CN111476640B - Authentication method, system, storage medium and big data authentication platform - Google Patents

Authentication method, system, storage medium and big data authentication platform Download PDF

Info

Publication number
CN111476640B
CN111476640B CN202010283671.9A CN202010283671A CN111476640B CN 111476640 B CN111476640 B CN 111476640B CN 202010283671 A CN202010283671 A CN 202010283671A CN 111476640 B CN111476640 B CN 111476640B
Authority
CN
China
Prior art keywords
user
credit
access request
authentication
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010283671.9A
Other languages
Chinese (zh)
Other versions
CN111476640A (en
Inventor
吕劲松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Sitrui Information Technology Co ltd
Original Assignee
Jiangsu Sitrui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Sitrui Information Technology Co ltd filed Critical Jiangsu Sitrui Information Technology Co ltd
Priority to CN202010283671.9A priority Critical patent/CN111476640B/en
Publication of CN111476640A publication Critical patent/CN111476640A/en
Application granted granted Critical
Publication of CN111476640B publication Critical patent/CN111476640B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an authentication method, an authentication system, a storage medium and a big data authentication platform, wherein the authentication method comprises the following steps: receiving an access request of a user; verifying the validity of the access request; and after the verification is passed, carrying out credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform. Through verifying the validity and the credit of the access request of the user, the public opinion risk factors closely related with the enterprise main body are introduced in real time, the credit limit threshold of the enterprise main body is dynamically adjusted, a timely and effective evaluation basis is provided for the evaluation main body, and the method has the advantages of being real-time, efficient and reliable.

Description

Authentication method, system, storage medium and big data authentication platform
Technical Field
The present invention relates to the field of big data credit authentication technologies, and in particular, to an authentication method, system, storage medium, and big data authentication platform.
Background
At present, the credit market development of China is immature, and a large part of enterprises are in credit loss due to lack of unified credit record standards and objective risk assessment standards. A set of fair and objective enterprise credit assessment model is established, and has important significance for reasonably measuring the enterprise risk level and creating a healthy credit market.
The credit evaluation technical scheme in the prior art mainly comprises the following steps: and (3) periodically calculating enterprise financial indexes by using a solidified credit scoring model, and substituting the enterprise financial indexes into a formula to calculate. Because the financial index updating period is longer, various possible situations such as data delay, incompleteness, unreality and the like exist, so that the credit score updating is slow, and the enterprise risk state at a certain time point cannot be objectively and comprehensively reflected. Timely reflection cannot be made for various emergencies, so that possible default losses are caused. Other factors reflecting the risk of the enterprise, such as public opinion related to the enterprise subject, are not considered beyond the financial index.
Public opinion refers to the social attitude of a host people to a subject social manager, enterprise, individual and other various organizations and their politics, society, morals and the like, around the occurrence, development and change of intermediate social events in a certain social space. It is the sum of expressions of beliefs, attitudes, ideas, emotions, and the like expressed by many masses about various phenomena, problems in society. The internet public opinion is a talk and a view which are transmitted through the internet and have strong influence and tendency on some hot spots and focus problems in real life, and is mainly realized and enhanced through BBS forums, blogs, news follow-up sticks, transfer sticks and the like.
With the rapid development of the internet worldwide, network media has been recognized as a fourth media following newspapers, radio, television, and the network has become one of the main carriers reflecting social public opinion. The network public opinion has the advantages of rapid expression, multiple information, interactive modes and incomparable traditional media. The control and monopoly of self-media breaking information represented by microblogs, blogs, social networks and instant messaging systems can freely express the attitudes and ideas of people on the network, so that the self-media breaking information is not easy to unconditionally accept like the past, and on the contrary, interest and solicitation of different levels are presented, and different ideas and ideas are in front collision. Under the circumstance, it is necessary to build a public opinion monitoring system capable of covering multiple data sources, and the system can further study the hot spot research and judgment method of public opinion and the influence from media aiming at a new medium transmission environment, so as to enrich and perfect the public opinion research.
Under the condition of market economy, a competition mechanism is necessarily introduced into each link of enterprise production and management. The technology is promoted and updated, and the product is updated and the enterprise is in superior and inferior states, which are all results of competition change. It can be said that the enterprise is changing the amount every day. Therefore, the situation of the enterprise should be investigated and analyzed in a dynamic view and a development view during the evaluation and analysis. Only with comprehensive knowledge and dynamic analysis of the enterprise, it is possible to make a correct evaluation in accordance with the actual situation.
In view of the above situation, the invention provides an authentication method, an authentication system, a storage medium and a big data authentication platform, which can effectively improve the prior art and overcome the defects thereof.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an authentication method, an authentication system, a storage medium and a big data authentication platform, which are used for solving the problems of poor timeliness, poor reliability and the like in the prior art, and the specific scheme is as follows:
in a first aspect, the present invention provides an authentication method, the method comprising:
receiving an access request of a user;
verifying the validity of the access request;
and after the verification is passed, carrying out credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
Preferably, the method for verifying the validity of the access request includes:
and checking the digital signature of the access request by using the public key, and if the digital signature passes the check, verifying the validity of the access request.
Preferably, the method for generating the access request includes:
encrypting the access request;
compressing the access request subjected to encryption processing;
And adding a response protocol to the access request subjected to encryption processing and compression processing.
Preferably, the method for verifying the validity of the access request includes:
and judging whether the access identifier of the access request is matched with the access identifier of the big data platform, if so, verifying the legitimacy of the access request command.
Preferably, the credit authentication is performed on the user, and the method comprises the following steps:
scoring the enterprise credit public opinion of the user to obtain the credit limit of the user;
and when the credit line is larger than a preset credit line threshold value, the user passes the credit authentication.
Preferably, the credit line obtaining method includes:
dividing comments of each Internet site, acquired by a crawler, on the user into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value;
and respectively counting the proportion of the positive comment information and the negative comment information to the total comment information, and carrying out weighted operation on the preset positive comment value, the proportion of the preset negative comment value and the positive comment information and the proportion of the negative comment information, wherein the operation result is the credit line.
Preferably, the method further comprises:
when the business transaction of the user on the big data platform is successful, reducing the preset credit limit threshold of the user;
and when the business transaction of the user on the big data platform fails, increasing the preset credit limit threshold of the user.
In a second aspect, the present invention provides an authentication system, the system comprising:
the receiving module is used for receiving the access request of the user;
the verification module is used for verifying the validity of the access request;
and the authentication module is used for carrying out credit authentication on the user after the authentication is passed, and allowing the user to access the big data platform if the authentication is passed.
In a third aspect, the present invention provides a big data authentication platform, the platform comprising:
a communication bus for realizing connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to perform the steps of:
receiving an access request of a user;
verifying the validity of the access request;
and after the verification is passed, carrying out credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method as described in the first aspect.
The invention has the beneficial effects that: the authentication method, the system, the storage medium and the big data authentication platform of the invention introduce the public opinion risk factors closely related to the enterprise main body in real time through verifying the validity and the credit of the access request of the user, dynamically adjust the credit limit threshold of the enterprise main body, provide timely and effective evaluation basis for the evaluation main body, and have the advantages of real time, high efficiency and reliability.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it will be obvious that the drawings in the following description are only some embodiments of the present invention, and the embodiments in the drawings do not constitute any limitation of the present invention, and it is possible for a person skilled in the art to obtain other drawings according to these drawings without inventive effort.
FIG. 1 is a flow chart of an authentication method according to an embodiment of the invention.
FIG. 2 is a flow chart of an authentication method according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an embodiment of an authentication system according to the present invention.
FIG. 4 is a schematic diagram of a big data authentication platform according to an embodiment of the present invention.
Detailed Description
