CN108073794B - Authentication method and device - Google Patents

Authentication method and device Download PDF

Info

Publication number
CN108073794B
CN108073794B CN201611026441.4A CN201611026441A CN108073794B CN 108073794 B CN108073794 B CN 108073794B CN 201611026441 A CN201611026441 A CN 201611026441A CN 108073794 B CN108073794 B CN 108073794B
Authority
CN
China
Prior art keywords
level authority
level
authority
click rate
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611026441.4A
Other languages
Chinese (zh)
Other versions
CN108073794A (en
Inventor
黄海勇
叶璨
卞俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI YOUYANG NEW MEDIA INFORMATION TECHNOLOGY Co.,Ltd.
Original Assignee
Shanghai Youyang New Media Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Youyang New Media Information Technology Co ltd filed Critical Shanghai Youyang New Media Information Technology Co ltd
Priority to CN201611026441.4A priority Critical patent/CN108073794B/en
Publication of CN108073794A publication Critical patent/CN108073794A/en
Application granted granted Critical
Publication of CN108073794B publication Critical patent/CN108073794B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0224Discounts or incentives, e.g. coupons or rebates based on user history
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0239Online discounts or incentives
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Automation & Control Theory (AREA)

Abstract

The application discloses an authentication method and device. One embodiment of the method comprises: acquiring user information of a user, wherein the user information comprises authority information of the user; acquiring a permission set, wherein the permissions in the permission set are sorted in a descending order of the level, the permission with the minimum level is used as a first level permission, and each level permission corresponds to a preset threshold value; based on the first level authority, the following authentication steps are executed: inputting the user information into a pre-trained click rate prediction model to obtain a click rate corresponding to the user information; determining whether the click rate is greater than or equal to a threshold corresponding to the first level authority; and if so, distributing the first-level authority for the user by modifying the authority information. The embodiment allocates the authority by using the user information of the user to improve the click rate of the user.

Description

Authentication method and device
Technical Field
The present application relates to the field of computer technologies, in particular to the field of internet technologies, and in particular, to an authentication method and apparatus.
Background
With the popularization of the internet, competition among various network application platforms is increasingly intensified, and a manner of giving user authority is adopted in many cases to improve the click quantity or the download quantity of users.
In the prior art, users are attracted by giving user rights, generally, the same user rights are given to all users, or users are simply divided into different levels and given different levels of rights, but the individual habits of the users when using network applications are not considered, and the user rights cannot be given to improve the click rate or the download rate of the users in a targeted manner.
Disclosure of Invention
It is an object of the present application to propose an improved authentication method and apparatus to solve the technical problems mentioned in the background section above.
In a first aspect, the present application provides an authentication method, including: acquiring user information of a user, wherein the user information comprises authority information of the user; acquiring a permission set, wherein the permissions in the permission set are sorted in a descending order of the level, the permission with the minimum level is used as a first level permission, and each level permission corresponds to a preset threshold value; based on the first level authority, the following authentication steps are executed: inputting the user information into a pre-trained click rate prediction model to obtain a click rate corresponding to the user information; determining whether the click rate is greater than or equal to a threshold corresponding to the first level authority; and if so, distributing the first-level authority for the user by modifying the authority information.
In some embodiments, if the click rate is smaller than the threshold corresponding to the first level permission, the authentication step is continuously executed with the next level permission as the first level permission.
In some embodiments, the user information further comprises at least one of: historical transaction data of the user, retrieval data of the user, gender of the user, age of the user, professional information of the user, and geographic location information of the user.
In some embodiments, the method further comprises the step of allocating a flow ratio comprising: acquiring user information of a preset number of sample users, and taking the ratio of the number of the sample users of each level authority to the preset number as a flow proportion corresponding to each level authority; acquiring click rate corresponding to each level authority; taking the product of the click rate corresponding to each level authority and the flow rate proportion corresponding to each level authority as the click rate corresponding to each level authority, and taking the sum of the click rates corresponding to each level authority as the total click rate; and determining the flow proportion corresponding to each level authority which maximizes the total click quantity, and taking the flow proportion as the distribution flow proportion corresponding to each level authority.
In some embodiments, determining the traffic proportion corresponding to each level authority that maximizes the total click volume includes: establishing a multiple regression equation of the flow proportion corresponding to the total click rate and each level authority; and solving the flow proportion corresponding to each level authority which enables the total click quantity to be maximum in the multiple regression equation.
In some embodiments, obtaining the click rate corresponding to each level authority includes: obtaining the click rate of a plurality of sample users corresponding to each level authority, sequencing the click rate of each sample user according to the sequence from large to small, and forming a click rate set corresponding to each level authority; sequentially determining the ranking proportion of each click rate corresponding to each level authority in the click rate set and forming a ranking proportion set corresponding to each level authority, wherein the ranking proportion is the ratio of the sorting position of the elements in the set to the total number of the elements; drawing a curve corresponding to each level authority by taking each ranking proportion in the ranking proportion set corresponding to each level authority as an abscissa and taking each click rate in the click rate set corresponding to each level authority as an ordinate, and generating a fitting function corresponding to each level authority; and solving the average value of the fitting function corresponding to each level authority in a preset interval as the click rate corresponding to each level authority.
In some embodiments, the method further comprises the step of setting a threshold comprising: and setting the click rate corresponding to the distribution flow proportion corresponding to each level authority as a threshold corresponding to each level authority.
In a second aspect, the present application provides an authentication apparatus, comprising: the system comprises an acquisition user information unit and a processing unit, wherein the acquisition user information unit is configured to acquire user information of a user, and the user information comprises authority information of the user; the system comprises an acquisition permission unit, a storage unit and a processing unit, wherein the acquisition permission unit is configured to acquire a permission set, the permissions in the permission set are sorted in the order of levels from small to large, the permission with the minimum level is used as a first level permission, and the permission of each level corresponds to a preset threshold value; a selection unit configured to drive the following sub-units to perform the authentication step based on the first level authority: the prediction subunit inputs the user information into a pre-trained click rate prediction model to obtain a click rate corresponding to the user information; the determining subunit determines whether the click rate is greater than or equal to a threshold corresponding to the first-level authority; and the distribution subunit distributes the first-level authority to the user by modifying the authority information if the click rate is greater than or equal to the threshold corresponding to the first-level authority.
In some embodiments, the apparatus further includes a feedback unit configured to feed back the next-level right as the first-level right to the selection unit if the click rate is smaller than a threshold corresponding to the first-level right.
In some embodiments, the user information further comprises at least one of: historical transaction data of the user, retrieval data of the user, gender of the user, age of the user, professional information of the user, and geographic location information of the user.
In some embodiments, the apparatus further comprises: the traffic proportion obtaining unit is configured for obtaining user information of a preset number of sample users and taking the ratio of the number of the sample users of each level authority to the preset number as a traffic proportion corresponding to each level authority; the click rate obtaining unit is configured to obtain click rates corresponding to the level authorities; the counting unit is configured to take the product of the click rate corresponding to each level authority and the flow rate corresponding to each level authority as the click amount corresponding to each level authority, and take the sum of the click amounts corresponding to each level authority as the total click amount; and the flow proportion determining unit is configured to determine a flow proportion corresponding to each level authority which maximizes the total click quantity, and take the flow proportion as a distribution flow proportion corresponding to each level authority.
In some embodiments, the determine flow ratio unit is further configured to: establishing a multiple regression equation of the flow proportion corresponding to the total click rate and each level authority; and solving the flow proportion corresponding to each level authority which enables the total click quantity to be maximum in the multiple regression equation.
In some embodiments, the get click rate unit is further configured to: obtaining the click rate of a plurality of sample users corresponding to each level authority, sequencing the click rate of each sample user according to the sequence from large to small, and forming a click rate set corresponding to each level authority; sequentially determining the ranking proportion of each click rate corresponding to each level authority in the click rate set and forming a ranking proportion set corresponding to each level authority, wherein the ranking proportion is the ratio of the sorting position of the elements in the set to the total number of the elements; drawing a curve corresponding to each level authority by taking each ranking proportion in the ranking proportion set corresponding to each level authority as an abscissa and taking each click rate in the click rate set corresponding to each level authority as an ordinate, and generating a fitting function corresponding to each level authority; and solving the average value of the fitting function corresponding to each level authority in a preset interval as the click rate corresponding to each level authority.
In some embodiments, the apparatus further comprises a setting unit configured to: and setting the click rate corresponding to the distribution flow proportion corresponding to each level authority as a threshold corresponding to each level authority.
According to the authentication method and the authentication device, the click rate corresponding to the user information is obtained by utilizing the pre-trained click rate prediction model according to the user information, then the click rate is compared with the preset threshold value, if the click rate exceeds the preset threshold value, the authority of the level can be distributed to the user by modifying the authority information, and therefore different authorities are set for different users in a targeted mode to obtain the maximum click rate.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of an authentication method according to the present application;
FIG. 3 is a flow diagram of yet another embodiment of an authentication method according to the present application;
FIG. 4 is a schematic diagram of a fitting function of an authentication method according to the present application;
FIG. 5 is a schematic block diagram of one embodiment of an authentication device according to the present application;
FIG. 6 is a schematic block diagram of a computer system suitable for use in implementing a server according to embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows an exemplary system architecture 100 to which embodiments of the authentication method or authentication apparatus of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting a client application, including but not limited to a smart phone, a tablet computer, an e-book reader, an MP3 player (Moving Picture Experts Group Audio Layer III, motion Picture Experts Group Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion Picture Experts Group Audio Layer 4), a laptop portable computer, a desktop computer, and the like.
The server 105 may be a server providing various services, such as a background application server providing support for client applications running on the terminal devices 101, 102, 103. The background application server may analyze and otherwise process the received data such as the login request, and feed back the processing result (e.g., the authority information assigned to the user) to the terminal device.
It should be noted that the authentication method provided in the embodiment of the present application is generally executed by the server 105, and accordingly, the authentication device is generally disposed in the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow 200 of one embodiment of an authentication method according to the present application is shown. The authentication method comprises the following steps:
step 201, user information of a user is acquired.
In this embodiment, an electronic device (for example, a server shown in fig. 1) on which the authentication method operates may receive a login request from a terminal of a user through a wired connection manner or a wireless connection manner, where the login request includes an identifier of a pre-registered user, and user information including permission information of the user may be found through the pre-registered identifier. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
In some optional implementations of this embodiment, the user information may further include historical transaction data, retrieved data, gender, age, occupation, and so on, and the user information may be utilized to obtain a big data image of the user. In addition, the login request can also comprise the geographical position information of the user, and the click rate of the user on a certain commodity can be more accurately predicted according to the geographical position information.
Step 202, acquiring a set of permissions.
In this embodiment, the permission set includes permissions of multiple levels, the permission of each level corresponds to a preset threshold, the permissions in the permission set are sorted in order of the level from small to large, and the permission with the smallest level is used as the first-level permission. The right can be an access right, a use day right, a discount right, a payment-free right and the like. For example, the access rights may be access rights to certain functions of the application, e.g., a user with specific rights can access the toolbox. The usage day authority may be a validity period set for a user having a specific authority, and may be a free usage day. The discount or unpaid right may be multiple levels of preferential amounts, from 5, 6, … …, to 15, for 11 levels, with 5 as the first level right, 6 as the second level right, and so on, and 15 as the eleventh level right. The threshold corresponding to the first level authority is 0.5, the threshold corresponding to the second level authority is 0.55, the threshold corresponding to the third level authority is 0.6, the threshold corresponding to the fourth level authority is 0.65, and so on, and the threshold corresponding to the eleventh level authority is 1. The authorities at different levels may not be in an equal difference array, and the threshold may not be uniformly distributed.
Step 203, inputting the user information into a click rate prediction model trained in advance to obtain a click rate corresponding to the user information.
In this embodiment, the click rate prediction model is used to represent a corresponding relationship between user information and a click rate, and may predict the click rate of the user on the product when the user has the first level right according to the user information and the obtained portrait of the user in combination with the application information. For example, the application information of the shopping application is commodity information, the number of times that a certain commodity is clicked by the user accounts for the number of times that the commodity is browsed by the user, and the click rate prediction model can be obtained through deep learning by using a large amount of user information and commodity information as samples.
Step 204, determining whether the click rate is greater than or equal to a threshold corresponding to the first-level authority.
In this embodiment, the click rate predicted in step 203 is compared with a threshold corresponding to the preset first-level authority. If the click rate is greater than or equal to the threshold corresponding to the first level authority, step 205 is executed, otherwise step 206 is executed. The threshold value used for comparison is one-to-one corresponding to the size of the updated first level authority rather than the level name. For example, initially, the first level authority is a discount of 5 units, and its corresponding threshold is 0.5, and the second level authority is a discount of 6 units, and its corresponding threshold is 0.6. When the first level authority is updated to offer 6 yuan, its corresponding threshold is 0.6 instead of the initial 0.5.
Step 205, assigning a first level of authority to the user by modifying the authority information.
In this embodiment, if the click rate is greater than or equal to the threshold corresponding to the first-level permission, the first-level permission is allocated to the user by modifying the permission information. For example, the first level authority is preferential 5 yuan, and when the click rate of the user is predicted to reach more than 0.5, the preferential 5 yuan can be given to the user without increasing the preferential amount.
In some optional implementation manners of this embodiment, if the click rate is smaller than the threshold corresponding to the first-level permission, the method may further include step 206, taking the next-level permission as the first-level permission, and repeatedly performing step 203 and step 204 until the determined click rate is higher than the preset threshold. After the next-level authority is taken as the first-level authority, the corresponding threshold value is updated together with the first-level authority, instead of always using the threshold value corresponding to the initial minimum-level authority. If the rights up to the last level cannot meet the threshold requirement, a default right is assigned to the user, for example, the lowest level right may be the default right or no right may be assigned to the user.
According to the method provided by the embodiment of the application, different authorities are allocated to different users, so that the click rate of the users is increased with lower cost.
With further reference to fig. 3, a flow 300 of yet another embodiment of an authentication method is shown. The process 300 of the authentication method includes the following steps:
step 301, obtaining user information of a predetermined number of sample users and taking a ratio of the number of sample users of each level authority to the predetermined number as a traffic proportion corresponding to each level authority.
In this embodiment, an electronic device (for example, the server shown in fig. 1) on which the authentication method operates may obtain, through a wired connection manner or a wireless connection manner, user information of a predetermined number of sample users from a third-party server, and use a ratio of the number of sample users of each level authority to the predetermined number as a traffic ratio corresponding to each level authority. The sample data is large enough to cover users with different levels of authority, and the data volume is large enough to consider the user traffic proportion to be relatively the same. For example, the predetermined number is 10000, if the authority of 2000 users in the 10000 users is the first level authority, the traffic ratio corresponding to the first level authority is 20%,
step 302, obtaining the click rate corresponding to each level authority.
In this embodiment, the click rate corresponding to each known level authority may be obtained from the third-party server. Or a large number of samples can be used for training to obtain the click rate corresponding to each level authority.
In some optional implementation manners of this embodiment, obtaining the click rate corresponding to each level authority includes:
and 311, obtaining the click rate of a plurality of sample users corresponding to each level authority, sequencing the click rate of each sample user from large to small, and forming a click rate set corresponding to each level authority. For example, M samples are obtained offline, where M is 10000, and under the condition that the authority of the user is preferential for 6 yuan, the click rates P corresponding to the 10000 samples under the condition are determined, and the click rate values are sorted in descending order, so as to obtain an array of 1 × 10000, which is denoted as P.
And step 312, sequentially determining the ranking proportion of each click rate corresponding to each level authority in the click rate set and forming a ranking proportion set corresponding to each level authority, wherein the ranking proportion is the ratio of the sorting position of the elements in the set to the total number of the elements. For example, the position ratio of the array where each value of the array P is located, such as the click rate of the 100 th rank, is determined, and the ranking ratio is 100/10000-0.01. Thus, each number in P can obtain its corresponding ratio value U, and also can obtain an array of 1 × 10000, which is denoted as U.
And 313, drawing a curve corresponding to each level authority by taking each ranking proportion in the ranking proportion set corresponding to each level authority as an abscissa and taking each click rate in the click rate set corresponding to each level authority as an ordinate, and generating a fitting function corresponding to each level authority. For example, 10000 (U) points can be formed on a plane by using the points of the array U as the abscissa and the points of the array P as the ordinatej,Pj) Point (j ═ 1, 2, 3.. 10000), the 10000 points are plotted as a curve, and a functional relationship of p ═ g (u) can be fitted, as shown in fig. 4. The function can be viewed as the relationship between the click rate ranking proportion and the click probability of each sample.
And step 314, solving the average value of the fitting function corresponding to each level authority in a preset interval as the click rate corresponding to each level authority. Here, take the preferential 6 yuan as an example, and the click rate R corresponding to the preferential 6 yuan6The average value of the function for the specified interval of the function p ═ g (u) is used for solving. The flow proportion corresponding to each level authority is the ratio of the number of each level authority to the sum of the numbers of all levels of authorities. For example, in 10000 users, the first level authority is preferential 5 yuan, the number of the users assigned with the first level authority is 1000, and the corresponding traffic proportion of the first level authority is 0.1. The sum of the corresponding flow proportions of the various levels of authority is 1.
Figure BDA0001156813920000091
Wherein a is the flow proportion V allocated to the preferential 5 yuan5I.e. a ═ V5(ii) a b is 6-aryFlow rate ratio V6Flow rate ratio V to the 5-ary preference5Sum, i.e. b ═ V5+V6
Therefore, the simplification is as follows:
Figure BDA0001156813920000092
in formula 2, V5Is the proportion of the flow already allocated, so R6With a flow ratio V of only 6 units allocated to the offer6There is a relationship.
Step 303, taking the product of the click rate corresponding to each level authority and the flow rate ratio corresponding to each level authority as the click rate corresponding to each level authority, and taking the sum of the click rates corresponding to each level authority as the total click rate.
In this embodiment, the corresponding click rate can be determined according to different levels of permissions (e.g., the payment exemption permission embodied by the discount amount), different distribution flow proportions, and click rate conditions of each level. And determining the actual consumption amount under the condition that the authority is the preferential amount. The specific arrangement is shown in the following table 1:
Figure BDA0001156813920000093
Figure BDA0001156813920000101
TABLE 1
Through the table, the click quantity determining formula Q of each level authority, the actual consumption amount determining formula C of each level authority, and the total distribution flow rate proportion V of each level authority can be easily obtainedtotalTotal click rate QtotalTotal actual consumption amount CtotalWherein dmax is the maximum benefit amount of 15, dmin is the minimum benefit amount of 5, i belongs to [ dmin, dmax ]]:
Qi=Vi*Ri(formula 3)
Ci=Qi*i=Vi*RiI (equation 4)
Figure BDA0001156813920000102
Figure BDA0001156813920000103
Figure BDA0001156813920000104
And step 304, determining the flow proportion corresponding to each level authority which maximizes the total click quantity, and taking the flow proportion as the distribution flow proportion corresponding to each level authority.
In this embodiment, the determined distribution flow rate ratio corresponding to each level authority needs to satisfy the following conditions: the sum of the distribution flow proportions corresponding to each level authority is 1. Each level authority corresponds to a proportion of the allocated traffic. For example, the distribution flow rate ratio corresponding to the first level authority is V5The distribution flow rate proportion corresponding to the second level authority is V6And by analogy, the distribution flow proportion corresponding to the last level authority is V15
In some optional implementations of this embodiment, determining a traffic proportion corresponding to each level authority that maximizes the total click volume includes: establishing a multiple regression equation of the flow proportion corresponding to the total click rate and each level authority; and solving the flow proportion corresponding to each level authority which maximizes the total click quantity in the multiple regression equation.
The above multiple regression equation is as follows:
Figure BDA0001156813920000111
assuming that the click rate R is known, it can be simplified to: and (3) solving a multiple regression model of the click rate Q and the distribution flow rate ratio V, namely f is a function of V.
The solution may consider: the solution is solved by using a tool of SPSS (Statistical Product and Service Solutions) software or a scipy library (a tool set for scientific determination in Python, such as numerical determination algorithms and some function functions, which can conveniently process data) in Python (an object-oriented interpreted computer programming language).
In some optional implementations of this embodiment, for a budget case, the cost of a single click is considered when allocating the traffic proportion, so equation 8 further needs to satisfy the following condition:
Figure BDA0001156813920000112
wherein, CPAbaseThe pre-set per-person budget.
Step 305, setting the click rate corresponding to the distribution flow rate proportion corresponding to each level authority as a threshold corresponding to each level authority.
In this embodiment, the click rate corresponding to the distribution flow rate ratio corresponding to each level authority determined in step 304 is set as a threshold corresponding to each level authority. For example, after the distribution flow rate is determined, the click rate corresponding to the distribution flow rate can be obtained according to formula 2. And setting the click rate as a threshold corresponding to the level authority. For example, the threshold of the first level authority (the preferential amount is 5 yuan) is set as the click rate R5
As can be seen from fig. 3, compared with the embodiment corresponding to fig. 2, the flow 300 of the authentication method in this embodiment highlights the step of setting the threshold. Therefore, the threshold values corresponding to the authorities at different levels can be reasonably set, and the maximum click rate of the user is obtained.
With further reference to fig. 5, as an implementation of the method shown in the above figures, the present application provides an embodiment of an authentication apparatus, which corresponds to the embodiment of the method shown in fig. 2, and which can be applied in various electronic devices.
As shown in fig. 5, the authentication apparatus 500 according to the present embodiment includes: an acquire user information unit 501, an acquire authority unit 502, and a selection unit 503. The acquiring user information unit 501 is configured to acquire user information of a user; the permission acquiring unit 502 is configured to acquire a permission set, wherein the permissions in the permission set are sorted in order of levels from small to large, the permission with the smallest level is used as a first-level permission, and each level of permission corresponds to a preset threshold; the selection unit 503 is configured to drive the following sub-units to perform the authentication step based on the first level of authority: the prediction subunit 511 inputs the user information into a click rate prediction model trained in advance to obtain a click rate corresponding to the user information; the determining subunit 512 determines whether the click rate is greater than or equal to a threshold corresponding to the first level permission; the assigning subunit 513 assigns the first level right to the user by modifying the right information if the click rate is greater than or equal to the threshold corresponding to the first level right.
In the present embodiment, the user information acquired by the acquire user information unit 501 and the authority information acquired by the acquire authority unit 502 are input to the selection unit 503 for authority assignment.
In some optional implementation manners of this embodiment, the apparatus further includes a feedback unit 504 configured to, if the click rate is smaller than a threshold corresponding to the first level permission, feed back the next level permission as the first level permission to the selection unit 503.
In some optional implementations of this embodiment, the user information may further include historical transaction data, retrieved data, gender, age, occupation, and so on, and the user information may be utilized to obtain a big data image of the user. In addition, the login request can also comprise the geographical position information of the user, and the click rate of the user on a certain commodity can be more accurately predicted according to the geographical position information.
In some optional implementations of this embodiment, the apparatus 500 further includes: the traffic proportion obtaining unit is configured for obtaining user information of a preset number of sample users and taking the ratio of the number of the sample users of each level authority to the preset number as a traffic proportion corresponding to each level authority; the click rate obtaining unit is configured to obtain click rates corresponding to the level authorities; the counting unit is configured to take the product of the click rate corresponding to each level authority and the flow rate corresponding to each level authority as the click amount corresponding to each level authority, and take the sum of the click amounts corresponding to each level authority as the total click amount; and the flow proportion determining unit is configured to determine a flow proportion corresponding to each level authority which maximizes the total click quantity, and take the flow proportion as a distribution flow proportion corresponding to each level authority, wherein the sum of the distribution flow proportions corresponding to each level authority is 1.
In some optional implementations of this embodiment, the flow rate ratio determining unit is further configured to: establishing a multiple regression equation of the flow proportion corresponding to the total click rate and each level authority; and solving the flow proportion corresponding to each level authority which enables the total click quantity to be maximum in the multiple regression equation.
In some optional implementation manners of this embodiment, the click rate obtaining unit is further configured to: obtaining the click rate of a plurality of sample users corresponding to each level authority, sequencing the click rate of each sample user according to the sequence from large to small, and forming a click rate set corresponding to each level authority; sequentially determining the ranking proportion of each click rate corresponding to each level authority in the click rate set and forming a ranking proportion set corresponding to each level authority, wherein the ranking proportion is the ratio of the sorting position of the elements in the set to the total number of the elements; drawing a curve corresponding to each level authority by taking each ranking proportion in the ranking proportion set corresponding to each level authority as an abscissa and taking each click rate in the click rate set corresponding to each level authority as an ordinate, and generating a fitting function corresponding to each level authority; and solving the average value of the fitting function corresponding to each level authority in a preset interval as the click rate corresponding to each level authority.
In some optional implementations of this embodiment, the apparatus 500 further includes a setting unit configured to: and setting the click rate corresponding to the distribution flow proportion corresponding to each level authority as a threshold corresponding to each level authority.
Referring now to FIG. 6, shown is a block diagram of a computer system 600 suitable for use in implementing a server according to embodiments of the present application.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the system 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Liquid Crystal Display (LCD) and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program performs the above-described functions defined in the method of the present application when executed by a Central Processing Unit (CPU) 601.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes an acquire user information unit, an acquire authority unit, and a selection unit. The names of these units do not in some cases form a limitation on the units themselves, and for example, the unit for acquiring user information may also be described as "unit for acquiring user information of the user".
As another aspect, the present application also provides a non-volatile computer storage medium, which may be the non-volatile computer storage medium included in the apparatus in the above-described embodiments; or it may be a non-volatile computer storage medium that exists separately and is not incorporated into the terminal. The non-transitory computer storage medium stores one or more programs that, when executed by a device, cause the device to: acquiring user information of a user, wherein the user information comprises authority information of the user; acquiring a permission set, wherein the permissions in the permission set are ordered according to the sequence of levels from small to large, the permission with the minimum level is taken as a first level permission, and each level permission corresponds to a preset threshold value; based on the first level authority, the following authentication steps are executed: inputting the user information into a pre-trained click rate prediction model to obtain a click rate corresponding to the user information; determining whether the click rate is greater than or equal to a threshold corresponding to the first level authority; and if so, distributing the first-level authority for the user by modifying the authority information.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by a person skilled in the art that the scope of the invention as referred to in the present application is not limited to the embodiments with a specific combination of the above-mentioned features, but also covers other embodiments with any combination of the above-mentioned features or their equivalents without departing from the inventive concept. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (8)

1. A method of authentication, the method comprising:
acquiring user information of a user, wherein the user information comprises authority information of the user;
acquiring a permission set, wherein the permissions in the permission set are sorted in the order of the levels from small to large, the permission with the minimum level is taken as a first-level permission, the permission of each level corresponds to a preset threshold, and the threshold is increased along with the increase of the permission level;
based on the first level authority, the following authentication steps are executed: inputting the user information into a pre-trained click rate prediction model to obtain a click rate corresponding to the user information; determining whether the click rate is larger than or equal to a threshold corresponding to the first level authority;
if so, distributing the first level authority for the user by modifying the authority information;
wherein, the threshold corresponding to the authority of each level is set through the following steps:
acquiring user information of a preset number of sample users, and taking the ratio of the number of the sample users of each level authority to the preset number as a flow proportion corresponding to each level authority;
acquiring click rate corresponding to each level authority;
taking the product of the click rate corresponding to each level authority and the flow rate proportion corresponding to each level authority as the click rate corresponding to each level authority, and taking the sum of the click rates corresponding to each level authority as the total click rate;
determining a flow proportion corresponding to each level authority which enables the total click quantity to be maximum, and taking the flow proportion as a distribution flow proportion corresponding to each level authority;
setting the click rate corresponding to the distribution flow proportion corresponding to each level authority as a threshold corresponding to each level authority;
the obtaining of the click rate corresponding to each level authority includes:
obtaining the click rate of a plurality of sample users corresponding to each level authority, sequencing the click rate of each sample user according to the sequence from large to small, and forming a click rate set corresponding to each level authority;
sequentially determining the ranking proportion of each click rate corresponding to each level authority in a click rate set and forming a ranking proportion set corresponding to each level authority, wherein the ranking proportion is the ratio of the sorting position of elements in the set to the total number of the elements;
drawing a curve corresponding to each level authority by taking each ranking proportion in the ranking proportion set corresponding to each level authority as an abscissa and taking each click rate in the click rate set corresponding to each level authority as an ordinate, and generating a fitting function corresponding to each level authority;
and solving the average value of the fitting function corresponding to each level authority in a preset interval as the click rate corresponding to each level authority.
2. The authentication method according to claim 1, characterized in that the method further comprises:
and if the click rate is smaller than the threshold corresponding to the first level authority, taking the next level authority as the first level authority to continue executing the authentication step.
3. The authentication method according to claim 1 or 2, characterized in that the user information further comprises at least one of the following:
historical transaction data of the user, retrieval data of the user, gender of the user, age of the user, professional information of the user, and geographic location information of the user.
4. The authentication method according to claim 1, wherein the determining the traffic proportion corresponding to each level authority that maximizes the total click-through amount comprises:
establishing a multiple regression equation of the flow proportion corresponding to the total click rate and each level authority;
and solving the flow proportion corresponding to each level authority which maximizes the total click quantity in the multiple regression equation.
5. An authentication apparatus, characterized in that the apparatus comprises:
the system comprises an acquisition user information unit and a processing unit, wherein the acquisition user information unit is configured to acquire user information of a user, and the user information comprises authority information of the user;
the system comprises an acquisition permission unit, a storage unit and a processing unit, wherein the acquisition permission unit is configured to acquire a permission set, the permissions in the permission set are sorted in the order of the levels from small to large, the permission with the minimum level serves as a first level permission, the permission of each level corresponds to a preset threshold value, and the threshold value is increased along with the increase of the permission level;
a selection unit configured to drive the following sub-units to perform the authentication step based on the first level authority: the prediction subunit inputs the user information into a pre-trained click rate prediction model to obtain a click rate corresponding to the user information; the determining subunit determines whether the click rate is greater than or equal to a threshold corresponding to the first level authority; the distribution subunit distributes the first-level authority to the user by modifying authority information if the click rate is greater than or equal to a threshold corresponding to the first-level authority;
the traffic proportion obtaining unit is configured for obtaining user information of a preset number of sample users and taking the ratio of the number of the sample users of each level authority to the preset number as a traffic proportion corresponding to each level authority;
the click rate obtaining unit is configured to obtain click rates corresponding to the level authorities;
the counting unit is configured to take the product of the click rate corresponding to each level authority and the flow rate corresponding to each level authority as the click amount corresponding to each level authority, and take the sum of the click amounts corresponding to each level authority as the total click amount;
a flow rate proportion determining unit configured to determine a flow rate proportion corresponding to each level authority that maximizes the total click amount, and use the flow rate proportion as a distribution flow rate proportion corresponding to each level authority;
the setting unit is configured to set the click rate corresponding to the distribution flow proportion corresponding to each level authority as a threshold corresponding to each level authority;
the obtaining of the click rate corresponding to each level authority includes:
obtaining the click rate of a plurality of sample users corresponding to each level authority, sequencing the click rate of each sample user according to the sequence from large to small, and forming a click rate set corresponding to each level authority;
sequentially determining the ranking proportion of each click rate corresponding to each level authority in a click rate set and forming a ranking proportion set corresponding to each level authority, wherein the ranking proportion is the ratio of the sorting position of elements in the set to the total number of the elements;
drawing a curve corresponding to each level authority by taking each ranking proportion in the ranking proportion set corresponding to each level authority as an abscissa and taking each click rate in the click rate set corresponding to each level authority as an ordinate, and generating a fitting function corresponding to each level authority;
and solving the average value of the fitting function corresponding to each level authority in a preset interval as the click rate corresponding to each level authority.
6. The authentication device of claim 5, wherein the device further comprises:
and the feedback unit is configured to feed back the next level authority as the first level authority to the selection unit if the click rate is smaller than the threshold corresponding to the first level authority.
7. The authentication device according to claim 5 or 6, wherein the user information further comprises at least one of:
historical transaction data of the user, retrieval data of the user, gender of the user, age of the user, professional information of the user, and geographic location information of the user.
8. The authentication device according to claim 5, wherein the unit for determining the flow rate proportion is further configured to:
establishing a multiple regression equation of the flow proportion corresponding to the total click rate and each level authority;
and solving the flow proportion corresponding to each level authority which maximizes the total click quantity in the multiple regression equation.
CN201611026441.4A 2016-11-18 2016-11-18 Authentication method and device Active CN108073794B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611026441.4A CN108073794B (en) 2016-11-18 2016-11-18 Authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611026441.4A CN108073794B (en) 2016-11-18 2016-11-18 Authentication method and device

Publications (2)

Publication Number Publication Date
CN108073794A CN108073794A (en) 2018-05-25
CN108073794B true CN108073794B (en) 2022-03-15

Family

ID=62160874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611026441.4A Active CN108073794B (en) 2016-11-18 2016-11-18 Authentication method and device

Country Status (1)

Country Link
CN (1) CN108073794B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101233536A (en) * 2005-01-07 2008-07-30 皮艇软件公司 Individualized marketing to improve capacity utilization
CN202257679U (en) * 2011-01-25 2012-05-30 郭曦 Intelligent commodity and promotion recommendation system based on cloud analysis
CN103092877A (en) * 2011-11-04 2013-05-08 百度在线网络技术(北京)有限公司 Method and device for recommending keyword
CN105260912A (en) * 2015-10-16 2016-01-20 百度在线网络技术(北京)有限公司 Resource allocation method and resource allocation device
CN105678568A (en) * 2015-12-29 2016-06-15 拉扎斯网络科技(上海)有限公司 Method and apparatus for determining preferential information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8909655B1 (en) * 2007-10-11 2014-12-09 Google Inc. Time based ranking
US8229786B2 (en) * 2010-04-06 2012-07-24 Yahoo! Inc. Click probability with missing features in sponsored search
CN103345512A (en) * 2013-07-06 2013-10-09 北京品友互动信息技术有限公司 Online advertising click-through rate forecasting method and device based on user attribute
CN104992060A (en) * 2015-06-25 2015-10-21 腾讯科技(深圳)有限公司 User age estimation method and apparatus
CN105631711A (en) * 2015-12-30 2016-06-01 合一网络技术(北京)有限公司 Advertisement putting method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101233536A (en) * 2005-01-07 2008-07-30 皮艇软件公司 Individualized marketing to improve capacity utilization
CN202257679U (en) * 2011-01-25 2012-05-30 郭曦 Intelligent commodity and promotion recommendation system based on cloud analysis
CN103092877A (en) * 2011-11-04 2013-05-08 百度在线网络技术(北京)有限公司 Method and device for recommending keyword
CN105260912A (en) * 2015-10-16 2016-01-20 百度在线网络技术(北京)有限公司 Resource allocation method and resource allocation device
CN105678568A (en) * 2015-12-29 2016-06-15 拉扎斯网络科技(上海)有限公司 Method and apparatus for determining preferential information

Also Published As

Publication number Publication date
CN108073794A (en) 2018-05-25

Similar Documents

Publication Publication Date Title
US20210232984A1 (en) Order allocation system and method
CN107944481B (en) Method and apparatus for generating information
US20210341299A1 (en) E-hailing service
CN110377829B (en) Function recommendation method and device applied to electronic equipment
CN110619078B (en) Method and device for pushing information
CN111274341A (en) Site selection method and device for network points
CN110738436A (en) method and device for determining available stock
US10062101B2 (en) Maximizing the propensity of content consumption according to content complexity and content consumption time
JP2016062489A (en) Information processing device, terminal device, information processing method, and information processing program
CN113780613A (en) Path recommendation method and device
WO2022127517A1 (en) Hierarchical adaptive contextual bandits for resource-constrained recommendation
CN111552835A (en) File recommendation method and device and server
CN109978594B (en) Order processing method, device and medium
US20170365014A1 (en) Systems, methods and non-transitory computer readable storage media for tracking and evaluating predictions regarding relationships
CN108073794B (en) Authentication method and device
CN112449217A (en) Method and device for pushing video
JP2017117478A (en) Information processing device, terminal device, information processing method, and information processing program
CN107077475A (en) According to product/user tag and the system and method for common installation diagram recommended products bundle
Du et al. Monte-carlo tree search aided contextual online learning approach for wireless caching
CN111858542B (en) Data processing method, device, equipment and computer readable storage medium
CN109727072B (en) Method and apparatus for processing information
CN112508631A (en) User policy distribution method and device and electronic equipment
JP2020113144A (en) Information processing device, advertisement distribution method, and program
CN116911912B (en) Method and device for predicting interaction objects and interaction results
Su et al. The User Participation Incentive Mechanism of Mobile Crowdsensing Network Based on User Threshold

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20191126

Address after: 201210 room j1328, floor 3, building 8, No. 55, Huiyuan Road, Jiading District, Shanghai

Applicant after: SHANGHAI YOUYANG NEW MEDIA INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 100085 Beijing, Haidian District, No. ten on the ground floor, No. 10 Baidu building, layer three

Applicant before: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180525

Assignee: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY Co.,Ltd.

Assignor: SHANGHAI YOUYANG NEW MEDIA INFORMATION TECHNOLOGY Co.,Ltd.

Contract record no.: X2020990000202

Denomination of invention: User authentication method and user authentication device

License type: Exclusive License

Record date: 20200420

EE01 Entry into force of recordation of patent licensing contract
GR01 Patent grant
GR01 Patent grant