Summary of the invention
In view of the above technical problems, this specification embodiment provides a kind of authorization text Accuracy Verification method and apparatus,
Technical solution is as follows:
According to this specification embodiment in a first aspect, provide a kind of authorization text Accuracy Verification method, applied to asking
The third party's service of user information authorization is sought, this method comprises:
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to
User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified
Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark
It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service
Actual user's information of output determines the accuracy of authorization text according to comparing result.
According to the second aspect of this specification embodiment, a kind of authorization text Accuracy Verification device is provided, applied to asking
The third party's service of user information authorization is sought, which includes:
Text obtains module: for obtaining authorization text to be verified, the authorization text to be verified for third party's service to
When user requests authorization, authorization message is listed to user so that user carries out the text exhibition of Authorized operation;
Text analysis model: for carrying out semantic analysis to the authorization text to be verified, the authorization to be verified is determined
User identifier, third party's service mark and the user information for being provided to third party's service for including in text;
Output obtains module: for being generated after authorizing successfully according to the user identifier and third party's service mark
Information output record in retrieved, determine actual user's information for exporting to third party's service;
Transcription comparison's module: for comparing the user's letter for being provided to third party's service in the authorization text to be verified
Breath determines the accuracy of authorization text according to comparing result with the actual user's information exported to third party's service.
According to the third aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit
Store up the computer program that can be run on a memory and on a processor, wherein the processor is realized when executing described program
A kind of authorization text Accuracy Verification method, the third party's service applied to request user information authorization, which comprises
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to
User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified
Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark
It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service
Actual user's information of output determines the accuracy of authorization text according to comparing result.
Technical solution provided by this specification embodiment, the flow that platform generates when requesting and authorize to user by obtaining
The practical user information exported to third-party application of message, the authorization content of text that true directional user shows, then monitoring platform, leads to
The authorization content of text and the practical user information exported to third-party application that comparison is shown to user are crossed, verifies and is shown to user
Authorization content of text whether there is mistake.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
This specification embodiment can be limited.
In addition, any embodiment in this specification embodiment does not need to reach above-mentioned whole effects.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute
The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses
Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims
Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is
Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but
These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off
In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed
For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or
" when ... " or " in response to determination ".
Platform can be serviced to third party's service by related API, SDK etc. and provide user information, so that user uses the
The related service of tripartite's service.To ensure user's right, during user information is supplied to third party's service, need straight
It connects or the authorization of indirect gain user.Specifically, it is desirable that provided in information process to third party, it is necessary to list authorization to user
Content and authorization object, to obtain the express authorization of user.
The third party's service for needing to authorize may include, and mobile terminal application, small routine, web application etc. are needed to third
The user information that side's service provides may include the client-side information of user, telephone number information, ID card information etc..Due to
The third party's service for needing to authorize and the user information that needs authorize are various, if requesting the text of authorization official documents and correspondence occur to user
It writes mistake or actual grant information changes but when official documents and correspondence does not timely update, traditional dependence manually checks authorization
The mode of text is possibly can not timely discovery and modification.
In view of the above problems, this specification embodiment provides a kind of authorization text Accuracy Verification method and a kind of use
In the risk rule generating means for executing this method.The method that this specification embodiment is mentioned is mainly used in request user information
The third party's service of authorization, specifically, platform may include that ant gold takes open platform, sesame credit open platform etc..
The authorization text Accuracy Verification method that the present embodiment is related to is described in detail below, it is shown in Figure 1, it should
Method may comprise steps of:
S101, obtains authorization text to be verified, and the authorization text to be verified is that third party's service requests to authorize to user
When, authorization message is listed to user so that user carries out the text exhibition of Authorized operation;
Platform would generally gather a variety of third party's services to facilitate user to select and use, and user can pass through operating platform
The interface for being supplied to third party's service so that use third party's service, such as: user platform interface click icon " doctor
Treat ", third party's service interface, and then the diagnosis provided using third party can be provided, register and wait health services.
Still by taking third party's service " medical treatment " as an example, when user wants to use the third party's service, for example, when user wants to lead to
When crossing third party's service progress " registering ", which needs to obtain the name of user, identification card number etc. by platform
For information to complete the operation of registering, platform needs to request the authorization of user before providing these user informations, it is generally the case that
It is that an authorization interface is shown to user, comprising listing authorization message to user so that user carries out the exhibition of Authorized operation in interface
Show text.
Wherein, the mode for obtaining text exhibition can be with are as follows: the traffic messages generated when requesting and authorize to user is obtained, by institute
It states the authorization text for including in traffic messages and is determined as authorization text to be verified.
Further, the traffic messages generated when requesting and authorize to user are obtained, are awarded include in the traffic messages
Power text is determined as authorization text to be verified can be with are as follows: obtains the traffic messages generated when requesting and authorize to user, extraction is wherein
The page of text for showing user is positioned in page of text according to preset keyword, to extract the text
The authorization text is determined as authorization text to be verified by the authorization text for including in the page.
Authorization text usually has similar text formatting, even carries out writing, example according to preset text formatting
Such as, the official documents and correspondence of authorization text beginning is usual are as follows: and " XX service needs to obtain following information ... ", according to similar in authorization text
Vocabulary presets one or more keywords, and navigates to authorization text in all texts of page of text according to the keyword
This.
Further, the traffic messages generated when requesting and authorize to user are obtained, the text for wherein showing user is extracted
The mode of the page can be with are as follows: obtains the traffic messages generated when requesting and authorize to user, extracts and store crucial message therein;
The crucial message is subjected to normalization processing, to obtain the page of text for wherein showing user.
Normalization processing is to arrange the message content of chaotic format, according to unified pattern output, so as to subsequent
Carry out transcription comparison.
S102 carries out semantic analysis to the authorization text to be verified, determines in the authorization text to be verified and includes
User identifier, third party's service mark and the user information for being provided to third party's service;
Wherein, user identifier at least may include the unique information that platform can be used for identifying the user, which can be
Platform distributes to the id information of the user;Third party's service mark at least may include that platform can be used for identifying the third party's service
Unique information, when third party's service mark can move into platform for third party's service, platform is generated and assigned to third party clothes
The id information of business.
S103, the information output note generated after authorizing successfully according to the user identifier and third party's service mark
It is retrieved in record, determines the actual user's information exported to third party's service;
S104 is compared in the authorization text to be verified and is provided to the user information of third party's service, and to third
Actual user's information of side's service output, the accuracy of authorization text is determined according to comparing result.
If comparing result shows to be provided to the user information of third party's service in authorization text to be verified, and to the
Actual user's information category that tripartite services output is identical, then can verify that authorization text accuracy is errorless, say if the two difference
Bright authorization text accuracy is wrong.
The method that this specification provides can find rapidly the authorization text of description inaccuracy, and then correct authorization in time
Text, and can be found in historical record according to the discovery time of inaccuracy authorization text with corresponding third party's service
The user that the inaccuracy authorizes text was provided for it when request authorization, to provide the augmentation requests such as authorized to the user
Etc. relevant treatments.
In order to further ensure the accuracy of verifying, in addition to being provided to third party's service in authorization text to be verified
User information, and outside actual user's information for being exported to third party's service, can also add-on third party signing information tested jointly
Card, third party's signing information is third party's service when moving into platform, the label relevant to third party's service that platform can save
About information, the signing information are generally held in third party's signing table, wherein may include the title of third party's service, mark
ID, classification, the user information etc. for needing to obtain.When the user information of third party's service demand changes, need to notify to put down
Platform simultaneously modifies signing information.Such as: third party's service increases new service content after updating, in addition to obtaining original user's letter
Breath is outer, increases the demand for obtaining station address information newly, needs to revise signing information at this time, is added believes about station address wherein
The demand entry of breath.
With reference to attached drawing 2, for the flow chart that third party's signing information is added to authorization text Accuracy Verification method, this method
It may comprise steps of:
S201 obtains the third party's signing table itself prestored, according to third party's service mark in third party's signing table
In retrieved, to extract the signing record of the third party's service, include third party's service needs in signing record
The user information of acquisition;
S202 compares third party's service in the signing record and needs the user information that obtains, and defeated to third party's service
Whether actual user's information out, both verifyings are identical;
S203 compares the user information that third party's service needs to obtain in the signing record, with authorization text to be verified
In be provided to the user information of third party's service, whether both verifyings identical.
This specification embodiment also provides a kind of more specifically authorization text Accuracy Verification method, shown in Figure 3,
This method may comprise steps of:
S301 obtains the traffic messages generated when requesting and authorize to user, extracts and stores crucial message therein;
The crucial message is carried out normalization processing, to obtain the page of text for wherein showing user by S302;
S303 is positioned in page of text according to preset keyword, is wrapped with extracting in the page of text
The authorization text is determined as authorization text to be verified by the authorization text contained;
S304 carries out semantic analysis to the authorization text to be verified, determines in the authorization text to be verified and includes
User identifier, third party's service mark and the user information for being provided to third party's service;
S305, the information output note generated after authorizing successfully according to the user identifier and third party's service mark
It is retrieved in record, determines the actual user's information exported to third party's service;
S306 is compared in the authorization text to be verified and is provided to the user information of third party's service, and to third
Actual user's information of side's service output, the accuracy of authorization text is determined according to comparing result;
Corresponding to above method embodiment, this specification embodiment also provides a kind of risk rule generating means, referring to fig. 4
It is shown, the apparatus may include: text obtains module 410, similar computing module 420, network struction module 430, group's hair
Existing module 440.
Text obtains module 410: for obtaining authorization text to be verified, the authorization text to be verified is third party's service
When requesting to authorize to user, authorization message is listed to user so that user carries out the text exhibition of Authorized operation;
Text analysis model 420: for the authorization text to be verified progress semantic analysis, determining described to be verified award
User identifier, third party's service mark and the user information for being provided to third party's service for including in power text;
Output obtains module 430: for being identified after authorizing successfully according to the user identifier and the third party's service
It is retrieved in the information output record of generation, determines the actual user's information exported to third party's service;
Transcription comparison's module 440: for comparing the use for being provided to third party's service in the authorization text to be verified
Family information determines the accuracy of authorization text according to comparing result with the actual user's information exported to third party's service.
This specification embodiment also provides a kind of computer equipment, includes at least memory, processor and is stored in
On reservoir and the computer program that can run on a processor, wherein processor realizes that aforementioned authorization is literary when executing described program
This Accuracy Verification method, the method include at least:
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to
User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified
Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark
It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service
Actual user's information of output determines the accuracy of authorization text according to comparing result.
Fig. 5 shows one kind provided by this specification embodiment and more specifically calculates device hardware structural schematic diagram,
The equipment may include: processor 1010, memory 1020, input/output interface 1030, communication interface 1040 and bus
1050.Wherein processor 1010, memory 1020, input/output interface 1030 and communication interface 1040 are real by bus 1050
The now communication connection inside equipment each other.
Processor 1010 can use general CPU (Central Processing Unit, central processing unit), micro- place
Reason device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one
Or the modes such as multiple integrated circuits are realized, for executing relative program, to realize technical side provided by this specification embodiment
Case.
Memory 1020 can use ROM (Read Only Memory, read-only memory), RAM (Random Access
Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 1020 can store
Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware
When, relevant program code is stored in memory 1020, and execution is called by processor 1010.
Input/output interface 1030 is for connecting input/output module, to realize information input and output.Input and output/
Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein
Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display,
Loudspeaker, vibrator, indicator light etc..
Communication interface 1040 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment
Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly
(such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 1050 include an access, equipment various components (such as processor 1010, memory 1020, input/it is defeated
Outgoing interface 1030 and communication interface 1040) between transmit information.
It should be noted that although above equipment illustrates only processor 1010, memory 1020, input/output interface
1030, communication interface 1040 and bus 1050, but in the specific implementation process, which can also include realizing normal fortune
Other assemblies necessary to row.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising real in above equipment
Component necessary to existing this specification example scheme, without including all components shown in figure.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey
Realize that authorization text Accuracy Verification method above-mentioned, the method include at least when sequence is executed by processor:
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to
User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified
Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark
It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service
Actual user's information of output determines the accuracy of authorization text according to comparing result.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitorymedia), such as the data-signal and carrier wave of modulation.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with
It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual
The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not
In the case where making the creative labor, it can understand and implement.
As seen through the above description of the embodiments, those skilled in the art can be understood that this specification
Embodiment can be realized by means of software and necessary general hardware platform.Based on this understanding, this specification is implemented
Substantially the part that contributes to existing technology can be embodied the technical solution of example in the form of software service in other words,
The computer software service can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are to make
It is each to obtain computer equipment (can be personal computer, server or the network equipment etc.) execution this specification embodiment
Method described in certain parts of a embodiment or embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the service with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can
To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment
The combination of any several equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality
For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method
Part explanation.The apparatus embodiments described above are merely exemplary, wherein described be used as separate part description
Module may or may not be physically separated, can be each module when implementing this specification example scheme
Function realize in the same or multiple software and or hardware.Can also select according to the actual needs part therein or
Person's whole module achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not the case where making the creative labor
Under, it can it understands and implements.
The above is only the specific embodiment of this specification embodiment, it is noted that for the general of the art
For logical technical staff, under the premise of not departing from this specification embodiment principle, several improvements and modifications can also be made, this
A little improvements and modifications also should be regarded as the protection scope of this specification embodiment.