The following describes the technical scheme of the present invention in further detail by referring to the accompanying drawings and examples, which are preferred examples of the present invention. It should be understood that the described embodiments are merely some, but not all, embodiments of the present invention; it should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The main idea of the technical scheme of the embodiment of the invention is as follows: receiving an access request of a user; verifying the validity of the access request; and after the verification is passed, carrying out credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In order to better understand the above technical solutions, the following detailed description will refer to the accompanying drawings and specific embodiments.
Example 1
An embodiment of the present invention provides an authentication method, as shown in fig. 1, where the authentication method specifically includes the following steps:
s101, receiving an access request of a user;
the user access request received by the big data credit authentication platform may include identity information of a user, identification information of a component of the big data credit authentication platform to be accessed, and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user can be a user name and a password; the components that the user needs to access can be any component that makes up the big data credit authentication platform. Wherein, the identification information of the components is used for distinguishing the components from other components, and the identification information of the components can include, but is not limited to, information such as names, numbers and the like, and the specification is not limited in particular.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, and the physical carrier is usually a server or a server cluster, so that the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform itself has the payment function, which is not particularly limited in this specification.
In one example, a user may scan a specified two-dimensional code using a terminal device such as a cell phone to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer, a mobile phone, etc. to initiate the access request. The two-dimensional code and the link can be provided by a big data credit authentication platform or other third party systems, and the specification is not particularly limited. If the two-dimensional code and the link are provided by other third party systems, the third party system can send the user information of the user to the big data credit authentication platform.
S102, verifying the validity of the access request; wherein verification in terms of digital signatures is involved.
In the embodiment of the invention, the big data credit authentication platform uses the public key to verify the digital signature of the access request, and if the digital signature passes the verification, the validity of the access request passes the verification.
Wherein, the verified content can include: security of access requests, qualification of authorizing access to big data credit authentication platforms, and legitimacy of access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface of a keyboard or the like.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to input legal verification information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, the big data credit authentication platform of the data owner may preset a legal account, also known as a whitelist user, that allows access to the data file.
In the embodiment of the present invention, the above access request may be generated by the following method: firstly, encrypting the access request; then, compressing the access request subjected to encryption processing; and finally, adding a response protocol to the access request subjected to encryption processing and compression processing.
If the digital signature passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are further executed through the validity verification.
If the digital signature does not pass verification, the access request of the initiating user can be confirmed to be illegal, and the big data credit authentication platform can return a message with potential safety hazard to the initiating user for ensuring the initiating safety.
In the embodiment of the present invention, the public key may be provided to the big data credit authentication platform by the user during registration, or may be added to the two-dimensional code by the user, which is not particularly limited in this embodiment.
In practical application, the validity verification can be performed by adopting a scheme combining signature verification and registration verification, the validity verification can be performed by adopting only signature verification or registration verification, and the validity verification can be performed by adopting other modes, and the embodiment is not particularly limited.
And S103, after the verification is passed, credit authentication is carried out on the user, and if the user passes the credit authentication, the user is allowed to access the big data platform.
In the embodiment of the invention, after the digital signature passes verification, credit authentication is carried out on the user, and the specific method can be that the enterprise credit public opinion of the user is scored to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold value, and when the credit line is larger than the preset credit line threshold value, the user passes the credit authentication.
The credit line can be obtained by the following method: firstly, capturing comment information of a user on each related internet site by a configuration crawler, and dividing comments, obtained by the crawler, of the user by each internet site into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as good and/or praise appear, the comments are positive comments, if words such as bad appear, the comments are negative comments, and the like, which are not repeated herein; then, the proportion of the positive comment information and the negative comment information in the total comment information is counted respectively; finally, weighting the preset positive comment value, the proportion of the preset negative comment value to the positive comment information and the proportion of the negative comment information, for example, if the proportion of the positive comment portion to the total comment information after extraction is 80%, the proportion of the negative comment portion to the total comment information after extraction is 20%, and the preset values of the positive comment portion and the negative comment portion are respectively 10 points and 2 points, the credit line can be expressed by a formula:
Credit line = 80% x10 +20% x2 = 8.4;
the result of this operation is the credit line of the user, i.e. 8.4 points.
In an alternative embodiment, when the service transaction of the user on the big data credit authentication platform is successful, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is reduced.
In another alternative embodiment, when the service transaction of the user on the big data credit authentication platform fails, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform to carry out subsequent work; when the logged-in user is not a legal user, the authentication is failed, and the access request authentication processing method is ended.
The operation request information of the user on the big data credit authentication platform comprises, but is not limited to, reading data, opening a file, creating a file, deleting a file and the like.
It should be noted that the above verification method is given as an example, and those skilled in the art can use other verification methods, which are included in the scope of the present invention.
Example two
An embodiment of the present invention provides an authentication method, as shown in fig. 2, where the authentication method specifically includes the following steps:
s201, receiving an access request of a user;
the user access request received by the big data credit authentication platform may include identity information of a user, identification information of a component of the big data credit authentication platform to be accessed, and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user can be a user name and a password; the components that the user needs to access can be any component that makes up the big data credit authentication platform. Wherein, the identification information of the components is used for distinguishing the components from other components, and the identification information of the components can include, but is not limited to, information such as names, numbers and the like, and the specification is not limited in particular.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, and the physical carrier is usually a server or a server cluster, so that the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform itself has the payment function, which is not particularly limited in this specification.
In one example, a user may scan a specified two-dimensional code using a terminal device such as a cell phone to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer, a mobile phone, etc. to initiate the access request. The two-dimensional code and the link can be provided by a big data credit authentication platform or other third party systems, and the specification is not particularly limited. If the two-dimensional code and the link are provided by other third party systems, the third party system can send the user information of the user to the big data credit authentication platform.
S202, verifying the validity of the access request; wherein authentication in terms of access identification is involved.
In the embodiment of the invention, specifically, the big data credit authentication platform judges whether the access identifier of the access request is matched with the access identifier of the big data platform, if so, the legitimacy of the access request command is verified.
Wherein, the verified content can include: security of access requests, qualification of authorizing access to big data credit authentication platforms, and legitimacy of access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface of a keyboard or the like.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to input legal verification information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, the big data credit authentication platform of the data owner may preset a legal account, also known as a whitelist user, that allows access to the data file.
If the access identifier passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are further executed through the validity verification; if the access identifier does not pass verification, the access request of the initiating user can be confirmed to be illegal, and the big data credit authentication platform can return a message with potential safety hazard to the initiating user for ensuring the initiating safety.
And S203, after the verification is passed, credit authentication is carried out on the user, and if the user passes the credit authentication, the user is allowed to access the big data platform.
In the embodiment of the invention, after the access identifier passes verification, credit authentication is performed on the user, and the specific method may be that the enterprise credit public opinion of the user is scored to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold value, and when the credit line is larger than the preset credit line threshold value, the user passes the credit authentication.
The credit line can be obtained by the following method: firstly, capturing comment information of a user on each related internet site by a configuration crawler, and dividing comments, obtained by the crawler, of the user by each internet site into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as good and/or praise appear, the comments are positive comments, if words such as bad appear, the comments are negative comments, and the like, which are not repeated herein; then, the proportion of the positive comment information and the negative comment information in the total comment information is counted respectively; finally, weighting the preset positive comment value, the proportion of the preset negative comment value to the positive comment information and the proportion of the negative comment information, for example, if the proportion of the positive comment portion to the total comment information after extraction is 80%, the proportion of the negative comment portion to the total comment information after extraction is 20%, and the preset values of the positive comment portion and the negative comment portion are respectively 10 points and 2 points, the credit line can be expressed by a formula:
credit line = 80% x10 +20% x2 = 8.4;
The result of this operation is the credit line of the user, i.e. 8.4 points.
In an alternative embodiment, when the service transaction of the user on the big data credit authentication platform is successful, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is reduced.
In another alternative embodiment, when the service transaction of the user on the big data credit authentication platform fails, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform to carry out subsequent work; when the logged-in user is not a legal user, the authentication is failed, and the access request authentication processing method is ended.
The operation request information of the user on the big data credit authentication platform comprises, but is not limited to, reading data, opening a file, creating a file, deleting a file and the like.
It should be noted that the above verification method is given as an example, and those skilled in the art can use other verification methods, which are included in the scope of the present invention.
Example III
An embodiment of the present invention provides an authentication system, as shown in fig. 3, where the authentication system may specifically include the following modules:
the receiving module is used for receiving the access request of the user;
the user access request received by the big data credit authentication platform may include identity information of a user, identification information of a component of the big data credit authentication platform to be accessed, and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user can be a user name and a password; the components that the user needs to access can be any component that makes up the big data credit authentication platform. Wherein, the identification information of the components is used for distinguishing the components from other components, and the identification information of the components can include, but is not limited to, information such as names, numbers and the like, and the specification is not limited in particular.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, and the physical carrier is usually a server or a server cluster, so that the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform itself has the payment function, which is not particularly limited in this specification.
In one example, a user may scan a specified two-dimensional code using a terminal device such as a cell phone to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer, a mobile phone, etc. to initiate the access request. The two-dimensional code and the link can be provided by a big data credit authentication platform or other third party systems, and the specification is not particularly limited. If the two-dimensional code and the link are provided by other third party systems, the third party system can send the user information of the user to the big data credit authentication platform.
The verification module is used for verifying the validity of the access request;
in the embodiment of the invention, the big data credit authentication platform uses the public key to verify the digital signature of the access request, and if the digital signature passes the verification, the validity of the access request passes the verification.
Wherein, the verified content can include: security of access requests, qualification of authorizing access to big data credit authentication platforms, and legitimacy of access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface of a keyboard or the like.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to input legal verification information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, the big data credit authentication platform of the data owner may preset a legal account, also known as a whitelist user, that allows access to the data file.
In the embodiment of the present invention, the above access request may be generated by the following method: firstly, encrypting the access request; then, compressing the access request subjected to encryption processing; and finally, adding a response protocol to the access request subjected to encryption processing and compression processing.
If the digital signature passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are further executed through the validity verification.
If the digital signature does not pass verification, the access request of the initiating user can be confirmed to be illegal, and the big data credit authentication platform can return a message with potential safety hazard to the initiating user for ensuring the initiating safety.
In the embodiment of the present invention, the public key may be provided to the big data credit authentication platform by the user during registration, or may be added to the two-dimensional code by the user, which is not particularly limited in this embodiment.
In practical application, the validity verification can be performed by adopting a scheme combining signature verification and registration verification, the validity verification can be performed by adopting only signature verification or registration verification, and the validity verification can be performed by adopting other modes, and the embodiment is not particularly limited.
And the authentication module is used for carrying out credit authentication on the user after the authentication is passed, and allowing the user to access the big data platform if the authentication is passed.
In the embodiment of the invention, after the digital signature passes verification, credit authentication is carried out on the user, and the specific method can be that the enterprise credit public opinion of the user is scored to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold value, and when the credit line is larger than the preset credit line threshold value, the user passes the credit authentication.
The credit line can be obtained by the following method: firstly, capturing comment information of a user on each related internet site by a configuration crawler, and dividing comments, obtained by the crawler, of the user by each internet site into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as good and/or praise appear, the comments are positive comments, if words such as bad appear, the comments are negative comments, and the like, which are not repeated herein; then, the proportion of the positive comment information and the negative comment information in the total comment information is counted respectively; finally, weighting the preset positive comment value, the proportion of the preset negative comment value to the positive comment information and the proportion of the negative comment information, for example, if the proportion of the positive comment portion to the total comment information after extraction is 80%, the proportion of the negative comment portion to the total comment information after extraction is 20%, and the preset values of the positive comment portion and the negative comment portion are respectively 10 points and 2 points, the credit line can be expressed by a formula:
Credit line = 80% x10 +20% x2 = 8.4;
the result of this operation is the credit line of the user, i.e. 8.4 points.
In an alternative embodiment, when the service transaction of the user on the big data credit authentication platform is successful, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is reduced.
In another alternative embodiment, when the service transaction of the user on the big data credit authentication platform fails, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform to carry out subsequent work; when the logged-in user is not a legal user, the authentication is failed, and the access request authentication processing method is ended.
The operation request information of the user on the big data credit authentication platform comprises, but is not limited to, reading data, opening a file, creating a file, deleting a file and the like.
It should be noted that the above verification method is given as an example, and those skilled in the art can use other verification methods, which are included in the scope of the present invention.
Example IV
An embodiment of the present invention provides a big data authentication platform, as shown in fig. 4, where the authentication platform specifically may include the following modules:
a communication bus for realizing connection communication between the processor and the memory;
a memory for storing a computer program; the memory may comprise high-speed RAM memory or may further comprise non-volatile memory, such as at least one disk memory. The memory may optionally contain at least one storage device.
A processor for executing the above computer program to implement the following steps:
receiving an access request of a user;
the user access request received by the big data credit authentication platform may include identity information of a user, identification information of a component of the big data credit authentication platform to be accessed, and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user can be a user name and a password; the components that the user needs to access can be any component that makes up the big data credit authentication platform. Wherein, the identification information of the components is used for distinguishing the components from other components, and the identification information of the components can include, but is not limited to, information such as names, numbers and the like, and the specification is not limited in particular.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, and the physical carrier is usually a server or a server cluster, so that the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform itself has the payment function, which is not particularly limited in this specification.
In one example, a user may scan a specified two-dimensional code using a terminal device such as a cell phone to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer, a mobile phone, etc. to initiate the access request. The two-dimensional code and the link can be provided by a big data credit authentication platform or other third party systems, and the specification is not particularly limited. If the two-dimensional code and the link are provided by other third party systems, the third party system can send the user information of the user to the big data credit authentication platform.
Verifying the validity of the access request;
in the embodiment of the invention, specifically, the big data credit authentication platform judges whether the access identifier of the access request is matched with the access identifier of the big data platform, if so, the legitimacy of the access request command is verified.
Wherein, the verified content can include: security of access requests, qualification of authorizing access to big data credit authentication platforms, and legitimacy of access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface of a keyboard or the like.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to input legal verification information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, the big data credit authentication platform of the data owner may preset a legal account, also known as a whitelist user, that allows access to the data file.
If the access identifier passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are further executed through the validity verification; if the access identifier does not pass verification, the access request of the initiating user can be confirmed to be illegal, and the big data credit authentication platform can return a message with potential safety hazard to the initiating user for ensuring the initiating safety.
And after the verification is passed, carrying out credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In the embodiment of the invention, after the access identifier passes verification, credit authentication is performed on the user, and the specific method may be that the enterprise credit public opinion of the user is scored to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold value, and when the credit line is larger than the preset credit line threshold value, the user passes the credit authentication.
The credit line can be obtained by the following method: firstly, capturing comment information of a user on each related internet site by a configuration crawler, and dividing comments, obtained by the crawler, of the user by each internet site into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as good and/or praise appear, the comments are positive comments, if words such as bad appear, the comments are negative comments, and the like, which are not repeated herein; then, the proportion of the positive comment information and the negative comment information in the total comment information is counted respectively; finally, weighting the preset positive comment value, the proportion of the preset negative comment value to the positive comment information and the proportion of the negative comment information, for example, if the proportion of the positive comment portion to the total comment information after extraction is 80%, the proportion of the negative comment portion to the total comment information after extraction is 20%, and the preset values of the positive comment portion and the negative comment portion are respectively 10 points and 2 points, the credit line can be expressed by a formula:
Credit line = 80% x10 +20% x2 = 8.4;
the result of this operation is the credit line of the user, i.e. 8.4 points.
In an alternative embodiment, when the service transaction of the user on the big data credit authentication platform is successful, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is reduced.
In another alternative embodiment, when the service transaction of the user on the big data credit authentication platform fails, the stored preset credit threshold of the user on the big data credit authentication platform may be updated, for example, the preset credit threshold of the user is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform to carry out subsequent work; when the logged-in user is not a legal user, the authentication is failed, and the access request authentication processing method is ended.
The operation request information of the user on the big data credit authentication platform comprises, but is not limited to, reading data, opening a file, creating a file, deleting a file and the like.
It should be noted that the above verification method is given as an example, and those skilled in the art can use other verification methods, which are included in the scope of the present invention.
The processor in this embodiment may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The processor may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present invention may be implemented or performed. The processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
Example five
An embodiment of the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the authentication method described above.
In summary, according to the authentication method, the system, the storage medium and the big data authentication platform provided by the embodiment of the invention, through verifying the validity and the credit of the access request of the user, the public opinion risk factors closely related to the enterprise main body are introduced in real time, the credit limit threshold of the enterprise main body is dynamically adjusted, a timely and effective evaluation basis is provided for the evaluation main body, and the authentication method, the system, the storage medium and the big data authentication platform have the advantages of real time, high efficiency and reliability.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded or executed on a computer, produces, in whole or in part, a flow or function consistent with embodiments of the present application. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired (e.g., infrared, wireless, microwave, etc.) means. The computer readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more sets of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, or other various media capable of storing program codes.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (8)

1. An authentication method, comprising:
receiving an access request of a user;
verifying the validity of the access request;
after the verification is passed, carrying out credit authentication on the user, and if the user passes the credit authentication, allowing the user to access a big data platform; the method is characterized in that:
authenticating the user for credit includes:
scoring the enterprise credit public opinion of the user to obtain the credit limit of the user;
when the credit line is larger than a preset credit line threshold value, the user passes credit authentication;
the credit line acquisition method comprises the following steps:
dividing comments of each Internet site, acquired by a crawler, on the user into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value;
And respectively counting the proportion of the positive comment information and the negative comment information to the total comment information, and carrying out weighted operation on the preset positive comment value, the proportion of the preset negative comment value and the positive comment information and the proportion of the negative comment information, wherein the operation result is the credit line.
2. The method of claim 1, wherein the verifying the validity of the access request comprises:
and checking the digital signature of the access request by using the public key, and if the digital signature passes the check, verifying the validity of the access request.
3. The method according to claim 2, wherein the method of generating the access request comprises:
encrypting the access request;
compressing the access request subjected to encryption processing;
and adding a response protocol to the access request subjected to encryption processing and compression processing.
4. The method of claim 1, wherein the verifying the validity of the access request comprises:
and judging whether the access identifier of the access request is matched with the access identifier of the big data platform, if so, verifying the legitimacy of the access request command.
5. The method according to claim 1, wherein the method further comprises:
when the business transaction of the user on the big data platform is successful, reducing the preset credit limit threshold of the user;
and when the business transaction of the user on the big data platform fails, increasing the preset credit limit threshold of the user.
6. The authentication system of the method of claim 1, wherein the system comprises:
the receiving module is used for receiving the access request of the user;
the verification module is used for verifying the validity of the access request;
and the authentication module is used for carrying out credit authentication on the user after the authentication is passed, and allowing the user to access the big data platform if the authentication is passed.
7. The big data authentication platform of claim 1, wherein the authentication platform comprises:
a communication bus for realizing connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to perform the steps of:
receiving an access request of a user;
verifying the validity of the access request;
And after the verification is passed, carrying out credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
8. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the method according to any of claims 1-5.
CN202010283671.9A 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform Active CN111476640B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010283671.9A CN111476640B (en) 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010283671.9A CN111476640B (en) 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform

Publications (2)

Publication Number Publication Date
CN111476640A CN111476640A (en) 2020-07-31
CN111476640B true CN111476640B (en) 2023-08-04

Family

ID=71752203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010283671.9A Active CN111476640B (en) 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform

Country Status (1)

Country Link
CN (1) CN111476640B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112200586B (en) * 2020-11-16 2022-07-08 支付宝(杭州)信息技术有限公司 Identity authentication method and device
CN112818312A (en) * 2021-02-02 2021-05-18 江苏欧软信息科技有限公司 MES system login authentication method based on face recognition technology and MES system
CN114201418B (en) * 2021-12-13 2024-05-03 珠海格力电器股份有限公司 Data access method, device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
CN107809317A (en) * 2017-11-09 2018-03-16 郑州云海信息技术有限公司 A kind of identity identifying method and system based on token digital signature
CN110941844A (en) * 2019-11-27 2020-03-31 网易(杭州)网络有限公司 Authentication method, system, electronic equipment and readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
CN107809317A (en) * 2017-11-09 2018-03-16 郑州云海信息技术有限公司 A kind of identity identifying method and system based on token digital signature
CN110941844A (en) * 2019-11-27 2020-03-31 网易(杭州)网络有限公司 Authentication method, system, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN111476640A (en) 2020-07-31

Similar Documents

Publication Publication Date Title
CN111476640B (en) Authentication method, system, storage medium and big data authentication platform
US10554649B1 (en) Systems and methods for blockchain validation of user identity and authority
EP3859644B1 (en) Block chain-based data check system and method, computing device, and storage medium
WO2020143765A1 (en) Advertisement anti-spamming method and apparatus, electronic device, and storage medium
US20230134838A1 (en) User verification system and method based on restricted url opening on browser of user device
CN108711006B (en) Income management method, management node, system and storage equipment
KR101962686B1 (en) System and method for electronic voting
CN105516133B (en) User identity verification method, server and client
US11917050B1 (en) Systems and methods for generating a blockchain-based user profile
CN110414270B (en) Personal data protection system and method based on block chain
CN104303483A (en) User-based identification system for social networks
US20150006399A1 (en) Social Media Based Identity Verification
EP4178155A1 (en) Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof
CN104517217A (en) Data processing method and terminal
CN104618416A (en) Credit account establishing method, device and system
CN113179282A (en) Method and device for merging account numbers and server
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN113890739B (en) Cross-blockchain authentication method and device, electronic equipment and medium
CN108009444A (en) Authority control method, device and the computer-readable recording medium of full-text search
CN105988998B (en) Relational network construction method and device
CN111047146A (en) Risk identification method, device and equipment for enterprise users
CN111259430A (en) Data processing method and device, electronic equipment and computer storage medium
CN105225153A (en) Data processing method and device
CN107787500B (en) Message providing and evaluating system
KR102498336B1 (en) Method and system for managing user reputation based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant