CN110402570A - Information processing method and system, server, terminal, computer storage medium - Google Patents

Information processing method and system, server, terminal, computer storage medium Download PDF

Info

Publication number
CN110402570A
CN110402570A CN201780054468.0A CN201780054468A CN110402570A CN 110402570 A CN110402570 A CN 110402570A CN 201780054468 A CN201780054468 A CN 201780054468A CN 110402570 A CN110402570 A CN 110402570A
Authority
CN
China
Prior art keywords
applications client
user
data
terminal
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780054468.0A
Other languages
Chinese (zh)
Other versions
CN110402570B (en
Inventor
陈谦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Publication of CN110402570A publication Critical patent/CN110402570A/en
Application granted granted Critical
Publication of CN110402570B publication Critical patent/CN110402570B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a kind of information processing methods and system, server, terminal, computer storage medium.The described method includes: obtaining the first message from the first terminal for including first applications client based on the second applications client is requested access to the account data of the first applications client;The first message includes the User Identity of the account data corresponding to first applications client;Obtain user credit data associated with the User Identity, the user credit data are sent to the second terminal including second applications client, so that second applications client is based on the user credit data and executes corresponding service logic;The first terminal and the second terminal are identical or different;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.

Description

Information processing method and system, server, terminal, computer storage medium Technical field
The present invention relates to the information processing technologies, and in particular to a kind of information processing method and system, server, terminal, computer storage medium.
Background technique
With the rapid development of Internet technology, role is increasing in people's lives for internet, and internet can be used to handle various affairs for people.But under normal conditions, before using Internet service, it usually needs the operation such as Account Registration.In order to avoid excessive Account Registration is perplexed to user's bring, there is a kind of technical solution of account authorization login another application using an existing application, i.e. user can the service that is provided by way of account authorization using third-party application of the account based on a registered application, in this way without user's repeated registration account under multiple applications.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method and system, server, terminal, computer storage medium.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
The embodiment of the invention provides a kind of information processing methods, which comprises based on the second applications client is requested access to the account data of the first applications client, obtains the first message from the first terminal for including first applications client;The first message includes the corresponding User Identity of account data corresponding to first applications client;Obtain user credit data associated with the User Identity, the user credit data are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic;The user credit data are corresponding for characterizing the User Identity Terminal user violate pre-defined rule probability.
The embodiment of the invention also provides a kind of information processing methods, the described method includes: based on the second applications client is requested access to the account data of first applications client, the corresponding user credit data of account data of first applications client are obtained, the user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;Based on the user credit data, corresponding service logic is executed by second applications client.
The embodiment of the invention also provides a kind of information processing methods, the described method includes: server obtains the first message from the first terminal for including first applications client based on the second applications client is requested access to the account data of first applications client;The first message includes the User Identity of the account data corresponding to first applications client;The server obtains user credit data associated with the User Identity, and the user credit data are sent to the second terminal including second applications client;The first terminal and the second terminal are identical or different;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;Based on the user credit data, the second terminal executes corresponding service logic by second applications client.
The embodiment of the invention also provides a kind of server, the server includes: the first communication unit, first acquisition unit and the second communication unit;First communication unit is configured to request access to the second applications client with the account data of the first applications client, obtains the first message from the first terminal for including first applications client;The first message includes the corresponding User Identity of account data of the first applications client;The first acquisition unit is configured to obtain user credit data associated with the User Identity;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;Second communication unit, the user credit data for being configured to obtain the first acquisition unit are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic.
The embodiment of the invention also provides a kind of terminal, the terminal includes: third communication unit and execution unit;The third communication unit, it is configured to access the second applications client with the account data of the first applications client, the corresponding user credit data of account data of first applications client are obtained, the user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;The execution unit, is configured to the user credit data that the third communication unit obtains, and executes corresponding service logic by second applications client.
The step of the embodiment of the invention also provides a kind of computer storage mediums, are stored thereon with computer instruction, and the information processing method for being applied to server described in the embodiment of the present invention is realized when which is executed by processor;Alternatively, the step of realizing the information processing method for being applied to terminal described in the embodiment of the present invention when instruction is executed by processor.
The embodiment of the invention also provides a kind of servers, the step of including memory, processor and storing the computer program that can be run on a memory and on a processor, be applied to the information processing method of server described in the realization embodiment of the present invention when processor executes described program.
The embodiment of the invention also provides a kind of terminals, the step of including memory, processor and storing the computer program that can be run on a memory and on a processor, be applied to the information processing method of terminal described in the realization embodiment of the present invention when processor executes described program.
The embodiment of the invention also provides a kind of information processing systems, and the system comprises servers and terminal;The server is configured to request access to the second applications client with the account data of first applications client, and server obtains the first message from the terminal or another terminal that include first applications client;The first message includes the User Identity of the account data corresponding to first applications client;User credit data associated with the User Identity are obtained, the user credit data are sent to the terminal including second applications client;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;The terminal is configured to the user credit data, executes respective service logic by second applications client.
Detailed description of the invention
Fig. 1 is a kind of interaction flow schematic diagram that third-party application is logged in based on main application authorization;
Fig. 2 is a kind of system architecture schematic diagram that the embodiment of the present invention carries out information exchange;
Fig. 3 is the first flow diagram of the information processing method of the embodiment of the present invention;
Fig. 4 is second of flow diagram of the information processing method of the embodiment of the present invention;
Fig. 5 is the third flow diagram of the information processing method of the embodiment of the present invention;
Fig. 6 a and Fig. 6 b are respectively the interaction flow schematic diagram of the information processing method of the embodiment of the present invention;
Fig. 7 is a kind of composed structure schematic diagram of the server of the embodiment of the present invention;
Fig. 8 is another composed structure schematic diagram of the server of the embodiment of the present invention;
Fig. 9 is a kind of composed structure schematic diagram of the terminal of the embodiment of the present invention;
Figure 10 is the hardware composed structure schematic diagram of the server of the embodiment of the present invention;
Figure 11 is the software and hardware combining schematic diagram of the terminal of the embodiment of the present invention.
Specific embodiment
Before the information processing method to the embodiment of the present invention is described in detail, the treatment process for logging in third-party application based on main application authorization is illustrated first.Fig. 1 is a kind of interaction flow schematic diagram that third-party application is logged in based on main application authorization;As shown in Figure 1, comprising:
Step 101: main applications client sends logging request to third-party application client, which is specifically used for logging in third-party application client with the account request of main applications client.It wherein, include User Identity in the logging request, which can be and the unique corresponding User Identity (UID, User Identification) of the user account of main applications client.
In practical application, as an example, user opens a Webpage using browser application client, such as the webpage is an e-commerce page or the multimedia page (such as Tencent's video page);User needs to log in the webpage.It could be logged in order to avoid user needs to input the more information content and could register and input user name password, in the icon of the one or more main applications of logging zone configuration of the page, icon of the main application such as QQ application icon, wechat application icon etc., So that the account of existing main application can be used to log in the webpage for user.When the user clicks when the icon of any main application, the corresponding main applications client of icon as main application initiates logging request to the browser application client as third-party application client.
Step 102: logging request of the third-party application client based on main applications client requests temporary identifier to the corresponding master application server of main applications client, the temporary identifier can be interim Universally Unique Identifier (UUID, Universally Unique Identifier), which requests effective only for this time;Or temporarily UUID is effective in preset time range (such as five minutes).It wherein, may include the User Identity of main applications client in request message;The temporary identifier that then master application server generates is corresponding with the User Identity of main applications client.
Step 103: master application server returns to temporary identifier to third-party application client.
Step 104: third-party application client is based on the temporary identifier and application identities (APP ID) generate graphic code, display diagram shape code, the graphic code specifically can be two dimensional code (QR Code, Quick Response Code), then third-party application client generates two dimensional code according to the interim UUID and the application identities coding of itself of acquisition and shows.
Step 105: third-party application clients poll master application server obtains the information whether user confirms authorization, carries temporary identifier in the information;Wherein, step 104 and step 105 do not distinguish sequencing, can be and first carry out step 104 and execute step 105 again, are also possible to first carry out step 105 and execute step 104 again, it is also possible to be performed simultaneously step 104 and step 105, execution sequence is not defined in the present embodiment.
Step 106: the graphic code that main applications client scanning third-party application client is shown obtains temporary identifier and application identities that graphic code carries.Wherein, there is main applications client graphic code to scan read functions, includes the image of graphic code by calling camera to obtain as an implementation after activating the function, further identifies temporary identifier and application identities that the graphic code in image carries.For example, main applications client starts graphic code scanning function, camera is called, winner's applications client is made to show the display interface including a scan box;When camera collection image data make collected figure When shape code is in the scan box, main applications client is scanned based on graphic code of the graphic code scanning function to acquisition, obtains the temporary identifier and application identities of graphic code carrying.As another embodiment, main applications client has optical character identification (OCR, Optical Character Recognition) function, i.e. Direct Recognition includes the character in the image of graphic code, is based further on temporary identifier and application identities that the character identified obtains graphic code carrying.
Step 107: main applications client notifies master application server, the notice is used to request to log in third-party application with the account of main applications client, temporary identifier, application identities and User Identity that scanning obtains are carried in notification message, which is the mark of third-party application client.
Step 108: master application server is based on the notification message and returns to authorization message to third-party application client, and carries access token (access token).
Step 109: main applications client confirms to third-party application client to be authorized, in practical application, the display interface of main applications client can show such as " authorization ", " not authorizing " virtual key, user clicks " authorization " virtual key, it determines that main applications client confirms to third-party application client to authorize, third-party application client allows to log in using the account of main applications client.Correspondingly, determining that main applications client does not confirm to third-party application client if user clicks " not authorizing " virtual key and authorizing, third-party application client does not allow to log in using the account of main applications client.
Step 110: after confirmation authorization, third-party application client sends information acquisition request to master application server, it include the information such as temporary identifier, access token, application identities in the information acquisition request, master application server can determine the User Identity of corresponding main applications client based on the temporary identifier in information acquisition request, corresponding user information is obtained based on the User Identity, user information is returned into third-party application.
Wherein, main applications client and third-party application client are mounted client application in terminal device, can provide different services after different client application activation;Master application server is the corresponding server of main applications client.Main applications client can be one of following application type: instant messaging application client, social application client, payment platform client, Instant messaging application client for example can be wechat (WeChat) application, QQ application, Facebook application, microblogging (Weibo) application.Main applications client and third-party application client can run in same terminal device, also can run in different terminal equipment.
With reference to the accompanying drawing and specific embodiment the present invention is described in further detail.
Fig. 2 is the schematic diagram that each side's hardware entities of information exchange are carried out in the embodiment of the present invention, it include: server 11, server 12 and terminal device 21-23 in Fig. 1, terminal device 21-23 carries out information exchange by cable network or wireless network and server 11 or server 12, and terminal device includes the types such as mobile phone, tablet computer, desktop computer, laptop.In one example, at least one terminal device in terminal device 21-23 can run the first applications client and the second applications client, i.e. the first applications client and the second applications client can be run in the same terminal device simultaneously;In another example, a terminal device in terminal device 21-23 can run the first applications client, another terminal device can run the second applications client, i.e. the first applications client and the second applications client are run in different terminal devices respectively.Server 11 and server 12 are respectively the first applications client subordinate server and the second applications client subordinate server, and by the information exchange between terminal device and server, the application of terminal device operation can provide corresponding service.
The example of above-mentioned Fig. 1 is a system architecture example for realizing the embodiment of the present invention, and the embodiment of the present invention is not limited to system structure described in above-mentioned Fig. 1, can be based on the system architecture, proposes each embodiment of the present invention.
The embodiment of the invention provides a kind of information processing methods.Fig. 3 is the first flow diagram of the information processing method of the embodiment of the present invention;As shown in Figure 3, which comprises
Step 301: based on the second applications client is requested access to the account data of the first applications client, obtaining the first message from the first terminal for including first applications client;The first message includes the corresponding User Identity of account data of first applications client.
Step 302: obtaining user credit data associated with the User Identity, the user credit data are sent to the second terminal including second applications client, so that described second is whole Second applications client at end is based on the user credit data and executes corresponding service logic;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.
In the present embodiment, information processing method is applied in server, the service implement body can be the first applications client subordinate server, that is the first applications client requests to access the second applications client with the account data of first applications client, first applications client sends first message to server by first terminal, and the first message includes the User Identity of the account data corresponding to first applications client;The User Identity can be and the unique corresponding UID of the account data of the first applications client.
In the present embodiment, it is described based on requesting access to the second applications client with the account data of the first applications client, obtain the first message from the first terminal for including first applications client, it include: to read to identify that the second terminal passes through the identification information that the second applications client exports by first applications client based on the first terminal, the first message from the first terminal is obtained, the first message includes the temporary identifier of the User Identity and server distribution.Wherein, the identification information is graphic code, such as two dimensional code, bar code etc..
In practical application, the first terminal is identical or different, i.e. the first applications client and the second applications client can be respectively arranged in first terminal and second terminal, or can also be installed in same terminal.By taking first terminal is identical with second terminal as an example, it, can be by detecting that the input operation requests for the mark of the first applications client access the second applications client with the account data of first applications client in the display interface of the second applications client after terminal activates the second applications client;Wherein, the mark of the first applications client of display specifically can be icon or the link of the first applications client of display, and user triggers the icon or link to request to access corresponding second applications client with the account data of the first applications client.It after second applications client receives the request, is communicated with server (i.e. the first applications client subordinate server), obtains the temporary identifier of server distribution, which can be UUID.As an implementation, the second applications client can pass through coding Mode carries out coding to temporary identifier and generates identification information, and output shows the identification information;First applications client identifies the identification information, obtains the temporary identifier that identification information includes;Wherein, the second applications client can carry out coding to temporary identifier in such a way that two dimensional code encodes and generate two-dimensional barcode information, show the two-dimensional barcode information by the display component of terminal;First applications client can identify the two-dimensional barcode information by OCR mode, to obtain the temporary identifier of two-dimensional barcode information carrying.At this time, terminal sends first message to server by the first applications client, the first message includes the User Identity of the account data corresponding to first applications client, it can also include the temporary identifier and application identities (application identities are the corresponding application identities of the second applications client), in order to which server returns to authorization message to the second applications client of the terminal, and corresponding user credit data are obtained according to User Identity, user credit data are returned to the second applications client of second terminal.
In the present embodiment, it is described that the user credit data are sent to the second terminal including second applications client, include: the confirmation message for accessing with the account data of first applications client second applications client in response to the characterization confirmation authorization of acquisition, the user credit data are sent to second applications client.
As an implementation, first terminal obtains temporary identifier by the identification information that the first applications client reads the output of the second applications client, characterization authorization accesses second applications client with the account data of first applications client, after i.e. the first applications client of first terminal obtains temporary identifier, the first message for carrying User Identity is sent to server, the first message is responded, what server will acquire is sent to second applications client with the associated user credit data of User Identity.
As another embodiment, server can be directed to the input operation of " confirmation authorizes " function button by receiving, i.e. server receives characterization first terminal and determines that authorization accesses the second applications client with the account data of the first applications client, determines and obtains the confirmation message that characterization confirmation authorization accesses second applications client with the account data of first applications client.In practical application, after server receives the first message from first terminal, based on the information carried in the first message (including temporary identifier, second applications client mark and User Identity), authorization message and access token are sent to the second terminal for including the second applications client, second terminal is based on the interface that the output displaying of the second applications client includes " confirmation authorization " function button, user can pass through click " confirmation authorizes " function button, determine that authorization accesses the second applications client with the account data of the first applications client, after then the second applications client receives confirmation authorization instruction, notify server, server will be sent to the second terminal with the associated user credit data of User Identity based on the notification message of characterization confirmation authorization, it can be understood as, in present embodiment, second applications client is when needing user credit data, corresponding user credit data are obtained from server.
In the present embodiment, user credit data may include at least one of following data type: credit score, credit grade.As an implementation, credit score is bigger or credit grade is higher, show that the probability of corresponding terminal user's violation treaty rule is lower, correspondingly, credit score is smaller, or credit grade is lower, shows that the probability of corresponding terminal user's violation treaty rule is bigger.
In the present embodiment, as an implementation, there is credit data computing function in server, i.e. server can be calculated by the acquisition of behavioral data and obtain user credit data, when then server receives the first message for carrying User Identity, it can be searched based on the user credit data acquisition system of itself storage, obtain user credit data associated with User Identity.As another embodiment, user credit data can be calculated by acquisition behavioral data by credit services platform and be obtained, then server is after obtaining first message, information exchange is carried out with credit services platform, obtains user credit data associated with the User Identity from credit services platform.
Using the technical solution of the embodiment of the present invention, when the first applications client requests to access the second applications client with the account data of first applications client, the corresponding user credit data of account data are sent to the second applications client by server, so that the second applications client can execute corresponding service logic based on user credit data, it realizes and provides corresponding service based on the probability scenarios for violating pre-defined rule, to reduce in accordance with the high user of probability of pre-defined rule during obtaining service caused information leakage or to the probability of occurrence of the safety problems such as the attack of service platform, it improves Service provides and the safety and reliability of service platform.
The embodiment of the invention also provides a kind of information processing methods, are applied in server, which can be the first applications client subordinate server.Fig. 4 is second of flow diagram of the information processing method of the embodiment of the present invention;As shown in Figure 4, which comprises
Step 401: acquisition corresponds to the behavioral data of account data, and the behavioral data includes behavioral data under behavioral data and line on line Internet-based.Wherein, which is the account data of the first applications client.
Step 402: the fisrt feature variable of the account data is obtained according to the behavioral data, wherein the fisrt feature variable is used to indicate the behavioural characteristic of the account data.
Step 403: by the fisrt feature variable input data analysis model, obtaining user credit data;Wherein, the Data Analysis Model is used to export user credit data according to the fisrt feature variable.
Step 404: based on the second applications client is requested access to the account data of the first applications client, obtaining the first message from the first terminal for including first applications client;The first message includes the User Identity of the account data of first applications client.
Step 405: obtaining user credit data associated with the User Identity, the user credit data are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.
In the present embodiment, using the behavioural characteristic of fisrt feature variable characterization account data, the behavioural characteristic of account data is obtained based on account data behavioral data Internet-based, after fisrt feature variable is input to Data Analysis Model again, the behavior for obtaining account data is unsatisfactory for the probability value of preset condition.Since behavioral data of the account data in social application can compare the behavior of wide covering account data, the behavioral data being input in Data Analysis Model can comprehensively embody the behavior of account data, so that the probability value that the behavior for analyzing the account data come is unsatisfactory for preset condition is more accurate.
Specifically, behavioral data includes behavioral data under behavioral data and line on account data line Internet-based.
Behavior data packet is included but is not limited in the Internet line:
1) the basic ascribed characteristics of population information of user, such as name, age, gender, area, educational background, occupation;
2) virtual Value added service data, such as virtual account roles are dressed up, game item purchase, video display membership service, the value-added service of cloud storage space, music flow packet etc.;
3) social interaction behavioral data is such as chatted, Email, voice communication, and microblogging space is delivered, and question and answer, the reading of public platform article etc. are known in bean cotyledon comment comment;
4) economic behaviour data are such as paid, and are managed money matters, shopping, stock, fund, P2P, finance etc.;
5) amusement and leisure behavioral data, such as video on demand, music, K song, news reading etc.;
6) educational action data, as read on line, open class study, trade examination is practiced, and skills training, translation software uses;
7) other internet mobile application behavioral datas, if APP is downloaded, search etc..
On line data can data or application program active reporting that by user mobile phone, on plate or PC computer, the acquisition user such as instant messaging application program, game client, APP download platform, financing platform, shopping software is filled in obtain.
Behavior data packet is included but is not limited under line:
1) to (O2O, Online to Offline) life service information, such as household services, urban service, beauty and health care etc. under line on line;
2) wearable device data, such as medical treatment & health, movement etc.;
3) location based service device (LBS, Location Based Service) geographic position data such as navigates, registers, special train etc.;
4) tourism trip data, such as ticket booking, hotel reservation etc..
As it can be seen that behavioral data includes the movement in a variety of online and offline scenes, life is almost enumerated Therefore the behavioral data of various aspects has also more accurately reacted the true probability value of account according to the probability value that these behavioral datas obtain.In addition, when behavioral data is by changing, meeting immediate feedback is obtained to server or immediately by server, therefore, the renewal speed of behavioral data is fast, can reflect the probability that the behavior of account data instantly is unsatisfactory for preset condition according to the probability value that the behavioral data of these immediate updatings obtains.The probability value for being unsatisfactory for preset condition can be Default Probability, behavior if as defined in not abiding by contract etc..
For example, account chat behavior of the user A in instant messaging application, behavior, behavior of downloading application of viewing video etc. in Video Applications can be acquired when obtaining the credit rating of the user A according to the behavioral data of user A.The fisrt feature variable from being extracted respectively in these behavioral datas, available different classes of fisrt feature variable.Such as the fisrt feature variable of instant messaging class, being all input in Data Analysis Model for these different classes of fisrt feature variables is exported the first numerical value by the fisrt feature variable of video class and the fisrt feature variable of downloading class.It can also use and the part in different classes of fisrt feature variable is input in Data Analysis Model.
Under normal conditions, the good friend of user A and user A have similitude, and the behavioral data of the good friend of user A can also reflect that the behavior of user A is unsatisfactory for the probability of preset condition.Therefore, when inputting fisrt feature variable to Data Analysis Model, characteristic variable associated with the good friend of user A can also be inputted simultaneously.
It is i.e. described by the fisrt feature variable input data analysis model, comprising: obtain second feature variable, wherein the second feature variable be used for indicates with the account data with incidence relation other multiple account datas behavioural characteristic;The fisrt feature variable and the second feature variable are input to the Data Analysis Model, wherein the Data Analysis Model is also used to export the user credit data according to the fisrt feature variable and the second feature variable.
Wherein, the method for obtaining second feature variable is identical as the method for fisrt feature variable is obtained, and is described in detail later.Account data and other multiple account datas with incidence relation are friend relation, it can be understood as other multiple account datas are the good friends of account data.Behavior on line in the above example Some behavior for applying account can be mapped as by certain corresponding relationship with behavior under line.Such as, other account datas have registered navigation Service and instant messaging application using phone number, when obtaining the behavioral data of other account datas, behavioral data and other account datas behavioral data in instant messaging application of other account datas in navigation Service is acquired.
It includes: the cohesion obtained between other multiple account datas and account data that fisrt feature variable and second feature variable, which are input to Data Analysis Model, wherein cohesion is generated according to the mutual-action behavior of other each account datas and account data;Third feature variable is obtained according to cohesion and second feature variable using following formula:
υ '=f ((α12,...,αi,...,αn),(υ12,...,υi,...,υn)),
Wherein, υ ' indicates that third feature variable, i indicate i-th of other account data, αiFor the cohesion of i-th other account datas and account data, υiIt is the second feature variable of i-th of other account data, f is the preceding n second feature variables of other account datas and the weighted average of cohesion for indicating in the sequence of cohesion from high to low;Fisrt feature variable and third feature variable are input to Data Analysis Model.
In the present embodiment, data processing is carried out to the second feature variable of other account datas, the behavioural characteristic of account data can be embodied by making it more.Therefore, it when obtaining the second variable, with each second feature variable multiplied by corresponding weighted value, then is weighted and averaged.The cohesion of the weighted value expression account data and other account datas.Account data and other account datas are more intimate, and weighted value is bigger;Conversely, weighted value is smaller.Cohesion can be measured by the interaction between account data and other account datas, for example chat more between account data and other account datas, and relationship is more intimate.Community's registration of account data and other account datas is higher, and the relationship of the two account datas is more intimate.Cohesion and registration can be obtained by the way of training pattern.Mutual-action behavior includes circle of friends interaction, payment interaction (such as giving bonus), movement interaction (such as 10,000 beans-and bullets shooter of walking is praised).Cohesion can be embodied by above-mentioned information interaction, further include the ratio sent and received information including number, the number of days etc. sent and received information, carry out the number etc. of information interaction daily.These information include text Information, video information and voice messaging etc..Cohesion can also be by commenting on, thumbing up, and label good friend is special good friend, gives gifts and object or draw the behaviors such as black to obtain.
For example, third feature variableI.e. cohesion is according to by parent to the second feature variable of thin tactic preceding 10 good friends and the weighted average of cohesion.
The universals of one group can reflect the feature of some user in this group, therefore, the probability value that behavior is unsatisfactory for preset condition can be obtained according to the feature of a group, can more accurately embody the credit rating of user.It should be noted that, when obtaining the second feature variable of multiple second accounts, first according to the cohesion in the good friend of account data with account data, n other account datas before cohesion ranking are selected, generate third feature variable further according to cohesion and second feature variable.
Since the behavioral data range of acquisition is wider, the data format of acquisition is not also identical.Therefore, after obtaining behavioral data, first suppressing exception data remove repeated data, filter out the data of the biggish data of undulating value and completion missing.Wherein, abnormal data can be obviously beyond a certain range of data, for example, the age of usually people does not exceed 100, if the data of acquisition show that the age is 100, delete the abnormal data.If collected data show that the age includes 0 and 49,0 and 49 in the range of 0 to 100, however, other data majorities, all between 18 to 45, therefore, 0 and 49 belong to the biggish singular point of undulating value.
After carrying out basic processing to behavioral data, behavioral data is divided by multiple dimensions according to data source and business characteristic.For example, essential information, social interaction, finance and money management etc., sort out integration write-in database.When database is written, data type and data structure can be first appointed.For example, the type of numerical value is int, the type of area name is character string.Other forms can also, no longer illustrate one by one.
Due to the behavioral data substantial amounts of these storages, and between many data there is correlation to obtain the stronger feature of conspicuousness therefore, it is necessary to screen to these data to be input to Data Analysis Model.
A) civil servants' work is more stable in primary attribute, and source of finance is reliable, can reflect user's Economic capability and refund wish;
B) user often replied message not in time in social interaction may be more slack, and reflection user compares delay in character;
C) often value-added service is bought, the user of shopping online can reflect the economic capability of user;
D) stock, fund, P2P buy the risk tolerance and economic capability that can reflect user in economic behaviour;
E) it has made special train but has often cancelled an order or comment the lower prestige that can reflect user of star;
If f) friend of the frequent dealing of user is high-quality, it is fixed to follow treaty, and the stronger crowd of economic capability to a certain extent can be with feedback user itself.
Above-mentioned primary attribute, buying behavior, calls a taxi behavior and friend's attribute can embody the behavioural characteristic of account data at social interaction behavior.
That is, including: the information gain for obtaining feature in behavioral data according to the fisrt feature variable that behavioral data obtains account data, information gain is for indicating the information content that behavioral data includes as an implementation;Judge whether information gain is within the scope of default value;If information gain is within the scope of default value, derivative variable is constructed according to behavioral data, wherein derivative variable is the behavioral data after merging or splitting;If information gain is in other than default value range, the corresponding feature of information gain other than default value range is deleted, further according to the derivative variable of remaining latent structure;Variable will be derived as fisrt feature variable.
As an implementation, delete the corresponding feature of information gain other than default value range, it include: to obtain the related coefficient of remaining feature deleting after the corresponding feature of information gain other than default value range further according to the derivative variable of remaining latent structure;The feature that related coefficient is more than or equal to predetermined coefficient is merged into a merging feature;Feature will be merged as derivative variable.
Feature and characteristic value constitute behavioral data.Such as collected behavioral data includes text chat number, voice communication number, payment amount etc., is all the feature in behavioral data.And for example, text chat 9 times, voice communication 10 times and payment amount 100, number therein are all called characteristic value. Information gain can embody the information content of a feature.If information content is less than threshold value, this feature can be deleted.For example, carrying out the sequence of information gain to each category feature, the feature that information gain is less than threshold value is deleted.The stronger feature of these correlations is then merged if there is the stronger feature of correlation, obtains fisrt feature variable by the correlation for then detecting remaining feature again.If the correlation of some feature is weaker, conspicuousness is very strong, then this feature can be refined as multiple features.For example, chat number is split as chat at night number, chat on daytime number, weekend chat number and working day chat number etc..Opposite, evening chat number and chat on daytime number can also be merged into chat number.
In the present embodiment, flexibly behavioral data can be split and be merged to construct fisrt feature variable, and when splitting and merging, same or different method can be used to multiple features, (such as, Partial Feature is using Principal Component Analysis and other feature using clustering procedure etc.), increase the flexibility of construction fisrt feature variable.
As an implementation, before fisrt feature variable and second feature variable are input to Data Analysis Model, method further include: behavioral data is divided into multiple classifications;A submodel is established to each classification in multiple classifications respectively, wherein, each submodel is used to export the first subvalue according to fisrt feature variable and/or second feature variable, wherein, for first subvalue for indicating under classification corresponding with submodel, the behavior of account data is unsatisfactory for the probability value of preset condition;The corresponding multiple submodels of multiple classifications are configured to Data Analysis Model.
Specifically, when establishing Data Analysis Model, namely before the fisrt feature variable and the second feature variable are input to the Data Analysis Model, the classification divided when can be according to acquisition behavioral data, by each classification one submodel of corresponding generation, each submodel can export first subvalue, these first subvalues are handled, and just obtain the first numerical value of Data Analysis Model output.Further, it when establishing submodel, can be trained according to the sample data of each classification, submodel is obtained, can continue to establish low level model to the data after division to each classification further division, multiple low level models constitute submodel, are then made of data point submodel again Analyse model.
As an implementation, establishing a submodel to each classification in multiple classifications respectively includes: to establish a submodel to each classification respectively using same or different training pattern;Or low level model is established to the subclass under each classification respectively using same or different training pattern, it is submodel by the corresponding low level model construction of multiple subclass under each classification.
Each classification establishes training pattern used by submodel can be same or different, for example, 5 classifications use decision tree training pattern in 10 classifications, in addition 5 use neural metwork training submodel.
Optionally, the corresponding multiple submodels of multiple classifications are configured to Data Analysis Model includes: that multiple submodels are configured to Data Analysis Model in the following ways:
Wherein, PAlwaysIndicating that the first numerical value, i are i-th of submodel in multiple submodels, n is the number of multiple submodels,For the coefficient of i-th of submodel, Pi' it is the first subvalue that i-th of submodel exports, P0For Constant eigenvalue.
Wherein, behavioral data is divided into multiple classifications includes: that behavioral data is divided into multiple classifications according to type of service included by behavioral data;Or will include that the data of target object are divided into one kind in behavioral data, it will not include that the data of target object are divided into other one kind in behavioral data.
It is divided according to level, according to type of service division and according to whether the division comprising target object, these three division methods can individually construct submodel using any of them, and combination that can also be any two kinds or three kinds constructs submodel.For example, first establishing submodel according to whether the division comprising target object, submodel low level submodel below etc. then is divided according still further to type of service.
Separate service Primary Reference earlier data category division, such as basic information, value-added service, social interaction, economic behaviour;Group is divided mainly to be divided according to business characteristic, in economic behaviour, the user of creditable card and the card that has no credit differs greatly in behavior expressions such as payment, shopping, financings, therefore can To be divided into two crowds, model is constructed respectively;Layering is mainly manifested on the level of entire model framework, and such as submodel layer, submodel can also be divided into multiple dimension layers, and the machine learning algorithm of every layer of use can be completely different.
In the present embodiment, above-mentioned step 404 to step 405 corresponds respectively to the step 301 in previous embodiment to step 302, and therefore, those skilled in the art can understand above-mentioned step 404 to step 405 refering to previous embodiment, to save length, which is not described herein again.
Using the technical solution of the embodiment of the present invention, on the one hand, realize accurate acquisition user credit data;On the other hand, when the first applications client requests to access the second applications client with the account data of first applications client, the corresponding user credit data of account data are sent to the second applications client by server, so that the second applications client can execute corresponding service logic based on user credit data, it realizes and provides corresponding service based on the probability scenarios for violating pre-defined rule, to reduce in accordance with the high user of probability of pre-defined rule during obtaining service caused information leakage or to the probability of occurrence of the safety problems such as the attack of service platform, service offer and the safety and reliability of service platform are provided.
The embodiment of the invention also provides a kind of information processing methods.Fig. 5 is the third flow diagram of the information processing method of the embodiment of the present invention;As shown in Figure 5, which comprises
Step 501: based on requesting access to the second applications client with the account data of the first applications client, terminal obtains the corresponding user credit data of account data of first applications client, and the user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.
Step 502: being based on the user credit data, the terminal executes corresponding service logic by second applications client.
In the present embodiment, information processing method is applied in terminal, which specifically can be the terminal device of the second applications client of operation, is also possible to that the terminal device of the first applications client and the second applications client can be run.
In the embodiment of the present invention, account data second applications client of access based on the first applications client, the terminal obtains the corresponding user credit data of account data of first applications client, it include: that the second applications client is accessed with the account data of first applications client based on the terminal or another terminal request, temporary identifier is requested to server and obtained to the terminal by second applications client, and output includes the identification information of the temporary identifier;The server is the corresponding server of the first applications client;It is read based on the terminal or another terminal by first applications client and identifies the identification information and request to access second applications client with the account data of first applications client to the server based on the terminal or another terminal, the terminal obtains the corresponding user credit data of the account data from the server by second applications client.Wherein, the identification information is graphic code, such as two dimensional code, bar code etc..
In practical application, by taking terminal can run the first applications client and the second applications client as an example, after terminal activates the second applications client, it can be by detecting that the input operation requests for the mark of the first applications client access the second applications client with the account data of first applications client in the display interface of the second applications client, i.e. terminal sends login request message to the second applications client by the interface between the first applications client and the second applications client, it and is the logging request that the second applications client is accessed with the account data of first applications client;Wherein, the mark of the first applications client of display specifically can be icon or the link of the first applications client of display, and user triggers the icon or link to request to access corresponding second applications client with the account data of the first applications client.
It after second applications client receives the login request message, is communicated with server (i.e. the first applications client subordinate server), obtains temporary identifier, which can be UUID;As an implementation, the second applications client can carry out coding to temporary identifier by way of coding and generate identification information, show the identification information by the display component output of terminal;First applications client identifies the identification information, obtains the temporary identifier that identification information includes;Wherein, the second applications client can Coding is carried out to temporary identifier in such a way that two dimensional code encodes and generates two-dimensional barcode information, terminal can show the two-dimensional barcode information by display component;First applications client can identify the two-dimensional barcode information by OCR mode, to obtain the temporary identifier of two-dimensional barcode information carrying.Terminal sends first message to user end to server by the first application, the first message includes the User Identity of the account data corresponding to first applications client, it can also include the temporary identifier and application identities (application identities are the corresponding application identities of the second applications client), in order to which server returns to authorization message to the second applications client of the terminal, and corresponding user credit data are obtained according to User Identity, user credit data are returned to the second applications client of second terminal.
In the present embodiment, terminal obtains the corresponding user credit data of account data of first applications client from server (specifically the first applications client subordinate server), and the user credit data are used to characterize the probability that the corresponding terminal user of the corresponding User Identity of the account data violates pre-defined rule.Wherein, user credit data may include at least one of following data type: credit score, credit grade.As an implementation, credit score is bigger or credit grade is higher, show that the probability of corresponding terminal user's violation treaty rule is lower, correspondingly, credit score is smaller, or credit grade is lower, shows that the probability of corresponding terminal user's violation treaty rule is bigger.Here violating pre-defined rule includes two major classes: the first kind, and request user actively performs some and violates operation etc. as promise breaking, does not have copyrighted film for example, clicking in an application;Second class, user are not carried out the obligation of pre-defined rule restriction, for example, user exceeds the time limit not pay dues etc. not as promise breaking.
In the present embodiment, credit score can be the comprehensive score according to user using various data such as the historical behavior data of service, it is also possible to the first scoring provided based on personal attribute, is also possible to the single credit scoring according to the current application scene sent when service request.
In the present embodiment, as an implementation, when the terminal or another terminal confirm that authorization accesses the second applications client with the account data of the first applications client by first applications client, a notification message is sent to server, based on the notification message, the terminal obtains the user credit data associated with the account data that server returns by the second applications client.As another A kind of embodiment, the terminal or another terminal pass through the first applications client confirmation request and access the second applications client with the account data of first applications client, the i.e. described terminal or another terminal after the first applications client acquisition temporary identifier to server by sending a notification message, based on the notification message, the terminal obtains the user credit data associated with the account data from server by the second applications client.
In the present embodiment, terminal is based on the user credit data by the second applications client and executes respective service logic, and the service logic is to respond the operation and/or operation timing that access request executes.Such as, the credit score of user A is very low, it is the promise breaking user an of high probability, then mask logic can be performed by the second applications client in terminal, when executing mask logic, then the second applications client will not respond the access request of user, and may further export characterization and not provide the notification of service.For example, the credit score of user B is very high, it is the low probability user of a violation pre-defined rule, then the second applications client provides the service needed for it to user B directly in response to the access request of the account data of the user B based on the first applications client.
As an implementation, the method also includes: according to the user credit data and label distribution logic, obtain the user tag of account data, wherein the user tag for characterize the account data can get service range;The user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule and is located at user in the first range;The second class user tag, which is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule, is located at user in the second range, wherein first range is different from second range;It is described that the respective service logic for corresponding to second applications client request access to, described is executed based on the user credit data, including it is following at least one: execute corresponding with first kind user tag service logic, shielding responds access request for the second applications client access request or part;Service logic corresponding with the second class user tag is executed, partly or entirely response is directed to the access request of second applications client.
In present embodiment, terminal will provide the user tag of current access request according to the user credit data and label distribution logic by the second applications client.The label distribution logic is the judgment rule for being user's distributing user label based on user credit data.Such as, the label distribution logic may include mapping table, and the mapping table includes the corresponding relationship of user credit data with corresponding user tag, then terminal can be according to the corresponding relationship by the second applications client, based on user credit data, corresponding user tag is obtained.The user tag may include a variety of, for example, the user tag can are as follows: follows treaty user and non-follows treaty user.The user that follows treaty will can distribute to the user for being greater than predetermined threshold in accordance with the probability of pre-defined rule, and the non-user that follows treaty can distribute to and not abide by the user that pre-defined rule is not more than predetermined threshold.Every one kind user tag is further divided into a variety of subclass user tags in some embodiments.For example, by taking booking as an example, according to credit score, producible user tag can include: " ox ", " first kind ordinary user " and " the second class ordinary user "." ox (ox refers to that the goods and materials of buying or ticketing service voucher high price sell some people to desire to make money or profit) " corresponding credit score is minimum, violates the probability highest of pre-defined rule." first kind ordinary user " corresponding credit is low by several times, there is the violations such as returned ticket." the second class ordinary user ", corresponding credit score highest never generated returned ticket behavior." ox " and " first kind ordinary user " all can be the subclass user tag of the first kind user tag in the present embodiment;" the second class ordinary user " is the subclass user tag of the second class user tag.The user tag may also include that guarantee user in some embodiments;The guarantee user can be to have prepay the users such as guaranty fund, can be tendered guarantee by the guaranty fund prepay if such user promise breaking, the credit score of such user may be very high, then is another subclass of the second class user tag.
Wherein, the user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the user that the probability that the request user violates the pre-defined rule is located in the first range;The second class user tag is used to indicate the probability that the request user violates the pre-defined rule and is located at user in the second range, wherein first range is different from second range.The user tag in the present embodiment includes at least first kind user and marks Label and the second class user tag.Here first kind user tag can be the user for having unusual maximum probability not abide by the pre-defined rule.The second class user is in accordance with the user for making a reservation for the rule.User has been divided into two major classes in the present embodiment, in the specific implementation process, two major classes can be not limited to.
In the present embodiment once it is determined that having gone out after user tag, terminal can execute the corresponding service logic of user tag by the second applications client.For example, can normally provide service for the user that follows treaty, and service can not be provided for the non-user that follows treaty or partial service is only provided.
As an implementation, terminal executes service logic corresponding with the first kind user tag by the second applications client, shields service request or part responds the service request.If the user tag of current request user is first kind user tag, the service request of the maskable user, for the second applications client of terminal not to request user offer service, then it is zero that the user, which obtains service range, at this time.Part responds the service request, for service needed for service request described in endless total regression, such as, user tag is the user of first kind user tag, the information of request inquiry other users, the information of request inquiry includes sensitive information and non-sensitive information, and part here responds the service request can include: only in response to the inquiry request of non-sensitive information, and then masks to the inquiry request of sensitive information.
As another embodiment, terminal executes service logic corresponding with the second class user tag by the second applications client, partly or entirely responds the service request.
Using the technical solution of the embodiment of the present invention, when requesting access to the second applications client with the account data of first applications client, the corresponding user credit data of account data are sent to the second applications client of terminal by server, so that the second applications client of terminal can execute corresponding service logic based on user credit data, corresponding service can be provided based on the probability scenarios for violating pre-defined rule by realizing terminal, to reduce in accordance with the high user of probability of pre-defined rule during obtaining service caused information leakage or to the probability of occurrence of the safety problems such as the attack of service platform, service offer and the safety and reliability of service platform are provided.
The embodiment of the invention also provides a kind of information processing methods.The described method includes:
Step 1: based on the second applications client is requested access to the account data of first applications client, server obtains the first message from the first terminal for including first applications client;The first message includes the User Identity of the account data corresponding to first applications client.
Step 2: the server obtains user credit data associated with the User Identity, and the user credit data are sent to the second terminal including second applications client;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.
Step 3: being based on the user credit data, the second terminal executes respective service logic by second applications client.
The above-mentioned steps of the present embodiment can refer to the description in previous embodiment, and which is not described herein again.
It is illustrated below with reference to information processing method of the specific application scenarios to the embodiment of the present invention.Fig. 6 a and Fig. 6 b are respectively the interaction flow schematic diagram of the information processing method of the embodiment of the present invention;As the first interactive mode, as shown in Figure 6 a, which comprises
Step 601: main applications client sends logging request to third-party application client, which is specifically used for logging in third-party application client with the account request of main applications client.It wherein, include User Identity in the logging request, which can be and the unique corresponding UID of the account of main applications client.
In practical application, as an example, user opens a Webpage using browser application client, such as the webpage is an e-commerce page or the multimedia page (such as Tencent's video page);User needs to log in the webpage.It could be logged in order to avoid user needs to input the more information content and could register and input user name password, in the icon of the one or more main applications of logging zone configuration of the page, icon of the main application such as QQ application icon, wechat application icon etc., so that the account of existing main application can be used to log in the webpage for user.When the user clicks when the icon of any main application, the corresponding main applications client of icon as main application is to as third-party application client The browser application client at end initiates logging request.
Step 602: logging request of the third-party application client based on main applications client requests temporary identifier to the corresponding master application server of main applications client, which can be interim UUID, which requests effective only for this time;Or temporarily UUID is effective in preset time range (such as five minutes).It wherein, may include the User Identity of main applications client in request message;The temporary identifier that then master application server generates is corresponding with the User Identity of main applications client.
Step 603: master application server returns to temporary identifier to third-party application client.
Step 604: third-party application client is based on the temporary identifier and application identities (APP ID) generate graphic code, display diagram shape code, the graphic code specifically can be two dimensional code, then third-party application client generates two dimensional code according to the interim UUID and the application identities coding of itself of acquisition and shows.
Step 605: third-party application clients poll master application server obtains the information whether user confirms login, carries temporary identifier in the information;Wherein, step 604 and step 605 do not distinguish sequencing, can be and first carry out step 604 and execute step 605 again, are also possible to first carry out step 605 and execute step 604 again, it is also possible to be performed simultaneously step 604 and step 605, execution sequence is not defined in the present embodiment.
Step 606 is to step 607: the graphic code that main applications client scanning third-party application client is shown obtains temporary identifier and application identities that graphic code carries.Wherein, there is main applications client graphic code to scan read functions, includes the image of identification information by calling camera to obtain as an implementation after activating the function, further identifies temporary identifier and application identities that the graphic code in image carries.For example, main applications client starts graphic code scanning function, camera is called, winner's applications client is made to show the display interface including a scan box;When camera collection image data make collected graphic code in the scan box when, main applications client is scanned based on graphic code of the graphic code scanning function to acquisition, obtain the graphic code carrying temporary identifier and application identities.As another embodiment, main applications client has the function of OCR, i.e. Direct Recognition includes the character in the image of graphic code, is based further on the temporary identifier that the character identified obtains graphic code carrying And application identities.
Step 608: main applications client notifies master application server, the notice is used to request to log in third-party application with the account of main applications client, temporary identifier, User Identity and application identities that scanning obtains are carried in notification message, which is the mark of third-party application client.
Step 609: master application server is based on the notification message and returns to authorization message to third-party application client, and carries access token (access token).
Step 610: third-party application client is to main applications client request confirmation authorization.In practical application, display interface based on main applications client can show such as " authorization ", " not authorizing " virtual key, so that user is not authorized by clicking " authorization " virtual key confirmation authorization or user by clicking the confirmation of " not authorizing " virtual key.
Step 611: main applications client confirms to third-party application client to be authorized, i.e. user clicks " authorization " virtual key, it determines that main applications client confirms to third-party application client to authorize, third-party application client allows to log in using the account of main applications client.
Step 612: after confirmation authorization, third-party application client requests to obtain user information to master application server, it include the information such as temporary identifier, access token, application identities in the request, master application server can determine the User Identity of corresponding main applications client based on the temporary identifier in request, the corresponding user information of User Identity is obtained based on the User Identity, user information is returned into third-party application client.
Step 613: main applications client logs in third-party application client with the account of main applications client.
Step 614: third-party application client requests user credit data to master application server, may include the information such as temporary identifier, access token, application identities in the request.
Step 615: master application server determines the User Identity of corresponding main applications client based on the temporary identifier in the request, corresponding user credit data, the user credit data such as user credit grade and/or user credit point are obtained based on the User Identity.Further, main application service Device can also carry out identification judgement based on user credit data, judge the user credit data whether characterize corresponding User Identity terminal user violate pre-defined rule probability it is higher, such as score is lower or the corresponding terminal user of junior user credit data violate pre-defined rule probability it is higher;When determine the user credit data characterization correspond to User Identity terminal user violation pre-defined rule probability it is higher, master application server produces prompt information, the probability that the prompt information characterizes terminal user's violation pre-defined rule is higher, and providing service has certain risk.
Step 616: user credit data are sent to third-party application client by master application server, so that third-party application client is based on the user credit data and executes corresponding logic;Alternatively, master application server sends prompt information to third-party application client, the probability which characterizes terminal user's violation pre-defined rule is higher, and providing service has certain risk.
Step 617: third-party application client is based on user credit data and executes corresponding service logic, for example, all response or part response access request, or shielding access request.Alternatively, third-party application client shields access request, or part response access request based on the prompt information received.
As another interactive mode, as shown in Figure 6 b, step 601 to step 608 can refer to the associated description in Fig. 6 a, and which is not described herein again, after step 608, further includes:
Step 609 ': master application server determines the User Identity of corresponding main applications client based on the temporary identifier carried in the notice request of step 608, corresponding user credit data, the user credit data such as user credit grade and/or user credit point are obtained based on the User Identity.Further, master application server can also carry out identification judgement based on user credit data, judge the user credit data whether characterize corresponding User Identity terminal user violate pre-defined rule probability it is higher, such as score is lower or the corresponding terminal user of junior user credit data violate pre-defined rule probability it is higher;When determine the user credit data characterization correspond to User Identity terminal user violation pre-defined rule probability it is higher, master application server produces prompt information, the probability that the prompt information characterizes terminal user's violation pre-defined rule is higher, and providing service has certain risk.
Step 610 ': master application server is based on the notification message and awards to the return of third-party application client Information and access token (access token) are weighed, and carries user credit data or the characterization lower prompt information of credit.
Step 611 ': third-party application client is to main applications client request confirmation authorization.In practical application, display interface based on main applications client can show such as " authorization ", " not authorizing " virtual key, so that user is not authorized by clicking " authorization " virtual key confirmation authorization or user by clicking the confirmation of " not authorizing " virtual key.
Step 612 ': main applications client confirms to third-party application client to be authorized, i.e. user clicks " authorization " virtual key, it determines that main applications client confirms to third-party application client to authorize, third-party application client allows to log in using the account of main applications client.
Step 613 ': after confirmation authorization, third-party application client requests to obtain user information to master application server, it include the information such as temporary identifier, access token, application identities in the request, master application server can determine the User Identity of corresponding main applications client based on the temporary identifier in request, the corresponding user information of User Identity is obtained based on the User Identity, user information is returned into third-party application client.
Step 614 ': main applications client logs in third-party application client with the account of main applications client.
Step 615 ': third-party application client is based on user credit data and executes corresponding service logic, for example, all response or part response access request, or shielding access request.Alternatively, third-party application client shields access request, or part response access request based on the prompt information received.
The embodiment of the invention also provides a kind of servers.Fig. 7 is a kind of composed structure schematic diagram of the server of the embodiment of the present invention, as shown in fig. 7, the server includes: the first communication unit 71, first acquisition unit 72 and the second communication unit 73;First communication unit 71 is configured to request access to the second applications client with the account data of the first applications client, obtains the first message from the first terminal for including first applications client;The first message includes the corresponding User Identity of account data of the first applications client;The first acquisition unit 72, is configured to obtain User credit data associated with the User Identity;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;Second communication unit 73, the user credit data for being configured to obtain the first acquisition unit 72 are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic.
In one embodiment, second communication unit 73, it is configured to authorize the confirmation message for accessing second applications client with the account data of first applications client in response to the characterization of acquisition, the user credit data is sent to second applications client.
In one embodiment, first communication unit 71, it is configured to the first terminal and the identification information for identifying that the second terminal is exported by second applications client is read by first applications client, the first message from the first terminal is obtained, the first message includes the temporary identifier of the User Identity and distribution.
As an implementation, Fig. 8 is another composed structure schematic diagram of the server of the embodiment of the present invention, as shown in figure 8, the server further includes acquisition unit 74 and second acquisition unit 75;Wherein, the acquisition unit 74, is configured to the behavioral data that acquisition corresponds to the account data, and the behavioral data includes behavioral data under behavioral data and line on line Internet-based;The second acquisition unit 75 is configured to obtain the fisrt feature variable of the account data according to the behavioral data that the acquisition unit 74 acquires, wherein the fisrt feature variable is used to indicate the behavioural characteristic of the account data;By the fisrt feature variable input data analysis model, user credit data are obtained;Wherein, the Data Analysis Model is used to export user credit data according to the fisrt feature variable.
In present embodiment, the second acquisition unit 75 is configured to obtain second feature variable, wherein the second feature variable is used to indicate the behavioural characteristic for other the multiple account datas for having incidence relation with the account data;The fisrt feature variable and the second feature variable are input to the Data Analysis Model, wherein the Data Analysis Model is also used to export the user credit data according to the fisrt feature variable and the second feature variable.
In present embodiment, the second acquisition unit 75 is configured to the behavioral data being divided into multiple classifications;A submodel is established to each classification in the multiple classification respectively, wherein, each submodel is used to export the first subvalue according to the fisrt feature variable and/or the second feature variable, wherein, for first subvalue for indicating under classification corresponding with the submodel, the behavior of the account data is unsatisfactory for the probability value of the preset condition;The corresponding multiple submodels of the multiple classification are configured to the Data Analysis Model.
In the embodiment of the present invention, first acquisition unit 72, acquisition unit 74 and second acquisition unit 75 in the server, it in practical applications can be by the central processing unit (CPU in the server, Central Processing Unit), digital signal processor (DSP, Digital Signal Processor), micro-control unit (MCU, Microcontroller Unit) or programmable gate array (FPGA, Field-Programmable Gate Array) realization;The first communication unit 71 and the second communication unit 73 in the server can be realized in practical applications by communications module (including: Base communication external member, operating system, communication module, standard interface and agreement etc.) and dual-mode antenna.
It should be understood that server provided by the above embodiment is when carrying out information processing, only it is illustrated with the division of above-mentioned each program module, in practical application, it can according to need and complete above-mentioned processing distribution by different program modules, the internal structure of server is divided into different program modules, to complete all or part of processing described above.In addition, server provided by the above embodiment and information processing method embodiment belong to same design, specific implementation process is detailed in embodiment of the method, and which is not described herein again.
The embodiment of the invention also provides a kind of terminals.Fig. 9 is a kind of composed structure schematic diagram of the terminal of the embodiment of the present invention, as shown in figure 9, the terminal includes: third communication unit 81 and execution unit 82;The third communication unit 81, it is configured to access the second applications client with the account data of the first applications client, the corresponding user credit data of account data of first applications client are obtained, the user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;The execution unit 82 is configured to the third communication unit 81 and obtains The user credit data, pass through second applications client and execute corresponding service logic.
In one embodiment, the execution unit 82 is additionally configured to obtain the user tag of account data according to the user credit data and label distribution logic, wherein the user tag can get service range for characterizing the account data;The user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule and is located at user in the first range;The second class user tag, which is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule, is located at user in the second range, wherein first range is different from second range;Be additionally configured to execute corresponding service logic based on the user credit data, including it is following at least one: execute service logic corresponding with the first kind user tag, shield access request or part responds access request;Service logic corresponding with the second class user tag is executed, access request is partly or entirely responded.
In one embodiment, the terminal further includes output unit;The third communication unit 81 is configured to the terminal or another terminal request with the account data of first applications client and accesses the second applications client, requested by second applications client to server and obtain temporary identifier;The server is the corresponding server of the first applications client;The output unit, be configured as output to include the temporary identifier identification information;The third communication unit 81, it is additionally configured to read based on the terminal or another terminal by first applications client and identifies the identification information and request to access second applications client with the account data of first applications client to the server based on the terminal or another terminal, the corresponding user credit data of the account data from the server are obtained by second applications client.
In the embodiment of the present invention, execution unit 82 in the terminal can be realized in practical applications by CPU, DSP, MCU or FPGA in the terminal;Third communication unit 81 in the terminal can be realized in practical applications by communications module (including: Base communication external member, operating system, communication module, standard interface and agreement etc.) and dual-mode antenna;Output unit in the terminal, In It can be realized by the display component of terminal in practical application.
It should be understood that terminal provided by the above embodiment is when carrying out information processing, only it is illustrated with the division of above-mentioned each program module, in practical application, it can according to need and complete above-mentioned processing distribution by different program modules, the internal structure of terminal is divided into different program modules, to complete all or part of processing described above.In addition, terminal provided by the above embodiment and information processing method embodiment belong to same design, specific implementation process is detailed in embodiment of the method, and which is not described herein again.
The embodiment of the invention also provides a kind of server, Figure 10 is the hardware composed structure schematic diagram of the server of the embodiment of the present invention;As shown in Figure 10, including memory 92, processor 91 and it is stored in the computer program that can be run on memory 92 and on processor 91, further includes power supply module and communication component 93, various components are coupled by bus system 94.It is understood that bus system 94 is for realizing the connection communication between these components.Bus system 94 further includes power bus, control bus and status signal bus in addition in addition to including data/address bus.But for the sake of clear explanation, various buses are all designated as bus system 94 in Figure 10.
It is appreciated that memory 92 can be volatile memory or nonvolatile memory, it may also comprise both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory), programmable read only memory (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM (EPROM, Erasable Programmable Read-Only Memory), electrically erasable programmable read-only memory (EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic RAM (FRAM, ferromagnetic random acc Ess memory), flash memory (Flash Memory), magnetic surface storage, CD or CD-ROM (CD-ROM, Compact Disc Read-Only Memory);Magnetic surface storage can be magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access Memory), be used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, example Such as static random access memory (SRAM, Static Random Access Memory), synchronous static random access memory (SSRAM, Synchronous Static Random Access Memory), dynamic random access memory (DRAM, Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous Dynamic Random Access Memory), double data speed synchronous dynamic RAM (DDRSDRAM, Double Data Rate Syn Chronous Dynamic Random Access Memory), enhanced Synchronous Dynamic Random Access Memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus random access memory (DRRAM, Direct Rambus Random Access Memory).The memory 92 of description of the embodiment of the present invention is intended to include but is not limited to the memory of these and any other suitable type.
Wherein, processor 91 may be a kind of IC chip, the processing capacity with signal.During realization, each step of the above method can be completed by the integrated logic circuit of the hardware in processor 91 or the instruction of software form.Above-mentioned processor 91 can be general processor, DSP or other programmable logic device, discrete gate or transistor logic, discrete hardware components etc..Processor 91 may be implemented or execute disclosed each method, step and logic diagram in the embodiment of the present invention.General processor can be microprocessor or any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in hardware decoding processor and execute completion, or in decoding processor hardware and software module combination execute completion.The step of software module can be located in storage medium, which is located at memory 92, and processor 91 reads the information in memory 92, completes preceding method in conjunction with its hardware.
In the present embodiment, the processor 91 is realized when executing described program: based on the second applications client is accessed with the account data of the first applications client, obtaining the first message from the first terminal for including first applications client;The first message includes the corresponding User Identity of account data of first applications client;User credit data associated with the User Identity are obtained, The user credit data are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.
As an implementation, the processor 91 is realized when executing described program: authorizing the confirmation message for accessing second applications client with the account data of first applications client in response to characterizing for acquisition, the user credit data are sent to second applications client.
As an implementation, the processor 91 is realized when executing described program: reading the identification information for identifying that the second terminal is exported by second applications client by first applications client based on the first terminal, the first message from the first terminal is obtained, the first message includes the temporary identifier of the User Identity and distribution.
As an implementation, also realize when the processor 91 executes described program: acquisition corresponds to the behavioral data of the account data, and the behavioral data includes behavioral data under behavioral data and line on line Internet-based;The fisrt feature variable of the account data is obtained according to the behavioral data, wherein the fisrt feature variable is used to indicate the behavioural characteristic of the account data;By the fisrt feature variable input data analysis model, user credit data are obtained;Wherein, the Data Analysis Model is used to export user credit data according to the fisrt feature variable.
As an implementation, it is also realized when the processor 91 executes described program: obtaining second feature variable, wherein the second feature variable is used to indicate the behavioural characteristic for other the multiple account datas for having incidence relation with the account data;The fisrt feature variable and the second feature variable are input to the Data Analysis Model, wherein the Data Analysis Model is also used to export the user credit data according to the fisrt feature variable and the second feature variable.
As an implementation, it is also realized when the processor 91 executes described program: the behavioral data is divided into multiple classifications;A submodel is established to each classification in the multiple classification respectively, wherein each submodel is used for according to the fisrt feature variable and/or the second feature variable Export the first subvalue, wherein for first subvalue for indicating under classification corresponding with the submodel, the behavior of the account data is unsatisfactory for the probability value of the preset condition;The corresponding multiple submodels of the multiple classification are configured to the Data Analysis Model.
The embodiment of the invention also provides a kind of terminals, Figure 11 is the software and hardware combining schematic diagram of the terminal of the embodiment of the present invention, as shown in figure 11, including memory 802, processor 801 and it is stored in the computer program that can be run on memory 802 and on processor 801, it further include at least one network interface 804 and user interface 803, various components are coupled by bus system 805.It is understood that bus system 805 is for realizing the connection communication between these components.Bus system 805 further includes power bus, control bus and status signal bus in addition in addition to including data/address bus.But for the sake of clear explanation, various buses are all designated as bus system 805 in Figure 11.
Unlike aforementioned server shown in Fig. 10, the memory 802 in the present embodiment is also used to store various types of data to support the operation of terminal.The example of these data includes: any computer program operated in terminal, such as operating system 8021 and application program 8022, contact data, telephone book data, message, picture, video.Wherein, operating system 8021 includes various system programs, such as ccf layer, core library layer, driving layer etc., for realizing various basic businesses and the hardware based task of processing.Application program 8022 may include various application programs, such as media player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that the program of present invention method may be embodied in application program 8022.
In the present embodiment, the processor 801 is realized when executing described program: based on requesting access to the second applications client with the account data of the first applications client, the corresponding user credit data of account data of first applications client are obtained, the user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;Based on the user credit data, corresponding service logic is executed by second applications client.
As an implementation, it is realized when the processor 801 executes described program: according to the user credit data and label distribution logic, obtaining the user tag of the account data, wherein institute It states user tag and can get service range for characterizing the account data;The user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule and is located at user in the first range;The second class user tag, which is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule, is located at user in the second range, wherein first range is different from second range;And, the respective service logic for corresponding to second applications client request access to, described is executed based on the user credit data, including it is following at least one: execute corresponding with first kind user tag service logic, shielding responds access request for the second applications client access request or part;Service logic corresponding with the second class user tag is executed, partly or entirely response is directed to the access request of second applications client.
As an implementation, the processor 801 is realized when executing described program: accessing the second applications client based on the terminal or another terminal request with the account data of first applications client, temporary identifier is requested to server and obtained to the terminal by second applications client, and output includes the identification information of the temporary identifier;The server is the corresponding server of the first applications client;It is read based on the terminal or another terminal by first applications client and identifies the identification information and request to access second applications client with the account data of first applications client to the server based on the terminal or another terminal, the terminal obtains the corresponding user credit data of the account data from the server by second applications client.
In the exemplary embodiment, the embodiment of the invention also provides a kind of computer storage medium, the memory 92 for example including computer program shown in Fig. 10, above-mentioned computer program can be executed by the processor 91 of server, to complete step described in preceding method.Computer storage medium can be the memories such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface storage, CD or CD-ROM;Be also possible to include one of above-mentioned memory or any combination various equipment.
Computer storage medium provided in an embodiment of the present invention, it is stored thereon with computer instruction, the realization when instruction is executed by processor: based on the second applications client is accessed with the account data of the first applications client, the first message from the first terminal for including first applications client is obtained;The first message includes the corresponding User Identity of account data of the first applications client;Obtain user credit data associated with the User Identity, the user credit data are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.
As an implementation, the realization when instruction is executed by processor: the confirmation message for accessing second applications client with the account data of first applications client is authorized in response to characterizing for acquisition, the user credit data are sent to second applications client.
As an implementation, the realization when instruction is executed by processor: the identification information for identifying that the second terminal is exported by second applications client is read by first applications client based on the first terminal, the first message from the first terminal is obtained, the first message includes the temporary identifier of the User Identity and distribution.
As an implementation, also realize when which is executed by processor: acquisition corresponds to the behavioral data of the account data, and the behavioral data includes behavioral data under behavioral data and line on line Internet-based;The fisrt feature variable of the account data is obtained according to the behavioral data, wherein the fisrt feature variable is used to indicate the behavioural characteristic of the account data;By the fisrt feature variable input data analysis model, user credit data are obtained;Wherein, the Data Analysis Model is used to export user credit data according to the fisrt feature variable.
As an implementation, it is also realized when which is executed by processor: obtaining second feature variable, wherein the second feature variable is used to indicate the behavioural characteristic for other the multiple account datas for having incidence relation with the account data;The fisrt feature variable and the second feature variable are input to the Data Analysis Model, wherein the Data Analysis Model is also used to special according to described first It levies variable and the second feature variable exports the user credit data.
As an implementation, it is also realized when which is executed by processor: the behavioral data is divided into multiple classifications;A submodel is established to each classification in the multiple classification respectively, wherein, each submodel is used to export the first subvalue according to the fisrt feature variable and/or the second feature variable, wherein, for first subvalue for indicating under classification corresponding with the submodel, the behavior of the account data is unsatisfactory for the probability value of the preset condition;The corresponding multiple submodels of the multiple classification are configured to the Data Analysis Model.
The embodiment of the invention also provides a kind of computer storage medium, the memory 802 for example including computer program shown in Figure 11, above-mentioned computer program can be executed by the processor 801 of terminal, to complete step described in preceding method.Computer storage medium can be the memories such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface storage, CD or CD-ROM;Be also possible to include one of above-mentioned memory or any combination various equipment, such as mobile phone, computer, tablet device, personal digital assistant.
Computer storage medium provided in an embodiment of the present invention, it is stored thereon with computer instruction, the realization when instruction is executed by processor: based on requesting access to the second applications client with the account data of the first applications client, the corresponding user credit data of account data of first applications client are obtained, the user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;Based on the user credit data, corresponding service logic is executed by second applications client.
As an implementation, it is also realized when which is executed by processor: according to the user credit data and label distribution logic, obtaining the user tag of the account data, wherein the user tag can get service range for characterizing the account data;The user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule and is located at user in the first range;The second class user tag is used to indicate the corresponding terminal user of the account data and violates institute The probability for stating pre-defined rule is located at user in the second range, wherein first range is different from second range;And, the respective service logic for corresponding to second applications client request access to, described is executed based on the user credit data, including it is following at least one: execute corresponding with first kind user tag service logic, shielding responds access request for the second applications client access request or part;Service logic corresponding with the second class user tag is executed, partly or entirely response is directed to the access request of second applications client.
As an implementation, the instruction is also realized when being executed by processor: accessing the second applications client based on the terminal or another terminal request with the account data of first applications client, temporary identifier is requested to server and obtained to the terminal by second applications client, and output includes the identification information of the temporary identifier;The server is the corresponding server of the first applications client;It is read based on the terminal or another terminal by first applications client and identifies the identification information and request to access second applications client with the account data of first applications client to the server based on the terminal or another terminal, the terminal obtains the corresponding user credit data of the account data from the server by second applications client.
The embodiment of the invention also provides a kind of information processing systems, and the system comprises servers and terminal;The server is configured to request access to the second applications client with the account data of first applications client, and server obtains the first message from the terminal or another terminal that include first applications client;The first message includes the User Identity of the account data corresponding to first applications client;User credit data associated with the User Identity are obtained, the user credit data are sent to the terminal including second applications client;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;The terminal is configured to the user credit data, executes respective service logic by second applications client.
In one embodiment, the server is configured to authorize the confirmation message for accessing second applications client with the account data of first applications client in response to the characterization of acquisition, by the use Family credit data is sent to second applications client.
In one embodiment, the server, it is configured to the first terminal and the identification information for identifying that the second terminal is exported by second applications client is read by first applications client, the first message from the first terminal is obtained, the first message includes the temporary identifier of the User Identity and server distribution.
In one embodiment, the server, is additionally configured to the behavioral data that acquisition corresponds to the account data, and the behavioral data includes behavioral data under behavioral data and line on line Internet-based;The fisrt feature variable of the account data is obtained according to the behavioral data, wherein the fisrt feature variable is used to indicate the behavioural characteristic of the account data;By the fisrt feature variable input data analysis model, user credit data are obtained;Wherein, the Data Analysis Model is used to export user credit data according to the fisrt feature variable.
In one embodiment, the server is configured to obtain second feature variable, wherein the second feature variable is used to indicate the behavioural characteristic for other the multiple account datas for having incidence relation with the account data;The fisrt feature variable and the second feature variable are input to the Data Analysis Model, wherein the Data Analysis Model is also used to export the user credit data according to the fisrt feature variable and the second feature variable.
In one embodiment, the server is configured to before the fisrt feature variable and the second feature variable are input to the Data Analysis Model, the behavioral data is divided into multiple classifications;A submodel is established to each classification in the multiple classification respectively, wherein, each submodel is used to export the first subvalue according to the fisrt feature variable and/or the second feature variable, wherein, for first subvalue for indicating under classification corresponding with the submodel, the behavior of the account data is unsatisfactory for the probability value of the preset condition;The corresponding multiple submodels of the multiple classification are configured to the Data Analysis Model.
In one embodiment, the terminal is additionally configured to obtain the user tag of the account data according to the user credit data and label distribution logic, wherein the user tag is for characterizing institute Stating account data can get service range;The user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule and is located at user in the first range;The second class user tag, which is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule, is located at user in the second range, wherein first range is different from second range;It is described that the respective service logic for corresponding to second applications client request access to, described is executed based on the user credit data, including it is following at least one: execute corresponding with first kind user tag service logic, shielding responds access request for the second applications client access request or part;Service logic corresponding with the second class user tag is executed, partly or entirely response is directed to the access request of second applications client.
In one embodiment, the terminal, it is additionally configured to access the second applications client based on the terminal or another terminal request with the account data of first applications client, temporary identifier is requested to server and obtained to the terminal by second applications client, and output includes the identification information of the temporary identifier;The server is the corresponding server of the first applications client;It is read based on the terminal or another terminal by first applications client and identifies the identification information and request to access second applications client with the account data of first applications client to the server based on the terminal or another terminal, the terminal obtains the corresponding user credit data of the account data from the server by second applications client.
In several embodiments provided herein, it should be understood that disclosed device and method may be implemented in other ways.Apparatus embodiments described above are merely indicative, such as, the division of the unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or be desirably integrated into another system, or some features can be ignored or not executed.In addition, the mutual coupling or direct-coupling of shown or discussed each component part or communication connection can be through some interfaces, the indirect coupling or communication connection of equipment or unit be can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, and component shown as a unit can be or may not be physical unit, it can and it is in one place, it may be distributed over multiple network units;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated in one processing unit, it is also possible to each unit individually as a unit, can also be integrated in one unit with two or more units;Above-mentioned integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realizing all or part of the steps of above method embodiment, this can be accomplished by hardware associated with program instructions, program above-mentioned can be stored in a computer readable storage medium, the program when being executed, executes step including the steps of the foregoing method embodiments;And storage medium above-mentioned includes: the various media that can store program code such as movable storage device, ROM, RAM, magnetic or disk.
If also can store in a computer readable storage medium alternatively, the above-mentioned integrated unit of the present invention is realized and when sold or used as an independent product in the form of software function module.Based on this understanding, substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of the embodiment of the present invention in other words, the computer software product is stored in a storage medium, and is used including some instructions so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention.And storage medium above-mentioned includes: the various media that can store program code such as movable storage device, ROM, RAM, magnetic or disk.
It is described above; only a specific embodiment of the invention, but scope of protection of the present invention is not limited thereto, and anyone skilled in the art is in the technical scope disclosed by the present invention; it can easily think of the change or the replacement, should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (23)

  1. A kind of information processing method, which comprises
    Based on the second applications client is requested access to the account data of the first applications client, the first message from the first terminal for including first applications client is obtained;The first message includes the corresponding User Identity of account data corresponding to first applications client;
    Obtain user credit data associated with the User Identity, the user credit data are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic;
    The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule.
  2. According to the method described in claim 1, wherein, it is described that the user credit data are sent to the second terminal including second applications client, comprising:
    The confirmation message for accessing second applications client with the account data of first applications client is authorized in response to characterizing for acquisition, the user credit data are sent to second applications client.
  3. According to the method described in claim 1, wherein, it is described based on the second applications client is requested access to the account data of the first applications client, obtain the first message from the first terminal for including first applications client, comprising:
    The identification information for identifying that the second terminal is exported by second applications client is read by first applications client based on the first terminal, the first message from the first terminal is obtained, the first message includes the temporary identifier of the User Identity and server distribution.
  4. According to the method described in claim 1, wherein, which comprises
    Acquisition corresponds to the behavioral data of the account data, and the behavioral data includes behavioral data under behavioral data and line on line Internet-based;
    The fisrt feature variable of the account data is obtained according to the behavioral data, wherein described One characteristic variable is used to indicate the behavioural characteristic of the account data;
    By the fisrt feature variable input data analysis model, user credit data are obtained;Wherein, the Data Analysis Model is used to export user credit data according to the fisrt feature variable.
  5. According to the method described in claim 4, wherein, it is described by the fisrt feature variable input data analysis model, comprising:
    Obtain second feature variable, wherein the second feature variable is used to indicate the behavioural characteristic for other the multiple account datas for having incidence relation with the account data;
    The fisrt feature variable and the second feature variable are input to the Data Analysis Model, wherein the Data Analysis Model is also used to export the user credit data according to the fisrt feature variable and the second feature variable.
  6. According to the method described in claim 5, wherein, before the fisrt feature variable and the second feature variable are input to the Data Analysis Model, the method also includes:
    The behavioral data is divided into multiple classifications;
    A submodel is established to each classification in the multiple classification respectively, wherein, each submodel is used to export the first subvalue according to the fisrt feature variable and/or the second feature variable, wherein, for first subvalue for indicating under classification corresponding with the submodel, the behavior of the account data is unsatisfactory for the probability value of the preset condition;
    The corresponding multiple submodels of the multiple classification are configured to the Data Analysis Model.
  7. A kind of information processing method, which comprises
    Based on requesting access to the second applications client with the account data of the first applications client, the corresponding user credit data of account data of first applications client are obtained, the user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;
    Based on the user credit data, corresponding service logic is executed by second applications client.
  8. According to the method described in claim 7, wherein, the method also includes: according to the use Family credit data and label distribution logic, obtain the user tag of the account data, wherein the user tag can get service range for characterizing the account data;The user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule and is located at user in the first range;The second class user tag, which is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule, is located at user in the second range, wherein first range is different from second range;
    It is described to execute the respective service logic for corresponding to second applications client request access to, described based on the user credit data, including it is following at least one:
    Service logic corresponding with the first kind user tag is executed, shielding is for the second applications client access request or part response access request;
    Service logic corresponding with the second class user tag is executed, partly or entirely response is directed to the access request of second applications client.
  9. The method according to the description of claim 7 is characterized in that described based on the second applications client is accessed with the account data of the first applications client, the terminal obtains the corresponding user credit data of account data of first applications client, comprising:
    The second applications client is accessed with the account data of first applications client based on the terminal or another terminal request, temporary identifier is requested to server and obtained to the terminal by second applications client, and output includes the identification information of the temporary identifier;The server is the corresponding server of the first applications client;
    It is read based on the terminal or another terminal by first applications client and identifies the identification information and request to access second applications client with the account data of first applications client to the server based on the terminal or another terminal, the terminal obtains the corresponding user credit data of the account data from the server by second applications client.
  10. A kind of information processing method, which comprises
    Based on the second applications client is requested access to the account data of first applications client, server obtains the first message from the first terminal for including first applications client;The first message includes the User Identity of the account data corresponding to first applications client;
    The server obtains user credit data associated with the User Identity, and the user credit data are sent to the second terminal including second applications client;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;
    Based on the user credit data, the second terminal executes respective service logic by second applications client.
  11. A kind of server, the server include: the first communication unit, first acquisition unit and the second communication unit;
    First communication unit is configured to request access to the second applications client with the account data of the first applications client, obtains the first message from the first terminal for including first applications client;The first message includes the corresponding User Identity of account data of the first applications client;
    The first acquisition unit is configured to obtain user credit data associated with the User Identity;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;
    Second communication unit, the user credit data for being configured to obtain the first acquisition unit are sent to the second terminal including second applications client, so that the second applications client of the second terminal is based on the user credit data and executes corresponding service logic.
  12. Server according to claim 11, wherein, second communication unit, it is configured to authorize the confirmation message for accessing second applications client with the account data of first applications client in response to the characterization of acquisition, the user credit data is sent to second applications client.
  13. Server according to claim 11, wherein, first communication unit, it is configured to the first terminal and the identification information for identifying that the second terminal is exported by second applications client is read by first applications client, obtain the first message from the first terminal The first message includes the temporary identifier of the User Identity and distribution.
  14. Server according to claim 11, wherein the server further includes acquisition unit and second acquisition unit;Wherein,
    The acquisition unit, is configured to the behavioral data that acquisition corresponds to the account data, and the behavioral data includes behavioral data under behavioral data and line on line Internet-based;
    The second acquisition unit is configured to obtain the fisrt feature variable of the account data according to the behavioral data that the acquisition unit acquires, wherein the fisrt feature variable is used to indicate the behavioural characteristic of the account data;By the fisrt feature variable input data analysis model, user credit data are obtained;Wherein, the Data Analysis Model is used to export user credit data according to the fisrt feature variable.
  15. Server according to claim 14, wherein the second acquisition unit is configured to obtain second feature variable, wherein the second feature variable is used to indicate the behavioural characteristic for other the multiple account datas for having incidence relation with the account data;The fisrt feature variable and the second feature variable are input to the Data Analysis Model, wherein the Data Analysis Model is also used to export the user credit data according to the fisrt feature variable and the second feature variable.
  16. Server according to claim 15, wherein the second acquisition unit is configured to the behavioral data being divided into multiple classifications;A submodel is established to each classification in the multiple classification respectively, wherein, each submodel is used to export the first subvalue according to the fisrt feature variable and/or the second feature variable, wherein, for first subvalue for indicating under classification corresponding with the submodel, the behavior of the account data is unsatisfactory for the probability value of the preset condition;The corresponding multiple submodels of the multiple classification are configured to the Data Analysis Model.
  17. A kind of terminal, the terminal include: third communication unit and execution unit;
    The third communication unit, it is configured to access the second applications client with the account data of the first applications client, the corresponding user credit data of account data of first applications client are obtained, the user credit data violate pre- set pattern for characterizing the corresponding terminal user of the User Identity Probability then;
    The execution unit, is configured to the user credit data that the third communication unit obtains, and executes corresponding service logic by second applications client.
  18. Terminal according to claim 17, wherein
    The execution unit is additionally configured to obtain the user tag of account data according to the user credit data and label distribution logic, wherein the user tag can get service range for characterizing the account data;The user tag includes at least: first kind user tag and the second class user tag, wherein the first kind user tag is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule and is located at user in the first range;The second class user tag, which is used to indicate the corresponding terminal user of the account data and violates the probability of the pre-defined rule, is located at user in the second range, wherein first range is different from second range;
    Be additionally configured to execute corresponding service logic based on the user credit data, including it is following at least one:
    Service logic corresponding with the first kind user tag is executed, access request or part response access request are shielded;
    Service logic corresponding with the second class user tag is executed, access request is partly or entirely responded.
  19. Terminal according to claim 17, wherein the terminal further includes output unit;
    The third communication unit is configured to the terminal or another terminal request with the account data of first applications client and accesses the second applications client, requested by second applications client to server and obtain temporary identifier;The server is the corresponding server of the first applications client;
    The output unit, be configured as output to include the temporary identifier identification information;
    The third communication unit is additionally configured to read the identification identification information by first applications client based on the terminal or another terminal and requests to be accessed second application with the account data of first applications client to the server based on the terminal or another terminal Client obtains the corresponding user credit data of the account data from the server by second applications client.
  20. The step of a kind of computer storage medium, is stored thereon with computer instruction, which realizes information processing method as claimed in any one of claims 1 to 6 when being executed by processor;
    Alternatively, the step of realizing claim 7 to 9 described in any item information processing methods when the instruction is executed by processor.
  21. The step of a kind of server including memory, processor and stores the computer program that can be run on a memory and on a processor, and the processor realizes information processing method as claimed in any one of claims 1 to 6 when executing described program.
  22. A kind of terminal, on a memory and the computer program that can run on a processor including memory, processor and storage, when the processor executes described program the step of realization claim 7 to 9 described in any item information processing methods.
  23. A kind of information processing system, the system comprises servers and terminal;
    The server is configured to request access to the second applications client with the account data of first applications client, and server obtains the first message from the terminal or another terminal that include first applications client;The first message includes the User Identity of the account data corresponding to first applications client;User credit data associated with the User Identity are obtained, the user credit data are sent to the terminal including second applications client;The user credit data are used to characterize the probability that the corresponding terminal user of the User Identity violates pre-defined rule;
    The terminal is configured to the user credit data, executes respective service logic by second applications client.
CN201780054468.0A 2017-11-03 2017-11-03 Information processing method and system, server, terminal, computer storage medium Active CN110402570B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/109397 WO2019084922A1 (en) 2017-11-03 2017-11-03 Information processing method and system, server, terminal and computer storage medium

Publications (2)

Publication Number Publication Date
CN110402570A true CN110402570A (en) 2019-11-01
CN110402570B CN110402570B (en) 2020-08-11

Family

ID=66332772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780054468.0A Active CN110402570B (en) 2017-11-03 2017-11-03 Information processing method and system, server, terminal, computer storage medium

Country Status (2)

Country Link
CN (1) CN110402570B (en)
WO (1) WO2019084922A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111079165A (en) * 2019-12-18 2020-04-28 深圳我家云网络科技有限公司 Data processing method, data processing device, equipment and storage medium
CN111617487A (en) * 2020-05-22 2020-09-04 腾讯科技(深圳)有限公司 Account access method and device in game application, storage medium and electronic equipment
CN114221776A (en) * 2020-10-26 2022-03-22 广州融至益教育科技有限公司 Account number binding method and device applied to intelligent electronic money saving scene
CN114339729A (en) * 2020-09-30 2022-04-12 阿里巴巴集团控股有限公司 Method and device for generating equipment identifier, electronic equipment and storage medium
CN114554251A (en) * 2022-02-10 2022-05-27 青岛海尔科技有限公司 Multimedia data request method and device, storage medium and electronic device
CN115460015A (en) * 2022-09-29 2022-12-09 山东亿云信息技术有限公司 TOTP-based identity authentication method and system for Web application

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193718A (en) * 2019-12-13 2020-05-22 航天信息股份有限公司 Safe login method and system based on third party authorization
CN111224955B (en) * 2019-12-25 2023-02-03 中国平安人寿保险股份有限公司 Service response method and system
CN112035548A (en) * 2020-08-31 2020-12-04 北京嘀嘀无限科技发展有限公司 Identification model acquisition method, identification method, device, equipment and medium
CN114448924B (en) * 2020-10-30 2023-04-14 腾讯科技(深圳)有限公司 User group upgrading method, device, equipment and storage medium
CN112561272B (en) * 2020-12-07 2023-01-06 深圳市思为软件技术有限公司 Data processing method for electronic sign-in and related product
CN113377345A (en) * 2021-05-31 2021-09-10 五八到家有限公司 Method and system for processing housekeeping service task, electronic device and readable medium
CN114640712B (en) * 2022-03-17 2024-01-30 广州博冠信息科技有限公司 Information generation method, device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100011421A1 (en) * 2008-07-13 2010-01-14 International Business Machines Corporation Enabling authentication of openid user when requested identity provider is unavailable
CN102821085A (en) * 2011-11-23 2012-12-12 腾讯科技(深圳)有限公司 Third party authorization login method, open platform and system
CN103634316A (en) * 2013-11-26 2014-03-12 乐视网信息技术(北京)股份有限公司 Account login method and electronic equipment
CN104113534A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 System and method for logging in applications (APPs)
CN105592109A (en) * 2014-10-20 2016-05-18 中国移动通信集团天津有限公司 Registration method, device and system
CN105991614A (en) * 2015-03-03 2016-10-05 阿里巴巴集团控股有限公司 Open authorization, resource access method and device, and a server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7324972B1 (en) * 1997-03-07 2008-01-29 Clickshare Service Corporation Managing transactions on a network: four or more parties
CN102821104B (en) * 2012-08-09 2014-04-16 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100011421A1 (en) * 2008-07-13 2010-01-14 International Business Machines Corporation Enabling authentication of openid user when requested identity provider is unavailable
CN102821085A (en) * 2011-11-23 2012-12-12 腾讯科技(深圳)有限公司 Third party authorization login method, open platform and system
CN103634316A (en) * 2013-11-26 2014-03-12 乐视网信息技术(北京)股份有限公司 Account login method and electronic equipment
CN104113534A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 System and method for logging in applications (APPs)
CN105592109A (en) * 2014-10-20 2016-05-18 中国移动通信集团天津有限公司 Registration method, device and system
CN105991614A (en) * 2015-03-03 2016-10-05 阿里巴巴集团控股有限公司 Open authorization, resource access method and device, and a server

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111079165A (en) * 2019-12-18 2020-04-28 深圳我家云网络科技有限公司 Data processing method, data processing device, equipment and storage medium
CN111079165B (en) * 2019-12-18 2022-05-17 深圳我家云网络科技有限公司 Data processing method, data processing device, equipment and storage medium
CN111617487A (en) * 2020-05-22 2020-09-04 腾讯科技(深圳)有限公司 Account access method and device in game application, storage medium and electronic equipment
CN111617487B (en) * 2020-05-22 2021-03-16 腾讯科技(深圳)有限公司 Account access method and device in game application, storage medium and electronic equipment
US12011659B2 (en) 2020-05-22 2024-06-18 Tencent Technology (Shenzhen) Company Limited Account connecting method and apparatus, storage medium, and electronic device
CN114339729A (en) * 2020-09-30 2022-04-12 阿里巴巴集团控股有限公司 Method and device for generating equipment identifier, electronic equipment and storage medium
CN114221776A (en) * 2020-10-26 2022-03-22 广州融至益教育科技有限公司 Account number binding method and device applied to intelligent electronic money saving scene
CN114554251A (en) * 2022-02-10 2022-05-27 青岛海尔科技有限公司 Multimedia data request method and device, storage medium and electronic device
CN114554251B (en) * 2022-02-10 2024-01-23 青岛海尔科技有限公司 Multimedia data requesting method and device, storage medium and electronic device
CN115460015A (en) * 2022-09-29 2022-12-09 山东亿云信息技术有限公司 TOTP-based identity authentication method and system for Web application

Also Published As

Publication number Publication date
CN110402570B (en) 2020-08-11
WO2019084922A1 (en) 2019-05-09

Similar Documents

Publication Publication Date Title
CN110402570A (en) Information processing method and system, server, terminal, computer storage medium
Schlegel et al. Blockchain technologies from the consumers’ perspective: What is there and why should who care?
Kotler et al. Marketing strategy in the digital age: applying Kotler’s strategies to digital marketing
Preibusch et al. Shopping for privacy: Purchase details leaked to PayPal
US11853983B1 (en) Video revenue sharing program
US11570214B2 (en) Crowdsourced innovation laboratory and process implementation system
US20210365574A1 (en) Method and System for Data Valuation and Secure Commercial Monetization Platform
Zhang et al. Value of big data to finance: observations on an internet credit Service Company in China
US11386476B2 (en) Methods and systems for notifying users of new applications
US20220005067A1 (en) Method and apparatus for clustering platform sessions and user accounts associated with the platform sessions
CN111476469A (en) Guest expansion method, terminal equipment and storage medium
KR102453535B1 (en) Method and apparatus for providing an online shopping platform
CN107545018A (en) Time delay in the system effectiveness based on feedback determines reduces
CN110322209A (en) Comment information processing method, device, system and storage medium
CN108737138B (en) Service providing method and service platform
US10453091B2 (en) System and method to build external facing information platform to generate target list of entities
Bulchand-Gidumal et al. Fighting fake reviews with blockchain-enabled consumer-generated reviews
KR102204843B1 (en) Value selective marketing system
US11544053B2 (en) Methods and systems for generating application build recommendations
CN109829593B (en) Credit determining method and device for target object, storage medium and electronic device
US20190197585A1 (en) Systems and methods for data storage and retrieval with access control
Macanovic et al. The moral embeddedness of cryptomarkets: text mining feedback on economic exchanges on the dark web
US20230319373A1 (en) Non-Fungible Token Minting in a Metaverse Environment
CN110163482B (en) Method for determining safety scheme data of activity scheme, terminal equipment and server
US20110022406A1 (en) Apparatus and method for providing security in an online gaming and/or digital environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant