CN113657910B - Real name authentication method, device, electronic equipment and readable storage medium - Google Patents

Real name authentication method, device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN113657910B
CN113657910B CN202110933975.XA CN202110933975A CN113657910B CN 113657910 B CN113657910 B CN 113657910B CN 202110933975 A CN202110933975 A CN 202110933975A CN 113657910 B CN113657910 B CN 113657910B
Authority
CN
China
Prior art keywords
authentication
real
target
instruction set
name authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110933975.XA
Other languages
Chinese (zh)
Other versions
CN113657910A (en
Inventor
邱琳耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Consumer Finance Co Ltd
Original Assignee
Ping An Consumer Finance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Consumer Finance Co Ltd filed Critical Ping An Consumer Finance Co Ltd
Priority to CN202110933975.XA priority Critical patent/CN113657910B/en
Publication of CN113657910A publication Critical patent/CN113657910A/en
Application granted granted Critical
Publication of CN113657910B publication Critical patent/CN113657910B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis

Abstract

The invention relates to data processing, and discloses a real-name authentication method, a device, electronic equipment and a readable storage medium, wherein the method comprises the following steps: generating a real-name authentication instruction set corresponding to the task type, wherein the real-name authentication instruction set comprises a plurality of sub-instruction sets, and each sub-instruction set corresponds to one risk level; determining a target risk level of the second user; determining a target real-name authentication instruction set corresponding to the target task type, and determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level; determining target weights corresponding to a plurality of preset index items, and determining target authentication channels based on the preset index items and the target weights; setting an authentication channel option in the initial authentication operation instruction set as a target authentication channel to obtain a target authentication operation instruction set, and carrying out real-name authentication on the second user by adopting the target authentication operation instruction set. The invention improves the accuracy of real-name authentication and accelerates the speed of real-name authentication.

Description

Real name authentication method, device, electronic equipment and readable storage medium
Technical Field
The present invention relates to the field of data processing, and in particular, to a real-name authentication method, apparatus, electronic device, and readable storage medium.
Background
With the development of network technologies, many off-line tasks are gradually converted into on-line tasks, such as applying loans, purchasing insurance, etc., and in order to ensure the safety of on-line task execution, real-name authentication is generally required for users.
Currently, a general real-name authentication scheme is generally adopted for online tasks, and the task type and the risk level of a user are not considered, so that the accuracy of real-name authentication is not high; meanwhile, a plurality of authentication channels for providing real-name authentication service are arranged in a core node-public security network authentication node of real-name authentication, and currently, the authentication channels are generally selected randomly, so that the condition that the selection is improper and the real-name authentication process takes too long is easy to occur. Therefore, there is a need for a real-name authentication method to improve the accuracy of real-name authentication and speed up the real-name authentication.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a real-name authentication method, which aims to improve accuracy and speed of real-name authentication.
The real name authentication method provided by the invention comprises the following steps:
responding to a real-name authentication instruction set creation request carrying a task type sent by a first user, acquiring first attribute information of the first user from a first database, and generating a real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information, wherein the real-name authentication instruction set comprises a plurality of sub-instruction sets, and each sub-instruction set corresponds to one risk level;
Receiving a real-name authentication request aiming at a target task type sent by a second user, acquiring second attribute information of the second user from a second database, and determining a target risk level of the second user based on the second attribute information;
determining a target real-name authentication instruction set corresponding to the target task type, and determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level;
acquiring first historical authentication data of each authentication channel in a plurality of authentication channels providing real-name authentication service in a first time period from a third database, determining target weights corresponding to a plurality of preset index items based on the first historical authentication data, and determining target authentication channels based on the preset index items and the target weights;
setting an authentication channel option in the initial authentication operation instruction set as the target authentication channel to obtain a target authentication operation instruction set, and carrying out real-name authentication on the second user by adopting the target authentication operation instruction set to obtain a real-name authentication result.
Optionally, the generating, based on the task type and the first attribute information, a real-name authentication instruction set corresponding to the task type includes:
Determining importance scores corresponding to the task types based on the task types and the first attribute information;
determining an initial flow node corresponding to the task type based on a predetermined importance score and a mapping relation between the flow nodes;
generating a flow configuration interface based on the initial flow node, wherein the flow configuration interface comprises a flow node modification and/or confirmation area and an authentication rule set modification and/or confirmation area of each flow node, and the authentication rule set comprises authentication rules corresponding to each risk level;
displaying the flow configuration interface to a client interface of the first user, receiving a real-name authentication flow configured by the first user at the flow configuration interface, and generating a sub-instruction set corresponding to each risk level based on the real-name authentication flow;
and summarizing the sub instruction sets to obtain a real-name authentication instruction set corresponding to the task type.
Optionally, the determining the importance score corresponding to the task type based on the task type and the first attribute information includes:
calculating an attribute score corresponding to the task type based on the first attribute information;
determining a security score corresponding to a task type according to a mapping relation between the task type and the security score;
And calculating an importance score corresponding to the task type based on the attribute score and the security score.
Optionally, the determining the target risk level of the second user based on the second attribute information includes:
constructing a user portrait of the second user based on the second attribute information;
and inputting the user portrait into a risk level identification model to obtain the target risk level of the second user.
Optionally, the determining, based on the first historical authentication data, the target weights corresponding to the plurality of preset index items includes:
acquiring a first index value corresponding to each preset index item in a plurality of preset index items from the first historical authentication data, and taking the first index value as an independent variable;
taking the score in the first historical authentication data as a dependent variable;
and acquiring a predetermined weight function, and determining the target weight corresponding to each preset index item based on the independent variable, the dependent variable and the weight function.
Optionally, the determining the target authentication channel based on the preset index item and the target weight includes:
acquiring second historical authentication data of each authentication channel in a second time period, acquiring second index values corresponding to each preset index item from the second historical authentication data, and calculating priority scores corresponding to each authentication channel based on the second index values and the target weights;
And taking the authentication channel with the highest priority score as a target real-name authentication channel.
Optionally, after the generating the sub instruction set corresponding to each risk level based on the real-name authentication procedure, the method further includes:
and executing the non-missing check of the key flow nodes and the order correctness check of the flow nodes on the real-name authentication flow.
In order to solve the above problems, the present invention also provides a real-name authentication device, the device comprising:
the generation module is used for responding to a real-name authentication instruction set creation request carrying a task type sent by a first user, acquiring first attribute information of the first user from a first database, and generating a real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information, wherein the real-name authentication instruction set comprises a plurality of sub instruction sets, and each sub instruction set corresponds to one risk level;
the receiving module is used for receiving a real-name authentication request aiming at a target task type sent by a second user, acquiring second attribute information of the second user from a second database, and determining a target risk level of the second user based on the second attribute information;
the determining module is used for determining a target real-name authentication instruction set corresponding to the target task type, and determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level;
The acquisition module is used for acquiring first historical authentication data of each authentication channel in a plurality of authentication channels providing real-name authentication service in a first time period from a third database, determining target weights corresponding to a plurality of preset index items based on the first historical authentication data, and determining target authentication channels based on the preset index items and the target weights;
and the authentication module is used for setting the authentication channel options in the initial authentication operation instruction set as the target authentication channels to obtain a target authentication operation instruction set, and carrying out real-name authentication on the second user by adopting the target authentication operation instruction set to obtain a real-name authentication result.
In order to solve the above-mentioned problems, the present invention also provides an electronic apparatus including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a real-name authentication program executable by the at least one processor, the real-name authentication program being executed by the at least one processor to enable the at least one processor to perform the real-name authentication method described above.
In order to solve the above-described problems, the present invention also provides a computer-readable storage medium having stored thereon a real-name authentication program executable by one or more processors to implement the above-described real-name authentication method.
Compared with the prior art, the method and the device have the advantages that the real-name authentication instruction set corresponding to the task type is firstly generated, and comprises a plurality of sub-instruction sets, wherein each sub-instruction set corresponds to one risk level; then, determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level of the second user; then, determining target weights corresponding to a plurality of preset index items based on first historical authentication data of each authentication channel, and determining target authentication channels based on the preset index items and the target weights; and finally, setting an authentication channel option in the initial authentication operation instruction set as a target authentication channel to obtain a target authentication operation instruction set, and carrying out real-name authentication on the second user by adopting the target authentication operation instruction set. The real-name authentication instruction sets corresponding to different task types are different, and for the same task type, the authentication operation instruction sets corresponding to users with different risk levels are different; according to the invention, the target weight of each preset index item is determined through the first historical authentication data, so that the determined target authentication channel is optimal, and the real-name authentication speed can be increased. Therefore, the invention improves the accuracy of real-name authentication and accelerates the speed of real-name authentication.
Drawings
Fig. 1 is a flow chart of a real-name authentication method according to an embodiment of the invention;
fig. 2 is a schematic block diagram of a real-name authentication device according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
the achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
The invention provides a real-name authentication method. Referring to fig. 1, a flow chart of a real-name authentication method according to an embodiment of the invention is shown. The method may be performed by an electronic device, which may be implemented in software and/or hardware.
In this embodiment, the real name authentication method includes:
s1, responding to a real-name authentication instruction set creation request carrying a task type sent by a first user, acquiring first attribute information of the first user from a first database, and generating a real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information, wherein the real-name authentication instruction set comprises a plurality of sub-instruction sets, and each sub-instruction set corresponds to one risk level.
