CN107040512B - Information verification correction method and device - Google Patents

Information verification correction method and device Download PDF

Info

Publication number
CN107040512B
CN107040512B CN201611093985.2A CN201611093985A CN107040512B CN 107040512 B CN107040512 B CN 107040512B CN 201611093985 A CN201611093985 A CN 201611093985A CN 107040512 B CN107040512 B CN 107040512B
Authority
CN
China
Prior art keywords
party data
information
score
verification
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611093985.2A
Other languages
Chinese (zh)
Other versions
CN107040512A (en
Inventor
梅健
郑丹丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201611093985.2A priority Critical patent/CN107040512B/en
Publication of CN107040512A publication Critical patent/CN107040512A/en
Application granted granted Critical
Publication of CN107040512B publication Critical patent/CN107040512B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a correction method and a correction device for information verification, wherein the method is applied to a server for information verification, and comprises the following steps: receiving information sent by a client; verifying the information according to a preset verification database, and calling a third-party data source except the verification database under the condition that a verification result is failed; calculating the credibility score of the information according to the third party data provided by the third party data source; and under the condition that the credibility score is larger than a preset threshold value, modifying the verification result of the information to be passed. By applying the embodiment of the application, the accuracy of information verification can be improved.

Description

Information verification correction method and device
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for correcting information verification.
Background
In the internet, authentication is required for many sensitive information. For example, when a personal internet bank is bound, identity information of a user needs to be verified; or, when real-name authentication is performed, identity information of the user also needs to be verified.
Traditionally, the information provided by the user could be verified by telephone or a third party authority, but would be labor intensive and financial intensive. Therefore, it is currently common in the internet to use an authentication database to authenticate information provided by a user.
In the prior art, the verification database may be composed of main data for verification; the master data may include a plurality of items of data related to the user. The data may be extracted from a third party system. User identity data, for example, available from a public security system; user shopping data available from an online shopping platform, and the like. Based on a preset verification database, the information provided by the user can be verified.
However, since the master data in the verification database is usually obtained in advance, some outdated data may exist in the master data, and even if the update is performed regularly, a period of time of a neutral period is inevitable. Due to the outdated data, certain inaccuracy exists in the verification result obtained by the verification database.
Disclosure of Invention
The application provides a correction method and device for information verification, and aims to solve the problem that in the prior art, a verification result is inaccurate.
According to the correction method for information verification provided by the embodiment of the application, the method is applied to a server for information verification, and the method comprises the following steps:
receiving information sent by a client;
verifying the information according to a preset verification database, and calling a third-party data source except the verification database under the condition that a verification result is failed;
calculating the credibility score of the information according to the third party data provided by the third party data source;
and under the condition that the credibility score is larger than a preset threshold value, modifying the verification result of the information to be passed.
Optionally, the calculating a trustworthiness score of the information according to the third party data provided by the third party data source specifically includes:
matching the information with third-party data provided by the third-party data source, and counting the successful matching times;
calculating the credible score of the information according to the successful matching times and a preset score; wherein the preset score is the score of each successful matching.
Optionally, the calculating a trustworthiness score of the information according to the third party data provided by the third party data source specifically includes:
matching the information with third party data provided by the third party data source;
under the condition of successful matching, obtaining a score corresponding to the importance degree of the third-party data source;
and determining the corresponding score as the credible score of the information.
Optionally, the invoking a third-party data source other than the verification database specifically includes:
acquiring the priority of each third-party data source under the condition that the number of the third-party data sources which can be called exceeds 1;
and calling the third-party data source with the highest priority.
Optionally, the priority of the third-party data source is determined by the accuracy, reliability, usefulness, adaptability and timeliness of the data of the third-party data source.
Optionally, the master database in the verification database is updated in the following manner:
receiving imported third party data;
under the condition that the third-party data conflicts with existing main data, acquiring the use time of the third-party data and the existing main data;
judging whether the use time of the third-party data is later than that of the existing main data or not;
and writing the third-party data into the verification database as new main data when the use time of the third-party data is later than that of the existing main data.
Optionally, the method further includes:
under the condition that the third-party data conflicts with the existing main data, acquiring the grade corresponding to the scene called by the existing main data;
judging whether the grade is greater than a preset grade or not;
and under the condition that the grade is not greater than the preset grade, executing the step of acquiring the use time of the third-party data and the existing main data.
According to the correction method for information verification provided by the embodiment of the application, the method is applied to a server for information verification, and the method comprises the following steps:
receiving information sent by a client;
under the condition that the total score obtained by the information verification of a preset verification database is not greater than the preset total score, determining that the verification result of the information does not pass, and calling a third-party data source except the verification database;
calculating the credibility score of the information according to the third party data provided by the third party data source;
adding the credible score to the total score to obtain a new total score;
and modifying the verification result of the information to pass under the condition that the new total score is larger than the preset total score.
According to the correction device for information verification provided by the embodiment of the application, the device is applied to a server for information verification, and the device comprises:
the receiving unit is used for receiving the information sent by the client;
the calling unit is used for verifying the information according to a preset verification database and calling a third-party data source except the verification database under the condition that the verification result is not passed;
the calculating unit is used for calculating the credible score of the information according to the third party data provided by the third party data source;
and the correcting unit is used for correcting the verification result of the information to be passed under the condition that the credibility value is larger than a preset threshold value.
Optionally, the computing unit specifically includes:
the matching subunit matches the information with third-party data provided by the third-party data source, and counts the times of successful matching;
the calculating subunit is used for calculating the credible score of the information according to the successful matching times and the preset score; wherein the preset score is the score of each successful matching.
Optionally, the computing unit specifically includes:
the matching subunit matches the information with third-party data provided by the third-party data source;
the obtaining subunit obtains a score corresponding to the importance degree of the third-party data source under the condition that the matching is successful;
and the determining subunit determines the corresponding score as a credible score of the information.
Optionally, the invoking unit specifically includes:
the first obtaining subunit is used for verifying the information according to a preset verification database, and obtaining the priority of each third-party data source under the condition that the verification result is that the information does not pass and the quantity of the callable third-party data sources outside the verification database exceeds 1;
and calling the subunit to call the third-party data source with the highest priority.
Optionally, the priority of the third-party data source is determined by the accuracy, reliability, usefulness, adaptability and timeliness of the data of the third-party data source.
Optionally, the master database in the verification database is updated through the following units:
a receiving unit that receives the imported third party data;
an acquisition unit that acquires use timings of the third-party data and existing master data when the third-party data and the existing master data conflict with each other;
a judging unit that judges whether or not the use time of the third-party data is later than the use time of the existing master data;
and a writing unit configured to write the third-party data as new master data into the verification database when the use time of the third-party data is later than the use time of the existing master data.
Optionally, the apparatus further comprises:
the first acquiring subunit is used for acquiring the grade corresponding to the scene called by the existing main data under the condition that the third-party data conflicts with the existing main data;
a judging subunit, for judging whether the grade is greater than a preset grade;
the acquiring unit specifically includes:
and the second acquisition subunit acquires the use time of the third-party data and the existing main data under the condition that the grade is not greater than the preset grade.
According to the correction device for information verification provided by the embodiment of the application, the device is applied to a server for information verification, and the device comprises:
the receiving unit is used for receiving the information sent by the client;
the calling unit is used for determining that the information verification result does not pass and calling a third-party data source except the verification database under the condition that the total score obtained by the information verification of the preset verification database is not greater than the preset total score;
the calculating unit is used for calculating the credible score of the information according to the third party data provided by the third party data source;
the adding unit is used for adding the credible score on the basis of the total score to obtain a new total score;
and the correcting unit is used for correcting the verification result of the information to be passed under the condition that the new total score is larger than the preset total score.
In the embodiment of the application, under the condition that the information verification result of the verification database is failed, the information is verified again by calling a third-party data source except the verification database and according to third-party data provided by the third-party data source. Therefore, the verification result of the verification database can be corrected by utilizing the real-time third-party data, so that the accuracy of information verification is improved, and the problem of inaccurate information verification caused by the fact that the main data in the verification database is too old is solved.
Drawings
FIG. 1 is a block diagram of an implementation information verification system provided by an embodiment of the present application;
FIG. 2 is a flow chart of a modification method for information verification according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a client interface provided by an embodiment of the present application;
FIG. 4 is a schematic diagram of reference dimensions provided in an embodiment of the present application;
FIG. 5 is a flow chart of a modification method for information verification according to an embodiment of the present application;
fig. 6 is a hardware structure diagram of a device in which a correction apparatus for information verification provided in the present application is located;
FIG. 7 is a block diagram of a modification apparatus for information verification according to an embodiment of the present application;
fig. 8 is a block diagram of a correction apparatus for information verification according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
As previously mentioned, the primary data in the validation database may include some outdated data. For example, in a process of binding a credit card by a user, the provided information is: card number + name B; suppose the user has recently renamed, having a name a and a name B. Since the name of the user is recorded in the master data and is still name a, the card number + name B information provided by the user is verified, so that the verification result is failed.
In this case, the information provided by the user is unproblematic, but the authentication fails due to the problem of the authentication database, which causes trouble to the user; the user can only seek help for the customer service, and waits for processing after the customer service registers the problem, which is usually longer, and the user experience is undoubtedly reduced; and may even lead to user churn. In order to solve the above problems, the present application provides the following embodiments:
a system architecture diagram for implementing information verification provided in the embodiment of the present application illustrated in fig. 1 is described below.
In the system architecture diagram 100, different nodes in the network can communicate messages via the network, and then complete message interaction and processing. The system architecture diagram 100 may include a client 11, a server 12, a third party data source 13, and a verification database 121 that may be integrated with the server 12 or separate from the server 12.
In this embodiment, the client 11 may also refer to an application client on software, such as an electronic wallet APP, an instant messaging APP, and the like.
The client 11 may also be a hard-soft client, such as a smart phone with an electronic wallet APP installed.
The client 11 may send information to the server 12 via the network 111. The network 111 may comprise wired or wireless telecommunication means by which network devices on which the clients 11 are based can exchange data. For example, the network 111 may include a local area network ("LAN"), a wide area network ("WAN"), an intranet, the internet, a mobile phone network, a Virtual Private Network (VPN), a cellular or other mobile communication network, bluetooth, NFC, or any combination thereof. In the discussion of the exemplary embodiments, it should be understood that the terms "data" and "message" may be used interchangeably herein to refer to text, images, audio, video, or any other form of message that may be present in a computer-based environment.
The server 12 is configured to receive the information sent by the client 11, and verify the information according to the verification database 121. The authentication database 121 may be composed of master data for authentication.
The server 12 may communicate with at least one third-party data source 13 to obtain third-party data from the third-party data source 13.
The third party data source 13 may provide third party data to the server 12.
A user can send information to be verified to the server 12 through the client 11; the server 12 may verify the information according to a preset verification database 121; in case the result of said verification is not passed, the information may also be verified again based on third party data provided by the third party data source 13.
The following is described with reference to the flowchart of a modification method for information verification provided by an embodiment of the present application shown in fig. 2, where the method is described from the server side, and the method may include the following steps:
step 210: and receiving the information sent by the client.
In this embodiment, as described above, the user may send information to be verified to the server through the client. Accordingly, at the server side, the server can receive the information sent by the client side.
As shown in the schematic diagram of the client interface shown in fig. 3, the user is performing the operation of binding the bank card in the payment application. The user inputs Xiaoming in the column of the cardholder, 6222222233334444 in the column of the card number and 330107123456789123 in the column of the identification card number; and may click a "bind" button to send the entered information to the server corresponding to the payment application. It is worth mentioning that each information may have a type representing the information, such as "name", "number" 6222222233334444 "," id "330107123456789123"; thus, the server can determine the meaning represented by the information according to the type.
Step 220: and verifying the information according to a preset verification database, and calling a third-party data source except the verification database under the condition that the verification result is failed.
In this embodiment, the information is verified by the verification database, for example, from a reference dimension of whether the information is located in the verification database:
if the information exists in the verification database, the verification result of the information can be determined to be passed; conversely, if the information does not exist in the verification database, the verification result of the information may be determined to be failed.
For another example, the verification may be performed from a reference dimension, which is the number of times information is matched in the verification database:
if the matching times of the information in the verification database reach the preset times, the verification result of the information can be determined to be passed; if the matching times of the information in the verification database do not reach the preset times, the verification result of the information can be determined to be failed.
For another example, the verification may be performed from a reference dimension, which is the importance degree of the main data matched with the information in the verification database:
the degree of importance may be determined based on the source of the data, e.g., the main data is relatively high if it comes from a public security system; the importance level of the primary data is relatively low if it comes from the network. Specifically, the importance level may be represented by a specific numerical value after quantization, for example, the importance level is 1, 2, 3, 4, 5, and a larger number indicates a better importance level, whereas a smaller number indicates a worse importance level. If the importance degree of the main data matched by the information in the verification database is greater than a preset value, the verification result of the information can be determined to be passed; if the importance degree of the main data matched with the information in the verification database is not greater than a preset value, the verification result of the information can be determined to be failed.
The reference dimensions in the above examples are only examples, and may be any combination in practical applications, or may also have other reference dimensions, which is not limited in this embodiment.
Generally, the third-party data source may provide an API (Application programming interface) to the outside. The server may be a third party data source invoked through the API.
It is worth mentioning that, under the condition that the verification result is passed, the server does not need to call the third-party data source at the moment because the calling of the third-party data source except the verification database does not obviously improve the accuracy of information verification. Of course, in other embodiments, in the case that the verification result is passed, the server may also invoke a third-party data source other than the verification database, and the specific process is the same as the step after the verification result is not passed.
Step 230: and calculating the credibility score of the information according to the third party data provided by the third party data source.
In this embodiment, the step 230 may specifically include:
a1: and matching the information with third-party data provided by the third-party data source, and counting the successful matching times.
A2: calculating the credible score of the information according to the successful matching times and a preset score; wherein the preset score is the score of each successful matching.
For example, the information to be verified is: name: A. a phone: b; assume that the third party data provided by the third party data source is: name: A. a phone: B. add: c; the match can be counted as a successful match. I.e. the third party data needs to include all the information to be verified.
The preset score may be an empirical value set by a human. Assuming that the matching is successful 5 times and the predetermined score is 10 points, a trustworthy score of 5 x 10 to 50 points can be calculated.
In another embodiment, the step 230 of calculating the trustworthiness score of the information according to the third party data provided by the third party data source may further include:
b1: matching the information with third party data provided by the third party data source;
b2: under the condition of successful matching, obtaining a score corresponding to the importance degree of the third-party data source;
b3: and determining the corresponding score as the credible score of the information.
In this embodiment, the importance level is as described in step 220, and is not described herein again.
For example, the information to be verified is: name: A. ID: d; the name exists in the third-party data source: A. ID: D. add: c; the match can be successful. Assuming that the degree of importance has a1, 2, 3, 4, 5 rating, the corresponding scores are 20, 40, 60, 80, 100. The third party data source in this example is a public security system (importance level 3); further, a score of 60 corresponding to the importance of the third party data source may be determined as the trustworthiness score of the information.
Step 240: and under the condition that the credibility score is larger than a preset threshold value, modifying the verification result of the information to be passed.
In this embodiment, the server modifies the verification result of the information to pass when the calculated trustworthiness is greater than the preset threshold.
Of course, in the case that the calculated credibility is not greater than the preset threshold, the server does not process, so the verification result of the information still fails.
According to the embodiment of the application, under the condition that the information verification result of the verification database is failed, the information is verified again by calling the third-party data source except the verification database according to the third-party data provided by the third-party data source. Therefore, the verification result of the verification database can be corrected by utilizing the real-time third-party data, so that the accuracy of information verification is improved, and the problem of inaccurate information verification caused by the fact that the main data in the verification database is too old is solved.
In practical applications, the server may communicate with a plurality of third-party data sources other than the verification database, that is, the server may invoke the plurality of third-party data sources, so as to obtain third-party data provided by the plurality of third-party data sources. However, it takes a certain time for the server to call one third-party data source every time, and the more the third-party data sources are called, the slower the calculation of the trustworthiness value of the information is, which easily causes a delay in information verification.
In order to solve the above problem, in a specific embodiment of the present application, the invoking a third-party data source other than the verification database in step 220 may specifically include:
acquiring the priority of each third-party data source under the condition that the number of the third-party data sources which can be called exceeds 1;
and calling the third-party data source with the highest priority.
In this embodiment, each third-party data source may be set with a priority. By acquiring the priority of each third-party data source, the third-party data source with the highest priority can be used as the third-party data source for information verification, and the third-party data source with the highest priority is called. Therefore, only one third-party data source can be called, and the time consumed by calling the server is reduced; and because only one third-party data source is called, the provided third-party data is relatively less, so that the time for calculating the credible score can be reduced, and the delay of information verification can be reduced.
Specifically, the priority of the third-party data source may be obtained as follows:
determining the acquisition cost of third-party data in a third-party data source;
determining the priority of the third-party data source according to the acquisition cost;
accordingly, the highest priority third-party data source is determined by:
and determining the priority of the third-party data source with the lowest acquisition cost as the highest priority.
In practical applications, the third-party data source does not provide third-party data for free, and generally requires a caller to pay a certain fee, so the embodiment may determine the priority of the third-party data source with the lowest acquisition cost as the highest priority in consideration of the acquisition cost. In this way, a reduction in the cost of verification can also be achieved.
In particular, the priority of the third party data source may be determined by the accuracy, reliability, usefulness, fitness, and timeliness of its data.
Wherein, the accuracy can represent the accuracy of the data.
Reliability, which may represent the degree of reliability of the third party data source.
Usefulness, can indicate the extent to which the data is allowed to be published by law.
Adaptability, the richness of data can be represented.
Timeliness, which may represent the reflection time of the query data.
In this embodiment, the reference dimensions may be quantized to specific values, for example, each reference dimension is 0 to 5 minutes, the lowest is 0 minutes, and the highest is 5 minutes; the full score is 5 x 5 ═ 25.
For the accuracy, for example, if the verification results of 10 data of 100 data are all passed, the accuracy of the third-party data source is 0.5 point.
For the reliability, for example, data in a government system, a large company and a large website is reliable, that is, the reliability is high, and may be 5 points.
For the usefulness, for example, data related to user privacy, security, and the like, which is stipulated by law, is not allowed to be disclosed, so that usability is poor, and may be 0 point.
For the appropriateness, for example, 10 data to be queried can be queried for 100 data to be queried, and the appropriateness of the third-party data source can be 0.5 point.
For the timeliness, for example, if the query data generally reflects for a long time, the timeliness of the third-party data source is poor, and the appropriateness of the third-party data source may be 0 point.
And determining the priority of the third-party data source according to the score obtained by the reference dimension. Generally, the third-party data source with a high score has a correspondingly high priority; the third party data source with the lower score has a correspondingly lower priority.
In some embodiments, the priority of each level may be set to a scoring interval, for example, 0-10 points correspond to low priority, 10-20 points correspond to medium priority, and above 25 points correspond to high priority.
It is worth mentioning that in addition to the above accuracy, reliability, usefulness, adaptability and timeliness, there may be other reference dimensions.
Specifically, the reference dimension diagram shown in fig. 4 can be used:
1. availability may indicate the ease of data acquisition and querying.
2. Consistency may mean whether the same data has only one value at the same time.
3. Intelligibility may represent the ease of reading and understanding the encoding of the data resource.
4. Integrity, can indicate the degree to which the data in the data source is correct and consistent.
5. The accuracy is the same as before and is not described in detail here.
6. Correctness, which may represent how true the data and the data reflect the object to which the data refers.
7. Objectivity, which may indicate whether and to what extent subjective factors affect the data acquisition and generation process.
8. Validity, may indicate how well the data meets the user's needs.
9. The reliability is the same as before and is not described here again.
10. The correlation can indicate the matching degree of the data and the user requirement.
11. The usefulness is the same as before and will not be described further herein.
12. Background, it can indicate whether the data provides background material and the sufficiency of the background material, the background material includes metadata, user instruction manual.
13. The adaptability is the same as before, and is not described in detail here.
14. The timeliness is the same as before and is not described in detail here.
Similar to the foregoing, each reference dimension can be 0-5 points, with a minimum of 0 points and a maximum of 5 points; the full score is 5 × 14 ═ 70.
It should be noted that, as shown in fig. 4, the score of each reference dimension may also have a value of one ratio. For example, if the availability score is 5 points, the actual score is 0.25 point from 5% to 5%.
It should be noted that the reference dimension shown in fig. 4 is only an example provided in the present embodiment, and may be any other rule in practical application, which is not limited in the present embodiment.
According to the embodiment, the third-party data source is rated in a quantitative analysis mode from multiple reference dimensions, and the priority of the third-party data source is determined according to the rating result.
Generally, the third-party data source with a high score has a correspondingly high priority; the third party data source with the lower score has a correspondingly lower priority.
In some embodiments, the priority of each level may be set to a scoring interval, for example, 0-20 points correspond to low priority, 20-40 points correspond to medium priority, 40-60 points correspond to high priority, and more than 60 points correspond to super high priority.
In a specific embodiment of the present application, the master data in the verification database may be updated by:
c1: imported third party data is received.
C2: and acquiring the use time of the third-party data and the existing main data under the condition that the third-party data and the existing main data conflict.
C3: and judging whether the use time of the third-party data is later than that of the existing main data.
C4: and writing the third-party data into the verification database as new main data when the use time of the third-party data is later than that of the existing main data.
In this embodiment, as mentioned above, the third-party data may be provided by a third-party data source. In particular, the data that is used/invoked will generate third party data in third party data sources. For example, if a new identity information is entered into the public security system (i.e., the third-party data source), the entered identity information is the third-party data of the public security system. For another example, when a user purchases a commodity on a shopping platform, an order is produced, and information in the order, such as a name, a mobile phone number, an address, and the like, forms third-party data in the shopping platform.
For example, user a purchases a mobile phone card at a mobile operator using an identification card; this will be recorded in the mobile operator, and the corresponding relationship between the user a and the mobile phone number a corresponding to the mobile phone card, such as a: a;
however, in the actual application process of the mobile phone card, the mother user B of the user a is always in use; therefore, in the online shopping platform, a corresponding relationship exists between the user B and the mobile phone number a, such as B: a;
the shopping platform is supposed to need to update the verification database of the shopping platform, and third party data provided by a mobile operator is imported; since B exists in the existing master data: a; and third party data exists a: a;
similarly, the mobile phone number a in the main data corresponds to B, and the mobile phone number a in the third-party data corresponds to A;
in this case, a conflict between the third party data and the existing master data may occur.
The use time of the third-party data is 2016, 10, 22, 15, 10 min and 10 sec; the use time of the existing main data is 2016, 9, 22, 15, 10 min and 10 sec;
since the third-party data is used later than the existing master data, it can be said that the third-party data has been used by the user recently (compared to the existing master data) and may be trustworthy; the third party data may be written into the verification database as new master data.
Of course, the use time of the third-party data is not later than that of the existing master data, which may indicate that the third-party data has not been used by the user recently (compared with the existing master data), and the trust level is low; the third party data need not be written into the verification database as new master data.
By comparing timeliness of conflicting parties, namely third-party data and existing master data, the embodiment can show that the third-party data is used by a user recently (compared with the existing master data) and can be trustworthy under the condition that the use time of the third-party data is later than that of the existing master data; so that the third party data can be written as new master data into the verification database. Therefore, the verification database can be continuously improved, and the accuracy of information verification of the verification database is further improved.
In another embodiment of the present application, the method further comprises:
under the condition that the third-party data conflicts with the existing main data, acquiring the grade corresponding to the scene called by the existing main data;
judging whether the grade is greater than a preset grade or not;
and under the condition that the grade is not greater than the preset grade, executing the step of acquiring the use time of the third-party data and the existing main data.
In this embodiment, if the main data in the verification database is called by the user, a level may be set according to a scenario in which the user calls the main data.
The larger the grade is, the more reliable the scene is, and correspondingly, the more credible the existing main data is; and vice versa.
For example, when ordering shopping, the user needs to call the harvesting information (which may include a consignee, a mobile phone number, and an address), and after the user successfully orders the shopping, a level may be set according to the scene, that is, the shopping scene.
The level may have a correspondence with the scene, which may be manually set. The correspondence of scenes to levels as shown in table 1 below:
TABLE 1
Figure BDA0001168614830000151
Figure BDA0001168614830000161
It should be noted that table 1 is only an example provided in this embodiment, and any reasonable rule may be used in practical applications, which is not limited in this embodiment.
In this embodiment, the preset level may also be an experience value defined manually.
If the grade corresponding to the called scene of the existing main data is greater than the preset grade, the existing main data can be verified by the strongly related scene and can be trusted, so that the conflicting third-party data can be discarded;
if the level corresponding to the called scene of the existing main data is not greater than the preset level, it can be shown that the existing main data is not verified by the strongly related scene, and the accuracy is in doubt, and further judgment is needed, that is, the content described in the previous embodiment.
The following is described with reference to a flowchart of a modification method for information verification provided by an embodiment of the present application shown in fig. 5, where the method is described from a server side, and the method may include the following steps:
step 310: and receiving the information sent by the client.
This step is the same as step 210, and is not described herein again.
Step 320: and under the condition that the total score of the information scored according to the preset verification database is not greater than the preset total score, determining that the verification result of the information does not pass, and calling a third-party data source.
Step 330: and calculating the credibility score of the information according to the third party data provided by the third party data source.
This step is the same as step 230, and is not described herein again.
Step 340: and adding the credible score on the basis of the total score to obtain a new total score.
Step 350: and modifying the verification result of the information to pass under the condition that the new total score is larger than the preset total score.
In the related art, the verification database verifies information and can obtain a total score.
If the total score is larger than the preset total score, the information is trustable, and the verification result is passed; and if the total score is not greater than the preset total score, the information is suspicious, and the verification result is failed. Generally, the preset total score may be an empirical value set by a human. For example 60 minutes.
The embodiment is different from the embodiment in that the embodiment only uses the third-party data for verification after the information verification fails; in the embodiment, the verification result of the verification database is also referred to in addition to the verification by using the third-party data source, that is, the total score obtained by the verification database is combined with the credible score obtained by the third-party data source to judge whether the information passes the verification; the verification result obtained in this way is more accurate.
It is worth mentioning that the server may also write third party data into the verification database after the verification result of the information is modified to pass. The third-party data plays a role in correcting the verification result, so that the third-party data can be trusted and written into the verification database, the verification database can be perfected, and the accuracy of information verification of the verification database is further improved.
Corresponding to the embodiment of the correction method for information verification, the application also provides an embodiment of a correction device for information verification. The embodiment of the correction device for information verification can be applied to a server for information verification. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory for operation through the processor of the device where the software implementation is located as a logical means. From a hardware aspect, as shown in fig. 6, the present application is a hardware structure diagram of a device in which a correction apparatus for information verification is located, where, in addition to the processor, the network interface, the memory, and the nonvolatile memory shown in fig. 6, the device in which the apparatus is located in the embodiment may also include other hardware according to the actual correction function of the information verification, which is not described again.
Referring to fig. 7, a block diagram of a correction apparatus for information verification according to an embodiment of the present application is provided, where the apparatus includes: a receiving unit 410, a calling unit 420, a calculating unit 430 and a modifying unit 440.
The receiving unit 410 receives information sent by a client;
the calling unit 420 is used for verifying the information according to a preset verification database, and calling a third-party data source except the verification database under the condition that the verification result is not passed;
the calculating unit 430 is used for calculating the credible score of the information according to the third party data provided by the third party data source;
and a correcting unit 440, configured to modify the verification result of the information to pass if the trustworthiness value is greater than a preset threshold.
In an alternative implementation:
the calculating unit 430 specifically includes:
the matching subunit matches the information with third-party data provided by the third-party data source, and counts the times of successful matching;
the calculating subunit is used for calculating the credible score of the information according to the successful matching times and the preset score; wherein the preset score is the score of each successful matching.
In an alternative implementation:
the calculating unit 430 specifically includes:
the matching subunit matches the information with third-party data provided by the third-party data source;
the obtaining subunit obtains a score corresponding to the importance degree of the third-party data source under the condition that the matching is successful;
and the determining subunit determines the corresponding score as a credible score of the information.
In an alternative implementation:
the invoking unit 420 specifically includes:
the first obtaining subunit is used for verifying the information according to a preset verification database, and obtaining the priority of each third-party data source under the condition that the verification result is that the information does not pass and the quantity of the callable third-party data sources outside the verification database exceeds 1;
and calling the subunit to call the third-party data source with the highest priority.
In an alternative implementation:
the priority of the third-party data source is determined by the accuracy, reliability, usefulness, adaptability and timeliness of the data of the third-party data source.
In an alternative implementation:
the master database in the verification database is updated through the following units:
a receiving unit that receives the imported third party data;
an acquisition unit that acquires use timings of the third-party data and existing master data when the third-party data and the existing master data conflict with each other;
a judging unit that judges whether or not the use time of the third-party data is later than the use time of the existing master data;
and a writing unit configured to write the third-party data as new master data into the verification database when the use time of the third-party data is later than the use time of the existing master data.
In an alternative implementation:
the device further comprises:
the first acquiring subunit is used for acquiring the grade corresponding to the scene called by the existing main data under the condition that the third-party data conflicts with the existing main data;
a judging subunit, for judging whether the grade is greater than a preset grade;
the acquiring unit specifically includes:
and the second acquisition subunit acquires the use time of the third-party data and the existing main data under the condition that the grade is not greater than the preset grade.
Referring to fig. 8, a block diagram of a correction apparatus for information verification according to an embodiment of the present application is provided, where the apparatus includes:
a receiving unit 410, which receives information sent by a client;
the calling unit 420 is used for determining that the information verification result does not pass and calling a third-party data source except the verification database under the condition that the total score obtained by the information verification of the preset verification database is not greater than the preset total score;
the calculating unit 430 is used for calculating the credible score of the information according to the third party data provided by the third party data source;
an adding unit 440, which adds the credibility score to the total score to obtain a new total score;
and the correcting unit 450 is used for correcting the verification result of the information to be passed if the new total score is larger than the preset total score.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (14)

1. A correction method for information verification is applied to a server for information verification, and comprises the following steps:
receiving information sent by a client;
verifying the information according to a preset verification database, and calling a third-party data source except the verification database under the condition that a verification result is failed;
matching the information with third-party data provided by the third-party data source, and counting the successful matching times;
calculating the credible score of the information according to the successful matching times and a preset score; wherein the preset score is the score of each successful matching;
and under the condition that the credibility score is larger than a preset threshold value, modifying the verification result of the information to be passed.
2. The method according to claim 1, wherein the calculating a trustworthiness score of the information based on third party data provided by the third party data source comprises:
matching the information with third party data provided by the third party data source;
under the condition of successful matching, obtaining a score corresponding to the importance degree of the third-party data source;
and determining the corresponding score as the credible score of the information.
3. The method of claim 1, wherein the invoking a third-party data source outside of the validation database specifically comprises:
acquiring the priority of each third-party data source under the condition that the number of the third-party data sources which can be called exceeds 1;
and calling the third-party data source with the highest priority.
4. The method of claim 3, wherein the priority of the third party data source is determined by the accuracy, reliability, usefulness, fitness, and timeliness of its data.
5. The method of claim 1, wherein the master database in the validation database is updated by:
receiving imported third party data;
under the condition that the third-party data conflicts with existing main data, acquiring the use time of the third-party data and the existing main data;
judging whether the use time of the third-party data is later than that of the existing main data or not;
and writing the third-party data into the verification database as new main data when the use time of the third-party data is later than that of the existing main data.
6. The method of claim 5, wherein the method further comprises:
under the condition that the third-party data conflicts with the existing main data, acquiring the grade corresponding to the scene called by the existing main data;
judging whether the grade is greater than a preset grade or not;
and under the condition that the grade is not greater than the preset grade, executing the step of acquiring the use time of the third-party data and the existing main data.
7. A correction method for information verification is applied to a server for information verification, and comprises the following steps:
receiving information sent by a client;
under the condition that the total score obtained by the information verification of a preset verification database is not greater than the preset total score, determining that the verification result of the information does not pass, and calling a third-party data source except the verification database;
matching the information with third-party data provided by the third-party data source, and counting the successful matching times;
calculating the credible score of the information according to the successful matching times and a preset score; wherein the preset score is the score of each successful matching;
adding the credible score to the total score to obtain a new total score;
and modifying the verification result of the information to pass under the condition that the new total score is larger than the preset total score.
8. An information verification correction device, which is applied to a server for information verification, the device comprising:
the receiving unit is used for receiving the information sent by the client;
the calling unit is used for verifying the information according to a preset verification database and calling a third-party data source except the verification database under the condition that the verification result is not passed;
the matching subunit matches the information with third-party data provided by the third-party data source, and counts the times of successful matching;
the calculating subunit is used for calculating the credible score of the information according to the successful matching times and the preset score; wherein the preset score is the score of each successful matching;
and the correcting unit is used for correcting the verification result of the information to be passed under the condition that the credibility value is larger than a preset threshold value.
9. The apparatus according to claim 8, wherein the computing subunit specifically comprises:
the matching subunit matches the information with third-party data provided by the third-party data source;
the obtaining subunit obtains a score corresponding to the importance degree of the third-party data source under the condition that the matching is successful;
and the determining subunit determines the corresponding score as a credible score of the information.
10. The apparatus according to claim 8, wherein the invoking unit specifically includes:
the first obtaining subunit is used for verifying the information according to a preset verification database, and obtaining the priority of each third-party data source under the condition that the verification result is that the information does not pass and the quantity of the callable third-party data sources outside the verification database exceeds 1;
and calling the subunit to call the third-party data source with the highest priority.
11. The apparatus of claim 10, wherein the priority of the third party data source is determined by the accuracy, reliability, usefulness, fitness, and timeliness of its data.
12. The apparatus of claim 8, wherein the master database in the verification database is updated by:
a receiving unit that receives the imported third party data;
an acquisition unit that acquires use timings of the third-party data and existing master data when the third-party data and the existing master data conflict with each other;
a judging unit that judges whether or not the use time of the third-party data is later than the use time of the existing master data;
and a writing unit configured to write the third-party data as new master data into the verification database when the use time of the third-party data is later than the use time of the existing master data.
13. The apparatus of claim 12, wherein the apparatus further comprises:
the first acquiring subunit is used for acquiring the grade corresponding to the scene called by the existing main data under the condition that the third-party data conflicts with the existing main data;
a judging subunit, for judging whether the grade is greater than a preset grade;
the acquiring unit specifically includes:
and the second acquisition subunit acquires the use time of the third-party data and the existing main data under the condition that the grade is not greater than the preset grade.
14. An information verification correction device, which is applied to a server for information verification, the device comprising:
the receiving unit is used for receiving the information sent by the client;
the calling unit is used for determining that the information verification result does not pass and calling a third-party data source except the verification database under the condition that the total score obtained by the information verification of the preset verification database is not greater than the preset total score;
the matching subunit matches the information with third-party data provided by the third-party data source, and counts the times of successful matching;
the calculating subunit is used for calculating the credible score of the information according to the successful matching times and the preset score; wherein the preset score is the score of each successful matching;
the adding unit is used for adding the credible score on the basis of the total score to obtain a new total score;
and the correcting unit is used for correcting the verification result of the information to be passed under the condition that the new total score is larger than the preset total score.
CN201611093985.2A 2016-12-01 2016-12-01 Information verification correction method and device Active CN107040512B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611093985.2A CN107040512B (en) 2016-12-01 2016-12-01 Information verification correction method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611093985.2A CN107040512B (en) 2016-12-01 2016-12-01 Information verification correction method and device

Publications (2)

Publication Number Publication Date
CN107040512A CN107040512A (en) 2017-08-11
CN107040512B true CN107040512B (en) 2020-04-14

Family

ID=59530655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611093985.2A Active CN107040512B (en) 2016-12-01 2016-12-01 Information verification correction method and device

Country Status (1)

Country Link
CN (1) CN107040512B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119197A (en) * 2006-08-04 2008-02-06 华为技术有限公司 Contracting method and system
CN101150405A (en) * 2006-09-22 2008-03-26 华为技术有限公司 Method and system for multicast and broadcast service authentication and authorization
CN101582763A (en) * 2009-04-02 2009-11-18 北京飞天诚信科技有限公司 Method and system for identity authentication based on dynamic password
CN103327133A (en) * 2013-05-31 2013-09-25 青岛海信传媒网络技术有限公司 Method and device for updating geographic position information
CN104811312A (en) * 2015-05-25 2015-07-29 王旭东 Terminal course identity authentication method based on center authorization

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI299831B (en) * 2005-11-29 2008-08-11 Dorado Design Automation Inc Circuit-design auxiliary method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119197A (en) * 2006-08-04 2008-02-06 华为技术有限公司 Contracting method and system
CN101150405A (en) * 2006-09-22 2008-03-26 华为技术有限公司 Method and system for multicast and broadcast service authentication and authorization
CN101582763A (en) * 2009-04-02 2009-11-18 北京飞天诚信科技有限公司 Method and system for identity authentication based on dynamic password
CN103327133A (en) * 2013-05-31 2013-09-25 青岛海信传媒网络技术有限公司 Method and device for updating geographic position information
CN104811312A (en) * 2015-05-25 2015-07-29 王旭东 Terminal course identity authentication method based on center authorization

Also Published As

Publication number Publication date
CN107040512A (en) 2017-08-11

Similar Documents

Publication Publication Date Title
US10812460B2 (en) Validation system utilizing dynamic authentication
CN108389129B (en) Transaction execution method and device based on block chain and electronic equipment
US20180114261A1 (en) Verifying reviews on a blockchain
US20180365688A1 (en) Transaction execution and validation in a blockchain
JP6800147B2 (en) Methods, devices, terminals and servers for verifying the security of service operations
CN112491551A (en) Data verification method and device based on block chain and electronic equipment
CN113434592A (en) Block chain-based data evidence storing method and device and electronic equipment
US11489662B2 (en) Special relationships in a blockchain
US20200090269A1 (en) Data collection method and apparatus for risk evaluation, and electronic device
US9165207B2 (en) Screenshot orientation detection
US20140250105A1 (en) Reliable content recommendations
CN109951475A (en) Multi-platform user account information synchronous method and system, server
CN109428900B (en) Data processing method and device
CN114003510A (en) Script testing method, device, equipment and medium based on Mock service
CN110278241B (en) Registration request processing method and device
CN113656497A (en) Data verification method and device based on block chain
CN108632348B (en) Service checking method and device
CN113449986A (en) Service distribution method, device, server and storage medium
CN107040512B (en) Information verification correction method and device
CN110796548B (en) Asset transaction method and device
CN114138651A (en) Test data generation method and device
JP6563001B2 (en) System and method for detecting and alerting to risks in replenishment transactions
US10515403B1 (en) Bid-based requests for electronic resources
US20200167788A1 (en) Fraudulent request identification from behavioral data
CN111080084A (en) Credit investigation management method, device and storage medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1241591

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.