Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below with reference to the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It is the flow diagram of information processing method provided by the embodiments of the present application referring to Fig. 1, this method comprises:
S101: the first information set being made of the corresponding authentication information of the first account is obtained, and by the second account pair
The second information aggregate that the authentication information answered is constituted.
In view of in practical application scene, user on the server register account number when, it is desirable to provide it is corresponding with the account
The different types of authentication information such as contact method, certificate information, password, convenient for server according to these authentication informations to user
Identity authenticated.Therefore, in the embodiment of the present application, server can obtain the corresponding authentication information of account, and will acquire
The corresponding each authentication information of the account arrived is as an information aggregate.
Specifically, server is it needs to be determined that when relationship between any two account (e.g., the first account and the second account),
The corresponding authentication information of the first account can be obtained, and each authentication information that will acquire is as first information set;And obtain the
The corresponding authentication information of two accounts, and each authentication information that will acquire is as the second information aggregate.It is corresponding to obtain two accounts
The sequencing of authentication information is unlimited.
Wherein, the authentication information that server obtains may include the authentication informations such as password, contact method, certificate information.For example,
The authentication information that server obtains may include phone number and E-mail address (contact method), and by phone number and electricity
Sub-voice mailbox address is as the corresponding information aggregate of the account.Since in electric business field, the corresponding password of account generally includes to log in
Password and payment cipher, then the authentication information that server obtains may include login password and payment cipher, and the login is close
Code is with payment cipher as the corresponding information aggregate of the account.
It will illustrate so that the authentication information that server obtains includes login password and payment cipher as an example below.
Information aggregate that server is got, the corresponding account of information aggregate and comprising authentication information, as shown in table 1.
Account |
Information aggregate |
Authentication information |
First account |
First information set |
Login password 1, payment cipher 1 |
Second account |
Second information aggregate |
Login password 2, payment cipher 2 |
Table 1
In table 1, the corresponding login password 1 of the first account and payment cipher 1 constitute first information set.Second account pair
The login password 2 and payment cipher 2 answered constitute the second information aggregate.
S102: set and the second information aggregate according to the first information determine the relationship between the first account and the second account.
In the embodiment of the present application, account relationship may include two class of close relationship and non-close relationship.
In view of often there is identical authentication information between the account with close relationship in practical application scene,
Identical authentication information is generally not present between the account of non-close relationship.
For example, user remembers for convenience when registering login password and payment cipher for each account in electric business field
Recall, it is likely that identical login password and payment cipher are registered for each account, and between multiple accounts of the same user's control
It obviously should be close relationship, thus, once the corresponding authentication information of two accounts is identical, then the two accounts are with regard to very possible
It is close relationship.
In this way, in the embodiment of the present application, for two accounts (the first account and the second account), once it is determined that each account
There are at least one identical authentication informations between corresponding information aggregate, so that it may it determines for close relationship between account, it is no
Then, it may be determined that be non-close relationship between account.
That is, when need to gather according to the first information with the second information aggregate, determine the first account and the second account
Between relationship when, specifically can determine whether first information set and the second information aggregate with the presence or absence of identical authentication information, if so,
Determine that relationship between first account and the second account is close relationship, otherwise, it determines first account and the second account it
Between relationship be non-close relationship.
For example, it is assumed that judgement can be passed through after server gets first information set and the second information aggregate shown in table 1
Whether login password 1 and login password 2 are identical, and judge whether payment cipher 1 and payment cipher 2 are identical, to determine first
Relationship between account and the second account.
Specifically, payment cipher 1 and payment cipher 2 are different if it is determined that login password 1 and login password 2 are identical, then it can be true
Relationship between fixed first account and the second account is close relationship.
If it is determined that login password 1 and login password 2 are identical, payment cipher 1 and payment cipher 2 are also identical, then also can determine
Relationship between first account and the second account is close relationship.
If it is determined that login password 1 and login password 2 be not identical, payment cipher 1 and payment cipher 2 be not also identical, then can be true
Relationship between fixed first account and the second account is non-close relationship.
S103: information processing is carried out according to the relationship between the first account and the second account.
In the embodiment of the present application, it is determined that after the relationship between the first account and the second account, so that it may according to this
Account relationship carries out information processing to the account.
For example, in electric business field, when the relationship between the first account and the second account that determines is that specified relationship is (e.g., close
Close relationship) when, information can be sent to the first account and the second account respectively, wherein be sent to the first account and the second account
Information can be identical information.
For example, can speculate the corresponding user's ratio of these accounts when determining the first account and the second account is close relationship
Relatively intimate, they may be relatives or friends, so as to according to the historical operation record of the first account and the second account
(e.g., historical transaction record) determines the common hobby of these users, and sends and determining happiness to the first account and the second account
Good relevant recommendation information.
In above-mentioned method shown in FIG. 1, server is determined according to the corresponding authentication information of two accounts of acquisition
Account relationship, and information processing is carried out according to the account relationship.Due to the corresponding certification letter of the account with incidence relation
Also there is certain relevance therefore to determine that the accuracy of account relationship is higher according to authentication information between breath, thus, according to true
The accuracy that the account relationship made carries out information processing is also higher.
In step s 102, as long as there are identical authentication informations in determining two information aggregates for server, really
It is close relationship between fixed corresponding account, still, there are when the quantity difference of same authenticated information, the degree of close relationship is not
Together, if carry out identical information processing to each account of different intimate degree, it is understood that there may be carry out information to certain accounts
The accuracy of processing is with regard to lower.
In the embodiment of the present application, it in order to further increase the accuracy for carrying out information processing to each account, can preset more
A ratio range and the corresponding account relationship of each ratio range and information processing method.Then, server is according to two information collection
When closing the relationship between determining first account and the second account, it specifically can determine that first information set and the second information aggregate exist
The quantity of identical authentication information, as the first quantity, by the quantity of the authentication information in first information set or the second information
The quantity of authentication information in set determines the default ratio that the ratio of the first quantity and the second quantity is fallen into as the second quantity
It is worth range, the corresponding account relationship of default ratio range can be determined as the relationship between the first account and the second account.
Illustrate so that server obtains first information set as shown in Table 1 and the second information aggregate as an example, then presets ratio
Range, account relationship and information processing method, as shown in table 2.
Default ratio range |
Account relationship |
Information processing method |
1 |
The first estate close relationship |
First information processing method |
0.5≤L<1 |
Second grade close relationship |
Second information processing method |
0<L<0.5 |
Tertiary gradient close relationship |
Third information processing method |
0 |
Non- close relationship |
4th information processing method |
Table 2
In table 2, the default ratio range of difference has corresponded to different account relationships, and different account relationships has corresponded to not again
Same information processing method.
For example, after server obtains first information set shown in table 1 and the second information aggregate, if it is determined that log in close
Code 1 and login password 2 are identical, and payment cipher 1 and payment cipher 2 are also identical, then server can determine first information set and the
Two information aggregates are 2 there are the quantity N of same authenticated information (N is the first quantity), authentication information in any one information aggregate
The ratio L that total quantity M (M is the second quantity) is 2, N and M is 1, and look-up table 2 is it is found that the corresponding account relationship of ratio 1 is first
Grade close relationship can be used the first estate close relationship and correspond to first information processing method to the first account and the second account
Information is handled.
In upper example, due to two accounts of the first estate close relationship each other, intimate degree highest, corresponding customer relationship
It is possible for a relationship, then server can send information (first information processing side relevant to family to the two accounts
Method), e.g., send and the relevant information such as child-bearing, finishing.
For another example, if determining login password 1 after first information set shown in server acquisition table 1 and the second information aggregate
Identical with login password 2, payment cipher 1 and payment cipher 2 be not identical, then server can determine first information set and the second letter
Breath set is 0.5 there are the ratio L that the quantity N of same authenticated information is 1, N and M, and look-up table 2 is it is found that the corresponding account of ratio 0.5
Number relationship is the second grade close relationship, and corresponding second information processing method of the second grade close relationship can be used to the first account
It is handled with the information of the second account.
In upper example, due to two accounts of the second grade close relationship each other, intimate degree is than the first estate close relationship
Slightly lower, corresponding customer relationship is possible for friends, and there may be identical hobby between these users, then server can
According to the historical operation record of the two accounts, the common hobby of the corresponding user of the two accounts is determined, and to the two accounts
Relevant information is liked in number transmission to this jointly, e.g., sends information relevant to movement, game etc..
It can be seen that when there are identical authentication informations in first information set and the second information aggregate, and the certification is believed
When the quantity difference of breath, can determining different account relationships, (e.g., the first estate close relationship and the second grade are intimately closed
System), different brackets close relationship corresponds to different information processing methods, can thus effectively improve and carry out at information to each account
The accuracy of reason.
Certainly, the embodiment of the present application can also be determined as follows the relationship between the first account and the second account.
Server determines that first information set and the second information aggregate there are the quantity of identical authentication information, determine the number
Measure the default value range that falls into, by the corresponding account relationship of the default value range be determined as the first account and the second account it
Between relationship.
For example, it is assumed that the first default value range is 2, corresponding the first estate close relationship;Second default value range is
1, corresponding second grade close relationship;Third default value range is 0, corresponding non-close relationship.Then: when server obtains table 1
Shown in after first information set and the second information aggregate, determine that login password 1 and login password 2 are identical, payment cipher 1 and branch
It is also identical to pay password 2, it may be determined that first information set and the second information aggregate are 2 there are the quantity of identical authentication information, then
Determine relationship of the corresponding the first estate close relationship of the first default value range between the first account and the second account.
The above-mentioned server that had been illustrated is after determining the relationship between the first account and the second account, according to determining
Relationship sends the processing method of information to the two accounts, still, it is contemplated that in practical application scene, normal users control
The quantity of account is typically small (e.g., several to more than ten), and the quantity of the account of malicious user control is generally large (e.g., several
Ten to several hundred).Therefore, when larger with the quantity of the first account the second account of close relationship each other, then first account
Number and the second account be likely to (e.g., the trumpet that these accounts are all malicious user) that is controlled by the same malicious user, from
And, it should risk control processing is carried out to these accounts.
Then, in the embodiment of the present application, when the determining relationship with the first account of server is that specified relationship (is closed as intimate
System) the quantity of the second account when being more than preset threshold, risk control processing is carried out to first account and the second account, this
Sample, so that it may improve the accuracy that information processing is carried out to account.
Wherein the preset threshold can control the lower limit value or average value of account quantity for malicious user, as this is default
Threshold value is 30.
The above are information processing methods provided by the embodiments of the present application, are based on same thinking, and the embodiment of the present application also mentions
A kind of information processing unit is supplied, as shown in Figure 2.
Referring to fig. 2, a kind of information processing unit provided by the embodiments of the present application, comprising:
Module 21 is obtained, for obtaining the first information set being made of the corresponding authentication information of the first account, Yi Jiyou
The second information aggregate that the corresponding authentication information of second account is constituted;
Determining module 22, for according to the first information set and the second information aggregate, determine first account and
Relationship between second account;
Processing module 23, for carrying out information processing according to the relationship between first account and the second account.
Optionally, the authentication information is password, and the password includes login password and payment cipher.
Optionally, the determining module 22 is specifically used for:
First information set and the second information aggregate are judged with the presence or absence of identical authentication information, if so, determining described the
Relationship between one account and the second account is close relationship, otherwise, it determines the pass between first account and the second account
System is non-close relationship.
Optionally, the determining module 22 is specifically used for:
First information set and the second information aggregate are determined there are the quantity of identical authentication information, as the first quantity,
Using the quantity of the authentication information in the quantity of the authentication information in the first information set or the second information aggregate as second
Quantity determines the default ratio range that the ratio of first quantity and second quantity is fallen into, by the default ratio model
Enclose the relationship that corresponding account relationship is determined as between first account and the second account.
Optionally, the processing module 23 is specifically used for:
When the quantity with the second account that the relationship of the first account is specified relationship is more than preset threshold, to described first
Account and the second account carry out risk control processing.
Optionally, the processing module 23 is specifically used for:
When the relationship between first account and the second account that determines is specified relationship, respectively to first account
Information is sent with the second account, wherein the information includes recommendation information.
In conclusion information processing method provided by the embodiments of the present application and device, this method obtains two account difference
Corresponding two information aggregates, the two information aggregates are made of authentication information, according to the two information aggregates, determine this two
Relationship (i.e. account relationship) between a account, and information processing is carried out according to the account relationship.As it can be seen that account relationship is accurate
Property is higher, and the accuracy of information processing is also higher.Due to based on authentication information determine account relationship, the account relationship with set
The factors such as standby MAC Address, IP address are unrelated, and therefore, account relationship provided by the present application determines method, can effectively improve account
So as to effectively improve the accuracy for carrying out information processing based on the account relationship, and then service can be improved in the accuracy of relationship
Quality.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art,
Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement,
Improve etc., it should be included within the scope of the claims of this application.