In this embodiment, the first user is a platform or an enterprise that needs to perform real-name authentication on a client accessing to its website, for example, an insurance company, a bank, etc., where the task type is a type of business service provided by the enterprise, for example, a task type corresponding to the insurance company is to purchase insurance, and a task type corresponding to the bank is to apply for loan.
The first database stores first attribute information of each first user, wherein the first attribute information comprises the region where the first user is located, total assets, net profits and business incomes, importance scores of each task type can be determined through the first attribute information and the task types, when a real-name authentication instruction set is created, real-name authentication flow nodes corresponding to different task types are different, and each flow node corresponds to authentication rules of a plurality of risk levels.
The generating the real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information includes:
a11, determining importance scores corresponding to the task types based on the task types and the first attribute information;
in this embodiment, a security score is determined according to the security requirement of the task type, an attribute score is determined according to the index value of each index item in the first attribute information, and the security score and the attribute score are integrated to obtain an importance score corresponding to the task type (the following steps B11-B13 describe the calculation process of the importance score in detail).
A12, determining an initial flow node corresponding to the task type based on a predetermined importance score and a mapping relation between the flow nodes;
in this embodiment, the predetermined mapping relationship between importance scores and flow nodes may be:
importance score 0-40: node 1, node 2, node 3;
importance scores 41-60: node 1, node 2, node 3, node 4;
importance score 61-80: node 1, node 2, node 3, node 4, node 5, node 6;
……
and determining the flow nodes required by creating the real-name authentication instruction set corresponding to the task type according to the mapping relation.
A13, generating a flow configuration interface based on the initial flow node, wherein the flow configuration interface comprises a flow node modification and/or confirmation area and an authentication rule set modification and/or confirmation area of each flow node, and the authentication rule set comprises authentication rules corresponding to each risk level;
in this embodiment, a corresponding authentication rule set is configured for each flow node in advance, where the authentication rule set includes authentication rules corresponding to each risk level, for example, in an identity image type confirmation node, the authentication rule corresponding to the first risk level (the level with the highest risk) is an original image, the authentication rule corresponding to the second risk level is an original image or a copy, the authentication rule corresponding to the third risk level is an identity image or an original image, a copy or a screen image (in the subsequent real-name authentication process, the type of the identity image may be determined by analyzing the difference between the pixel value of the identity image and the pixel value of the standard image).
A14, displaying the flow configuration interface to a client interface of the first user, receiving a real-name authentication flow configured by the first user at the flow configuration interface, and generating a sub-instruction set corresponding to each risk level based on the real-name authentication flow;
The process configuration interface displays initial process nodes corresponding to the task types and authentication rule sets corresponding to each initial process node, and the first user can add, delete and modify the process nodes in the process configuration interface, and also can modify the authentication rule sets under each process node, for example, the identity image acquisition path can be modified by a file system to be acquired by an interface.
And generating a sub instruction set corresponding to each risk level according to the node name, the node sequence and the rules corresponding to each risk level of the nodes after the modification by the first user. For example, for the first risk level, only the authentication rule corresponding to the first risk level in each node is used as a target rule, and the sub instruction set corresponding to the first risk level is generated according to the target rule of each node and the flow sequence of the nodes.
And A15, summarizing the sub instruction sets to obtain a real-name authentication instruction set corresponding to the task type.
And taking the generated sub instruction set corresponding to each risk level as a real-name authentication instruction set corresponding to the task type.
After the sub-instruction set corresponding to each risk level is generated based on the real-name authentication flow, the method further includes:
And executing the non-missing check of the key flow nodes and the order correctness check of the flow nodes on the real-name authentication flow.
In this embodiment, a standard flow node set and a standard flow sequence list corresponding to each task type are stored in advance, and through the standard flow node set and the standard flow sequence list, a critical flow node non-missing check and a flow node sequence correctness check can be executed.
The determining the importance score corresponding to the task type based on the task type and the first attribute information includes:
b11, calculating an attribute score corresponding to the task type based on the first attribute information;
in this embodiment, the attribute score corresponding to the task type is obtained by weighted summation (where the weights are predetermined) of the index values of the respective index items in the first attribute information.
B12, determining a security score corresponding to the task type according to a mapping relation between the task type and the security score;
in this embodiment, a mapping relationship between a task type and a security score is set according to security requirements of the task type, for example, if the security requirement of applying for loan is higher than that of purchasing insurance, the security score of applying for loan is higher than that of purchasing insurance.
And B13, calculating an importance score corresponding to the task type based on the attribute score and the security score.
The weights of the attribute scores and the safety scores are determined in advance, and the importance scores corresponding to the task types can be obtained by carrying out weighted summation on the attribute scores and the safety scores.
S2, receiving a real-name authentication request aiming at a target task type, sent by a second user, acquiring second attribute information of the second user from a second database, and determining a target risk level of the second user based on the second attribute information.
For example, if the target task type is to purchase insurance, the second user is the user who wants to purchase insurance.
The second database stores second attribute information of the user corresponding to each task type, wherein the second attribute information comprises gender, age, education degree, marital status, residence, occupation, residence change information, mobile phone number change information, occupation change information and the like of the user.
Experimental data confirm that: the change frequency of the information reflects the risk level of the user to a certain extent, the risk level of the user frequently changing the residence is higher than that of the user fixedly changing the residence, and the risk level of the user frequently changing the work is higher than that of the user doing one work for a long time.
The determining the target risk level of the second user based on the second attribute information includes:
c11, constructing a user portrait of the second user based on the second attribute information;
in this embodiment, the label corresponding to each index item in the second attribute information is determined, so as to further determine the user portrait of the second user (steps D11-D13 below describe the construction process of the user portrait in a refinement).
And C12, inputting the user portrait into a risk level identification model to obtain the target risk level of the second user.
The risk level identification model is a neural network model and is obtained through training sample data carrying labels, and the training process is the prior art and is not described herein.
The constructing a user portrait of the second user based on the second attribute information includes:
d11, obtaining the mapping relation between the index value corresponding to each index item in the second attribute information and the label;
in this embodiment, the mapping relationship between index values and labels is described using age and residence change information in index items as an example.
The mapping relationship between the index value corresponding to the age and the label is as follows:
teenagers under 18 years old;
18-30 years old, young;
31 years to 50 years old, middle-aged;
over 50 years old and older.
The mapping relationship between the index value corresponding to the residence change information and the label is as follows:
the residence is changed 0 times within 1 year, and the residence is not changed;
1-3 times of residence change within 1 year, and less residence change frequency;
the residence is changed for 4 times or more within 1 year, and the residence change frequency is high;
d12, determining target labels of index values corresponding to all index items in the second attribute information based on the mapping relation between the index values and the labels;
if the second attribute information of the second user is 25 years old, the sex is female, the residence is Shanghai, the occupation is a job member of an external enterprise, and the residence is changed 1 time within 1 year … …, the target labels of the index values corresponding to the index items of the user 1 are respectively young, female, first line city, white collar, and residence change frequency is … ….
D13, using the set of target labels as the user portrait of the second user.
And summarizing the target labels to obtain the user portrait of the second user.
S3, determining a target real-name authentication instruction set corresponding to the target task type, and determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level.
Through step S1, a corresponding real-name authentication instruction set may be created for each task type, a target real-name authentication instruction set corresponding to the second user may be determined based on the target task type, and a sub-instruction set corresponding to a target risk level in the target real-name authentication instruction set may be used as an initial authentication operation instruction set corresponding to the second user.
S4, acquiring first historical authentication data of each authentication channel in a plurality of authentication channels providing real-name authentication service in a first time period from a third database, determining target weights corresponding to a plurality of preset index items based on the first historical authentication data, and determining target authentication channels based on the preset index items and the target weights.
In this embodiment, the public security network authentication node is used to execute real-name authentication service, and is a core node in the real-name authentication process, where the node needs to obtain information of a person to be authenticated from household registration information of the public security network system, and compare whether the obtained information is consistent with information in an identity image uploaded by the person to be authenticated.
At present, a plurality of authentication channels can acquire household registration information in a public security network system for real-name authentication, however, the resource conditions of all the authentication channels are different, and the authentication accuracy is also different.
The first historical authentication data comprises resource information, response time, price and score of a server to which an authentication channel belongs, and the determining the target weights corresponding to a plurality of preset index items based on the first historical authentication data comprises the following steps:
e11, acquiring a first index value corresponding to each preset index item in a plurality of preset index items from the first historical authentication data, and taking the first index value as an independent variable;
in this embodiment, the first historical authentication data may be historical authentication data in the last month, and the preset index item includes a remaining memory, a CPU occupancy rate, a response time, and a price of a server to which the authentication channel belongs.
E12, taking the score in the first historical authentication data as a dependent variable;
and E13, acquiring a predetermined weight function, and determining the target weight corresponding to each preset index item based on the independent variable, the dependent variable and the weight function.
The weight function is y=a1+a2+a2+ … +an x n, wherein y is a score, x1, x2 and xn are respectively first index values of a first index item, a second index item and an nth index item in the preset index items, and a1, a2 and an are respectively target weights corresponding to the first index item, the second index item and the nth index item in the preset index items.
The determining the target authentication channel based on the preset index item and the target weight includes:
f11, acquiring second historical authentication data of each authentication channel in a second time period, acquiring second index values corresponding to each preset index item from the second historical authentication data, and calculating priority scores corresponding to each authentication channel based on the second index values and the target weights;
the second time period may be 24 hours recently, the second index value is an index value of each preset index item in the second historical authentication data, and the second index value and the corresponding target weight are input into the weight function to obtain a priority score corresponding to each authentication channel.
And F12, taking the authentication channel with the highest priority score as a target real-name authentication channel.
If the priority scores of a plurality of authentication channels are highest in parallel, randomly selecting one authentication channel as a target authentication channel.
S5, setting an authentication channel option in the initial authentication operation instruction set as the target authentication channel to obtain a target authentication operation instruction set, and carrying out real-name authentication on the second user by adopting the target authentication operation instruction set to obtain a real-name authentication result.
The initial authentication operation instruction set comprises an authentication channel option, the option is set as the target authentication channel, a target authentication operation instruction set can be obtained, and the target authentication channel is the optimal authentication channel, so that real-name authentication of the second user by adopting the target authentication operation instruction set can ensure that the authentication time is shortest and the error rate is lowest.
As can be seen from the above embodiments, in the real-name authentication method provided by the present invention, first, a real-name authentication instruction set corresponding to a task type is generated, where the real-name authentication instruction set includes a plurality of sub-instruction sets, and each sub-instruction set corresponds to a risk level; then, determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level of the second user; then, determining target weights corresponding to a plurality of preset index items based on first historical authentication data of each authentication channel, and determining target authentication channels based on the preset index items and the target weights; and finally, setting an authentication channel option in the initial authentication operation instruction set as a target authentication channel to obtain a target authentication operation instruction set, and carrying out real-name authentication on the second user by adopting the target authentication operation instruction set. The real-name authentication instruction sets corresponding to different task types are different, and for the same task type, the authentication operation instruction sets corresponding to users with different risk levels are different; according to the invention, the target weight of each preset index item is determined through the first historical authentication data, so that the determined target authentication channel is optimal, and the real-name authentication speed can be increased. Therefore, the invention improves the accuracy of real-name authentication and accelerates the speed of real-name authentication.
Fig. 2 is a schematic block diagram of a real-name authentication device according to an embodiment of the invention.
The real-name authentication apparatus 100 of the present invention may be mounted in an electronic device. Depending on the implemented functions, the real-name authentication device 100 may include a generating module 110, a receiving module 120, a determining module 130, an obtaining module 140, and an authentication module 150. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
the generating module 110 is configured to respond to a real-name authentication instruction set creation request carrying a task type sent by a first user, obtain first attribute information of the first user from a first database, and generate a real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information, where the real-name authentication instruction set includes a plurality of sub-instruction sets, and each sub-instruction set corresponds to a risk level.
The generating the real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information includes:
A21, determining importance scores corresponding to the task types based on the task types and the first attribute information;
a22, determining an initial flow node corresponding to the task type based on a predetermined importance score and a mapping relation between the flow nodes;
a23, generating a flow configuration interface based on the initial flow node, wherein the flow configuration interface comprises a flow node modification and/or confirmation area and an authentication rule set modification and/or confirmation area of each flow node, and the authentication rule set comprises authentication rules corresponding to each risk level;
a24, displaying the flow configuration interface to a client interface of the first user, receiving a real-name authentication flow configured by the first user at the flow configuration interface, and generating a sub-instruction set corresponding to each risk level based on the real-name authentication flow;
a25, summarizing the sub instruction sets to obtain a real-name authentication instruction set corresponding to the task type.
After the sub-instruction set corresponding to each risk level is generated based on the real-name authentication procedure, the generating module 110 is further configured to:
and executing the non-missing check of the key flow nodes and the order correctness check of the flow nodes on the real-name authentication flow.
The determining the importance score corresponding to the task type based on the task type and the first attribute information includes:
b21, calculating an attribute score corresponding to the task type based on the first attribute information;
b22, determining a security score corresponding to the task type according to a mapping relation between the task type and the security score;
and B23, calculating an importance score corresponding to the task type based on the attribute score and the security score.
The receiving module 120 is configured to receive a real-name authentication request for a target task type sent by a second user, obtain second attribute information of the second user from a second database, and determine a target risk level of the second user based on the second attribute information.
The determining the target risk level of the second user based on the second attribute information includes:
c21, constructing a user portrait of the second user based on the second attribute information;
and C22, inputting the user portrait into a risk level identification model to obtain the target risk level of the second user.
The constructing a user portrait of the second user based on the second attribute information includes:
D21, obtaining the mapping relation between the index value corresponding to each index item in the second attribute information and the label;
d22, determining target labels of index values corresponding to all index items in the second attribute information based on the mapping relation between the index values and the labels;
d23, using the set of target labels as the user portrait of the second user.
The determining module 130 is configured to determine a target real-name authentication instruction set corresponding to the target task type, and determine an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level.
The obtaining module 140 is configured to obtain, from a third database, first historical authentication data of each authentication channel in the plurality of authentication channels that provide real-name authentication services in a first period, determine a target weight corresponding to a plurality of preset index items based on the first historical authentication data, and determine a target authentication channel based on the preset index items and the target weight.
The determining the target weights corresponding to the plurality of preset index items based on the first historical authentication data comprises the following steps:
e21, acquiring a first index value corresponding to each preset index item in a plurality of preset index items from the first historical authentication data, and taking the first index value as an independent variable;
E22, taking the score in the first historical authentication data as a dependent variable;
and E23, acquiring a predetermined weight function, and determining the target weight corresponding to each preset index item based on the independent variable, the dependent variable and the weight function.
The determining the target authentication channel based on the preset index item and the target weight includes:
f21, acquiring second historical authentication data of each authentication channel in a second time period, acquiring second index values corresponding to each preset index item from the second historical authentication data, and calculating priority scores corresponding to each authentication channel based on the second index values and the target weights;
and F22, taking the authentication channel with the highest priority score as a target real-name authentication channel.
And the authentication module 150 is configured to set an authentication channel option in the initial authentication operation instruction set as the target authentication channel to obtain a target authentication operation instruction set, and perform real-name authentication on the second user by using the target authentication operation instruction set to obtain a real-name authentication result.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
The electronic device 1 is a device capable of automatically performing numerical calculation and/or information processing in accordance with a preset or stored instruction. The electronic device 1 may be a computer, a server group formed by a single network server, a plurality of network servers, or a cloud formed by a large number of hosts or network servers based on cloud computing, wherein the cloud computing is one of distributed computing, and is a super virtual computer formed by a group of loosely coupled computer sets.
In the present embodiment, the electronic device 1 includes, but is not limited to, a memory 11, a processor 12, and a network interface 13, which are communicably connected to each other via a system bus, and the memory 11 stores therein a real-name authentication program 10, the real-name authentication program 10 being executable by the processor 12. Fig. 3 shows only the electronic device 1 with components 11-13 and a real-name authentication procedure 10, it being understood by those skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the electronic device 1, and may include fewer or more components than shown, or may combine certain components, or a different arrangement of components.
Wherein the storage 11 comprises a memory and at least one type of readable storage medium. The memory provides a buffer for the operation of the electronic device 1; the readable storage medium may be a non-volatile storage medium such as flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the readable storage medium may be an internal storage unit of the electronic device 1, such as a hard disk of the electronic device 1; in other embodiments, the nonvolatile storage medium may also be an external storage device of the electronic device 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device 1. In this embodiment, the readable storage medium of the memory 11 is generally used to store an operating system and various application software installed in the electronic device 1, for example, store codes of the real-name authentication program 10 in an embodiment of the present invention, and the like. Further, the memory 11 may be used to temporarily store various types of data that have been output or are to be output.
Processor 12 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 12 is typically used to control the overall operation of the electronic device 1, such as performing control and processing related to data interaction or communication with other devices, etc. In this embodiment, the processor 12 is configured to execute the program code or process data stored in the memory 11, for example, execute the real-name authentication program 10.
The network interface 13 may comprise a wireless network interface or a wired network interface, the network interface 13 being used for establishing a communication connection between the electronic device 1 and a client (not shown).
Optionally, the electronic device 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device 1 and for displaying a visual user interface.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
The real-name authentication program 10 stored in the memory 11 of the electronic device 1 is a combination of a plurality of instructions, and when executed in the processor 12, the above-described real-name authentication method can be implemented.
Specifically, the specific implementation method of the processor 12 to the real-name authentication procedure 10 described above may refer to the description of the related steps in the corresponding embodiment of fig. 1, which is not repeated herein.
Further, the modules/units integrated in the electronic device 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. The computer readable medium may be nonvolatile or nonvolatile. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
The computer-readable storage medium has stored thereon a real-name authentication program 10, the real-name authentication program 10 being executable by one or more processors to implement the real-name authentication method described above.
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the system claims can also be implemented by means of software or hardware by means of one unit or means. The terms second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (9)

1. A real name authentication method, the method comprising:
responding to a real-name authentication instruction set creation request carrying a task type sent by a first user, acquiring first attribute information of the first user from a first database, and generating a real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information, wherein the real-name authentication instruction set comprises a plurality of sub-instruction sets, and each sub-instruction set corresponds to one risk level;
receiving a real-name authentication request aiming at a target task type sent by a second user, acquiring second attribute information of the second user from a second database, and determining a target risk level of the second user based on the second attribute information;
determining a target real-name authentication instruction set corresponding to the target task type, and determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level;
Acquiring first historical authentication data of each authentication channel in a plurality of authentication channels providing real-name authentication service in a first time period from a third database, determining target weights corresponding to a plurality of preset index items based on the first historical authentication data, and determining target authentication channels based on the preset index items and the target weights;
setting an authentication channel option in the initial authentication operation instruction set as the target authentication channel to obtain a target authentication operation instruction set, and performing real-name authentication on the second user by adopting the target authentication operation instruction set to obtain a real-name authentication result;
the generating the real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information includes: determining importance scores corresponding to the task types based on the task types and the first attribute information; determining an initial flow node corresponding to the task type based on a predetermined importance score and a mapping relation between the flow nodes; generating a flow configuration interface based on the initial flow node, wherein the flow configuration interface comprises a flow node modification and/or confirmation area and an authentication rule set modification and/or confirmation area of each flow node, and the authentication rule set comprises authentication rules corresponding to each risk level; displaying the flow configuration interface to a client interface of the first user, receiving a real-name authentication flow configured by the first user at the flow configuration interface, and generating a sub-instruction set corresponding to each risk level based on the real-name authentication flow; and summarizing the sub instruction sets to obtain a real-name authentication instruction set corresponding to the task type.
2. The real-name authentication method according to claim 1, wherein the determining the importance score corresponding to the task type based on the task type and the first attribute information includes:
calculating an attribute score corresponding to the task type based on the first attribute information;
determining a security score corresponding to a task type according to a mapping relation between the task type and the security score;
and calculating an importance score corresponding to the task type based on the attribute score and the security score.
3. The real-name authentication method according to claim 1, wherein the determining the target risk level of the second user based on the second attribute information includes:
constructing a user portrait of the second user based on the second attribute information;
and inputting the user portrait into a risk level identification model to obtain the target risk level of the second user.
4. The real-name authentication method according to claim 1, wherein determining the target weights corresponding to the plurality of preset index items based on the first historical authentication data comprises:
acquiring a first index value corresponding to each preset index item in a plurality of preset index items from the first historical authentication data, and taking the first index value as an independent variable;
Taking the score in the first historical authentication data as a dependent variable;
and acquiring a predetermined weight function, and determining the target weight corresponding to each preset index item based on the independent variable, the dependent variable and the weight function.
5. The real-name authentication method according to claim 1, wherein the determining a target authentication channel based on the preset index item and the target weight comprises:
acquiring second historical authentication data of each authentication channel in a second time period, acquiring second index values corresponding to each preset index item from the second historical authentication data, and calculating priority scores corresponding to each authentication channel based on the second index values and the target weights;
and taking the authentication channel with the highest priority score as a target real-name authentication channel.
6. The real-name authentication method according to claim 1, wherein after the generation of the sub-instruction set corresponding to each risk level based on the real-name authentication flow, the method further comprises:
and executing the non-missing check of the key flow nodes and the order correctness check of the flow nodes on the real-name authentication flow.
7. A real name authentication apparatus, the apparatus comprising:
The generation module is used for responding to a real-name authentication instruction set creation request carrying a task type sent by a first user, acquiring first attribute information of the first user from a first database, and generating a real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information, wherein the real-name authentication instruction set comprises a plurality of sub instruction sets, and each sub instruction set corresponds to one risk level;
the receiving module is used for receiving a real-name authentication request aiming at a target task type sent by a second user, acquiring second attribute information of the second user from a second database, and determining a target risk level of the second user based on the second attribute information;
the determining module is used for determining a target real-name authentication instruction set corresponding to the target task type, and determining an initial authentication operation instruction set corresponding to the second user from the target real-name authentication instruction set based on the target risk level;
the acquisition module is used for acquiring first historical authentication data of each authentication channel in a plurality of authentication channels providing real-name authentication service in a first time period from a third database, determining target weights corresponding to a plurality of preset index items based on the first historical authentication data, and determining target authentication channels based on the preset index items and the target weights;
The authentication module is used for setting the authentication channel options in the initial authentication operation instruction set as the target authentication channels to obtain a target authentication operation instruction set, and carrying out real-name authentication on the second user by adopting the target authentication operation instruction set to obtain a real-name authentication result;
the generating the real-name authentication instruction set corresponding to the task type based on the task type and the first attribute information includes: determining importance scores corresponding to the task types based on the task types and the first attribute information; determining an initial flow node corresponding to the task type based on a predetermined importance score and a mapping relation between the flow nodes; generating a flow configuration interface based on the initial flow node, wherein the flow configuration interface comprises a flow node modification and/or confirmation area and an authentication rule set modification and/or confirmation area of each flow node, and the authentication rule set comprises authentication rules corresponding to each risk level; displaying the flow configuration interface to a client interface of the first user, receiving a real-name authentication flow configured by the first user at the flow configuration interface, and generating a sub-instruction set corresponding to each risk level based on the real-name authentication flow; and summarizing the sub instruction sets to obtain a real-name authentication instruction set corresponding to the task type.
8. An electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a real-name authentication program executable by the at least one processor to enable the at least one processor to perform the real-name authentication method as claimed in any one of claims 1 to 6.
9. A computer-readable storage medium having stored thereon a real-name authentication program executable by one or more processors to implement the real-name authentication method of any of claims 1 to 6.
CN202110933975.XA 2021-08-13 2021-08-13 Real name authentication method, device, electronic equipment and readable storage medium Active CN113657910B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110933975.XA CN113657910B (en) 2021-08-13 2021-08-13 Real name authentication method, device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110933975.XA CN113657910B (en) 2021-08-13 2021-08-13 Real name authentication method, device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN113657910A CN113657910A (en) 2021-11-16
CN113657910B true CN113657910B (en) 2023-09-15

Family

ID=78480322

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110933975.XA Active CN113657910B (en) 2021-08-13 2021-08-13 Real name authentication method, device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN113657910B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105591745A (en) * 2014-11-07 2016-05-18 中国银联股份有限公司 Method and system for performing identity authentication on user using third-party application
CN109829273A (en) * 2019-02-19 2019-05-31 杭州数梦工场科技有限公司 A kind of identity identifying method, device, system, equipment and readable storage medium storing program for executing
CN110808978A (en) * 2019-10-31 2020-02-18 支付宝(杭州)信息技术有限公司 Real name authentication method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101712742B1 (en) * 2015-10-15 2017-03-06 라인 가부시키가이샤 System and method for authenticating user using history of user
SG10201800338TA (en) * 2018-01-15 2019-08-27 Mastercard International Inc User authentication systems and methods

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105591745A (en) * 2014-11-07 2016-05-18 中国银联股份有限公司 Method and system for performing identity authentication on user using third-party application
CN109829273A (en) * 2019-02-19 2019-05-31 杭州数梦工场科技有限公司 A kind of identity identifying method, device, system, equipment and readable storage medium storing program for executing
CN110808978A (en) * 2019-10-31 2020-02-18 支付宝(杭州)信息技术有限公司 Real name authentication method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
双因素身份认证应用技术的研究及APP客户端的研发;郝金旭;;电脑迷(第09期);全文 *

Also Published As

Publication number Publication date
CN113657910A (en) 2021-11-16

Similar Documents

Publication Publication Date Title
CN108133013B (en) Information processing method, information processing device, computer equipment and storage medium
WO2019169756A1 (en) Product recommendation method and apparatus, and storage medium
WO2021174944A1 (en) Message push method based on target activity, and related device
US8396935B1 (en) Discovering spam merchants using product feed similarity
CN112183091A (en) Question and answer pair generation method and device, electronic equipment and readable storage medium
WO2022089190A1 (en) Product recommendation method and apparatus, and electronic device and readable storage medium
CN113946690A (en) Potential customer mining method and device, electronic equipment and storage medium
CN112597135A (en) User classification method and device, electronic equipment and readable storage medium
CN114663198A (en) Product recommendation method, device and equipment based on user portrait and storage medium
CN112507212A (en) Intelligent return visit method and device, electronic equipment and readable storage medium
CN111881158A (en) Management report data processing method and device, computer system and readable storage medium
CN113868529A (en) Knowledge recommendation method and device, electronic equipment and readable storage medium
CN113178071B (en) Driving risk level identification method and device, electronic equipment and readable storage medium
CN113344433A (en) Product matching method and device, electronic equipment and readable storage medium
CN113344673A (en) Product pushing method and device, electronic equipment and storage medium
CN112511632A (en) Object pushing method, device and equipment based on multi-source data and storage medium
CN112527280A (en) Interface display method and device, server and readable storage medium
CN113657910B (en) Real name authentication method, device, electronic equipment and readable storage medium
CN111429085A (en) Contract data generation method and device, electronic equipment and storage medium
CN115204971B (en) Product recommendation method, device, electronic equipment and computer readable storage medium
CN116629423A (en) User behavior prediction method, device, equipment and storage medium
CN113610580B (en) Product recommendation method and device, electronic equipment and readable storage medium
CN113706249B (en) Data recommendation method and device, electronic equipment and storage medium
CN113537806A (en) Abnormal user identification method and device, electronic equipment and readable storage medium
CN114925275A (en) Product recommendation method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant