chart of the first risk control method provided by one or more embodiments of this specification;

图3为本说明书一个或多个实施例提供的风险控制方法的第二种流程示意图;Fig. 3 is a second schematic flow chart of the risk control method provided by one or more embodiments of this specification;

图4为本说明书一个或多个实施例提供的风险控制装置的模块组成示意图;Fig. 4 is a schematic diagram of the module composition of the risk control device provided by one or more embodiments of this specification;

图5为本说明书一个或多个实施例提供的风险控制设备的结构示意图。Fig. 5 is a schematic structural diagram of a risk control device provided by one or more embodiments of this specification.

具体实施方式Detailed ways

为了使本技术领域的人员更好地理解本说明书一个或多个中的技术方案,下面将结合本说明书一个或多个实施例中的附图,对本说明书一个或多个实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一个或多个一部分实施例,而不是全部的实施例。基于本说明书一个或多个中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本文件的保护范围。In order to enable those skilled in the art to better understand the technical solutions in one or more embodiments of this specification, the technical solutions in one or more embodiments of this specification will be described below in conjunction with the drawings in one or more embodiments of this specification To describe clearly and completely, it is obvious that the described embodiments are only one or more partial embodiments in this specification, rather than all the embodiments. All other embodiments obtained by persons of ordinary skill in the art based on one or more embodiments in this specification without creative efforts shall fall within the scope of protection of this document.

需要说明的是,在不冲突的情况下,本说明书中的一个或多个实施例以及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本说明书一个或多个实施例。It should be noted that, in the case of no conflict, one or more embodiments in this specification and features in the embodiments can be combined with each other. One or more embodiments of this specification will be described in detail below with reference to the drawings and in combination with the embodiments.

本说明书一个或多个实施例中的部分术语解释如下:Some terms in one or more embodiments of this specification are explained as follows:

数据流转节点,也称为业务节点,是一种抽象概念,表示数据所经过的某个系统或者某个接口。A data transfer node, also known as a service node, is an abstract concept that represents a system or an interface through which data passes.

数据流转全链路,简称全链路、全调用链路,是指通过数据流转节点之间的传递关系组合而成,形成一条完整的数据流转链路。Data transfer full link, referred to as full link and full call link, refers to the combination of transfer relationships between data transfer nodes to form a complete data transfer link.

本说明书一个或多个实施例提供了一种风险控制方法及装置,通过获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的;然后基于上述多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息,再基于上述全链路质量评估信息,对目标调用链进行风险防控,从而能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。One or more embodiments of this specification provide a risk control method and device, by obtaining multiple single-point quality assessment information of multiple service nodes in the target call chain, wherein each single-point quality assessment information includes any business The quality evaluation information of the business data generated by the node for the business processing call request. Different business data are obtained based on the target call request identifier; Request the full link quality assessment information corresponding to the identification, and then based on the above full link quality assessment information, carry out risk prevention and control on the target call chain, so that the quality assessment information of each business node can be collected from the perspective of the full link for comprehensive risk assessment Prevention and control, avoiding missed judgments and misjudgments caused by the limitations of single-node risk control, and improving the accuracy of risk control.

图1为本说明书一个或多个实施例提供的风险控制系统的应用场景示意图,如图1所示,该系统包括:客户端和服务端,其中,该客户端可以是智能手机、平板电脑等移动终端,该客户端还可以是个人计算机等终端设备,该服务端可以是用于对客户端发起的业务进行处理的业务服务端,该服务端可以是独立的服务器,也可以是由多个服务器组成的服务器集群,在微服务架构中,该服务端可以是微服务架构中的一个服务节点,也可称为业务节点。Figure 1 is a schematic diagram of the application scenario of the risk control system provided by one or more embodiments of this specification. As shown in Figure 1, the system includes: a client and a server, where the client can be a smart phone, a tablet, etc. Mobile terminal, the client can also be a terminal device such as a personal computer, the server can be a business server for processing the business initiated by the client, the server can be an independent server, or it can be composed of multiple A server cluster composed of servers. In the microservice architecture, the server can be a service node in the microservice architecture, and can also be called a business node.

其中,本说明书一个或多个实施例提供的风险控制方法可以应用于服务端,该服务端可以位于任一风控节点,例如其可以是微服务架构的业务链路中的任一业务节点,该风险控制方法的具体过程为:首先获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的,然后基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息,再基于所述全链路质量评估信息,对所述目标调用链进行风险防控,从而能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。Among them, the risk control method provided by one or more embodiments of this specification can be applied to the server, and the server can be located at any risk control node, for example, it can be any business node in the business link of the microservice architecture, The specific process of the risk control method is as follows: firstly obtain multiple single-point quality assessment information of multiple service nodes in the target call chain, wherein each single-point quality assessment information includes Requesting the quality evaluation information of the business data generated, different business data is obtained based on the target invocation request identification, and then performing full-link evaluation processing based on the multiple single-point quality evaluation information to obtain the target invocation request identification The corresponding full-link quality assessment information, and then based on the full-link quality assessment information, carry out risk prevention and control on the target call chain, so that the quality assessment information of each service node can be collected from the perspective of the full link for comprehensive Risk prevention and control, avoiding missed judgments and misjudgments caused by the limitations of single-node risk control, and improving the accuracy of risk control.

在上述应用场景中,参考图1,客户端可根据用户的操作发起目标业务,该目标业务的处理过程需要微服务架构中多个业务节点的共同参与,例如,客户端发起的业务请求到达服务端A后,服务端A需要继续调用服务端B、C、D,其中,服务端D还需要调用服务端E,当每个被调用的服务端返回数据后,服务端A向客户端返回业务响应数据,完成业务流程,其中,从服务端发起的一连串调用关系的集合构成该业务请求对应的调用链路,简称调用链,上述服务端A、B、C、D、E均为业务节点,在相关技术中,上述多个业务节点之间可能因为网域、地理位置、管理权限、职能、数据库类别中至少一项原因进行了分隔,使得只能针对其中任意一个节点进行单节点风险防控,而无法获知其他节点的风险状况并进行针对性的防控,因此,相关技术提供的风险防控方法主要聚焦于单节点的数据质量评估,从以下两方面进行风险防控方法及系统的升级;其中,一方面,可以是降低梳理和配置评判数据质量等级的人力成本,例如,使用机器学习的方式,使用历史数据自动确定数据质量预警的阈值;另一方面,可以是增加数据质量评价的不同方式,例如,电网公司多聚焦于电费场景下编写不同公式对数据质量进行评价。In the above application scenario, referring to Figure 1, the client can initiate the target business according to the user's operation. The processing of the target business requires the joint participation of multiple business nodes in the microservice architecture. After connecting to A, server A needs to continue to call servers B, C, and D. Among them, server D also needs to call server E. When each called server returns data, server A returns business to the client Respond to the data and complete the business process. The set of a series of invocation relationships initiated from the server constitutes the invocation link corresponding to the business request, referred to as the invocation chain. The above-mentioned servers A, B, C, D, and E are business nodes. In related technologies, the above multiple business nodes may be separated due to at least one of network domain, geographic location, management authority, function, and database category, so that only any one of the nodes can be used for single-node risk prevention and control , but it is impossible to know the risk status of other nodes and carry out targeted prevention and control. Therefore, the risk prevention and control methods provided by related technologies mainly focus on the data quality assessment of a single node, and carry out risk prevention and control methods and system upgrades from the following two aspects Among them, on the one hand, it can be to reduce the human cost of combing and configuring and judging the data quality level, for example, using machine learning to automatically determine the threshold of data quality early warning using historical data; on the other hand, it can be to increase the data quality evaluation. In different ways, for example, power grid companies focus on writing different formulas to evaluate data quality in electricity bill scenarios.

不难看出,已有的数据质量的检测和系统都围绕于单点系统中数据的质量分析,但是,对于数据在多个系统中的流转形成的全链路质量,并未有所涉及,而本说明书一个或多个实施例提供的风险控制方法则基于风控领域的大背景,创造性的定位数据在不同节点中的流转链路,并对其进行质量检测和预警。It is not difficult to see that the existing data quality detection and systems are all centered on the quality analysis of data in a single point system. However, the quality of the entire link formed by the flow of data in multiple systems is not involved. The risk control method provided by one or more embodiments of this specification is based on the background of the risk control field, creatively locates the flow links of data in different nodes, and performs quality inspection and early warning.

具体的,本说明书一个或多个实施例的风险控制方法即可应用于其中的任一业务节点,上述微服务架构中的每个业务节点都可以应用上述风险控制方法,其中,任一应用上述风险控制方法的业务节点,均可以通过获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个所述单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的,然后基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息,再基于所述全链路质量评估信息,对所述目标调用链进行风险防控,从而能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。Specifically, the risk control method in one or more embodiments of this specification can be applied to any of the business nodes, and each business node in the above-mentioned microservice architecture can apply the above-mentioned risk control method, wherein any application of the above-mentioned The business nodes of the risk control method can obtain multiple single-point quality evaluation information of multiple business nodes in the target call chain, wherein each of the single-point quality evaluation information includes any service node's call request for business processing. The quality evaluation information of the generated business data, different business data is obtained based on the target invocation request identifier, and then the whole link evaluation process is performed based on the multiple single-point quality evaluation information to obtain the corresponding target invocation request identifier Based on the full link quality assessment information, risk prevention and control is performed on the target invocation chain based on the full link quality assessment information, so that the quality assessment information of each service node can be collected from the perspective of the full link for comprehensive risk prevention Control, avoid missed judgments and misjudgments caused by the limitations of single-node risk control, and improve the accuracy of risk control.

需要说明的是,以上以微服务架构对业务节点进行了举例说明,但其不应被理解为对说明书一个或多个实施例保护范围的限定,实际应用中,上述业务节点也可以是其他分布式服务架构中的一个节点,并参与基于多节点的服务调用过程,其均可以应用本说明书一个或多个实施例提供的风险控制方法对全链路的数据质量进行评估并进行对应的风险防控。It should be noted that the business nodes are described above using the microservice architecture as an example, but it should not be understood as limiting the scope of protection of one or more embodiments of the description. In practical applications, the above business nodes can also be other distributed A node in the service architecture, and participate in the multi-node-based service invocation process, all of them can apply the risk control method provided by one or more embodiments of this specification to evaluate the data quality of the whole link and carry out corresponding risk prevention. control.

图2为本说明书一个或多个实施例提供的风险控制方法的第一种流程示意图,图2中的方法能够由图1中的服务端执行,该服务端可以是业务节点中的任意一个,如图2所示,该方法至少包括以下步骤:Fig. 2 is a schematic flowchart of the first risk control method provided by one or more embodiments of this specification. The method in Fig. 2 can be executed by the server in Fig. 1, and the server can be any one of the service nodes, As shown in Figure 2, the method at least includes the following steps:

S102,获取目标调用链中多个业务节点的多个单点质量评估信息;其中,每个业务节点对应于一个单点质量评估信息,每个单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务节点对应的业务数据是基于上述业务处理调用请求对应的同一个目标调用请求标识所获取的。S102. Obtain multiple single-point quality assessment information of multiple service nodes in the target call chain; wherein, each service node corresponds to a single-point quality assessment information, and each single-point quality assessment information includes any service node for business processing The quality evaluation information of the service data generated by the invocation request, and the service data corresponding to different service nodes are obtained based on the same target invocation request identifier corresponding to the above service processing invocation request.

具体的,考虑到上述多个业务节点之间可能因为网域、地理位置、管理权限、职能、数据库类别中至少一项原因进行了分隔,如何将多个业务节点的单点质量评估信息进行梳理和汇总,成为首先要面临的技术问题,基于此,通过借助于调用链追踪技术,利用微服务架构中的调用链实现业务数据的追踪和串联,将同一个目标调用请求标识(如traceID)对应的多个业务数据作为相关联的业务数据,从而基于同一个目标调用请求标识对应的多个业务数据分别所属的业务节点确定一个目标调用链,即目标调用链中多个业务节点是基于同一个目标调用请求标识对应的多个业务数据的数据生成节点而确定的,并据此进一步计算全链路质量评估信息,这些将会在后续说明中进一步进行说明,此处不再赘述。Specifically, considering that the above multiple business nodes may be separated due to at least one of the reasons of network domain, geographical location, management authority, function, and database category, how to sort out the single-point quality evaluation information of multiple business nodes and summary become the first technical problems to be faced. Based on this, by using the call chain tracking technology in the microservice architecture, the call chain in the microservice architecture is used to realize the tracking and concatenation of business data, and the same target call request identifier (such as traceID) corresponds to Multiple business data of the target call chain are used as the associated business data, so that a target call chain is determined based on the business nodes to which the multiple business data corresponding to the same target call request identifier belong, that is, multiple business nodes in the target call chain are based on the same The target call request identifies multiple data generation nodes corresponding to the service data, and further calculates the full link quality evaluation information based on this. These will be further explained in the subsequent description, and will not be repeated here.

需要说明的是,评估数据质量的意义在于能够第一时间感知源端数据的变更与产生的脏数据,自动拦截问题任务,有效阻断脏数据向下游蔓延,避免任务产出不符合预期的问题数据,影响正常使用和业务决策。同时也能显著降低问题处理的时间成本、避免任务重新运行带来的资源费用浪费,因此,可以用于作为风险防控的主要依据之一。It should be noted that the significance of assessing data quality lies in being able to perceive changes in source data and generated dirty data in the first place, automatically intercept problematic tasks, effectively prevent dirty data from spreading downstream, and avoid problems where task output does not meet expectations Data, affecting normal use and business decisions. At the same time, it can also significantly reduce the time cost of problem handling and avoid the waste of resource costs caused by task rerunning. Therefore, it can be used as one of the main basis for risk prevention and control.

S104,基于上述多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息。S104. Perform full-link evaluation processing based on the above-mentioned multiple single-point quality evaluation information, and obtain full-link quality evaluation information corresponding to the target invocation request identifier.

具体的,在获得多个业务节点对应的单点质量评估信息后,即可将其融合得到全链路质量评估信息,以反映整个调用链的数据质量,便于进一步从全链路角度进行风险防控。Specifically, after obtaining the single-point quality assessment information corresponding to multiple service nodes, it can be fused to obtain the full-link quality assessment information to reflect the data quality of the entire call chain, so as to facilitate further risk prevention from the perspective of the entire link. control.

需要说明的是,在一些实施方式中,一个目标调用请求标识对应一个业务处理调用请求,而一个目标调用请求标识对应一个全链路质量评估信息,因此,目标调用请求标识、业务处理调用请求、全链路质量评估信息一一对应,其中,上述全链路质量评估信息可以是一个得分,例如全链路质量分。It should be noted that, in some implementations, a target invocation request identifier corresponds to a service processing invocation request, and a target invocation request identifier corresponds to a full link quality assessment information. Therefore, the target invocation request identifier, service processing invocation request, There is a one-to-one correspondence of full link quality evaluation information, wherein the above full link quality evaluation information may be a score, such as a full link quality score.

S106,基于上述全链路质量评估信息,对目标调用链进行风险防控。S106. Perform risk prevention and control on the target invocation chain based on the above-mentioned full-link quality assessment information.

本说明书一个或多个实施例提供的风险控制方法,通过获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的;然后基于上述多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息,再基于上述全链路质量评估信息,对目标调用链进行风险防控,从而能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。The risk control method provided by one or more embodiments of this specification obtains multiple single-point quality assessment information of multiple service nodes in the target call chain, wherein each single-point quality assessment information includes The quality evaluation information of the business data generated by the invocation request. Different business data are obtained based on the target invocation request identifier; then, based on the above-mentioned multiple single-point quality assessment information, the whole link evaluation process is performed to obtain the corresponding value of the target invocation request identifier. Based on the above-mentioned full-link quality assessment information, the risk prevention and control of the target call chain can be carried out, so that the quality assessment information of each service node can be collected from the perspective of the whole link for comprehensive risk prevention and control, avoiding Due to the limitations of single-node risk control, missed judgments and misjudgments, etc., improve the accuracy of risk control.

在上述步骤S102中,获取单点质量评估信息的方式至少有两种,一种是从其他业务节点获取业务数据,然后根据业务数据计算得到单点质量评估信息;另一种是直接从其他业务节点获取其单点质量评估信息,本领域技术人员可以根据实际需求灵活选择或变更实施,下面结合示例对上述两种方式进一步说明。In the above step S102, there are at least two ways to obtain single-point quality assessment information, one is to obtain service data from other service nodes, and then calculate and obtain single-point quality assessment information according to the service data; the other is to obtain the single-point quality assessment information directly from other service nodes Nodes obtain their single-point quality evaluation information, and those skilled in the art can flexibly choose or change the implementation according to actual needs. The above two methods are further described below with examples.

第一种方式,在本说明书一个或多个实施例中,上述步骤S102获取目标调用链中多个业务节点的多个单点质量评估信息,包括:In the first way, in one or more embodiments of this specification, the above step S102 acquires multiple single-point quality evaluation information of multiple service nodes in the target call chain, including:

基于针对目标调用链的业务处理调用请求所生成的目标调用请求标识,从所述目标调用链的每个业务节点对应的调用链日志中,查询所述目标调用请求标识对应的业务数据;Based on the target call request identifier generated for the service processing call request of the target call chain, query the service data corresponding to the target call request identifier from the call chain log corresponding to each service node of the target call chain;

针对每个上述业务节点,基于目标质量评估方式,对该业务节点对应的业务数据进行质量评估,得到该业务节点对应的单点质量评估信息;其中,上述目标质量评估方式是针对产生上述业务数据的业务节点所配置的质量评估方式。For each of the above business nodes, based on the target quality assessment method, perform quality assessment on the business data corresponding to the service node, and obtain the single-point quality assessment information corresponding to the service node; wherein, the above target quality assessment method is for generating the above business data The quality evaluation method configured by the business node.

其中,获取的上述业务数据,可以是包括目标调用请求标识对应的业务数据和多个历史调用请求标识对应的业务数据,也可以是某一单位时间段内多个目标调用请求标识对应的多条业务数据,本说明书一个或多个实施例不做限定。Wherein, the above-mentioned business data obtained may include business data corresponding to the target invocation request identifier and business data corresponding to multiple historical invocation request identifiers, or may be multiple records corresponding to multiple target invocation request identifiers within a certain unit time period. Business data is not limited by one or more embodiments of this specification.

通过本实施方式,可以直接从调用链日志中查询对应的业务数据,然后由当前业务节点基于各个业务数据对应的质量评估方式进行质量评估,从而得到各个业务节点对应的单点质量评估信息,这种方式下,调用链日志所记载的内容和格式可以继续沿用已有技术而无需进行改变,单点质量评估信息的计算全部由当前服务节点实现,对已有的调用链架构影响较小,可以在较少对现有架构进行改动的情况下从全链路的角度汇集各个业务节点的单点质量评估信息并融合后进行综合的风险防控。Through this embodiment, the corresponding service data can be queried directly from the call chain log, and then the current service node performs quality assessment based on the quality assessment method corresponding to each service data, so as to obtain the single-point quality assessment information corresponding to each service node. In this way, the content and format recorded in the call chain log can continue to use the existing technology without changing, and the calculation of the single-point quality evaluation information is all implemented by the current service node, which has little impact on the existing call chain architecture. In the case of few changes to the existing architecture, the single-point quality assessment information of each service node is collected from the perspective of the whole link and integrated for comprehensive risk prevention and control.

第二种方式,在本说明书另一些变更实施方式中,上述步骤S102获取目标调用链中多个业务节点的多个单点质量评估信息,包括:In the second way, in other modified implementations of this specification, the above step S102 acquires multiple single-point quality evaluation information of multiple service nodes in the target call chain, including:

基于针对目标调用链的业务处理调用请求所生成的目标调用请求标识,从目标调用链的每个业务节点对应的调用链日志中,查询目标调用请求标识对应的单点质量评估信息;其中,每个业务节点根据目标质量评估方式对自身产生的业务数据进行质量评估,并将评估得到的单点质量评估信息与目标调用请求标识绑定后写入各自的调用链日志;Based on the target call request identifier generated for the service processing call request of the target call chain, query the single-point quality evaluation information corresponding to the target call request identifier from the call chain log corresponding to each business node of the target call chain; wherein, each Each business node evaluates the quality of the business data generated by itself according to the target quality evaluation method, and writes the respective call chain logs after binding the single-point quality evaluation information obtained by the evaluation with the target call request identifier;

将同一个目标调用请求标识对应的单点质量评估信息确定为目标调用链中多个业务节点的多个单点质量评估信息。The single-point quality assessment information corresponding to the same target call request identifier is determined as multiple single-point quality assessment information of multiple service nodes in the target call chain.

通过本实施方式,需要在现有的调用链日志中增加对业务节点的单点质量评估信息的记载,其好处是,各个业务节点自行计算本地的单点质量评估信息,任意服务节点需要执行本说明书一个或多个实施例提供的上述风险控制方法时,可以直接从调用链日志中查询得到其他服务节点的单点质量评估信息并进行融合后即可进行综合的风险防控,省去了该任意服务节点计算其他各个业务节点单点质量评估信息的过程,换而言之,是将各个服务节点的单点质量评估信息的评估过程散发到各个服务节点执行,通过这种“去中心化”、“分布式”的计算方式,充分利用各个服务节点的计算资源,整体上提高单点质量评估信息的评估效率,从而提高全链路质量评估信息的计算效率,进而提高基于全链路质量评估信息进行风险防控的实时性和灵敏性。Through this implementation mode, it is necessary to add the record of single-point quality assessment information of service nodes in the existing call chain log. The advantage is that each service node calculates the local single-point quality assessment information by itself, and any service node needs to execute this When describing the above-mentioned risk control method provided by one or more embodiments, the single-point quality evaluation information of other service nodes can be directly queried from the call chain log and integrated to carry out comprehensive risk prevention and control, eliminating the need for this The process of any service node calculating the single-point quality evaluation information of other business nodes, in other words, the evaluation process of the single-point quality evaluation information of each service node is distributed to each service node for execution. Through this "decentralization" , "Distributed" calculation method, make full use of the computing resources of each service node, improve the evaluation efficiency of single-point quality evaluation information as a whole, thereby improving the calculation efficiency of full-link quality evaluation information, and then improve the quality evaluation based on full-link The real-time and sensitivity of information for risk prevention and control.

在上述任意实施例的基础上,在一些变更实施方式中,上述单点质量评估信息可以是通过以下至少一种质量评估方式得到的:On the basis of any of the above-mentioned embodiments, in some modified implementation manners, the above-mentioned single-point quality evaluation information may be obtained through at least one of the following quality evaluation methods:

质量评估方式1:基于业务数据与针对上述业务节点所配置的数据达标判定规则的匹配结果,生成上述业务节点对应的单点质量评估信息。Quality evaluation method 1: Based on the matching result of the service data and the data compliance determination rule configured for the above service node, generate single-point quality evaluation information corresponding to the above service node.

质量评估方式2:将上述业务数据输入针对上述业务节点所配置的质量评估模型进行质量评估,得到上述业务节点对应的单点质量评估信息。Quality assessment method 2: input the above service data into a quality assessment model configured for the above service node to perform quality assessment, and obtain single-point quality assessment information corresponding to the above service node.

质量评估方式3:利用针对上述业务节点所配置的质量评估算法对上述业务数据进行质量评估,得到上述业务节点对应的单点质量评估信息。Quality assessment method 3: use the quality assessment algorithm configured for the above service nodes to perform quality assessment on the above service data, and obtain single-point quality assessment information corresponding to the above service nodes.

下面以上述质量评估方式1为例进行说明,在一些示例中,假定某个节点X1上数据报文即业务数据C1如下:The following takes the above-mentioned quality evaluation method 1 as an example for illustration. In some examples, it is assumed that the data message on a certain node X1, that is, the service data C1 is as follows:

[[

{{

"key1":1,"key1": 1,

"key2":2"key2": 2

},},

{{

"key1":11,"key1": 11,

"key2":22"key2":22

}}

]]

假定某个节点X2上数据报文即业务数据C2如下Assume that the data message on a node X2, that is, the business data C2 is as follows

[[

{{

"key1":null,"key1": null,

"key2":null"key2": null

},},

{{

"key1":null,"key1": null,

"key2":null"key2": null

}}

]]

假定配置的数据达标判定规则R1为key1对应长度为[0,1](表示0到1),配置的数据达标判定规则R2为key2对应结果不为空。Assume that the configured data compliance determination rule R1 is key1 and the corresponding length is [0,1] (indicating 0 to 1), and the configured data compliance determination rule R2 is key2 and the corresponding result is not empty.

经过数据达标判定规则R1后,此次数据报文C1的单点质量评估信息RES1为1/2=0.5,表示有一半的数据命中规则R1;经过数据达标判定规则R2后,此次数据报文C2的单点质量评估信息RES2为0/2=0,表示没有数据命中规则R2。After passing the data compliance determination rule R1, the single-point quality evaluation information RES1 of the data message C1 is 1/2=0.5, indicating that half of the data hits the rule R1; after passing the data compliance determination rule R2, the data message C1 this time The single-point quality assessment information RES2 of C2 is 0/2=0, indicating that no data matches the rule R2.

以上,以数据达标判定规则为例进行了示例性说明,此外,指令评估模型、指令评估算法也是目前较为常用的评估单点质量评估信息的手段,本领域技术人员可以结合实际需求灵活选择合适的上述质量评估方式进行单点质量评估信息的实时计算,其可以参考已有技术实施,在此不再赘述。Above, the data compliance determination rule is taken as an example to illustrate. In addition, the instruction evaluation model and instruction evaluation algorithm are currently more commonly used methods for evaluating single-point quality evaluation information. Those skilled in the art can flexibly choose the appropriate one based on actual needs. The above-mentioned quality assessment method performs real-time calculation of single-point quality assessment information, which can be implemented with reference to existing technologies, and will not be repeated here.

通过上述实施方式,本领域技术人员可以灵活选择合适的上述质量评估方式进行单点质量评估信息的实时计算,丰富本说明书一个或多个实施例的实施手段,满足用户自由化、多样化的实施需求。Through the above-mentioned implementation, those skilled in the art can flexibly select the appropriate above-mentioned quality assessment method to perform real-time calculation of single-point quality assessment information, enrich the implementation means of one or more embodiments of this specification, and satisfy users' liberalization and diversification. need.

需要说明的是,在一些实施方式中,针对单点质量评估信息的确定过程,可以不是基于一个调用请求对应的业务数据,其还可以基于多个调用请求对应的多条业务数据进行计算,例如,对于某一个业务节点,取目标调用请求标识对应的业务数据以前的1000条业务数据(包含目标调用请求标识对应的业务数据),如果与规则1不匹配的有20条,那么,经过规则1之后的打分是980/1000=0.98,该方式也是本说明书一个或多个实施例的可变更实施方式之一,也应在本说明书一个或多个实施例的保护范围之内;另外,在具体实施时,可以针对每个业务处理调用请求均计算一次全链路质量评估信息,也可以是间隔一定数量的业务处理请求计算一次全链路质量评估信息。It should be noted that, in some implementations, the determination process of single-point quality evaluation information may not be based on the business data corresponding to one call request, but may also be calculated based on multiple pieces of business data corresponding to multiple call requests, for example , for a certain business node, take 1000 pieces of business data before the business data corresponding to the target invocation request identifier (including the business data corresponding to the target invocation request identifier), if there are 20 pieces that do not match rule 1, then, after rule 1 The subsequent scoring is 980/1000=0.98, which is also one of the changeable implementations of one or more embodiments of this specification, and should also be within the scope of protection of one or more embodiments of this specification; in addition, in specific During implementation, the full link quality assessment information may be calculated once for each service processing call request, or the full link quality assessment information may be calculated once at intervals of a certain number of service processing requests.

对于全链路质量评估信息的计算,在本说明书一个或多个实施例中,上述步骤S104,基于多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息,包括:For the calculation of full link quality evaluation information, in one or more embodiments of this specification, the above step S104 performs full link evaluation processing based on multiple single-point quality evaluation information, and obtains the full link corresponding to the target call request identifier. Quality assessment information, including:

获取目标调用链中每个业务节点对应的质量影响权重;Obtain the quality impact weight corresponding to each business node in the target call chain;

基于上述质量影响权重对每个上述业务节点对应的单点质量评估信息进行加权融合,得到目标调用请求标识对应的全链路质量评估信息。Based on the above quality impact weights, the single-point quality evaluation information corresponding to each of the above service nodes is weighted and fused to obtain the full link quality evaluation information corresponding to the target call request identifier.

通过本实施方式,可以针对不同的业务节点设置不完全相同的质量影响权重,对于较为重要的业务节点,其对应的质量影响权重可以设置为较大的数值,而对于非重要的业务节点,其对应的质量影响权重可以设置为较小的数值,从而使得加权融合得到的全链路质量评估信息能够更为准确地反映整条调用链的质量评估情况,便于进行更具针对性的风险防控。Through this embodiment, different quality impact weights can be set for different business nodes. For more important business nodes, the corresponding quality impact weights can be set to a larger value, while for non-important business nodes, the corresponding quality impact weights can be set to a larger value. The corresponding quality impact weight can be set to a smaller value, so that the full-link quality evaluation information obtained by weighted fusion can more accurately reflect the quality evaluation of the entire call chain, facilitating more targeted risk prevention and control .

在上述实施例的基础上,在一些变更实施方式中,所述获取所述目标调用链中每个所述业务节点对应的质量影响权重,包括:On the basis of the above embodiments, in some modified implementation manners, the obtaining the quality impact weight corresponding to each of the service nodes in the target call chain includes:

根据上述目标调用请求标识对应的业务处理调用请求的业务类别,确定上述目标调用链对应的质量权重分配信息;其中,不同业务类别对应的质量权重分配情况不同;According to the service category of the service processing call request corresponding to the above target call request identifier, determine the quality weight distribution information corresponding to the above target call chain; wherein, the quality weight distribution conditions corresponding to different service categories are different;

基于上述质量权重分配信息,确定上述目标调用链中每个业务节点对应的质量影响权重。Based on the above quality weight distribution information, determine the quality impact weight corresponding to each service node in the above target call chain.

考虑到不同的业务处理调用请求,所流经的调用链路一般是不同的,这在实际应用中一般是根据业务类别进行划分的,例如支付请求和转账请求的业务链路就是不同的,而不同的链路中,各个服务节点的权重分配情况也可以根据实际需求预先设置为不同的,因此,在这种情况下,本说明书一个或多个实施例需要根据业务请求的业务类别来确定对应的质量影响权重,从而能够针对不同的业务类别分别计算对应的全链路质量评估信息,进而针对不同的业务类别分别进行全链路质量跟踪并进行针对性的风险防控,进一步提高风险防控水平。Considering different business processing call requests, the call links they pass through are generally different, which are generally divided according to business categories in practical applications. For example, the service links of payment requests and transfer requests are different, and In different links, the weight distribution of each service node can also be preset to be different according to actual needs. Therefore, in this case, one or more embodiments of this specification need to determine the corresponding The weight of the quality impact, so that the corresponding full-link quality evaluation information can be calculated for different business categories, and then the full-link quality tracking and targeted risk prevention and control can be carried out for different business categories, further improving risk prevention and control. level.

其中,对于风险防控的方式,在本说明书一个或多个实施例中,上述步骤S106,基于上述全链路质量评估信息,对目标调用链进行风险防控,可以包括:Among them, for the method of risk prevention and control, in one or more embodiments of this specification, the above step S106, based on the above-mentioned full link quality evaluation information, performs risk prevention and control on the target call chain, which may include:

基于单位时间段内多个目标调用请求标识分别对应的全链路质量评估信息,生成上述单位时间段的归一化质量评估信息;Based on the full-link quality evaluation information corresponding to multiple target call request identifiers in the unit time period, the normalized quality evaluation information of the above unit time period is generated;

基于多个单位时间段分别对应的归一化质量评估信息,确定归一化质量水平变化信息;Determining normalized quality level change information based on the normalized quality evaluation information corresponding to multiple unit time periods;

基于上述归一化质量水平变化信息,对目标调用链进行风险防控。Based on the above normalized quality level change information, risk prevention and control is carried out on the target call chain.

考虑到不同业务节点部署的单点质量评估方式不尽相同,所计算得到的单点质量评估信息在数值上可能差异较大,影响对风险情况的判断,因此,首先对全链路质量评估信息进行归一化处理,又考虑到在业务数据量较大的情况下,如果逐个数据地分析质量波动,一方面数据量大难以观察,另一方面某个数据的突然变化会干扰对风险情况的判断,因此,进一步对归一化处理后的归一化质量评估信息按照单位时间段进行统计,例如求平均值或者加权平均值,从而得到单位时间段的综合归一化质量评估信息,然后根据多个单位时间段分别对应的综合归一化质量评估信息的变化趋势(即归一化质量水平变化信息)对目标调用链进行风险防控,从而能够更为准确的对全链路质量波动情况进行检测并进行针对性的风险防控。Considering that the single-point quality assessment methods deployed by different service nodes are not the same, the calculated single-point quality assessment information may have a large difference in value, which affects the judgment of the risk situation. Therefore, firstly, the full-link quality assessment information Perform normalization processing, and consider that in the case of a large amount of business data, if the quality fluctuations are analyzed one by one, on the one hand, the large amount of data is difficult to observe, and on the other hand, a sudden change in a certain data will interfere with the risk situation. Judgment, therefore, the normalized quality evaluation information after normalization processing is further counted according to the unit time period, such as averaging or weighted average, so as to obtain the comprehensive normalized quality evaluation information per unit time period, and then according to The change trend of the comprehensive normalized quality evaluation information corresponding to multiple unit time periods (that is, the normalized quality level change information) can prevent and control the risk of the target call chain, so that the quality fluctuation of the whole link can be more accurately analyzed Conduct detection and carry out targeted risk prevention and control.

在一些可变更的实施方式中,可以对单位时间段内多个目标调用请求标识分别对应的全链路质量评估信息进行归一化处理,得到单位时间段内多个目标调用请求标识分别对应的归一化质量评估信息;然后,基于一个单位时间段内多个目标调用请求标识分别对应的归一化质量评估信息确定归一化质量水平变化信息,即可以获知一个单位时间段内多个归一化质量评估信息的随着时间的波动情况;具体的,上述单位时间段可以是对应于一个质量评估时间窗口,例如,单位时间段为1小时,那么,基于上述实现方式能够得到某一天的任意1个小时内多个归一化质量评估信息,就体现了全链路质量评估信息在时间上的波动情况即质量水平变化信息;然而,为了提高归一化质量水平变化信息的准确度,可以考虑多个单位时间段分别对应的归一化质量评估信息;具体的,归一化质量水平变化信息可以包括多个单位时间段中每个单位时间段内多个归一化质量评估信息,也可以包括多个单位时间段中每个单位时间段对应的综合归一化质量评估信息,该综合归一化质量评估信息可以是单位时间段内多个归一化质量评估信息的均值或者加权均值。In some variable implementations, the full link quality evaluation information corresponding to multiple target call request identifiers within a unit time period can be normalized to obtain the corresponding Normalized quality evaluation information; then, based on the normalized quality evaluation information corresponding to multiple target call request identifiers in a unit time period, the normalized quality level change information can be determined, that is, multiple normalized quality evaluation information in a unit time period can be obtained. The fluctuation of the quality assessment information over time; specifically, the above-mentioned unit time period may correspond to a quality assessment time window, for example, the unit time period is 1 hour, then, based on the above-mentioned implementation method, it is possible to obtain the Multiple normalized quality evaluation information in any one hour reflects the time fluctuation of the full link quality evaluation information, that is, the quality level change information; however, in order to improve the accuracy of the normalized quality level change information, The normalized quality assessment information corresponding to multiple unit time periods may be considered; specifically, the normalized quality level change information may include multiple normalized quality assessment information in each unit time period of the multiple unit time periods, It may also include comprehensive normalized quality evaluation information corresponding to each unit time period in multiple unit time periods, and the comprehensive normalized quality assessment information may be the mean value or weighted value of multiple normalized quality assessment information within a unit time period mean.

其中,上述归一化质量水平变化信息可以以图表形式呈现,以便于用户观看后针对性地采取风险防控措施,此外,上述归一化质量水平变化信息也可以以数值形式呈现,通过与预设的风险防控条件进行比较,选择合适的风险防控规则进行风险防控,其均应在本说明书一个或多个实施例的保护范围之内,此处不再赘述;可选地,上述归一化质量水平变化信息用于在可视化界面上以趋势图形式进行展示。Among them, the above-mentioned normalized quality level change information can be presented in the form of charts, so that users can take targeted risk prevention and control measures after viewing. In addition, the above-mentioned normalized quality level change information can also be presented in numerical form. Compared with the risk prevention and control conditions set by the user, and selecting the appropriate risk prevention and control rules for risk prevention and control, all of them should be within the scope of protection of one or more embodiments of this specification, and will not be described here; optionally, the above The normalized quality level change information is used to display in the form of a trend graph on the visual interface.

以上述风险防控条件为预警条件为例,在上述实施例的基础上,在一些变更实施方式中,上述基于归一化质量水平变化信息,对目标调用链进行风险防控,包括:Taking the above-mentioned risk prevention and control conditions as the early warning conditions as an example, on the basis of the above-mentioned embodiments, in some modification implementation methods, the above-mentioned risk prevention and control of the target call chain based on the normalized quality level change information includes:

若上述归一化质量水平变化信息符合预设预警条件,则发出针对目标调用链的全链路风险预警信息;If the above-mentioned normalized quality level change information meets the preset early warning conditions, a full link risk early warning information for the target call chain is issued;

若上述归一化质量水平变化信息不符合预设预警条件,则继续针对下一个业务处理调用请求确定目标调用链的全链路质量评估信息。If the above-mentioned normalized quality level change information does not meet the preset warning conditions, continue to determine the full link quality evaluation information of the target call chain for the next service processing call request.

通过本实施方式,可以预先设置预警条件,在得到归一化质量水平变化信息后,将其与预设预警条件进行比较,如果符合预警条件,则发出针对所述目标调用链的全链路风险预警信息,提醒风控人员进行针对性的风险防控。如果不符合预警条件,则继续针对下一个业务处理调用请求确定所述目标调用链的全链路质量评估信息,避免漏判全链路风险。Through this embodiment, the early warning conditions can be set in advance, and after the normalized quality level change information is obtained, it is compared with the preset early warning conditions, and if the early warning conditions are met, a full link risk for the target call chain is issued Early warning information reminds risk control personnel to carry out targeted risk prevention and control. If the warning condition is not met, continue to determine the full link quality evaluation information of the target call chain for the next service processing call request, so as to avoid the risk of missing the full link judgment.

此外,在本说明书一个或多个实施例中,多个所述业务节点跨域分布;上述步骤S106,基于上述全链路质量评估信息,对目标调用链进行风险防控,可以包括:In addition, in one or more embodiments of this specification, multiple service nodes are distributed across domains; the above step S106, based on the above-mentioned full-link quality evaluation information, performs risk prevention and control on the target call chain, which may include:

基于上述全链路质量评估信息和多个业务节点中当前业务节点的单点质量评估信息,确定目标业务节点的风险识别信息;其中,上述当前业务节点为位于当前网域的业务节点,上述目标业务节点包括当前业务节点、当前业务节点的上游业务节点、或者当前业务节点的下游业务节点;Based on the above-mentioned full-link quality assessment information and the single-point quality assessment information of the current service node among multiple service nodes, determine the risk identification information of the target service node; wherein, the above-mentioned current service node is a service node located in the current network domain, and the above-mentioned target The service node includes the current service node, the upstream service node of the current service node, or the downstream service node of the current service node;

基于上述风险识别信息对目标调用链进行风险防控。Based on the above risk identification information, carry out risk prevention and control on the target call chain.

考虑到上述跨域分布是指多个业务节点位于不同的网域,其一般由不同的风控人员进行管理,不同业务节点之间由于网域、地理位置、职能、管理权限、数据库类别中至少一项原因而分隔,导致当前一业务节点无法得知其他业务节点的质量变化情况,基于此,通过基于上述全链路质量评估信息和当前业务节点的单点质量评估信息,当前业务节点即可据此推断出上游业务节点、下游业务节点、或者是当前业务节点自身存在风险,其具体推断策略可以根据实际需求灵活设置,以实现风险的自动检测并自动确定对应的风险防控手段进行风险防控,例如向推断得到的存在风险的上游业务节点或下游业务节点发送预警信息,以帮助其进行针对性的风险防控,充分发挥全链路风险防控的优点,从而整体上提高整个服务架构的风险防控水平。Considering that the above-mentioned cross-domain distribution means that multiple business nodes are located in different network domains, which are generally managed by different risk control personnel. Due to at least Separated by one reason, the current service node cannot know the quality changes of other service nodes. Based on this, based on the above-mentioned full-link quality assessment information and the single-point quality assessment information of the current service node, the current service node can Based on this, it is inferred that the upstream business node, downstream business node, or the current business node itself has risks. The specific inference strategy can be flexibly set according to actual needs, so as to realize the automatic detection of risks and automatically determine the corresponding risk prevention and control measures for risk prevention. control, such as sending early warning information to upstream business nodes or downstream business nodes that are inferred to be at risk, to help them carry out targeted risk prevention and control, and give full play to the advantages of full-link risk prevention and control, thereby improving the entire service architecture as a whole level of risk control.

为了便于理解,结合一个具体的示例对上述风险控制方法进一步进行说明。For ease of understanding, the above risk control method will be further described with reference to a specific example.

请参考图3,其示出了本说明书一个或多个实施例提供的风险控制方法的第二种流程示意图,在一个具体示例中,通过配置数据达标判定规则可以计算单个服务节点的质量分数即单点质量评估信息,再利用全链路中的目标调用请求标识traceId,确定单次业务数据流转的全链路,然后计算全链路质量评估信息,再根据数据在经过多个业务节点的过程中全链路质量评估信息所表征的质量变化情况进行风险控制。Please refer to FIG. 3 , which shows a second schematic flowchart of the risk control method provided by one or more embodiments of this specification. In a specific example, the quality score of a single service node can be calculated by configuring the data compliance determination rule, namely Single-point quality assessment information, and then use the target call request identifier traceId in the whole link to determine the full link of a single business data flow, and then calculate the quality assessment information of the whole link, and then according to the data in the process of passing through multiple service nodes Risk control is carried out on the quality changes represented by the quality assessment information of the whole link in the network.

同时,对于全链路质量评估信息的评估方式,可以配置高阶的评估规则,对全链路中单个服务节点的质量影响权重进行修改,降低或忽略某些业务节点对全链路质量评估信息的影响,主要流程如下:At the same time, for the evaluation method of the full link quality evaluation information, high-level evaluation rules can be configured to modify the quality impact weight of a single service node in the full link, reducing or ignoring the impact of certain service nodes on the full link quality evaluation information. , the main process is as follows:

(1)通过在业务数据流转途径的业务系统中进行埋点,得到服务节点(x1,x2,x3,……)及数据报文即业务数据(c1,c2,c3,……)。(1) Obtain service nodes (x1, x2, x3, ...) and data packets, namely business data (c1, c2, c3, ...) by embedding points in the business system of the business data flow path.

(2)在数据报文c经过的第一个服务节点x时,生成该次数据流转的traceId。(2) When the data packet c passes through the first service node x, generate the traceId of the data flow.

(3)对服务节点(x1,x2,x3,……),配置对应数据报文(c1,c2,c3,……)的数据达标判定规则(R1,R2,R3,……)。(3) For the service nodes (x1, x2, x3, ...), configure the data compliance determination rules (R1, R2, R3, ...) corresponding to the data packets (c1, c2, c3, ...).

(4)数据报文(c1,c2,c3,……)经过数据达标判定规则(R1,R2,R3,……)后,会输出命中规则的比例即单点质量评估信息(RES1,RES2,RES3,……),其中,每个RES的范围在(0-1)。(4) After the data packets (c1, c2, c3, ...) pass the data standard determination rules (R1, R2, R3, ...), the ratio of hit rules, that is, the single-point quality evaluation information (RES1, RES2, RES3, ...), wherein, the range of each RES is (0-1).

(5)配置服务节点在数据全链路中的权重(Q1,Q2,Q3,……),可得全链路的数据质量分数即全链路质量评估信息S为:(5) Configure the weight of the service node in the full data link (Q1, Q2, Q3, ...), and the data quality score of the full link, that is, the full link quality evaluation information S, can be obtained as:

S=Q1 x RES1+Q2 x RES2+Q3 x RES3……。S = Q1 x RES1 + Q2 x RES2 + Q3 x RES3 . . .

下面通过具体示例说明通过配置数据达标判定规则R和质量影响权重Q后,计算全链路质量评估信息S的过程。其中,单点质量评估信息RES结果计算示例:The following uses a specific example to illustrate the process of calculating the full link quality assessment information S after configuring the data compliance determination rule R and the quality impact weight Q. Among them, the calculation example of single-point quality assessment information RES results:

假定某个节点X1上数据报文即业务数据C1如下:Assume that the data message on a node X1, that is, the business data C1, is as follows:

[[

{{

"key1":1,"key1": 1,

"key2":2"key2": 2

},},

{{

"key1":11,"key1": 11,

"key2":22"key2":22

}}

]]

假定某个节点X2上数据报文即业务数据C2如下:Assume that the data message on a certain node X2, that is, the business data C2, is as follows:

[[

{{

"key1":null,"key1": null,

"key2":null"key2": null

},},

{{

"key1":null,"key1": null,

"key2":null"key2": null

}}

]]

配置数据达标判定规则R1为key1对应长度为[0,1](表示0到1),配置数据达标判定规则R2为key2对应结果不为空。The configuration data compliance determination rule R1 is key1 and the corresponding length is [0,1] (indicating 0 to 1), and the configuration data compliance determination rule R2 is key2 and the corresponding result is not empty.

经过数据达标判定规则R1后,此次数据报文C1的单点质量评估信息RES1为0.5,表示有一半的数据命中规则R1;After passing the data compliance determination rule R1, the single-point quality evaluation information RES1 of the data message C1 is 0.5, indicating that half of the data meets the rule R1;

经过数据达标判定规则R2后,此次数据报文C2的单点质量评估信息RES2为0,表示没有的数据命中规则R2。After passing the data compliance determination rule R2, the single-point quality evaluation information RES2 of the data message C2 is 0, indicating that no data matches the rule R2.

配置业务节点X1的权重Q1为0.3,表示此次数据流转全链路中该节点的重要程度为30%,配置节点X2的权重Q2为0.7,表示此次数据流转全链路中该节点的重要程度为70%。Configure the weight Q1 of the business node X1 to be 0.3, indicating that the importance of this node in the entire link of the data transfer is 30%, and configure the weight Q2 of the node X2 to be 0.7, indicating the importance of the node in the entire link of the data transfer. The degree is 70%.

经过计算后得到该次数据的全链路数据质量S为0.15。After calculation, the full-link data quality S of this data is 0.15.

经过一个时间段后,可以得到目标调用链的多个数据质量(S1,S2,S3,……)。After a period of time, multiple data qualities (S1, S2, S3, . . . ) of the target call chain can be obtained.

对时间段内的(S1,S2,S3,……)进行归一化展示,可以表征数据全链路在一段时间内的变化。The normalized display of (S1, S2, S3, ...) in the time period can represent the change of the whole data link in a period of time.

基于上述具体实例可知,通过加入全链路节点的权重Q,按照目标调用请求标识traceId来串联单次数据流转的全链路,再经过时间累积进行归一化展示其分数S,可以数据流转的全链路角度,评估数据的质量,在风控场景下能够提高对目标调用链的风险控制的准确度。Based on the above specific examples, it can be seen that by adding the weight Q of the full link node, according to the target call request identifier traceId to connect the full link of a single data flow in series, and then normalize and display its score S after time accumulation, the data flow can be achieved From the perspective of the whole link, the quality of the evaluation data can improve the accuracy of the risk control of the target call chain in the risk control scenario.

本说明书一个或多个实施例中的风险控制方法,通过获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的;然后基于上述多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息,再基于上述全链路质量评估信息,对目标调用链进行风险防控,从而能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。The risk control method in one or more embodiments of this specification obtains multiple single-point quality assessment information of multiple service nodes in the target call chain, wherein each single-point quality assessment information includes The quality evaluation information of the business data generated by the invocation request. Different business data are obtained based on the target invocation request identifier; then, based on the above-mentioned multiple single-point quality assessment information, the whole link evaluation process is performed to obtain the corresponding value of the target invocation request identifier. Based on the above-mentioned full-link quality assessment information, the risk prevention and control of the target call chain can be carried out, so that the quality assessment information of each service node can be collected from the perspective of the whole link for comprehensive risk prevention and control, avoiding Due to the limitations of single-node risk control, missed judgments and misjudgments, etc., improve the accuracy of risk control.

对应上述图2至图3描述的风险控制方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种风险控制装置,图4为本说明书一个或多个实施例提供的风险控制装置的一种模块组成示意图,该装置用于执行图2描述的风险控制方法,如图4所示,该装置包括:Corresponding to the risk control methods described above in Figures 2 to 3, based on the same technical concept, one or more embodiments of this specification also provide a risk control device, and Figure 4 shows the risk control method provided by one or more embodiments of this specification. A schematic diagram of a module composition of a control device, which is used to implement the risk control method described in Figure 2, as shown in Figure 4, the device includes:

单点评估信息获取模块402,用于获取目标调用链中多个业务节点的多个单点质量评估信息;其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的所述业务节点对应的业务数据是基于所述业务处理调用请求对应的同一个目标调用请求标识所获取的。A single-point evaluation information acquisition module 402, configured to obtain multiple single-point quality evaluation information of multiple service nodes in the target call chain; wherein, each of the single-point quality evaluation information includes any one of the service nodes for business processing calls The quality evaluation information of the generated service data is requested, and the service data corresponding to different service nodes is obtained based on the same target invocation request identifier corresponding to the service processing invocation request.

全链路评估信息确定模块404,用于基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息。The full link evaluation information determination module 404 is configured to perform full link evaluation processing based on the multiple single point quality evaluation information, and obtain the full link quality evaluation information corresponding to the target call request identifier.

调用链风控模块406,用于基于所述全链路质量评估信息,对所述目标调用链进行风险防控。The call chain risk control module 406 is configured to perform risk prevention and control on the target call chain based on the full link quality evaluation information.

可选地,单点评估信息获取模块402,具体用于:Optionally, the single-point evaluation information acquisition module 402 is specifically used for:

基于针对目标调用链的业务处理调用请求所生成的目标调用请求标识,从所述目标调用链的每个业务节点对应的调用链日志中,查询所述目标调用请求标识对应的业务数据;Based on the target call request identifier generated for the service processing call request of the target call chain, query the service data corresponding to the target call request identifier from the call chain log corresponding to each service node of the target call chain;

针对每个所述业务节点,基于目标质量评估方式,对所述业务节点对应的业务数据进行质量评估,得到所述业务节点对应的单点质量评估信息;其中,所述目标质量评估方式是针对产生所述业务数据的业务节点所配置的质量评估方式。For each of the service nodes, based on a target quality assessment method, perform quality assessment on the service data corresponding to the service node, and obtain single-point quality assessment information corresponding to the service node; wherein, the target quality assessment method is for The quality evaluation mode configured by the service node that generates the service data.

可选地,单点评估信息获取模块402,还具体用于:Optionally, the single-point evaluation information acquisition module 402 is also specifically used for:

基于针对目标调用链的业务处理调用请求所生成的目标调用请求标识,从所述目标调用链的每个业务节点对应的调用链日志中,查询所述目标调用请求标识对应的单点质量评估信息;其中,每个所述业务节点根据目标质量评估方式对自身产生的业务数据进行质量评估,并将评估得到的单点质量评估信息与目标调用请求标识绑定后写入各自的调用链日志;Based on the target call request identifier generated for the service processing call request of the target call chain, query the single-point quality evaluation information corresponding to the target call request identifier from the call chain log corresponding to each service node of the target call chain ; Wherein, each said service node performs quality assessment on the service data generated by itself according to the target quality assessment method, and writes the respective call chain log after binding the single-point quality assessment information obtained by the assessment with the target call request identifier;

将同一个所述目标调用请求标识对应的所述单点质量评估信息确定为目标调用链中多个业务节点的多个单点质量评估信息。The single-point quality assessment information corresponding to the same target call request identifier is determined as multiple single-point quality assessment information of multiple service nodes in the target call chain.

可选地,所述单点质量评估信息是通过以下至少一种质量评估方式得到的:Optionally, the single-point quality assessment information is obtained through at least one of the following quality assessment methods:

基于所述业务数据与针对所述业务节点所配置的数据达标判定规则的匹配结果,生成所述业务节点对应的单点质量评估信息;generating single-point quality evaluation information corresponding to the service node based on the matching result of the service data and the data compliance determination rule configured for the service node;

将所述业务数据输入针对所述业务节点所配置的质量评估模型进行质量评估,得到所述业务节点对应的单点质量评估信息;inputting the service data into a quality assessment model configured for the service node for quality assessment, and obtaining single-point quality assessment information corresponding to the service node;

利用针对所述业务节点所配置的质量评估算法对所述业务数据进行质量评估,得到所述业务节点对应的单点质量评估信息。Using the quality assessment algorithm configured for the service node to perform quality assessment on the service data to obtain single-point quality assessment information corresponding to the service node.

可选地,所述全链路评估信息确定模块404,具体用于:Optionally, the full link evaluation information determination module 404 is specifically configured to:

获取所述目标调用链中每个所述业务节点对应的质量影响权重;Acquiring the quality impact weight corresponding to each of the service nodes in the target call chain;

基于所述质量影响权重对每个所述业务节点对应的单点质量评估信息进行加权融合,得到所述目标调用请求标识对应的全链路质量评估信息。Based on the quality impact weight, the single-point quality evaluation information corresponding to each of the service nodes is weighted and fused to obtain the full-link quality evaluation information corresponding to the target call request identifier.

可选地,上述全链路评估信息确定模块404,进一步具体用于:Optionally, the above-mentioned full-link evaluation information determination module 404 is further specifically used for:

根据所述目标调用请求标识对应的业务处理调用请求的业务类别,确定所述目标调用链对应的质量权重分配信息;其中,不同业务类别对应的质量权重分配情况不同;Determine the quality weight distribution information corresponding to the target call chain according to the service category of the service processing call request corresponding to the target call request identifier; wherein, the quality weight distribution conditions corresponding to different service categories are different;

基于所述质量权重分配信息,确定所述目标调用链中每个所述业务节点对应的质量影响权重。Based on the quality weight allocation information, determine the quality impact weight corresponding to each of the service nodes in the target call chain.

可选地,所述调用链风控模块406,具体用于:Optionally, the call chain risk control module 406 is specifically used for:

基于单位时间段内多个目标调用请求标识分别对应的全链路质量评估信息,生成所述单位时间段的归一化质量评估信息;Generate normalized quality assessment information for the unit time period based on the full-link quality assessment information corresponding to the plurality of target invocation request identifiers in the unit time period;

基于多个所述单位时间段分别对应的归一化质量评估信息,确定归一化质量水平变化信息;Determining normalized quality level change information based on the normalized quality assessment information respectively corresponding to the plurality of unit time periods;

基于所述归一化质量水平变化信息,对所述目标调用链进行风险防控。Risk prevention and control is performed on the target call chain based on the normalized quality level change information.

可选地,所述调用链风控模块406,进一步具体用于:Optionally, the call chain risk control module 406 is further specifically used to:

若所述归一化质量水平变化信息符合预设预警条件,则发出针对所述目标调用链的全链路风险预警信息;If the normalized quality level change information meets the preset early warning condition, then issue full link risk early warning information for the target call chain;

若所述归一化质量水平变化信息不符合预设预警条件,则继续针对下一个业务处理调用请求确定所述目标调用链的全链路质量评估信息。If the normalized quality level change information does not meet the preset warning condition, continue to determine the full link quality evaluation information of the target call chain for the next service processing call request.

可选地,多个所述业务节点跨域分布;所述调用链风控模块406,具体用于:Optionally, multiple service nodes are distributed across domains; the call chain risk control module 406 is specifically used for:

基于所述全链路质量评估信息和所述多个业务节点中当前业务节点的单点质量评估信息,确定目标业务节点的风险识别信息;其中,所述当前业务节点为位于当前网域的业务节点,所述目标业务节点包括所述当前业务节点、所述当前业务节点的上游业务节点、或者所述当前业务节点的下游业务节点;Determine the risk identification information of the target service node based on the full-link quality assessment information and the single-point quality assessment information of the current service node among the plurality of service nodes; wherein, the current service node is a service located in the current network domain A node, where the target service node includes the current service node, an upstream service node of the current service node, or a downstream service node of the current service node;

基于所述风险识别信息对所述目标调用链进行风险防控。Perform risk prevention and control on the target call chain based on the risk identification information.

本说明书一个或多个实施例中的风险控制装置,通过获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的;然后基于上述多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息,再基于上述全链路质量评估信息,对目标调用链进行风险防控。可从而能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。The risk control device in one or more embodiments of this specification obtains multiple single-point quality assessment information of multiple service nodes in the target call chain, wherein each single-point quality assessment information includes The quality evaluation information of the business data generated by the invocation request. Different business data are obtained based on the target invocation request identifier; then, based on the above-mentioned multiple single-point quality assessment information, the whole link evaluation process is performed to obtain the corresponding value of the target invocation request identifier. The whole link quality assessment information, and then based on the above full link quality assessment information, carry out risk prevention and control on the target call chain. Therefore, it is possible to collect the quality assessment information of each business node from the perspective of the whole link for comprehensive risk prevention and control, avoiding missed judgments and misjudgments caused by the limitations of single-node risk control, and improving the accuracy of risk control .

需要说明的是,本说明书中关于风险控制装置的实施例与本说明书中关于风险控制方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险控制方法的实施,重复之处不再赘述。It should be noted that the embodiment of the risk control device in this specification and the embodiment of the risk control method in this specification are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the corresponding risk control method mentioned above, repeat The place will not be repeated.

进一步地,对应上述图2至图3所示的方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种风险控制设备,该设备用于执行上述的风险控制方法,如图5所示。Further, corresponding to the above methods shown in Figures 2 to 3, based on the same technical concept, one or more embodiments of this specification also provide a risk control device, which is used to implement the above risk control method, such as Figure 5 shows.

风险控制设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器501和存储器502,存储器502中可以存储有一个或一个以上存储应用程序或数据。其中,存储器502可以是短暂存储或持久存储。存储在存储器502的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对风险控制设备中的一系列计算机可执行指令。更进一步地,处理器501可以设置为与存储器502通信,在风险控制设备上执行存储器502中的一系列计算机可执行指令。风险控制设备还可以包括一个或一个以上电源503,一个或一个以上有线或无线网络接口504,一个或一个以上输入输出接口505,一个或一个以上键盘506等。The risk control device may have relatively large differences due to different configurations or performances, and may include one or more processors 501 and memory 502, and one or more storage applications or data may be stored in the memory 502. Wherein, the storage 502 may be a short-term storage or a persistent storage. The application program stored in the memory 502 may include one or more modules (not shown), and each module may include a series of computer-executable instructions to the risk control device. Furthermore, the processor 501 may be configured to communicate with the memory 502, and execute a series of computer-executable instructions in the memory 502 on the risk control device. The risk control device may also include one or more power sources 503, one or more wired or wireless network interfaces 504, one or more input and output interfaces 505, one or more keyboards 506, and the like.

在一个具体的实施例中,风险控制设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对风险控制设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:In a specific embodiment, the risk control device includes a memory, and one or more programs, wherein one or more programs are stored in the memory, and one or more programs may include one or more modules, and each Each module may include a series of computer-executable instructions in the risk control device, and configured to be executed by one or more processors. The one or more programs include computer-executable instructions for performing the following:

获取目标调用链中多个业务节点的多个单点质量评估信息;其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的所述业务节点对应的业务数据是基于所述业务处理调用请求对应的同一个目标调用请求标识所获取的;Obtain multiple single-point quality evaluation information of multiple service nodes in the target call chain; wherein, each of the single-point quality evaluation information includes the quality evaluation information of the service data generated by any of the service nodes for the service processing call request , the service data corresponding to the different service nodes is obtained based on the same target invocation request identifier corresponding to the service processing invocation request;

基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息;performing full-link assessment processing based on the plurality of single-point quality assessment information, and obtaining full-link quality assessment information corresponding to the target invocation request identifier;

基于所述全链路质量评估信息,对所述目标调用链进行风险防控。Risk prevention and control is performed on the target call chain based on the full link quality assessment information.

本说明书一个或多个实施例中的风险控制设备,首先获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的;然后基于上述多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息,再基于上述全链路质量评估信息,对目标调用链进行风险防控。可见,通过本说明书一个或多个实施例中的风险控制设备,能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。The risk control device in one or more embodiments of this specification first obtains multiple single-point quality assessment information of multiple service nodes in the target call chain, where each single-point quality assessment information includes The quality evaluation information of the business data generated by the invocation request. Different business data are obtained based on the target invocation request identifier; then, based on the above-mentioned multiple single-point quality assessment information, the whole link evaluation process is performed to obtain the corresponding value of the target invocation request identifier. The whole link quality assessment information, and then based on the above full link quality assessment information, carry out risk prevention and control on the target call chain. It can be seen that, through the risk control device in one or more embodiments of this specification, the quality assessment information of each service node can be collected from the perspective of the whole link to carry out comprehensive risk prevention and control, avoiding the risk caused by the limitations of single node risk control. Omissions, misjudgments, etc., to improve the accuracy of risk control.

需要说明的是,本说明书中关于风险控制设备的实施例与本说明书中关于风险控制方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险控制方法的实施,重复之处不再赘述。It should be noted that the embodiment of risk control equipment in this specification and the embodiment of risk control method in this specification are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the corresponding risk control method mentioned above, repeat The place will not be repeated.

进一步地,对应上述图2至图3所示的方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种存储介质,用于存储计算机可执行指令,一种具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:Further, corresponding to the methods shown in FIGS. 2 to 3 above, based on the same technical concept, one or more embodiments of this specification also provide a storage medium for storing computer-executable instructions. A specific implementation In an example, the storage medium can be a USB flash drive, an optical disc, a hard disk, etc., and the computer-executable instructions stored in the storage medium can realize the following process when executed by the processor:

获取目标调用链中多个业务节点的多个单点质量评估信息;其中,每个所述单点质量评估信息包括任一所述业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的所述业务节点对应的业务数据是基于所述业务处理调用请求对应的同一个目标调用请求标识所获取的;Obtain multiple single-point quality evaluation information of multiple service nodes in the target call chain; wherein, each of the single-point quality evaluation information includes the quality evaluation information of the service data generated by any of the service nodes for the service processing call request , the service data corresponding to the different service nodes is obtained based on the same target invocation request identifier corresponding to the service processing invocation request;

基于所述多个单点质量评估信息进行全链路评估处理,得到所述目标调用请求标识对应的全链路质量评估信息;performing full-link assessment processing based on the plurality of single-point quality assessment information, and obtaining full-link quality assessment information corresponding to the target invocation request identifier;

基于所述全链路质量评估信息,对所述目标调用链进行风险防控。Risk prevention and control is performed on the target call chain based on the full link quality assessment information.

本说明书一个或多个实施例中的存储介质存储的计算机可执行指令在被处理器执行时,首先获取目标调用链中多个业务节点的多个单点质量评估信息,其中,每个单点质量评估信息包括任一业务节点针对业务处理调用请求所产生的业务数据的质量评估信息,不同的业务数据是基于目标调用请求标识所获取的;然后基于上述多个单点质量评估信息进行全链路评估处理,得到目标调用请求标识对应的全链路质量评估信息,再基于上述全链路质量评估信息,对目标调用链进行风险防控。可见,通过本说明书一个或多个实施例中的存储介质,能够从全链路的角度汇集各个业务节点的质量评估信息进行综合的风险防控,避免单节点风控由于存在局限性而导致的漏判、误判等情况,提高风险控制的准确性。When the computer-executable instructions stored in the storage medium in one or more embodiments of this specification are executed by the processor, firstly obtain multiple single-point quality evaluation information of multiple service nodes in the target call chain, wherein each single-point The quality evaluation information includes the quality evaluation information of the business data generated by any business node for the business processing call request. Different business data is obtained based on the target call request identification; Through the road evaluation process, the full link quality assessment information corresponding to the target call request identifier is obtained, and then based on the above full link quality assessment information, the risk prevention and control of the target call chain is carried out. It can be seen that, through the storage medium in one or more embodiments of this specification, the quality evaluation information of each service node can be collected from the perspective of the whole link to carry out comprehensive risk prevention and control, and avoid single-node risk control due to limitations. Missed judgments, misjudgments, etc., to improve the accuracy of risk control.

需要说明的是,本说明书中关于存储介质的实施例与本说明书中关于风险控制方法的实施例基于同一发明构思,因此该实施例的具体实施可以参见前述对应的风险控制方法的实施,重复之处不再赘述。It should be noted that the embodiment of the storage medium in this specification and the embodiment of the risk control method in this specification are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the corresponding risk control method described above, and repeat I won't repeat them here.

上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。The foregoing describes specific embodiments of this specification. Other implementations are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in an order different from that in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. Multitasking and parallel processing are also possible or may be advantageous in certain embodiments.

在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable GateArray,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware DescriptionLanguage)、Confluence、CUPL(Cornell University Programming Language)、HD Cal、JHDL(Java Hardware Description Language)、Lava、Lola、My HDL、PALASM、RHDL(RubyHardware Description Language)等,目前最普遍使用的是VHDL(Very-High-SpeedIntegrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, the improvement of a technology can be clearly distinguished as an improvement in hardware (for example, improvements in circuit structures such as diodes, transistors, and switches) or improvements in software (improvement in method flow). However, with the development of technology, the improvement of many current method flows can be regarded as the direct improvement of the hardware circuit structure. Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (Programmable Logic Device, PLD) (such as a Field Programmable Gate Array (Field Programmable GateArray, FPGA)) is such an integrated circuit, and its logic function is determined by programming the device by a user. It is programmed by the designer to "integrate" a digital system on a PLD, instead of asking a chip manufacturer to design and make a dedicated integrated circuit chip. Moreover, nowadays, instead of making integrated circuit chips by hand, this kind of programming is mostly realized by "logic compiler (logic compiler)" software, which is similar to the software compiler used when writing programs. The original code of the computer must also be written in a specific programming language, which is called a hardware description language (Hardware Description Language, HDL), and there is not only one kind of HDL, but many kinds, such as ABEL (Advanced Boolean Expression Language) , AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HD Cal, JHDL (Java Hardware Description Language), Lava, Lola, My HDL, PALASM, RHDL (Ruby Hardware Description Language), etc., are currently the most commonly used The most popular are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be clear to those skilled in the art that only a little logical programming of the method flow in the above-mentioned hardware description languages and programming into an integrated circuit can easily obtain a hardware circuit for realizing the logic method flow.

控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable way, for example the controller may take the form of a microprocessor or processor and a computer readable medium storing computer readable program code (such as software or firmware) executable by the (micro)processor , logic gates, switches, Application Specific Integrated Circuit (ASIC), programmable logic controllers, and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic. Those skilled in the art also know that, in addition to realizing the controller in a purely computer-readable program code mode, it is entirely possible to make the controller use logic gates, switches, application-specific integrated circuits, programmable logic controllers, and embedded The same function can be realized in the form of a microcontroller or the like. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for realizing various functions can also be regarded as structures within the hardware component. Or even, means for realizing various functions can be regarded as a structure within both a software module realizing a method and a hardware component.

上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules, or units described in the above embodiments can be specifically implemented by computer chips or entities, or by products with certain functions. A typical implementing device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Combinations of any of these devices.

为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above devices, functions are divided into various units and described separately. Of course, the functions of each unit can be implemented in one or more software and/or hardware when implementing one or more of the present description.

本领域内的技术人员应明白,本说明书一个或多个的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书一个或多个可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that one or more embodiments of the present specification may be provided as a method, system, or computer program product. Accordingly, one or more of the present descriptions may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. form.

本说明书一个或多个是参照根据本说明书一个或多个实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。One or more of this specification is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to one or more embodiments of this specification. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.

在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.

内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and/or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridge, tape disk storage or other magnetic storage device or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer-readable media excludes transitory computer-readable media, such as modulated data signals and carrier waves.

还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes Other elements not expressly listed, or elements inherent in the process, method, commodity, or apparatus are also included. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.

本领域技术人员应明白,本说明书一个或多个的实施例可提供为方法、系统或计算机程序产品。因此,本说明书一个或多个可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that one or more embodiments of the present specification may be provided as a method, system or computer program product. Accordingly, one or more of the present descriptions may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. form.

本说明书一个或多个可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书一个或多个,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。One or more of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more of the present description may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, refer to part of the description of the method embodiment.

以上所述仅为本说明书一个或多个的实施例而已,并不用于限制本说明书一个或多个。对于本领域技术人员来说,本说明书一个或多个可以有各种更改和变化。凡在本说明书一个或多个的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书一个或多个的权利要求范围之内。The above descriptions are only one or more embodiments of this specification, and are not intended to limit one or more of this specification. Various modifications and changes will occur to one or more of this description for those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within one or more spirits and principles of this specification shall be included within the scope of one or more claims of this specification.

Claims (12)

1. A risk control method, comprising:
acquiring a plurality of single-point quality evaluation information of a plurality of service nodes in a target call chain; wherein, each single-point quality evaluation information comprises quality evaluation information of service data generated by any service node aiming at a service processing call request, and the service data corresponding to different service nodes are acquired based on the same target call request identifier corresponding to the service processing call request;
performing full link evaluation processing based on the plurality of single point quality evaluation information to obtain full link quality evaluation information corresponding to the target call request identifier;
and performing risk prevention and control on the target call chain based on the full link quality evaluation information.
2. The method of claim 1, wherein the obtaining the plurality of single point quality assessment information for the plurality of service nodes in the target call chain comprises:
inquiring service data corresponding to a target call request identifier from a call chain log corresponding to each service node of a target call chain based on the target call request identifier generated by a service processing call request aiming at the target call chain;
for each service node, performing quality evaluation on service data corresponding to the service node based on a target quality evaluation mode to obtain single-point quality evaluation information corresponding to the service node; the target quality evaluation mode is a quality evaluation mode configured for a service node generating the service data.
3. The method of claim 1, wherein the obtaining the plurality of single point quality assessment information for the plurality of service nodes in the target call chain comprises:
inquiring single-point quality evaluation information corresponding to a target call request identifier from a call chain log corresponding to each service node of a target call chain based on the target call request identifier generated by a service processing call request aiming at the target call chain; each service node carries out quality evaluation on service data generated by the service node according to a target quality evaluation mode, and writes single-point quality evaluation information obtained by evaluation into respective call chain logs after binding with a target call request identifier;
and determining the single-point quality evaluation information corresponding to the same target call request identifier as a plurality of single-point quality evaluation information of a plurality of service nodes in a target call chain.
4. A method according to claim 2 or 3, wherein the single point quality assessment information is obtained by means of at least one of the following quality assessment methods:
generating single-point quality evaluation information corresponding to the service node based on a matching result of the service data and a data standard reaching judgment rule configured for the service node;
Inputting the service data into a quality evaluation model configured for the service node for quality evaluation to obtain single-point quality evaluation information corresponding to the service node;
and carrying out quality evaluation on the service data by using a quality evaluation algorithm configured for the service node to obtain single-point quality evaluation information corresponding to the service node.
5. The method of claim 1, wherein the performing the full link quality assessment process based on the plurality of single point quality assessment information to obtain full link quality assessment information corresponding to the target call request identifier comprises:
acquiring a quality influence weight corresponding to each service node in the target call chain;
and carrying out weighted fusion on the single-point quality evaluation information corresponding to each service node based on the quality influence weight to obtain the full-link quality evaluation information corresponding to the target call request identifier.
6. The method of claim 5, wherein the obtaining the quality impact weight corresponding to each service node in the target call chain comprises:
determining quality weight distribution information corresponding to the target call chain according to the service class of the service processing call request corresponding to the target call request identifier; wherein, the quality weight distribution conditions corresponding to different service categories are different;
And determining the quality influence weight corresponding to each service node in the target call chain based on the quality weight distribution information.
7. The method of claim 1, wherein the risk prevention of the target call chain based on the full link quality assessment information comprises:
generating normalized quality evaluation information of a unit time period based on all link quality evaluation information respectively corresponding to a plurality of target call request identifiers in the unit time period;
determining normalized quality level change information based on normalized quality assessment information corresponding to each of the plurality of unit time periods;
and performing risk prevention and control on the target call chain based on the normalized quality level change information.
8. The method of claim 7, wherein the risk prevention of the target call chain based on the normalized quality level change information comprises:
if the normalized quality level change information accords with a preset early warning condition, sending out full-link risk early warning information aiming at the target call chain;
if the normalized quality level change information does not meet the preset early warning condition, continuing to determine the full link quality evaluation information of the target call chain for the next service processing call request.
9. The method of claim 1, wherein a plurality of the service nodes are distributed across a domain; the risk prevention and control of the target call chain based on the full link quality evaluation information comprises:
determining risk identification information of a target service node based on the full link quality evaluation information and single-point quality evaluation information of a current service node in the plurality of service nodes; the target service node comprises the current service node, an upstream service node of the current service node or a downstream service node of the current service node;
and performing risk prevention and control on the target call chain based on the risk identification information.
10. A risk control device comprising:
the single-point evaluation information acquisition module acquires a plurality of single-point quality evaluation information of a plurality of service nodes in a target call chain; wherein, each single-point quality evaluation information comprises quality evaluation information of service data generated by any service node aiming at a service processing call request, and the service data corresponding to different service nodes are acquired based on the same target call request identifier corresponding to the service processing call request;
The full link evaluation information determining module is used for carrying out full link evaluation processing based on the plurality of single-point quality evaluation information to obtain full link quality evaluation information corresponding to the target call request identifier;
and calling a chain wind control module, which is used for performing risk prevention and control on the target calling chain based on the full link quality evaluation information.
11. A risk control device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring a plurality of single-point quality evaluation information of a plurality of service nodes in a target call chain; wherein, each single-point quality evaluation information comprises quality evaluation information of service data generated by any service node aiming at a service processing call request, and the service data corresponding to different service nodes are acquired based on the same target call request identifier corresponding to the service processing call request;
performing full link evaluation processing based on the plurality of single point quality evaluation information to obtain full link quality evaluation information corresponding to the target call request identifier;
and performing risk prevention and control on the target call chain based on the full link quality evaluation information.
12. A storage medium storing computer executable instructions that when executed by a processor implement the method of:
acquiring a plurality of single-point quality evaluation information of a plurality of service nodes in a target call chain; wherein, each single-point quality evaluation information comprises quality evaluation information of service data generated by any service node aiming at a service processing call request, and the service data corresponding to different service nodes are acquired based on the same target call request identifier corresponding to the service processing call request;
performing full link evaluation processing based on the plurality of single point quality evaluation information to obtain full link quality evaluation information corresponding to the target call request identifier;
and performing risk prevention and control on the target call chain based on the full link quality evaluation information.
CN202310716247.2A 2023-06-15 2023-06-15 Risk control method and device Pending CN116614407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310716247.2A CN116614407A (en) 2023-06-15 2023-06-15 Risk control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310716247.2A CN116614407A (en) 2023-06-15 2023-06-15 Risk control method and device

Publications (1)

Publication Number Publication Date
CN116614407A true CN116614407A (en) 2023-08-18

Family

ID=87676563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310716247.2A Pending CN116614407A (en) 2023-06-15 2023-06-15 Risk control method and device

Country Status (1)

Country Link
CN (1) CN116614407A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117743093A (en) * 2023-12-20 2024-03-22 北京优特捷信息技术有限公司 Data quality evaluation method, device, equipment and medium of call chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9762495B1 (en) * 2016-09-13 2017-09-12 International Business Machines Corporation Weighted distribution across paths of degraded quality
CN112242917A (en) * 2019-07-19 2021-01-19 广州汽车集团股份有限公司 Internet of vehicles service quality detection method and system
CN113468159A (en) * 2021-07-19 2021-10-01 广东电网有限责任公司 Data application full-link management and control method and system
CN114124743A (en) * 2021-11-16 2022-03-01 广东电网有限责任公司 Method and system for executing data application full link check rule

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9762495B1 (en) * 2016-09-13 2017-09-12 International Business Machines Corporation Weighted distribution across paths of degraded quality
CN112242917A (en) * 2019-07-19 2021-01-19 广州汽车集团股份有限公司 Internet of vehicles service quality detection method and system
CN113468159A (en) * 2021-07-19 2021-10-01 广东电网有限责任公司 Data application full-link management and control method and system
CN114124743A (en) * 2021-11-16 2022-03-01 广东电网有限责任公司 Method and system for executing data application full link check rule

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117743093A (en) * 2023-12-20 2024-03-22 北京优特捷信息技术有限公司 Data quality evaluation method, device, equipment and medium of call chain

Similar Documents

Publication Publication Date Title
CN108492104B (en) A resource transfer monitoring method and device
TWI764148B (en) Risk prediction and training method, device and electronic device for risk prediction model
CN109347787A (en) A kind of recognition methods of identity information and device
US20190087767A1 (en) Targeted prioritization within a network based on user-defined factors and success rates
CN107015882A (en) A kind of block data method of calibration and device
US20160292570A1 (en) Enhancing natural language processing query/answer systems using social network analysis
CN110022227A (en) Method for processing business, device, equipment and storage medium
CN109274597B (en) Control method, device and equipment for special service line
CN111930810B (en) Data rule mining method and device
CN105917632A (en) A method for scalable distributed network traffic analytics in telco
CN109309596A (en) A kind of method for testing pressure, device and server
CN110046523A (en) Intelligent contract checking method and device and electronic equipment
TWI718379B (en) Evaluation method, device and equipment for users using shared items
CN110189165A (en) Abnormal channel user and abnormal channel identification method and device
CN116167670A (en) Model, service processing method, device and equipment
Dali Betzalel et al. " please, not now!" A model for timing recommendations
CN116614407A (en) Risk control method and device
CN116308372A (en) Detection method and device for blockchain transaction
CN109039695A (en) Business fault treatment method, device and equipment
WO2025180484A1 (en) Detection processing for resource service
Balint et al. On supporting contract-aware IoT dataspace services
CN108920326A (en) Determine system time-consuming abnormal method, apparatus and electronic equipment
CN118612083A (en) HTTP distributed denial of service attack detection model construction method and device
CN115099926B (en) Credit data analysis method, sharing method, device and equipment based on blockchain
Noor et al. Detecting occasional reputation attacks on cloud services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载