[go: up one dir, main page]

CN120219073A - Risk control management methods, devices, equipment, storage media and products - Google Patents

Risk control management methods, devices, equipment, storage media and products Download PDF

Info

Publication number
CN120219073A
CN120219073A CN202510178906.0A CN202510178906A CN120219073A CN 120219073 A CN120219073 A CN 120219073A CN 202510178906 A CN202510178906 A CN 202510178906A CN 120219073 A CN120219073 A CN 120219073A
Authority
CN
China
Prior art keywords
message
wind control
risk
control management
order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510178906.0A
Other languages
Chinese (zh)
Inventor
何万刚
张盈杰
张文清
邝文武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinzheng Technology Shanghai Co ltd
Original Assignee
Jinzheng Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinzheng Technology Shanghai Co ltd filed Critical Jinzheng Technology Shanghai Co ltd
Priority to CN202510178906.0A priority Critical patent/CN120219073A/en
Publication of CN120219073A publication Critical patent/CN120219073A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本申请涉及金融风控技术领域,公开了一种风控管理方法、装置、设备、存储介质及产品,该方法包括:通过可编程网卡对委托消息进行对敲检测,获得风险申报订单,并基于组播封装,将委托消息和回报消息分发到多个风控节点,根据多个风控节点和预设风控策略对风险申报订单进行风控管理。本申请通过可编程网卡的处理能力和组播封装的高效性,实现了对委托消息的高效对敲检测与风控管理,能够迅速识别出潜在的风险委托,并据此生成风险申报订单,将委托消息和回报消息复制到多个风控节点,确保了风控的时效性与准确性,根据预设风控策略,多个风控节点对风险申报订单进行协同管理,提高了交易安全性和稳定性的同时,也缩减了信息处理时延。

The present application relates to the field of financial risk control technology, and discloses a risk control management method, device, equipment, storage medium and product, the method comprising: performing cross-check detection on the entrusted message through a programmable network card to obtain a risk declaration order, and distributing the entrusted message and the return message to multiple risk control nodes based on multicast encapsulation, and performing risk control management on the risk declaration order according to multiple risk control nodes and preset risk control strategies. The present application realizes efficient cross-check detection and risk control management of entrusted messages through the processing power of the programmable network card and the efficiency of multicast encapsulation, can quickly identify potential risky entrusted messages, and generate risk declaration orders accordingly, copy the entrusted message and the return message to multiple risk control nodes, and ensure the timeliness and accuracy of risk control. According to the preset risk control strategy, multiple risk control nodes collaboratively manage the risk declaration order, which improves the transaction security and stability while also reducing the information processing delay.

Description

Wind control management method, device, equipment, storage medium and product
Technical Field
The application relates to the technical field of financial wind control, in particular to a wind control management method, a wind control management device, wind control management equipment, a wind control management storage medium and a wind control management product.
Background
The main business function of the transaction wind control management is to monitor whether abnormal transactions exist in the transactions of single clients or clients on target individual stocks or not at the order data stream layer, mainly to monitor programmed transaction errors or artificial errors of clients, and to prevent against the possible illegal knock-on transactions caused by the difference of strategies in the same account or different associated accounts.
In the prior art, the wind control node and the counter end node establish connection through a message bus, all the consignment information sent by the counter end is issued to the wind control node through the message bus, and before each consignment is sent by the counter end, the wind control node needs to wait for a calculation result to be returned to determine whether the consignment can be directly declared or not, and the wind control calculation node needs to obtain all the on-road consignment and the consignment information. Therefore, the traditional scheme adopts a centralized deployment mode to deploy, so that the processing time delay of the wind control management is larger.
Disclosure of Invention
The application mainly aims to provide a wind control management method, a device, equipment, a storage medium and a product, and aims to solve the technical problem that a large processing time delay is generated by adopting a centralized deployment mode in the traditional wind control management scheme.
In order to achieve the above object, the present application provides a wind control management method, which includes:
The method comprises the steps of performing tapping detection on a entrusting message through a programmable network card to obtain a risk reporting order, and distributing the entrusting message and a return message to a plurality of wind control nodes based on multicast encapsulation;
and performing wind control management on the risk reporting order according to the wind control nodes and a preset wind control strategy.
In an embodiment, the step of performing tapping detection on the delegated message through the programmable network card to obtain a risk declaration order, and distributing the delegated message and the return message to a plurality of wind control nodes based on multicast encapsulation includes:
Receiving a delegation message sent by a client through a programmable network card, and judging whether the delegation message needs to be subjected to a knocked-down control check according to the securities type of the delegation message;
if the delegation message does not need to be subjected to the windbreak check, the delegation message is sent to a transaction gateway through a first message transmission channel to carry out a transaction flow;
If the delegation message is required to be subjected to the windbreak control check, the delegation message is subjected to the knocking comparison to obtain a comparison result, and whether the delegation message is required to be modified is judged according to the comparison result;
If the entrusting message needs to be modified, modifying the entrusting message according to a preset modification rule to obtain a risk reporting order, and preventing a subsequent transaction flow of the risk reporting order through an refusing message;
the delegate message and the reward message are distributed to a plurality of wind-controlled nodes by multicast encapsulation and mirror replication.
In an embodiment, if the delegate message needs to be modified, modifying the delegate message according to a preset modification rule to obtain a risk reporting order, and after the step of blocking a subsequent transaction flow of the risk reporting order by the rejection message, further includes:
receiving a return message of the risk reporting order, and copying the return message through mirror image to obtain a first return message and a second return message;
updating the wind control storage table based on the first return information, obtaining an updated wind control storage table, and sending the second return information to a counter-side switch through a preset communication mode and a second information transmission channel based on a user datagram protocol multicast mode;
Each delegate message sent by the client is monitored based on the wind-controlled store table and the counter-side switch.
In an embodiment, the wind control storage table includes an order table and a gear table, the step of updating the wind control storage table based on the first report message, obtaining an updated wind control storage table, and sending the second report message to the counter-side switch through a preset communication mode and a second message transmission channel based on a user datagram protocol multicast mode includes:
Storing the entrusting message and the first return message through an order form, and recording market buying and selling gear information through a gear form;
Acquiring each entrusting message in real time, and updating and adjusting the order table and the gear table according to each entrusting message to acquire an updated wind control storage table;
and based on the user datagram protocol multicast mode, the second return message is sent to the counter-side switch through a preset communication mode and a second message transmission channel.
In an embodiment, the step of performing wind control management on the risk reporting order according to the plurality of wind control nodes and a preset wind control policy includes:
The plurality of wind control nodes extract the risk reporting orders by analyzing the multicast data packet, and perform risk assessment on the risk reporting orders to obtain an assessment result;
And performing wind control management on the risk reporting order according to the evaluation result and a preset wind control strategy.
In an embodiment, after the step of performing the wind control management on the risk claim order according to the plurality of wind control nodes and the preset wind control policy, the method further includes:
setting system parameters through a configuration register to obtain updated system parameters, and performing wind control management on the risk reporting order by applying the updated system parameters;
And/or the number of the groups of groups,
Initializing system settings through a reset register to obtain initialized system settings, and performing wind control management on the risk reporting order by applying the initialized system settings.
In addition, in order to achieve the above object, the present application also provides a wind control management device, including:
The data detection module is used for carrying out tapping detection on the entrusting message through the programmable network card to obtain a risk reporting order, and distributing the entrusting message and the return message to a plurality of wind control nodes based on multicast encapsulation;
And the wind control management module is used for carrying out wind control management on the risk reporting order according to the wind control nodes and a preset wind control strategy.
In addition, in order to achieve the above object, the application also proposes a wind control management device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program being configured to implement the steps of the wind control management method as described above.
In addition, in order to achieve the above object, the present application also proposes a storage medium, which is a computer-readable storage medium, on which a computer program is stored, which when being executed by a processor, implements the steps of the wind control management method as described above.
Furthermore, to achieve the above object, the present application also provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the wind control management method as described above.
According to the technical scheme, the delegation message is subjected to tapping detection through the programmable network card to obtain a risk reporting order, the delegation message and the return message are distributed to a plurality of wind control nodes based on multicast encapsulation, and wind control management is performed on the risk reporting order according to the plurality of wind control nodes and a preset wind control strategy. The application realizes the efficient knock detection and wind control management of the entrusting message through the processing capacity of the programmable network card and the high efficiency of multicast encapsulation, can rapidly identify potential risk entrusting, generates a risk reporting order according to the potential risk entrusting, copies the entrusting message and the return message to a plurality of wind control nodes, ensures the timeliness and the accuracy of wind control, and the plurality of wind control nodes cooperatively manage the risk reporting order according to the preset wind control strategy, thereby improving the transaction safety and the stability and reducing the information processing time delay.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic flow chart of a first embodiment of a wind control management method according to the present application;
FIG. 2 is a schematic diagram of a conventional pneumatic control management;
FIG. 3 is a schematic diagram of an improved flow of the wind control management method of the present application;
FIG. 4 is a schematic flow chart of a second embodiment of a wind control management method according to the present application;
FIG. 5 is a schematic diagram of an implementation flow of the wind control management method according to the present application;
FIG. 6 is a schematic block diagram of a wind control management device according to an embodiment of the present application;
fig. 7 is a schematic device structure diagram of a hardware operating environment related to a wind control management method according to an embodiment of the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the technical solution of the present application and are not intended to limit the present application.
For a better understanding of the technical solution of the present application, the following detailed description will be given with reference to the drawings and the specific embodiments.
In the prior art, the wind control and the counter end are connected through a message bus, each entrusting needs to be confirmed by the wind control node, and the wind control management processing time delay is larger due to the adoption of centralized deployment.
Therefore, in order to overcome the defects, the application provides a solution, through the processing capacity of the programmable network card and the high efficiency of multicast encapsulation, the high efficiency of the knock detection and the wind control management of the entrusting message are realized, the potential risk entrusting can be rapidly identified, the risk reporting order is generated according to the potential risk entrusting, the risk reporting order is copied to a plurality of wind control nodes, the rapid transmission of information is ensured, and the plurality of wind control nodes cooperatively manage the risk reporting order according to the preset wind control strategy, so that the safety and the stability of the transaction are improved, and the information processing time delay is reduced.
It should be noted that, the execution body of each embodiment of the present application may be a computing service system having functions of data processing, network communication and program running, for example, an electronic system, a wind control management system, etc. capable of implementing the above functions. Hereinafter, the following examples will be described with reference to an air control management system (hereinafter, simply referred to as "system").
Based on this, an embodiment of the present application provides a wind control management method, and referring to fig. 1, fig. 1 is a schematic flow chart of a first embodiment of the wind control management method of the present application.
In this embodiment, the wind control management method includes steps S10 to S20:
and step S10, carrying out tapping detection on the entrusting message through the programmable network card to obtain a risk reporting order, and distributing the entrusting message and the return message to a plurality of wind control nodes based on multicast encapsulation.
In the prior art architecture, the wind control node and the counter end node are connected through a message bus, and the design provides an effective way for real-time information transmission. However, this centralized deployment approach gradually exposes some problems in practical applications, especially in terms of processing efficiency and latency. As shown in fig. 2 (fig. 2 is a schematic diagram of conventional wind control management), before each request is sent, the counter end needs to wait for the calculation result returned by the wind control node to determine whether the request can be directly declared. This waiting mechanism, while ensuring compliance and security of the transaction, also increases the processing latency of the system. Particularly during peak transaction periods, the increased computing pressure of the wind control node may result in an increased time to return results, thereby affecting the efficiency of the overall transaction system. In addition, the wind control computing node needs to comprehensively acquire in-transit commission and its bargaining information so as to perform real-time risk calculation and evaluation, and the processing burden of the wind control node is further increased by the requirement of information acquisition.
For this reason, the wind control management method of the present application improves the prior art, as shown in fig. 3 (fig. 3 is a schematic diagram of an improved flow of the wind control management method of the present application), the transaction gateway (TRADE GATEWAY, TGW) copies the original delegation message and the transaction message/return message while receiving delegation and transaction, and uses the user datagram protocol (User Datagram Protocol, UDP) for multicast encapsulation. The transaction gateway which needs to receive the consignment information and the transaction information/return information is added into the corresponding multicast group, the multicast replication of the message is realized by utilizing the multicast capability of the switch, and finally all consignment and transaction information is received on all the transaction gateways. To improve efficiency, the programmable capabilities of an ultra low latency computing development platform (Nano-LATENCY DATA Processing Platform, NDPP) may be used, with delegate messages and rewards message replication implemented in hardware. The increased time delay relative to the L1 switch scheme is controllable (related to the performance of the switch, the switch with better performance is within 1 microsecond), the network configuration is simple, the expansion is good, the use habit of a dealer on the network is not changed (the transaction network still uses the L2 switch), and meanwhile, the transaction information flooding range can be controlled through different multicast groups.
The wind control management method mainly detects the knock-on transaction and controls the risk behavior, and when the wind control detects the risk reporting, two processing modes can be adopted, namely, the risk reporting is continuously changed into an illegal sheet and is transmitted to the exchange system, the reporting is refused by the front end of the exchange, and the risk reporting is directly intercepted and a risk warning message is sent to the exchange counter. The wind control management system provides a configurable interface to select the two processing modes, and the processing modes of different risk types can be respectively configured. The application integrates the knock-on transaction checking logic into the programmable network card, replaces the network card on the existing transaction link by integrating the programmable network card, can solve the problems that the existing wind control management system cannot perform the prior control and has stronger coupling between systems, and in addition, the application is developed based on the programmable network card, effectively utilizes the characteristics of hardware, and can greatly reduce the checking time delay, thereby solving the problem that the existing wind control management system has poorer performance. The pneumatic control management method can be applied to a plurality of financial exchanges and supervision scenes, such as a stock exchange and financial market, futures exchange and derivative market, a trading system of banks and investment companies, a supervision platform and the like.
It should be noted that the programmable network card is a network interface card with flexible programming capability, which allows a user to customize a processing flow of network data in a programming manner, in a financial transaction system, the programmable network card can efficiently process a large amount of transaction data and provide network communication with low delay and high throughput, the knock-over, also called relative commission or collusion, generally refers to the actions of respectively playing the roles of a seller and a buyer, respectively, according to the agreed conditions of transaction variety, price, quantity and the like, in the financial wind control field, the knock-over detection aims to identify and prevent such transaction actions possibly existing in a fraud or operating market, the multicast is a network communication manner, which allows data to be simultaneously transmitted from one sender to a plurality of receivers, the multicast encapsulation is to package the data to be transmitted according to a multicast protocol so as to be transmitted in a network, and the wind control node is a key component in the wind control management system, which is responsible for receiving and processing risk reporting orders and carrying out assessment and decision according to a preset wind control policy.
It should be appreciated that with a programmable network card, the system may capture and analyze transaction data in real-time, employ specific algorithms or models to detect tapping behavior, and when abnormal transaction patterns are detected, such as highly consistent and frequent transaction prices, quantities, etc., the system marks it as a risk claim order. Then, the multicast encapsulation can copy the risk reporting order to a plurality of wind control nodes for parallel processing, and the system can realize redundancy backup and load balancing by copying the entrusting message and the return message to the plurality of wind control nodes, thereby improving the reliability and the stability of the system. Meanwhile, the wind control nodes can also cooperate to jointly cope with financial risks.
And step S20, performing wind control management on the risk reporting order according to the wind control nodes and a preset wind control strategy.
It can be understood that the risk declaration order is managed by wind control according to the wind control nodes and the preset wind control strategy, and the parallel processing capacity and the redundancy backup characteristic of the wind control nodes are fully utilized in the process. In the wind control management, a plurality of wind control nodes firstly analyze the received multicast data packet to extract key information of a risk declaration order, and then the nodes carry out detailed risk assessment on the order according to a preset wind control strategy. The strategies cover multiple aspects of risk identification, quantitative assessment and risk response, based on the result of the risk assessment, the wind control node can make a decision to judge whether further wind control measures need to be taken, if so, the node can execute corresponding operations according to the preset strategies, such as rejecting the transaction, limiting the transaction amount or requiring additional verification, and the like, so as to ensure the safe proceeding of the transaction. Therefore, the step S20 may include the plurality of wind control nodes extracting the risk reporting order by parsing the multicast data packet, performing risk assessment on the risk reporting order to obtain an assessment result, and performing wind control management on the risk reporting order according to the assessment result and a preset wind control policy.
Further, in order to adapt to the new risk challenge, the step S20 may further include setting system parameters through a configuration register to obtain updated system parameters, and performing wind control management on the risk reporting order by applying the updated system parameters, and/or initializing system settings through a reset register to obtain initialized system settings, and performing wind control management on the risk reporting order by applying the initialized system settings.
It will be appreciated that the configuration and updating of system parameters typically depends on configuration registers. Register configuration is a hardware configuration mode, the behavior and functions of the hardware device can be controlled by setting the values of the registers, and the configuration registers allow an administrator or a system to automatically adjust system parameters, wherein the parameters may include transaction limits, risk thresholds, wind control strategy triggering conditions and the like. When the system parameters need to be updated, the configuration registers can be accessed through a specific interface or program to modify the parameters and obtain updated system parameters, and the updated parameters are then applied to the wind control management flow to more accurately and effectively evaluate and manage the risk reporting order.
On the other hand, when the system needs to be reset or initialized, the reset register can be used for restoring the system to the factory setting or preset initial state, and the system can be ensured to start to operate in a consistent and predictable manner through initializing the reset register, so that the risk of wind control failure caused by inconsistent system states is reduced. The initialized system setting is also applied to the wind control management flow, so that the risk reporting order is ensured to be evaluated and managed in a unified and standardized environment.
According to the method and the system, the efficient knock detection and wind control management of the entrusting message are achieved through the processing capacity of the programmable network card and the high efficiency of multicast encapsulation, potential risk entrusting can be rapidly identified, a risk reporting order is generated according to the potential risk entrusting, the entrusting message and the return message are copied to a plurality of wind control nodes, timeliness and accuracy of wind control are guaranteed, and the plurality of wind control nodes cooperatively manage the risk reporting order according to a preset wind control strategy, so that the safety and the stability of transaction are improved, and meanwhile information processing time delay is reduced.
In the second embodiment of the present application, the same or similar content as in the first embodiment of the present application may be referred to the above description, and will not be repeated. On this basis, referring to fig. 4, the step S10 may include steps S101 to S105:
Step S101, receiving a consignment message sent by a client through a programmable network card, and judging whether the consignment message needs to be subjected to windbreak check according to the securities type of the consignment message.
It should be appreciated that when a client submits a commit message (i.e., a buy and sell instruction), the messages first enter the trading system via the programmable network card, and the system makes a preliminary determination based on the securities category information in the commit message. The securities category generally refers to different kinds of financial instruments such as stocks, bonds, funds, etc. Different security categories may face different market risks and patterns of fraud, and thus the system needs to manage them differently in a wind-controlled manner. For certain specific security categories, such as those where high frequency transactions are active, price fluctuations are large, or there is historically a knock fraud, the system may automatically trigger a knock control checking mechanism that aims to carefully compare and analyze the delegated messages by specific algorithms or models to identify possible knock.
In the process of checking the knock control, the system comprehensively considers a plurality of factors, such as account relation of both transaction sides, deviation degree of transaction price and market price, transaction frequency and the like, and if the system detects an abnormal transaction mode, such as frequent transaction of both transaction sides under similar conditions and significant deviation of the transaction price and the market price, the entrusted messages may be marked as risk reporting orders and trigger further wind control measures.
Step S102, if the delegation message does not need to be subjected to the windbreak check, the delegation message is sent to a transaction gateway through a first message transmission channel to carry out a transaction flow.
It will be appreciated that if it is determined that the delegate message does not require a knock check, then the system sends the delegate message directly to the transaction gateway via the first message transmission channel to continue the subsequent transaction flow.
It should be noted that, the first message transmission channel generally refers to an efficient and safe data transmission path, which connects different components of the transaction system, so as to ensure that data can be accurately and timely transferred, on this channel, the delegate message is encapsulated into a specific data format, and necessary metadata (such as a timestamp, a message type, etc.) is added so that the transaction gateway can correctly parse and process, and the transaction gateway is a key component in the financial transaction system, and is responsible for receiving the delegate message from the client or the transaction system and forwarding it to the exchange or the clearing institution for matching or clearing.
After receiving the delegated message sent through the first message transmission channel, the transaction gateway performs a series of processes, such as verifying the validity of the message, checking the account balance, etc., to ensure that the transaction is performed successfully. If all the checks are passed, the transaction gateway sends a delegate message to the exchange or clearing house to wait for the result of the match or clearing, and meanwhile, the transaction gateway feeds back the result of the transaction to the transaction system so that the system can update account information, generate transaction records and the like.
Step S103, if the delegation message is required to be checked for knocking wind control, the delegation message is compared for knocking, a comparison result is obtained, and whether the delegation message is required to be modified is judged according to the comparison result.
It should be appreciated that when the delegate message received by the programmable network card is determined to require a knockdown check, the system may perform a knockdown comparison of the delegate message that requires a knockdown check, which may involve comparing the current delegate message with historical transaction data in the system, other concurrently submitted delegate messages, or a pre-set knockdown pattern, the purpose of which is to identify any possible abnormal transaction behavior, particularly those that may constitute knockdown fraud. The knock-down comparison may include multiple dimensional analyses such as account relationships of the transaction parties, degree of deviation of the transaction price from the market price, consistency of the transaction amount, proximity of the transaction time, etc. After the comparison is completed, the system generates a comparison result, which may be a simple binary judgment (such as presence/absence of a knock) or a complex report containing detailed comparison data and risk assessment.
Next, the system determines whether the delegate message needs to be modified according to the comparison result. If the comparison shows that there is evidence of knockdown or high suspected knockdown, the system may take a series of actions to prevent potential risk, which may include refusing the delegation, directly refusing the current delegation message, not allowing it to enter the transaction process, modifying the delegation, adjusting certain parameters in the delegation message, such as transaction price, quantity or transaction time, to reduce the risk of knockdown, delaying processing, temporarily placing the delegation message on hold, waiting for further manual review or verification of more transaction data, triggering an alarm, sending an alarm to a system administrator or a pneumatic team informing them that there is a potential knockdown risk for further investigation and processing.
It should be noted that the system typically follows a series of preset rules and policies when performing a knock control check on the delegate message. These rules and policies may be formulated based on historical transaction data, market patterns of behavior, legal regulatory requirements, etc., and continually adjust and optimize as market conditions change. In addition, the privacy protection and compliance requirements of both transaction parties are fully considered when comparing and processing the entrusted messages by the system. Ensuring that legal rights of both transaction parties are not infringed while the knockdown behavior is effectively identified.
Step S104, if the entrusting message needs to be modified, modifying the entrusting message according to a preset modification rule to obtain a risk reporting order, and preventing the subsequent transaction flow of the risk reporting order through the refusing message.
It will be appreciated that when it is determined that modification of the delegate message is required to prevent the risk of tapping, the system will modify the delegate message according to preset modification rules. The preset modification rules can include adjusting key parameters such as transaction price, quantity, time and the like, or limiting accounts of both transaction parties. For example, if the system detects that a transaction may constitute a tapping event, it may automatically adjust the transaction price to be closer to the market price, thereby reducing the likelihood of tapping. Or the system may limit the frequency or amount of transactions of certain accounts over time to prevent them from manipulating the market through high frequency or high volume transactions.
After modification, the original delegation message will be converted into a risk claim order that contains the modified transaction parameters and is marked as a high risk or a transaction requiring special attention. The system then blocks subsequent transaction flows of the risk claim order by sending a reject message. The refusal message is an explicit signal indicating that the order is refused by the system due to the potential risk, meaning that the order is not sent to the transaction gateway for matching, nor is it incorporated into the clearing and settlement process of the transaction system.
Step S105, distributing the delegate message and the return message to a plurality of wind control nodes through multicast encapsulation and mirror replication.
It should be appreciated that when processing risk claim orders, the delegate message and the reward message are quickly and securely distributed to multiple wind-controlled nodes for parallel processing based on multicast encapsulation. Specifically, the system modifies the delegated message according to a preset modification rule, and when generating a risk reporting order, the system copies all delegated messages and diagonalized messages and obtains multicast configuration information, wherein the information can comprise key parameters such as a multicast address, a multicast port, an encapsulation protocol and the like. Next, the delegated message and the return message are encapsulated using a preset encapsulation protocol, and during the encapsulation process, the delegated message and the return message are embedded in the payload of the multicast data packet, and the system adds necessary multicast header information, such as a destination multicast address and a source IP address. In addition, to ensure the integrity and correctness of the data packet, the system adds a checksum error detection mechanism.
Once encapsulation is complete, the multicast data packets are distributed to a plurality of wind control nodes according to the multicast configuration information. The wind control nodes are distributed in different geographical locations or network areas to ensure comprehensive monitoring and processing of risk claim orders. With multicast routing protocols (e.g., PIM-SM or PIM-DM), the system is able to efficiently manage the transmission paths of multicast packets and ensure that the packets arrive accurately at the destination node. After the wind control node receives the multicast data packet, the multicast data packet is unpacked and analyzed, and then risk assessment and judgment are carried out on the risk reporting order according to a preset wind control rule. If there is a potential risk for the risk claim order, the wind control node will generate detailed wind control reports and take corresponding action to prevent further progress of the transaction, such as rejecting the order or freezing the account.
The method comprises the steps of receiving a commission message sent by a client through a programmable network card, judging whether the commission message needs to be subjected to a windbreak check according to the securities type of the commission message, if the commission message does not need to be subjected to the windbreak check, sending the commission message to a transaction gateway through a first message transmission channel to carry out a transaction flow, if the commission message needs to be subjected to the windbreak comparison, obtaining a comparison result, judging whether the commission message needs to be modified, if the commission message needs to be modified, modifying according to a preset modification rule, obtaining a risk reporting order, preventing a subsequent transaction flow of the risk reporting order through a refusing message, and copying the commission message and the return message to a plurality of windbreak nodes based on multicast encapsulation. According to the embodiment, different wind control strategies can be implemented for different types of securities consignment, unnecessary inspection is reduced, transaction flow is accelerated, for consignment to be performed on the windbreak, risks are timely identified through accurate comparison, consignment content is modified according to needs, potential risk transaction is prevented, safety is ensured through a refusing single mechanism, consignment information and return information are distributed to a plurality of wind control nodes efficiently by using a multicast packaging technology, and parallel processing and quick response are achieved.
As an implementation manner, after the step S104, the method may further include receiving a report message of the risk reporting order, copying the report message by mirroring to obtain a first report message and a second report message, updating a wind control storage table based on the first report message, obtaining an updated wind control storage table, sending the second report message to a counter-side switch through a preset communication mode and a second message transmission channel based on a user datagram protocol multicast mode, and monitoring each delegate message sent by the client based on the wind control storage table and the counter-side switch.
It will be appreciated that when a return message for a risk claim order is received, mirror image replication is first performed to generate two identical return messages, a first return message and a second return message. The first return message is used to update a wind control storage table, which is an important data structure in the system for recording and analyzing risk information, and contains various wind control rules and historical transaction data. By updating the wind control storage table, the system can reflect the current market risk and transaction status in real time. Mirror image copying is a data backup technology, and the safety and reliability of data are ensured by creating copies of the data in the data transmission process.
And at the same time, a user datagram protocol multicast mode is used, and a second return message is sent to the counter-side switch through a preset communication mode and a second message transmission channel. The over-the-counter switch is a core device in a transaction system for processing transaction instructions and information that is capable of forwarding the transaction instructions to a transaction office or clearing house and receiving the results of the transaction from these houses. After the above steps are completed, the system may monitor each delegate message sent by the client based on the updated wind-controlled storage list and the counter-side switch.
Specifically, the system will compare and analyze each delegate message to the rules in the wind-controlled store table to determine if it is at risk. If the system detects that a certain entrusting message has risk, an air control mechanism is immediately triggered, such as refusing the entrusting message, freezing a related account or giving an alarm, and the like, and meanwhile, related risk information is recorded in an air control storage table.
The method comprises the steps of obtaining an updated wind control storage table, sending a first return message to a counter-side switch through a preset communication mode and a first return message, recording market buying and selling gear information through a gear table, obtaining each entrusting message in real time, updating and adjusting the order table and the gear table according to each entrusting message, obtaining the updated wind control storage table, and sending the first return message to the counter-side switch through the preset communication mode and the first return message based on a user datagram protocol multicast mode.
The wind control store table typically contains a plurality of sub-tables, wherein the order table is used primarily to store commission messages and return messages associated therewith, and each time the system receives a new commission message or return message, it is recorded into the order table, thereby enabling the status and changes of each order to be tracked in real time. The gear list is used for recording the buying and selling gear information of the market, and is generally updated and adjusted according to the real-time transaction data of the market to ensure that the latest market condition is reflected, and when the system receives the return information of the risk reporting order, the system firstly performs mirror image copying and is respectively used for updating the order list and sending the order list to the counter-side switch. And storing the entrusting message and the first return message through the order form, simultaneously acquiring each entrusting message in real time, and updating and adjusting the order form and the gear form according to the entrusting messages. After the wind control storage table is updated, a user datagram protocol multicast mode is used, and a second return message is sent to the counter-side switch through a preset communication mode and a second message transmission channel.
For ease of understanding, reference is made to fig. 5, which is not intended to limit the method of wind control management of the present application. Fig. 5 is a schematic flow chart of an implementation of the wind control management method of the present application, it should be noted that the configuration of the programmable network card may be that a 4x10G optical port is supported, corresponding to MAC0 to MAC3 (i.e. a message transmission channel) respectively, a PCIE3x16 host interface is supported, wherein PCIE (Peripheral Component Interconnect Express) is a bus for connecting with a peripheral device, a BASE DMA interface supports a complete TCP/IP protocol stack, a USER DMA is a basic USER interface only for data interaction between software and hardware, DMA (Direct Memory Access) is direct memory access, BAR-1 (BASE address register) is an address space of the network card mapped to an upper computer through PCIE for interaction with a software service, DDR (Double Data Rate Synchronous Dynamic Random Access Memory) is a double rate synchronous dynamic random access memory, BRAM (Block RAM) is a block RAM unit integrated inside a field programmable gate array (Field Programmable GATE ARRAY, FPGA).
Based on the above, the step of wind control management may include:
1. Client side query/management message
The client management information mainly relates to request information such as counter login and logout and corresponding login and logout confirmation response information. When the wind control management system receives the information, the information is directly sent to the transaction gateway through the MAC1 interface without any processing, so that the management information can be rapidly and accurately transmitted between the client and the transaction gateway (namely TGW), and the normal operation of the transaction system and the smoothness of the management flow are ensured.
2. Client delegation message
The consignment message sent by the client side can be judged according to the securities types, and the security types needing to be subjected to the knocking control inspection are subjected to knocking comparison by the wind control management system. If the comparison result shows that the tapping behavior does not exist, the original delegated order is directly sent to the transaction gateway through the MAC1, and the subsequent transaction flow is continued. However, if the tapping action exists, the wind control management system can take intervention measures, and can make the original order form generate refusal order in the front link of the exchange by modifying the original order form, thereby preventing the tapping action from happening, and then the modified order form is sent to the exchange gateway through the MAC 1.
3. Wind control refusing bill message
For the entrusting message which does not pass the knocking wind control check, the message is copied by the wind control management system and is transmitted to the wind control monitoring system for recording by the USER DMA (direct memory access) while being sent to the transaction gateway by the MAC 1. The USER DMA technology allows data to be directly transmitted between the equipment and the memory without being processed by a CPU, so that the data transmission efficiency can be improved, and the wind control monitoring system can timely and accurately record the refused bill information.
4. Rewarding message
The transaction gateway is directly connected with the BASE DMA, and the return communication link between the transaction counter and the TGW is kept unchanged, so that only mirror image copying processing is carried out. After the transaction gateway receives the return message of the exchange, the message mirror image is copied to one part, so that even if a problem occurs in the data transmission process, the data can be recovered through the copy, and the stable operation of the transaction system is ensured.
5. Exchange return message (mirror image)
The return message returned by the exchange is mirrored while being uploaded to the transaction counter via BASE DMA. The copied information is divided into two parts, one part is required to be transmitted to an air control module and used for updating and maintaining various storage tables, such as an order table, a transaction table and the like, so that an air control management system can grasp the latest situation of transaction in real time and provide accurate data basis for risk control, and the other part is transmitted to a counter-end switch through an MAC2 port in a user datagram protocol multicast mode, so that other transaction counter machines can receive the confirmation response and the transaction return information of the machine. The method realizes the sharing and synchronization of information, improves the cooperative efficiency between transaction counters, provides a function of controlling a copying switch for a risk monitoring program, and can flexibly start or stop the copying and transmission of information according to the requirement.
6. Reward message (multicast)
The return multicast message is sent to the exchange by other transaction counter machines, and shares various return messages such as reporting response, withdrawal response, and bargain return with all transaction counters. These messages are transmitted only to the air control module for updating and maintaining various types of storage tables, such as order tables, deal tables, etc. By the mode, the wind control management system can acquire transaction information of other transaction counters in real time, comprehensively master the running condition of the whole transaction system, and provide more comprehensive and accurate data support for risk control and decision.
7. Monitoring management messages
The risk monitoring program has the capability of reading order list and gear list information in the memory. The order list stores detailed information of all orders, such as order number, security code, entrusted quantity, entrusted price, etc., and the gear list records buying and selling gear information of the market, such as buying price, selling price, buying quantity, selling quantity, etc. By reading the information, the monitoring program can know the execution condition of the order and the buying and selling condition of the market in real time, and provides basic data for risk monitoring and analysis. Meanwhile, the risk monitoring program can also configure order list and gear list information, and update and adjust the data according to actual needs so as to meet the requirements of risk control and management.
8. Register configuration
The wind control monitoring program controls the wind control anti-knocking system of the ultra-low time delay computing development platform through register configuration. In the wind control anti-knocking system of the ultra-low time delay computing development platform, the register configuration can realize the functions of configuration, reset and the like of the system. For example, the parameters of the system, such as wind control threshold value, monitoring frequency and the like, can be set by configuring a register, and the system can be restarted by resetting the register so as to restore the system to an initial state, thereby ensuring the normal operation and stable operation of the system. The mode provides a flexible control means for the wind control monitoring program, and the wind control management system can be rapidly configured and adjusted according to actual needs, so that the response speed and the adaptability of the system are improved.
Therefore, the wind control management method can compress the wind control calculation time delay to be within 200 nanoseconds, and the average penetration time delay is about 150 nanoseconds, so that the wind control management system can quickly respond to the entrusting request and timely perform anti-knocking verification. The low latency, wind-controlled verification capability enables the trading system to process trading requests faster, providing a faster trading experience for investors. The wind control management method of the application supports various deployment scenes, can be deployed on a trading system side and a trading exchange gateway side, also supports synchronous access of a plurality of systems in a mirror image interface mode, supports various service modes such as self-camping, brokerage, institutions, resource management and the like, can adapt to a full counter (a centralized trading counter, a very fast trading counter, a QFII special counter, a ticket binding counter, a DMA counter, an investment trading system and the like), supports deployment of a main network card and a standby network card, and realizes high availability in the main-standby mode.
In the embodiment, after receiving the return information of the risk reporting order, two return information are obtained through mirror image copying, one of the return information is updated to support decision making, the other return information is quickly transmitted to the counter end through multicast, and the information of the air control storage table and the counter end is combined, so that the entrusting information is monitored in real time, the transaction safety compliance is ensured, and the air control efficiency is improved. Through order form memory entrusting and first return information, the gear list records market buying and selling information, updates the two tables in real time to obtain the wind control memory list, and then transmits the second return to the counter-side switch through multicast and by means of a preset channel and a second information path, so that real-time synchronization of transaction data is ensured, and wind control response is quick.
It should be noted that the foregoing examples are only for understanding the present application, and are not meant to limit the wind control management method of the present application, and more forms of simple transformation based on the technical concept are all within the scope of the present application.
The present application also provides a wind control management device, referring to fig. 6, the wind control management device includes:
the data detection module 10 is configured to perform tapping detection on the delegated message through the programmable network card to obtain a risk declaration order, and distribute the delegated message and the return message to a plurality of wind control nodes based on multicast encapsulation;
And the wind control management module 20 is configured to perform wind control management on the risk reporting order according to the plurality of wind control nodes and a preset wind control policy.
The wind control management device provided by the application can solve the technical problem of larger processing time delay caused by adopting a centralized deployment mode in the traditional wind control management scheme by adopting the wind control management method in the embodiment. Compared with the prior art, the wind control management device provided by the application has the same beneficial effects as the wind control management method provided by the embodiment, and other technical features in the wind control management device are the same as the features disclosed by the method of the embodiment, and are not repeated herein.
The application provides wind control management equipment, which comprises at least one processor and a memory in communication connection with the at least one processor, wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can execute the wind control management method in the first embodiment.
Referring now to fig. 7, a schematic diagram of a wind control management device suitable for use in implementing embodiments of the present application is shown. The wind control management device in the embodiment of the present application may include, but is not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (Personal DIGITAL ASSISTANT: personal digital assistants), PADs (Portable Application Desction: tablet computers), PMPs (Portable MEDIA PLAYER: portable multimedia players), vehicle-mounted terminals (e.g., vehicle-mounted navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The air management device shown in fig. 7 is only an example, and should not be construed as limiting the functionality and scope of use of the embodiments of the present application.
As shown in fig. 7, the wind control management apparatus may include a processing device 1001 (e.g., a central processing unit, a graphics processor, etc.), which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1002 or a program loaded from a storage device 1003 into a random access Memory (RAM: random Access Memory) 1004. In the RAM1004, various programs and data required for the operation of the wind control management device are also stored. The processing device 1001, the ROM1002, and the RAM1004 are connected to each other by a bus 1005. An input/output (I/O) interface 1006 is also connected to the bus. In general, a system including an input device 1007 such as a touch screen, a touch pad, a keyboard, a mouse, an image sensor, a microphone, an accelerometer, a gyroscope, etc., an output device 1008 including a Liquid crystal display (LCD: liquid CRYSTAL DISPLAY), a speaker, a vibrator, etc., a storage device 1003 including a magnetic tape, a hard disk, etc., and a communication device 1009 may be connected to the I/O interface 1006. The communication means 1009 may allow the wind control management device to communicate wirelessly or by wire with other devices to exchange data. While a wind control management device having various systems is shown in the figures, it should be understood that not all of the illustrated systems are required to be implemented or provided. More or fewer systems may alternatively be implemented or provided.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through a communication device, or installed from the storage device 1003, or installed from the ROM 1002. The above-described functions defined in the method of the disclosed embodiment of the application are performed when the computer program is executed by the processing device 1001.
The wind control management equipment provided by the application adopts the wind control management method in the embodiment, and can solve the technical problem that a large processing time delay is generated by adopting a centralized deployment mode in the traditional wind control management scheme. Compared with the prior art, the wind control management device provided by the application has the same beneficial effects as the wind control management method provided by the embodiment, and other technical features in the wind control management device are the same as the features disclosed by the method of the previous embodiment, and are not described in detail herein.
It is to be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof. In the description of the above embodiments, particular features, structures, materials, or characteristics may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
The present application provides a computer-readable storage medium having computer-readable program instructions (i.e., a computer program) stored thereon for performing the wind control management method in the above-described embodiments.
The computer readable storage medium provided by the present application may be, for example, a U disk, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, or device, or a combination of any of the foregoing. More specific examples of a computer-readable storage medium may include, but are not limited to, an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access Memory (RAM: random Access Memory), a Read-Only Memory (ROM), an erasable programmable Read-Only Memory (EPROM: erasable Programmable Read Only Memory or flash Memory), an optical fiber, a portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this embodiment, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to electrical wiring, fiber optic cable, RF (Radio Frequency) and the like, or any suitable combination of the foregoing.
The computer readable storage medium may be included in the wind control management device or may exist alone without being incorporated in the wind control management device.
The computer readable storage medium carries one or more programs, and when the one or more programs are executed by the wind control management device, the wind control management device performs tapping detection on the entrusting message through the programmable network card to obtain a risk reporting order, distributes the entrusting message and the reporting message to a plurality of wind control nodes based on multicast encapsulation, and performs wind control management on the risk reporting order according to the plurality of wind control nodes and a preset wind control strategy.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of remote computers, the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN: local Area Network) or a wide area network (WAN: wide Area Network), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules involved in the embodiments of the present application may be implemented in software or in hardware. Wherein the name of the module does not constitute a limitation of the unit itself in some cases.
The readable storage medium provided by the application is a computer readable storage medium, and the computer readable storage medium stores computer readable program instructions (namely computer programs) for executing the wind control management method, so that the technical problem of large processing time delay caused by adopting a centralized deployment mode in the traditional wind control management scheme can be solved. Compared with the prior art, the beneficial effects of the computer readable storage medium provided by the application are the same as those of the wind control management method provided by the above embodiment, and are not described herein.
The application also provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the wind control management method as described above.
The computer program product provided by the application can solve the technical problem of larger processing time delay caused by adopting a centralized deployment mode in the traditional wind control management scheme. Compared with the prior art, the beneficial effects of the computer program product provided by the application are the same as those of the wind control management method provided by the embodiment, and are not repeated here.
The foregoing description is only a partial embodiment of the present application, and is not intended to limit the scope of the present application, and all the equivalent structural changes made by the description and the drawings of the present application or the direct/indirect application in other related technical fields are included in the scope of the present application.

Claims (10)

1. A method of wind control management, the method comprising the steps of:
The method comprises the steps of performing tapping detection on a entrusting message through a programmable network card to obtain a risk reporting order, and distributing the entrusting message and a return message to a plurality of wind control nodes based on multicast encapsulation;
and performing wind control management on the risk reporting order according to the wind control nodes and a preset wind control strategy.
2. The method for wind control management according to claim 1, wherein the step of performing tapping detection on the delegated message through the programmable network card, obtaining a risk declaration order, and distributing the delegated message and the return message to the plurality of wind control nodes based on multicast encapsulation includes:
Receiving a delegation message sent by a client through a programmable network card, and judging whether the delegation message needs to be subjected to a knocked-down control check according to the securities type of the delegation message;
if the delegation message does not need to be subjected to the windbreak check, the delegation message is sent to a transaction gateway through a first message transmission channel to carry out a transaction flow;
If the delegation message is required to be subjected to the windbreak control check, the delegation message is subjected to the knocking comparison to obtain a comparison result, and whether the delegation message is required to be modified is judged according to the comparison result;
If the entrusting message needs to be modified, modifying the entrusting message according to a preset modification rule to obtain a risk reporting order, and preventing a subsequent transaction flow of the risk reporting order through an refusing message;
the delegate message and the reward message are distributed to a plurality of wind-controlled nodes by multicast encapsulation and mirror replication.
3. The method for managing wind control according to claim 2, wherein if the delegate message needs to be modified, modifying the delegate message according to a preset modification rule to obtain a risk declaration order, and blocking a subsequent transaction flow of the risk declaration order by a refusal message, further comprises:
receiving a return message of the risk reporting order, and copying the return message through mirror image to obtain a first return message and a second return message;
updating the wind control storage table based on the first return information, obtaining an updated wind control storage table, and sending the second return information to a counter-side switch through a preset communication mode and a second information transmission channel based on a user datagram protocol multicast mode;
Each delegate message sent by the client is monitored based on the wind-controlled store table and the counter-side switch.
4. The method for managing air control according to claim 3, wherein the air control storage table includes an order table and a gear table, the step of updating the air control storage table based on the first report message, obtaining an updated air control storage table, and transmitting the second report message to the counter-side switch through a preset communication mode and a second message transmission channel based on a user datagram protocol multicast mode includes:
Storing the entrusting message and the first return message through an order form, and recording market buying and selling gear information through a gear form;
Acquiring each entrusting message in real time, and updating and adjusting the order table and the gear table according to each entrusting message to acquire an updated wind control storage table;
and based on the user datagram protocol multicast mode, the second return message is sent to the counter-side switch through a preset communication mode and a second message transmission channel.
5. The method according to any one of claims 1 to 4, wherein the step of performing the wind control management on the risk claim order according to the plurality of wind control nodes and a preset wind control policy includes:
The plurality of wind control nodes extract the risk reporting orders by analyzing the multicast data packet, and perform risk assessment on the risk reporting orders to obtain an assessment result;
And performing wind control management on the risk reporting order according to the evaluation result and a preset wind control strategy.
6. The method according to any one of claims 1 to 4, wherein after the step of performing the wind control management on the risk claim order according to the plurality of wind control nodes and the preset wind control policy, the method further comprises:
setting system parameters through a configuration register to obtain updated system parameters, and performing wind control management on the risk reporting order by applying the updated system parameters;
And/or the number of the groups of groups,
Initializing system settings through a reset register to obtain initialized system settings, and performing wind control management on the risk reporting order by applying the initialized system settings.
7. A wind control management device, the wind control management device comprising:
The data detection module is used for carrying out tapping detection on the entrusting message through the programmable network card to obtain a risk reporting order, and distributing the entrusting message and the return message to a plurality of wind control nodes based on multicast encapsulation;
And the wind control management module is used for carrying out wind control management on the risk reporting order according to the wind control nodes and a preset wind control strategy.
8. A wind control management device, characterized in that it comprises a memory, a processor and a wind control management program stored on the memory and executable on the processor, which when executed by the processor implements the wind control management method according to any one of claims 1 to 6.
9. A storage medium having stored thereon a wind control management program which when executed by a processor implements the wind control management method according to any one of claims 1 to 6.
10. A computer program product comprising a wind control management program which when executed by a processor implements the wind control management method of any of claims 1 to 6.
CN202510178906.0A 2025-02-18 2025-02-18 Risk control management methods, devices, equipment, storage media and products Pending CN120219073A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510178906.0A CN120219073A (en) 2025-02-18 2025-02-18 Risk control management methods, devices, equipment, storage media and products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510178906.0A CN120219073A (en) 2025-02-18 2025-02-18 Risk control management methods, devices, equipment, storage media and products

Publications (1)

Publication Number Publication Date
CN120219073A true CN120219073A (en) 2025-06-27

Family

ID=96097893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510178906.0A Pending CN120219073A (en) 2025-02-18 2025-02-18 Risk control management methods, devices, equipment, storage media and products

Country Status (1)

Country Link
CN (1) CN120219073A (en)

Similar Documents

Publication Publication Date Title
CN109118214B (en) Method and device for operating intelligent contract
US11316690B2 (en) Blockchain token-based cloud orchestration architecture for discrete virtual network instances
US20250131498A1 (en) Systems and methods for coordinating processing of scheduled instructions across multiple components
US11283865B2 (en) Service meshes and smart contracts for zero-trust systems
TWI705346B (en) Transaction method and system based on centralized settlement and blockchain deposit certificate
US12260458B2 (en) Data packet processing methods, systems, and apparatus
TW202113732A (en) Intelligent risk control decision-making method and system, business processing method and system
US11316933B2 (en) Service meshes and smart contracts for zero-trust systems
US20200013118A1 (en) Distributed ledger system for anonymized transaction management
WO2018204548A1 (en) Ledger management systems and methods
WO2023207146A1 (en) Service simulation method and apparatus for esop system, and device and storage medium
CN111861472B (en) Service monitoring processing method and device
CN112965986B (en) Service consistency processing method, device, equipment and storage medium
CN109597724B (en) Service stability measuring method, device, computer equipment and storage medium
CN113034275B (en) A management system, method and terminal device based on blockchain network
US11704637B2 (en) System and method to accept third-party payments
CN120219073A (en) Risk control management methods, devices, equipment, storage media and products
CN115686869B (en) Resource processing method, system, electronic device and storage medium
CN115222390A (en) Security check method, device, equipment and storage medium
CN112767166A (en) Method and device for controlling risk of transaction behavior, computer equipment and storage medium
US12255927B2 (en) System and method for quantification of standard compliance to drive remediation
US20240265391A1 (en) Numerically delineated value transfer
CN119295212A (en) Transaction risk control method, system, device and storage medium
CN115511667A (en) Bill data processing method and device based on block chain and server
CN117251193A (en) Service updating method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination