CN105306425B - Method and device for authenticating account number attribution - Google Patents

Method and device for authenticating account number attribution Download PDF

Info

Publication number
CN105306425B
CN105306425B CN201410337058.5A CN201410337058A CN105306425B CN 105306425 B CN105306425 B CN 105306425B CN 201410337058 A CN201410337058 A CN 201410337058A CN 105306425 B CN105306425 B CN 105306425B
Authority
CN
China
Prior art keywords
user
account
request message
temporary identifier
authentication request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410337058.5A
Other languages
Chinese (zh)
Other versions
CN105306425A (en
Inventor
刘杰
段文文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410337058.5A priority Critical patent/CN105306425B/en
Publication of CN105306425A publication Critical patent/CN105306425A/en
Application granted granted Critical
Publication of CN105306425B publication Critical patent/CN105306425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a device for authenticating account number attribution, and belongs to the field of internet communication. The method comprises the following steps: acquiring temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification; calculating an attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier, wherein the attribution score is used for indicating the possibility that the account number belongs to the user corresponding to the temporary identifier; and determining that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score. The device comprises: the device comprises an acquisition module, a calculation module and a determination module. The invention can maintain the benefits of the user and correctly judge the attribution of the account.

Description

Method and device for authenticating account number attribution
Technical Field
The invention relates to the field of internet communication, in particular to a method and a device for authenticating account number attribution.
Background
The user can perform various activities in the internet, and the activities can be online chatting or online shopping and the like. In order to maintain the interests of users, the website and the client only allow users with account numbers and passwords to log in for activities such as online chatting or shopping. And as black industrial chains such as phishing websites and trojans rise, the account number used by the user is leaked when the user performs the activities, and at the moment, the user requests the server to authenticate the attribution of the account number so that the server judges the account number to the user.
Currently, the server may authenticate the attribution of the account requested to be authenticated by the user as follows: the server receives a request message of account attribution authentication sent by a user, wherein the request message carries an account needing authentication and at least one certification material. The server acquires the historical record information corresponding to the account, and for each certification material, if the certification material is completely the same as some piece of information in the historical record information, the score of the certification material is set as a preset numerical value, otherwise, the score of the certification material is set as 0. And the server calculates a total score according to the score of each piece of evidence, and if the total score exceeds a preset threshold value, the user is determined to be the real owner of the account and the account is attributed to the user.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems:
and if the attribution score calculated by the server for the user exceeds a certain threshold value, judging that the account belongs to the user. If the preset threshold is small, the server can easily determine the account to other users except the true owner of the account. If the preset threshold is large, the true owner of the account may forget some information and may not submit enough evidence, so that it may be difficult for the server to determine the account to the true owner.
Disclosure of Invention
In order to maintain the benefit of a user and correctly judge account attribution, the invention provides a method and a device for authenticating account attribution. The technical scheme is as follows:
a method of authenticating account attribution, the method comprising:
acquiring temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification;
calculating an attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier, wherein the attribution score is used for indicating the possibility that the account number belongs to the user corresponding to the temporary identifier;
and determining that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score.
An apparatus to authenticate account attribution, the apparatus comprising:
the system comprises an acquisition module, a management module and a management module, wherein the acquisition module is used for acquiring temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification;
the calculation module is used for calculating an attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier, and the attribution score is used for indicating the possibility that the account number belongs to the user corresponding to the temporary identifier;
and the determining module is used for determining that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score.
In the embodiment of the invention, the server acquires the temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and the first authentication information sent by each of the plurality of users, calculates the attribution score corresponding to each temporary identification according to the first authentication information corresponding to each temporary identification, and determines that the account is attributed to the user corresponding to the temporary identification with the maximum attribution score. Therefore, the benefits of the user can be maintained, and the account attribution can be correctly judged.
Drawings
Fig. 1 is a flowchart of a method for authenticating account attribution according to embodiment 1 of the present invention;
fig. 2-1 is a flowchart of a method for authenticating account attribution according to embodiment 2 of the present invention;
fig. 2-2 are schematic diagrams of an account complaint interface provided in embodiment 2 of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for authenticating account attribution according to embodiment 3 of the present invention;
fig. 4 is a schematic structural diagram of a server according to embodiment 4 of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Example 1
The embodiment of the invention provides a method for authenticating account number attribution, and referring to fig. 1, the method comprises the following steps:
step 101: the server acquires temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification.
Step 102: and the server calculates the attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier, wherein the attribution score is used for indicating the possibility that the account number belongs to the user corresponding to the temporary identifier.
Step 103: the server determines that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score.
In the embodiment of the invention, the server acquires the temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and the first authentication information sent by each of the plurality of users, calculates the attribution score corresponding to each temporary identification according to the first authentication information corresponding to each temporary identification, and determines that the account is attributed to the user corresponding to the temporary identification with the maximum attribution score. Therefore, the benefits of the user can be maintained, and the account attribution can be correctly judged.
Example 2
The embodiment of the invention provides a method for authenticating account number attribution. Referring to fig. 2-1, a method provided by an embodiment of the present invention includes:
step 201: receiving and storing an authentication request message of a user, wherein the authentication request message carries first authentication information and an account number of the user.
When finding that the account of the user is stolen by others, the user can open a complaint interface on the terminal, wherein the complaint interface comprises at least one prompt message for prompting the user to fill in authentication information, the authentication information comprises at least one piece of sub-information, and the sub-information can be the name, age, account application date, frequently-contacted friend accounts and the like of the user. The user can fill and write sub information corresponding to each prompt message in the application interface according to each prompt message, or select a part of prompt messages, and fill and write corresponding sub information in the complaint interface according to the selected prompt messages, wherein the sub information filled in the complaint interface forms the first authentication information. After the user fills in the information, the user can send an authentication request message to the server through the terminal, wherein the authentication request message carries an account number which the user needs to authenticate and first authentication information which the user fills in a complaint interface.
The method comprises the steps that a server receives an authentication request message sent by a user, wherein the authentication request message carries first authentication information and an account number of the user; searching an account list according to the account, if the account does not exist in the account list, determining that an authentication request message carrying the account is received for the first time, allocating a timer and starting timing by the timer, storing the corresponding relation between the account and the timer in the account list, allocating a temporary identifier for the user, and storing the temporary identifier and the authentication request message in the corresponding relation between the temporary identifier and the authentication request message; if the account exists in the account list, a temporary identifier is allocated to the user, and the temporary identifier and the authentication request message are stored in the corresponding relation between the temporary identifier and the authentication request message.
For example: the method includes that a user 1 finds that an account of the user 1 is stolen by others, the user 1 can open a complaint interface on a terminal, as shown in fig. 2-2, the complaint interface includes prompt information for prompting the user to fill in first authentication information 1, the first authentication information 1 includes a name, an age, an account application date and a frequently-contacted friend account of the user, and the user 1 fills in the authentication information 1 on the complaint interface according to the prompt, and the method includes the following steps: the name of the friend account is Li IV, the birthday is 9.9.1999, the account application date is 1.1.2011, and the frequently-contacted friend account is 123456.
The server receives an authentication request message 1 sent by the user 1, where the authentication request message 1 carries the account and sub information included in the first authentication information 1 of the user 1: the name of the friend account is Li IV, the age of the friend account is 15 years old, the date of the account application is 2011, 1 month and 1 day, and the number of commonly contacted friend accounts is 123456. The server searches an account list, and if the account does not exist in the account list, it is determined that an authentication request message carrying the account is received for the first time, a timer 1 is allocated and starts to count time by the timer 1, the corresponding relationship between the account and the timer is stored in the account list, a temporary identifier ID1 is allocated to the user 1, and the temporary identifier ID1 and the authentication request message 1 are stored in the corresponding relationship between the temporary identifier and the authentication request message as shown in table 1.
TABLE 1
Temporary identifier Authentication request message
ID1 Authentication request message 1
…… ……
Step 202: and if the authentication request message carrying the account number is received for the first time, timing is started, and the authentication request messages of other users are continuously received and stored.
Within the time counted by the timer, one or more other users may request to authenticate the attribution of the account and send an authentication request message to the server, where the authentication request message sent by each of the other users carries the account. When the server receives an authentication request message of another user, the server allocates a temporary identifier for the other user, and stores the temporary identifier of the other user and the authentication request message in the corresponding relation between the temporary identifier and the authentication request message.
Step 203: and when the timed time reaches a preset time, acquiring each authentication request message carrying the account from the stored authentication request messages.
The method comprises the following steps: in the account list, when the time counted by the timer allocated in step 201 reaches a preset time length, the account corresponding to the timer is acquired, and each authentication request message carrying the account is acquired from the corresponding relationship between the temporary identifier and the authentication request message according to the account.
Because different users cannot simultaneously send authentication request messages to the server to request for authenticating the account, the server receives the authentication request message carrying a certain account for the first time, timing is started, the timing time receives and stores the authentication request message carrying the account sent by other users within the preset time, and thus the user to which the account belongs can be judged according to the authentication information of a plurality of users.
For example, suppose that, within a preset time, the user 2 and the user 3 request to authenticate the attribution of the account, first, the user 2 sends an authentication request message to the server, the server receives the authentication request message 2 of the user 2, searches an account list according to the account carried in the authentication request message 2, finds that the account exists in the account list, assigns a temporary identifier ID2 to the user 2, and stores the temporary identifier ID2 of the user 2 and the authentication request message 2 in the corresponding relationship between the temporary identifier and the authentication request message as shown in table 1. Then, the user 3 sends an authentication request message to the server, the server receives the authentication request message 3 of the user 3, searches an account list according to the account carried in the authentication request message 3, finds that the account exists in the account list, assigns a temporary identifier ID3 to the user 3, stores the temporary identifier ID3 of the user 3 and the authentication request message 3 in the corresponding relationship between the temporary identifier and the authentication request message shown in table 1, and obtains the result shown in table 2.
TABLE 2
Temporary identifier Authentication request message
ID1 Authentication request message 1
ID2 Authentication request message 2
ID3 Authentication request message 3
…… ……
In the account list, when the time counted by the timer 1 reaches a preset time length, an account corresponding to the timer 1 is acquired, and according to the account, an authentication request message carrying the account is acquired from the corresponding relationship between the temporary identifier and the authentication request message shown in table 2, including an authentication request message 1, an authentication request message 2, and an authentication request message 3.
Step 204: and acquiring the temporary identifier of the user corresponding to each authentication request message, and respectively acquiring the first authentication information corresponding to the temporary identifier of each user from the authentication request message of each user.
Specifically, according to each authentication request message carrying the account, a temporary identifier of a user corresponding to each authentication request message is obtained from a corresponding relationship between the temporary identifier and the authentication request message, first authentication information of each user is extracted from each authentication request message, and the first authentication information of each user is respectively used as first authentication information corresponding to the temporary identifier of each user.
For example, from the correspondence between the temporary identifier and the authentication request message as shown in table 2, the temporary identifier ID1 of the user 1 corresponding to the authentication request message 1, the temporary identifier ID2 of the user 2 corresponding to the authentication request message 2, and the temporary identifier ID3 of the user 3 corresponding to the authentication request message 3 are acquired. Authentication information 1 corresponding to the temporary identification ID1 of the user 1, authentication information 2 corresponding to the temporary identification ID2 of the user 2, and authentication information 3 corresponding to the temporary identification ID3 of the user 3 are extracted from the authentication request message 1, the authentication request message 2, and the authentication request message 3, respectively.
Step 205: and acquiring historical record information corresponding to the account number according to the account number.
The history information corresponding to the account includes personal attribute information and history behavior records that the real owner of the account has filled in, the personal attribute information may be information such as name, age, occupation and gender of the real owner of the account, and the history behavior records may be information such as business information that the real owner of the account has used, location information that the real owner of the account has logged in, published log information, and accounts of friends that the real owner of the account has contacted.
For example, according to the account, corresponding history information is acquired, and the history information includes that the name of the true owner of the account is "lisi", the age is "25 years", the date of applying for the account is 2011, 3 and 1, and 123457 exist in friend accounts which are frequently contacted.
Step 206: and calculating the redundancy rate between each piece of sub information and the historical information, wherein the sub information and the historical information are included in the first authentication information corresponding to the temporary identification, and the redundancy rate is used for indicating the same degree between the sub information and the historical information.
Specifically, for each piece of sub information included in the first authentication information, the information corresponding to the piece of sub information is found from the history information, the same characters between the piece of sub information and the found information are obtained, the ratio between the number of the same characters and the number of the characters included in the found information is calculated, and the ratio is used as the redundancy rate between the piece of sub information and the history information.
For example, if the name of the sub information 1 included in the authentication information 1 corresponding to the temporary identification ID1 of the user 1 is "lisi", and the corresponding information "lisi" of the name in the history information is found, the number of characters that are identical between the sub information and the found history information is 1, the number of characters included in the found information is 2, and the ratio of the number of characters to the number of characters is 0.5, so the error redundancy rate of the sub information is 50%, the error redundancy rate of each piece of sub information is calculated for each piece of other sub information in this way, the error redundancy rate of the age is 50%, the error redundancy rate of the application date is 83.3%, and the error redundancy rate of the frequently contacted friend account is 83.3%.
Step 207: and acquiring the redundancy rate range to which the redundancy rate of each piece of calculated sub information belongs.
For example, for the sub-information included in the authentication information 1 corresponding to the temporary identification ID1 of the user 1, the error redundancy rate of the name is 50%, the range of error redundancy rates is 40% to 60%, the error redundancy rate of the age is 50%, the range of error redundancy rates is 40% to 60%, the error redundancy rate of the application account date is 83.3%, the range of error redundancy rates is 80% to 100%, and the error redundancy rate of the frequently contacted friend account is 83.3%, and the range of error redundancy rates is 80% to 100%.
Step 208: and acquiring a corresponding score of each piece of sub information from the corresponding relation between the redundancy rate range and the score according to the acquired redundancy rate range of each piece of sub information.
The system is configured with a correspondence relationship between the error redundancy rate range and the score in advance, as shown in table 3. And then, according to the redundancy rate range of each piece of sub information, acquiring a corresponding score in the list, and taking the score corresponding to each piece of sub information as the score of each piece of sub information.
For example, the sub information included in the authentication information 1 of the user 1 has a name error redundancy rate of 50% and belongs to an error redundancy rate range of 40% to 60%, and a corresponding score of 3 is obtained from the correspondence between the error redundancy rate range and the score shown in table 3 based on the error redundancy rate range of 40% to 60%. The error redundancy rate of age is 50%, the range of the error redundancy rate is 40% -60%, the corresponding score is 3 according to the range of the error redundancy rate of 40% -60%, the error redundancy rate of the date of application for the account is 83.3%, the range of the error redundancy rate of 80% -100%, and the corresponding score is 5 according to the range of the error redundancy rate of 80% -100%, wherein the corresponding score is obtained from the corresponding relationship between the range of the error redundancy rate and the score shown in the table 3. The error redundancy rate of the frequently contacted friend account is 83.3%, the frequently contacted friend account belongs to an error redundancy rate range of 80% -100%, and a corresponding score of 5 is obtained from the corresponding relation between the error redundancy rate range and the score shown in the table 3 according to the error redundancy rate range of 80% -100%.
TABLE 3
Redundancy rate range Score of
0%-20% 1
20%-40% 2
40%-60% 3
60%-80% 4
80%-100% 5
Step 209: and performing summation operation on the obtained scores of each piece of sub information to obtain an attribution score corresponding to the temporary identifier.
For the obtained temporary identifier of each user, the processing is performed according to the above steps 205 to 208, and the attribution score corresponding to the temporary identifier of each user is obtained.
For example, for the authentication information 1 of the user 1, the scores of the acquired pieces of sub information are 3, 5, and 5, respectively, the scores of the acquired pieces of sub information are summed to obtain a score 16, and the score 16 is used as the attribution score corresponding to the temporary identification ID1 of the user 1. The user 2 and the user 3 are also processed according to the above steps 205 to 208, and the attribution score corresponding to the temporary identity ID2 of the user 2 is 17, and the attribution score corresponding to the temporary identity ID3 of the user 3 is 14.
Step 210: and determining that the account number belongs to the user corresponding to the temporary identifier with the maximum attribution score.
For example, for the users 1, 2, and 3 who apply for attribution authentication to the account, if the attribution score corresponding to the temporary identifier ID1 of the user 1 is 16, the attribution score corresponding to the temporary identifier ID2 of the user 2 is 17, and the attribution score corresponding to the temporary identifier ID3 of the user 3 is 14, the user 2 corresponding to the temporary identifier ID2 is determined as having the highest attribution score, and therefore, the account is determined to be attributed to the user 2 corresponding to the temporary identifier ID 2.
And when the account is determined to belong to the user corresponding to the temporary identifier with the maximum attribution score, notifying the corresponding user according to the temporary identifier with the maximum attribution score.
After the account attribution authentication is finished, if a user disagrees with the authentication result, a complaint interface can be opened on the terminal, the complaint interface comprises at least one prompt message for prompting the user to fill in second authentication information, the user can fill in new authentication information on the application interface and send an disagreement request message to the server to request the server to authenticate the attribution of the account again, and the specific process is as follows.
Step 211: and receiving an objection request message sent by the user, wherein the objection request message carries second authentication information.
Step 212: and according to second authentication information sent by the user, recalculating the attribution score of the user, and determining that the account is attributed to the user corresponding to the temporary identifier with the maximum attribution score.
After receiving the objection request message, the server recalculates the attribution score of the user according to the methods 202 to 208, and compares the attribution scores again to determine that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score.
In a preset time after determining that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score, if an objection request message for the account sent by other users is not received, deleting a record containing the account from the account list, acquiring an authentication request message carrying the account, and deleting a record containing the acquired authentication request message from a corresponding relation between the temporary identifier and the authentication request message.
In the embodiment of the invention, the server acquires the temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and the authentication information sent by each user of the plurality of users, calculates the attribution score corresponding to each temporary identification according to the authentication information corresponding to each temporary identification, and determines that the account is attributed to the user corresponding to the temporary identification with the maximum attribution score. Therefore, the benefits of the user can be maintained, and the account attribution can be correctly judged.
Example 3
Referring to fig. 3, an embodiment of the present invention provides an apparatus for authenticating account attribution. The method comprises the following steps:
an obtaining module 301, configured to obtain temporary identifiers of multiple users requesting to authenticate affiliations of the same account and first authentication information corresponding to each temporary identifier;
a calculating module 302, configured to calculate, according to the first authentication information corresponding to each temporary identifier, an attribution score corresponding to each temporary identifier, where the attribution score is used to indicate a possibility that the account belongs to a user corresponding to the temporary identifier;
a first determining module 303, configured to determine that the account belongs to the user corresponding to the temporary identifier with the largest attribution score.
Preferably, the obtaining module 301 includes:
the system comprises a first obtaining unit, a second obtaining unit and a third obtaining unit, wherein the first obtaining unit is used for obtaining at least one authentication request message which is received in a first time period and carries the same account number, each authentication request message in the at least one authentication request message also carries first authentication information of a user, the starting time of the first time period is the time when the authentication request message carrying the account number is received for the first time, and the time length is preset time length;
a second obtaining unit, configured to obtain the temporary identifier of the user corresponding to each authentication request message, and obtain the first authentication information of each user from each authentication request message, respectively, where the first authentication information of each user is used as the first authentication information corresponding to the temporary identifier of each user.
Preferably, the first acquiring unit includes:
the receiving subunit is used for receiving and storing an authentication request message of a user, wherein the authentication request message carries authentication information and an account number of the user;
the timing subunit is used for starting timing if receiving the authentication request message carrying the account for the first time, and continuously receiving and storing the authentication request messages of other users;
and the first obtaining subunit is configured to obtain, when the timed time reaches a preset time length, each authentication request message carrying the account from the stored authentication request messages.
Preferably, the calculation module 302 includes:
a third obtaining unit, configured to obtain, according to the account, history information corresponding to the account;
a first calculation unit configured to calculate a redundancy rate between each piece of sub information included in first authentication information corresponding to the temporary identifier and the history information, wherein the redundancy rate is used to indicate a degree of identity between the piece of sub information and the history information;
and the second calculating unit is used for calculating the attribution score corresponding to the temporary identifier according to the calculated redundancy rate of each piece of sub information.
Preferably, the second calculation unit includes:
a second acquiring subunit, configured to acquire a redundancy rate range to which each of the calculated redundancy rates belongs;
the third acquisition subunit is used for acquiring corresponding scores from the corresponding relation between the error redundancy rate range and the scores according to each acquired error redundancy rate range;
and the summation subunit is used for carrying out summation operation on the obtained scores of each piece of sub information to obtain the attribution score corresponding to the temporary identifier.
Preferably, the apparatus further comprises:
and the second determining module is used for receiving an objection request message sent by a user, wherein the objection request message carries second authentication information, recalculating the attribution score corresponding to the temporary identifier of the user according to the first authentication information and the second authentication information of the user, and determining that the account number belongs to the user corresponding to the temporary identifier with the largest attribution score.
In the embodiment of the invention, the server acquires the temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and the first authentication information sent by each of the plurality of users, calculates the attribution score corresponding to each temporary identification according to the first authentication information corresponding to each temporary identification, and determines that the account is attributed to the user corresponding to the temporary identification with the maximum attribution score. Therefore, the benefits of the user can be maintained, and the account attribution can be correctly judged.
Example 4
Fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention. Server 1900 may vary widely by configuration or performance, and may include one or more Central Processing Units (CPUs) 1922 (e.g., one or more processors) and memory 1932, one or more storage media 1930 (e.g., one or more mass storage devices) storing applications 1942 or data 1944. Memory 1932 and storage medium 1930 can be, among other things, transient or persistent storage. The program stored in the storage medium 1930 may include one or more modules (not shown), each of which may include a series of instructions operating on a server. Still further, a central processor 1922 may be provided in communication with the storage medium 1930 to execute a series of instruction operations in the storage medium 1930 on the server 1900.
The video server 1900 may also include one or more power supplies 1926, one or more wired or wireless network interfaces 1950, one or more input-output interfaces 1958, one or more keyboards 1956, and/or one or more operating systems 1941, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
Video server 1900 may include memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for:
acquiring temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification;
calculating an attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier, wherein the attribution score is used for indicating the possibility that the account number belongs to the user corresponding to the temporary identifier;
and determining that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score.
The acquiring temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification comprises the following steps:
acquiring at least one authentication request message carrying the same account number and received in a first time period, wherein each authentication request message in the at least one authentication request message also carries first authentication information of a user, and the starting time of the first time period is the time when the authentication request message carrying the account number is received for the first time and the time length is preset time length;
and acquiring the temporary identifier of the user corresponding to each authentication request message, acquiring the first authentication information of each user from each authentication request message respectively, and taking the first authentication information of each user as the first authentication information corresponding to the temporary identifier of each user respectively.
The acquiring at least one authentication request message carrying the same account received in the first time period includes:
receiving and storing an authentication request message of a user, wherein the authentication request message carries authentication information and an account number of the user;
if the authentication request message carrying the account number is received for the first time, timing is started, and the authentication request messages of other users are continuously received and stored;
and when the timing time reaches a preset time length, acquiring each authentication request message carrying the account from the stored authentication request messages.
The calculating the attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier includes:
acquiring historical record information corresponding to the account according to the account;
calculating the redundancy rate between each piece of sub information included by the first authentication information corresponding to the temporary identifier and the historical information, wherein the redundancy rate is used for indicating the same degree between the sub information and the historical information;
and calculating the attribution score corresponding to the temporary identifier according to the calculated redundancy rate of each piece of sub information.
The calculating the attribution score corresponding to the temporary identifier according to the calculated redundancy rate of each piece of sub information comprises:
acquiring the redundancy rate range to which each calculated redundancy rate belongs;
according to each acquired error redundancy rate range, acquiring a corresponding score from the corresponding relation between the error redundancy rate range and the score;
and performing summation operation on the obtained scores of each piece of sub information to obtain the attribution score corresponding to the temporary identifier.
The method further comprises the following steps:
receiving an objection request message sent by a user, wherein the objection request message carries second authentication information, recalculating an attribution score corresponding to the temporary identifier of the user according to the first authentication information and the second authentication information of the user, and determining that the account number belongs to the user corresponding to the temporary identifier with the largest attribution score.
In the embodiment of the invention, the server acquires the temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and the first authentication information sent by each of the plurality of users, calculates the attribution score corresponding to each temporary identification according to the first authentication information corresponding to each temporary identification, and determines that the account is attributed to the user corresponding to the temporary identification with the maximum attribution score. Therefore, the benefits of the user can be maintained, and the account attribution can be correctly judged.
In the embodiment of the present invention, since it can be understood by those skilled in the art that all or part of the steps for implementing the above embodiment may be implemented by hardware, or may be implemented by a program to instruct related hardware, the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk, an optical disk, or the like.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (12)

1. A method of authenticating account attribution, the method comprising:
acquiring temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification;
calculating an attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier, wherein the attribution score is used for indicating the possibility that the account number belongs to the user corresponding to the temporary identifier;
and determining that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score.
2. The method of claim 1, wherein the obtaining temporary identifications of a plurality of users requesting to authenticate attribution of the same account and the first authentication information corresponding to each temporary identification comprises:
acquiring at least one authentication request message carrying the same account number and received in a first time period, wherein each authentication request message in the at least one authentication request message also carries first authentication information of a user, and the starting time of the first time period is the time when the authentication request message carrying the account number is received for the first time and the time length is preset time length;
and acquiring the temporary identifier of the user corresponding to each authentication request message, acquiring the first authentication information of each user from each authentication request message respectively, and taking the first authentication information of each user as the first authentication information corresponding to the temporary identifier of each user respectively.
3. The method of claim 2, wherein the obtaining at least one authentication request message carrying the same account number received within the first time period comprises:
receiving and storing an authentication request message of a user, wherein the authentication request message carries authentication information and an account number of the user;
if the authentication request message carrying the account number is received for the first time, timing is started, and the authentication request messages of other users are continuously received and stored;
and when the timing time reaches a preset time length, acquiring each authentication request message carrying the account from the stored authentication request messages.
4. The method of claim 1, wherein the calculating the attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier comprises:
acquiring historical record information corresponding to the account according to the account;
calculating the redundancy rate between each piece of sub information included by the first authentication information corresponding to the temporary identifier and the historical information, wherein the redundancy rate is used for indicating the same degree between the sub information and the historical information;
and calculating the attribution score corresponding to the temporary identifier according to the calculated redundancy rate of each piece of sub information.
5. The method of claim 4, wherein said calculating the attribution score corresponding to the temporary identifier according to the calculated redundancy rate of each sub-message comprises:
acquiring the redundancy rate range to which each calculated redundancy rate belongs;
according to each acquired error redundancy rate range, acquiring a corresponding score from the corresponding relation between the error redundancy rate range and the score;
and performing summation operation on the obtained scores of each piece of sub information to obtain the attribution score corresponding to the temporary identifier.
6. The method according to any one of claims 1 to 5, wherein after determining that the account number belongs to the user corresponding to the temporary identifier with the largest attribution score, the method further comprises:
receiving an objection request message sent by a user, wherein the objection request message carries second authentication information, recalculating an attribution score corresponding to the temporary identifier of the user according to the first authentication information and the second authentication information of the user, and determining that the account number belongs to the user corresponding to the temporary identifier with the largest attribution score.
7. An apparatus for authenticating account attribution, the apparatus comprising:
the system comprises an acquisition module, a management module and a management module, wherein the acquisition module is used for acquiring temporary identifications of a plurality of users requesting to authenticate the attribution of the same account and first authentication information corresponding to each temporary identification;
the calculation module is used for calculating an attribution score corresponding to each temporary identifier according to the first authentication information corresponding to each temporary identifier, and the attribution score is used for indicating the possibility that the account number belongs to the user corresponding to the temporary identifier;
and the first determining module is used for determining that the account belongs to the user corresponding to the temporary identifier with the maximum attribution score.
8. The apparatus of claim 7, wherein the acquisition module comprises:
the system comprises a first obtaining unit, a second obtaining unit and a third obtaining unit, wherein the first obtaining unit is used for obtaining at least one authentication request message which is received in a first time period and carries the same account number, each authentication request message in the at least one authentication request message also carries first authentication information of a user, the starting time of the first time period is the time when the authentication request message carrying the account number is received for the first time, and the time length is preset time length;
a second obtaining unit, configured to obtain the temporary identifier of the user corresponding to each authentication request message, and obtain the first authentication information of each user from each authentication request message, respectively, where the first authentication information of each user is used as the first authentication information corresponding to the temporary identifier of each user.
9. The apparatus of claim 8, wherein the first obtaining unit comprises:
the receiving subunit is used for receiving and storing an authentication request message of a user, wherein the authentication request message carries authentication information and an account number of the user;
the timing subunit is used for starting timing if receiving the authentication request message carrying the account for the first time, and continuously receiving and storing the authentication request messages of other users;
and the first obtaining subunit is configured to obtain, when the timed time reaches a preset time length, each authentication request message carrying the account from the stored authentication request messages.
10. The apparatus of claim 7, wherein the computing module comprises:
a third obtaining unit, configured to obtain, according to the account, history information corresponding to the account;
a first calculation unit configured to calculate a redundancy rate between each piece of sub information included in first authentication information corresponding to the temporary identifier and the history information, wherein the redundancy rate is used to indicate a degree of identity between the piece of sub information and the history information;
and the second calculating unit is used for calculating the attribution score corresponding to the temporary identifier according to the calculated redundancy rate of each piece of sub information.
11. The apparatus of claim 10, wherein the second computing unit comprises:
a second acquiring subunit, configured to acquire a redundancy rate range to which each of the calculated redundancy rates belongs;
the third acquisition subunit is used for acquiring corresponding scores from the corresponding relation between the error redundancy rate range and the scores according to each acquired error redundancy rate range;
and the summation subunit is used for carrying out summation operation on the obtained scores of each piece of sub information to obtain the attribution score corresponding to the temporary identifier.
12. The apparatus of any of claims 7 to 11, further comprising:
and the second determining module is used for receiving an objection request message sent by a user, wherein the objection request message carries second authentication information, recalculating the attribution score corresponding to the temporary identifier of the user according to the first authentication information and the second authentication information of the user, and determining that the account number belongs to the user corresponding to the temporary identifier with the largest attribution score.
CN201410337058.5A 2014-07-15 2014-07-15 Method and device for authenticating account number attribution Active CN105306425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410337058.5A CN105306425B (en) 2014-07-15 2014-07-15 Method and device for authenticating account number attribution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410337058.5A CN105306425B (en) 2014-07-15 2014-07-15 Method and device for authenticating account number attribution

Publications (2)

Publication Number Publication Date
CN105306425A CN105306425A (en) 2016-02-03
CN105306425B true CN105306425B (en) 2020-01-10

Family

ID=55203183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410337058.5A Active CN105306425B (en) 2014-07-15 2014-07-15 Method and device for authenticating account number attribution

Country Status (1)

Country Link
CN (1) CN105306425B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107346310B (en) * 2016-05-05 2020-10-27 腾讯科技(深圳)有限公司 Account complaint processing method and server

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7424438B2 (en) * 2002-03-19 2008-09-09 Marc Vianello Apparatus and methods for providing career and employment services
JP5117865B2 (en) * 2008-01-10 2013-01-16 株式会社日立製作所 Biometric authentication system, biometric authentication method, and biometric authentication program
CN102457501B (en) * 2010-10-26 2016-08-31 腾讯科技(深圳)有限公司 The recognition methods of a kind of instant messaging account and system
CN103118043B (en) * 2011-11-16 2015-12-02 阿里巴巴集团控股有限公司 A kind of recognition methods of user account and equipment
CN103164416B (en) * 2011-12-12 2016-08-03 阿里巴巴集团控股有限公司 The recognition methods of a kind of customer relationship and equipment
CN103581120B (en) * 2012-07-24 2018-04-20 阿里巴巴集团控股有限公司 A kind of method and apparatus for identifying consumer's risk

Also Published As

Publication number Publication date
CN105306425A (en) 2016-02-03

Similar Documents

Publication Publication Date Title
US10554655B2 (en) Method and system for verifying an account operation
CN105516133B (en) User identity verification method, server and client
US9985944B2 (en) Method and apparatus for user authentication
US10091230B1 (en) Aggregating identity data from multiple sources for user controlled distribution to trusted risk engines
CN107026832B (en) Account login method, device and server
EP2698967A1 (en) Social network data mining method for terminal user, and relevant method, device and system
WO2017067394A1 (en) Method and system for distributing customer service modes
WO2020248658A1 (en) Abnormal account detection method and apparatus
WO2015024447A1 (en) Methods and systems for secure internet access and services
WO2014172956A1 (en) Login method,apparatus, and system
CN109257321B (en) Secure login method and device
WO2016148934A1 (en) On demand passwords
KR102110642B1 (en) Password protection question setting method and device
US20140325628A1 (en) Login method, apparatus, and system
WO2015074409A1 (en) Payment binding management method, payment server, client, and system
US10469484B1 (en) Automatic discovery and retrieval of interoperable applications
CN105993156B (en) Server access verification method and device
WO2015106728A1 (en) Data processing method and system
CN108763251B (en) Personalized recommendation method and device for nuclear product and electronic equipment
WO2014146434A1 (en) Methods and systems for managing user privileges
US20200004785A1 (en) Automatic grouping based on user behavior
WO2015139598A1 (en) Instant messaging method, instant messaging apparatus and instant messaging terminal
CN108234454B (en) Identity authentication method, server and client device
EP2725538B1 (en) Privacy protected dynamic clustering of end users
CN105306425B (en) Method and device for authenticating account number attribution

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant