CN111476640A - Authentication method, system, storage medium and big data authentication platform - Google Patents

Authentication method, system, storage medium and big data authentication platform Download PDF

Info

Publication number
CN111476640A
CN111476640A CN202010283671.9A CN202010283671A CN111476640A CN 111476640 A CN111476640 A CN 111476640A CN 202010283671 A CN202010283671 A CN 202010283671A CN 111476640 A CN111476640 A CN 111476640A
Authority
CN
China
Prior art keywords
user
credit
access request
authentication
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010283671.9A
Other languages
Chinese (zh)
Other versions
CN111476640B (en
Inventor
吕劲松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Sitrui Information Technology Co ltd
Original Assignee
Jiangsu Sitrui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Sitrui Information Technology Co ltd filed Critical Jiangsu Sitrui Information Technology Co ltd
Priority to CN202010283671.9A priority Critical patent/CN111476640B/en
Publication of CN111476640A publication Critical patent/CN111476640A/en
Application granted granted Critical
Publication of CN111476640B publication Critical patent/CN111476640B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses an authentication method, an authentication system, a storage medium and a big data authentication platform, wherein the method comprises the following steps: receiving an access request of a user; verifying the validity of the access request; and after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform. The method has the advantages that the legality and the credit of the access request of the user are verified, public opinion risk factors closely related to the enterprise main body are introduced in real time, the credit limit threshold value of the enterprise main body is dynamically adjusted, timely and effective evaluation basis is provided for the evaluation main body, and the method has the advantages of being real-time, efficient and reliable.

Description

Authentication method, system, storage medium and big data authentication platform
Technical Field
The invention relates to the technical field of big data credit authentication, in particular to an authentication method, an authentication system, a storage medium and a big data authentication platform.
Background
At present, the development of the credit market in China is immature, and a great part of enterprises lose credit due to the lack of a unified credit record standard and an objective risk assessment standard. A set of fair and objective enterprise credit evaluation model is established, and the method has important significance for reasonably measuring the enterprise risk level and creating a healthy credit market.
The technical scheme of credit assessment in the prior art mainly comprises the following steps: and (4) calculating the financial indexes of the enterprise regularly by using a solidified credit scoring model, and substituting the financial indexes into a formula for calculation. Due to the fact that the updating period of the financial index is long, various possible situations such as data delay, incompleteness and unreality exist, the credit score is updated slowly, and the enterprise risk state at a certain time point cannot be objectively and comprehensively reflected. Timely reflection cannot be made on various emergencies, and the loss of default which can occur is caused. In addition to financial indicators, other factors reflecting enterprise risk, such as corporate subject related public sentiments, are not considered.
Public opinion refers to the social attitude of the people as subjects in the direction of social managers, enterprises, individuals and other organizations as objects and their politics, society, morality, etc., around the occurrence, development and change of social events of intermediaries in a certain social space. It is the sum of the expressions of beliefs, attitudes, opinions, emotions, and the like expressed by more people about various phenomena, problems, and the like in the society. The network public opinion is a theory and a viewpoint which have strong influence and tendency on some hot spots and focus problems in real life by the public spreading through the internet, and is mainly realized and strengthened by BBS forum, blogs, news posters, reprints and the like.
With the rapid development of the internet on a global scale, network media has been recognized as the fourth media following newspapers, broadcasting, and television, and the network becomes one of the main carriers reflecting social public opinions. The network public opinion expression is rapid, the information is diversified, the modes are interactive, and the network public opinion expression system has incomparable advantages compared with the traditional media. The self-media represented by microblogs, blogs, social networks and instant messaging systems breaks through control and monopoly of information, people on the network freely express own attitudes and opinions, and are not easily accepted unconditionally as before, on the contrary, interest appeal disputes of different levels are presented, and different ideas and viewpoints are collided positively. Under the condition, it is necessary to build a public opinion monitoring system capable of covering multiple data sources, and the system can further raise the hot point research and judgment method for researching the public opinion and the influence brought by the media aiming at the new media transmission environment, so that the public opinion research is enriched and perfected.
Under the market economic condition, a competitive mechanism is inevitably introduced into each link of production and management of enterprises. The promotion of technology, the update of products and the elimination of the products in the enterprise are the results of competitive changes. It can be said that the business is changing in volume every time every day. Therefore, the situation of the analysis enterprise should be investigated with a dynamic eye-light and a developing viewpoint in the evaluation and analysis. Only through comprehensive understanding and dynamic analysis of enterprises can correct evaluation meeting actual conditions be made.
Aiming at the situation, the invention provides an authentication method, an authentication system, a storage medium and a big data authentication platform, which can effectively improve the prior art and overcome the defects.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an authentication method, an authentication system, a storage medium and a big data authentication platform, aiming at solving the problems of poor timeliness, poor reliability and the like of the prior art, and the specific scheme is as follows:
in a first aspect, the present invention provides an authentication method, including:
receiving an access request of a user;
verifying the validity of the access request;
and after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
Preferably, the verifying the validity of the access request includes:
and verifying the digital signature of the access request by using the public key, wherein if the verification is passed, the validity of the access request is verified.
Preferably, the method for generating the access request includes:
encrypting the access request;
compressing the access request subjected to the encryption processing;
and adding a response protocol to the access request subjected to the encryption processing and the compression processing.
Preferably, the verifying the validity of the access request includes:
and judging whether the access identifier of the access request is matched with the access identifier of the big data platform, if so, verifying the validity of the access request command.
Preferably, the user is credit authenticated, the method comprising:
scoring the enterprise credit public sentiment of the user to obtain the credit limit of the user;
and when the credit line is larger than a preset credit line threshold value, the user passes the credit authentication.
Preferably, the credit line acquisition method includes:
dividing comments of the user by each internet website point acquired by the crawler into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value;
and respectively counting the proportion of the positive comment information and the negative comment information in the total comment information, and carrying out weighted operation on the preset positive comment value, the proportion of the preset negative comment value and the positive comment information and the proportion of the negative comment information, wherein the operation result is the credit line.
Preferably, the method further comprises:
when the service transaction of the user on the big data platform is successful, reducing a preset credit limit threshold value of the user;
and when the service transaction of the user on the big data platform fails, increasing a preset credit limit threshold of the user.
In a second aspect, the present invention provides an authentication system, the system comprising:
the receiving module is used for receiving an access request of a user;
the verification module is used for verifying the validity of the access request;
and the authentication module is used for performing credit authentication on the user after the verification is passed, and allowing the user to access the big data platform if the user passes the credit authentication.
In a third aspect, the present invention provides a big data authentication platform, including:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of:
receiving an access request of a user;
verifying the validity of the access request;
and after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In a fourth aspect, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method according to the first aspect.
The invention has the beneficial effects that: the authentication method, the authentication system, the storage medium and the big data authentication platform of the invention can introduce public opinion risk factors closely related to the main body of the enterprise in real time by verifying the legality and the credit of the access request of the user, dynamically adjust the credit limit threshold of the main body of the enterprise, provide timely and effective evaluation basis for the evaluation main body, and have the advantages of real time, high efficiency and reliability.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present invention, the embodiments in the drawings do not constitute any limitation to the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flow chart illustrating an authentication method according to an embodiment of the present invention.
Fig. 2 is a flow chart of an authentication method according to an embodiment of the present invention.
FIG. 3 is a block diagram of an authentication system according to an embodiment of the present invention.
FIG. 4 is a schematic structural diagram of a big data authentication platform according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention will be further described in detail with reference to the accompanying drawings and embodiments, which are preferred embodiments of the present invention. It is to be understood that the described embodiments are merely a subset of the embodiments of the invention, and not all embodiments; it should be noted that the embodiments and features of the embodiments may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The main idea of the technical scheme of the embodiment of the invention is as follows: receiving an access request of a user; verifying the validity of the access request; and after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In order to better understand the technical solutions, the technical solutions will be described in detail below with reference to the drawings and specific embodiments.
Example one
An embodiment of the present invention provides an authentication method, as shown in fig. 1, the authentication method may specifically include the following steps:
s101, receiving an access request of a user;
the user access request received by the big data credit authentication platform can comprise identity information of the user, identification information of components of the big data credit authentication platform needing to be accessed and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user may be a user name and a password; the components that the user needs to access may be any of the components that make up the big data credit authentication platform. The identification information of the component is used to distinguish from other components, and the identification information of the component may include, but is not limited to, names, numbers, and the like, which is not limited in this specification.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, a physical carrier of the big data credit authentication platform is usually a server or a server cluster, the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform has a payment function, and the description does not specially limit the present invention.
In one example, a user may use a terminal device such as a mobile phone to scan a specified two-dimensional code to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer or a mobile phone to initiate the access request. The two-dimensional code and the link can be provided by a big data credit certification platform or other third-party systems, and the description does not specially limit the two-dimensional code and the link. If the two-dimension code and the link are provided by other third-party systems, the third-party systems can send the user information of the user to the big data credit authentication platform.
S102, verifying the validity of the access request; among other things, authentication in digital signatures is involved.
In the embodiment of the present invention, specifically, the big data credit authentication platform uses the public key to verify the digital signature of the access request, and if the verification is passed, the validity of the access request is verified.
The verified content may include: security of the access request, entitlement to authorize access to the big data credit authentication platform, and legitimacy of the access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to enter legitimate validation information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, a big data credit authentication platform of a data owner may preset a legal account, also called a white list user, that allows access to data files.
In an embodiment of the present invention, the access request may be generated by the following method: firstly, encrypting the access request; then, compressing the access request after encryption; and finally, adding a response protocol to the access request subjected to the encryption processing and the compression processing.
If the digital signature passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified.
If the digital signature does not pass the verification, the access request of the initiating user can be confirmed to be illegal, and in order to ensure the initiating safety, the big data credit authentication platform can return a message with potential safety hazard to the initiating user.
In the embodiment of the present invention, the public key may be provided to the big data credit authentication platform by the user during registration, or may be added to the two-dimensional code by the user, which is not particularly limited in this embodiment.
In practical application, the validity check may also be performed by using a scheme combining signature verification and registration verification, or may also be performed only by using signature verification or registration verification, or may also be performed in other manners, which is not limited in this embodiment.
And S103, after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In the embodiment of the invention, after the digital signature passes the verification, the credit authentication is carried out on the user, and the specific method can be that the enterprise credit public sentiment of the user is firstly graded to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold, and when the credit line is greater than the preset credit line threshold, the user passes the credit authentication.
The credit line can be acquired by the following method: firstly, capturing comment information of a user on each relevant internet site by a crawler through configuration, dividing comments of the user on each internet site acquired by the crawler into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as 'good' and/or 'good' appear, the comments are positive comments, and if words such as 'poor' appear, the comments are negative comments, and the like, and the details are not repeated herein; then, respectively counting the proportion of the positive comment information and the negative comment information in the total comment information; finally, performing weighting operation on the preset positive comment value, the proportion of the preset negative comment value to the positive comment information, and the proportion of the negative comment information, for example, if the proportion of the positive comment part to the extracted total comment information is 80%, the proportion of the negative comment part to the extracted total comment information is 20%, and the preset values of the positive comment part and the negative comment part are 10 minutes and 2 minutes respectively, the credit line can be expressed by a formula:
credit line 80%. 10+ 20%. 2.4;
the calculation result is the credit limit of the user, namely 8.4 points.
In an alternative embodiment, when the service transaction of the subscriber on the big data credit authentication platform is successful, the stored preset credit limit threshold of the subscriber on the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is decreased.
In another optional embodiment, when the service transaction of the subscriber at the big data credit authentication platform fails, the stored preset credit limit threshold of the subscriber at the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform for subsequent work; and when the logged-in user is not a legal user, the authentication is not passed, and the access request authentication processing method is ended.
The operation request information of the user to the big data credit authentication platform includes but is not limited to reading data, opening a file, creating a file, deleting a file and the like.
It is noted that the above described authentication method is given by way of example only and that other authentication methods are fully available to a person skilled in the art and are within the scope of the present invention.
Example two
An embodiment of the present invention provides an authentication method, as shown in fig. 2, the authentication method may specifically include the following steps:
s201, receiving an access request of a user;
the user access request received by the big data credit authentication platform can comprise identity information of the user, identification information of components of the big data credit authentication platform needing to be accessed and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user may be a user name and a password; the components that the user needs to access may be any of the components that make up the big data credit authentication platform. The identification information of the component is used to distinguish from other components, and the identification information of the component may include, but is not limited to, names, numbers, and the like, which is not limited in this specification.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, a physical carrier of the big data credit authentication platform is usually a server or a server cluster, the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform has a payment function, and the description does not specially limit the present invention.
In one example, a user may use a terminal device such as a mobile phone to scan a specified two-dimensional code to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer or a mobile phone to initiate the access request. The two-dimensional code and the link can be provided by a big data credit certification platform or other third-party systems, and the description does not specially limit the two-dimensional code and the link. If the two-dimension code and the link are provided by other third-party systems, the third-party systems can send the user information of the user to the big data credit authentication platform.
S202, verifying the validity of the access request; therein, authentication in terms of access identification is involved.
In the embodiment of the present invention, specifically, the big data credit authentication platform determines whether the access identifier of the access request matches the access identifier of the big data platform, and if the access identifier of the access request matches the access identifier of the big data platform, the validity of the access request command passes verification.
The verified content may include: security of the access request, entitlement to authorize access to the big data credit authentication platform, and legitimacy of the access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to enter legitimate validation information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, a big data credit authentication platform of a data owner may preset a legal account, also called a white list user, that allows access to data files.
If the access identifier passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified; if the access identifier does not pass the verification, the access request of the initiating user can be confirmed to be possibly illegal, and in order to ensure the initiating safety, the big data credit authentication platform can return a message with potential safety hazard to the initiating user.
S203, after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In the embodiment of the invention, after the access identification passes the verification, the credit authentication is carried out on the user, and the specific method can be that the enterprise credit public sentiment of the user is firstly graded to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold, and when the credit line is greater than the preset credit line threshold, the user passes the credit authentication.
The credit line can be acquired by the following method: firstly, capturing comment information of a user on each relevant internet site by a crawler through configuration, dividing comments of the user on each internet site acquired by the crawler into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as 'good' and/or 'good' appear, the comments are positive comments, and if words such as 'poor' appear, the comments are negative comments, and the like, and the details are not repeated herein; then, respectively counting the proportion of the positive comment information and the negative comment information in the total comment information; finally, performing weighting operation on the preset positive comment value, the proportion of the preset negative comment value to the positive comment information, and the proportion of the negative comment information, for example, if the proportion of the positive comment part to the extracted total comment information is 80%, the proportion of the negative comment part to the extracted total comment information is 20%, and the preset values of the positive comment part and the negative comment part are 10 minutes and 2 minutes respectively, the credit line can be expressed by a formula:
credit line 80%. 10+ 20%. 2.4;
the calculation result is the credit limit of the user, namely 8.4 points.
In an alternative embodiment, when the service transaction of the subscriber on the big data credit authentication platform is successful, the stored preset credit limit threshold of the subscriber on the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is decreased.
In another optional embodiment, when the service transaction of the subscriber at the big data credit authentication platform fails, the stored preset credit limit threshold of the subscriber at the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform for subsequent work; and when the logged-in user is not a legal user, the authentication is not passed, and the access request authentication processing method is ended.
The operation request information of the user to the big data credit authentication platform includes but is not limited to reading data, opening a file, creating a file, deleting a file and the like.
It is noted that the above described authentication method is given by way of example only and that other authentication methods are fully available to a person skilled in the art and are within the scope of the present invention.
EXAMPLE III
An embodiment of the present invention provides an authentication system, as shown in fig. 3, the authentication system may specifically include the following modules:
the receiving module is used for receiving an access request of a user;
the user access request received by the big data credit authentication platform can comprise identity information of the user, identification information of components of the big data credit authentication platform needing to be accessed and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user may be a user name and a password; the components that the user needs to access may be any of the components that make up the big data credit authentication platform. The identification information of the component is used to distinguish from other components, and the identification information of the component may include, but is not limited to, names, numbers, and the like, which is not limited in this specification.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, a physical carrier of the big data credit authentication platform is usually a server or a server cluster, the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform has a payment function, and the description does not specially limit the present invention.
In one example, a user may use a terminal device such as a mobile phone to scan a specified two-dimensional code to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer or a mobile phone to initiate the access request. The two-dimensional code and the link can be provided by a big data credit certification platform or other third-party systems, and the description does not specially limit the two-dimensional code and the link. If the two-dimension code and the link are provided by other third-party systems, the third-party systems can send the user information of the user to the big data credit authentication platform.
The verification module is used for verifying the validity of the access request;
in the embodiment of the present invention, specifically, the big data credit authentication platform uses the public key to verify the digital signature of the access request, and if the verification is passed, the validity of the access request is verified.
The verified content may include: security of the access request, entitlement to authorize access to the big data credit authentication platform, and legitimacy of the access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to enter legitimate validation information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, a big data credit authentication platform of a data owner may preset a legal account, also called a white list user, that allows access to data files.
In an embodiment of the present invention, the access request may be generated by the following method: firstly, encrypting the access request; then, compressing the access request after encryption; and finally, adding a response protocol to the access request subjected to the encryption processing and the compression processing.
If the digital signature passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified.
If the digital signature does not pass the verification, the access request of the initiating user can be confirmed to be illegal, and in order to ensure the initiating safety, the big data credit authentication platform can return a message with potential safety hazard to the initiating user.
In the embodiment of the present invention, the public key may be provided to the big data credit authentication platform by the user during registration, or may be added to the two-dimensional code by the user, which is not particularly limited in this embodiment.
In practical application, the validity check may also be performed by using a scheme combining signature verification and registration verification, or may also be performed only by using signature verification or registration verification, or may also be performed in other manners, which is not limited in this embodiment.
And the authentication module is used for performing credit authentication on the user after the verification is passed, and allowing the user to access the big data platform if the user passes the credit authentication.
In the embodiment of the invention, after the digital signature passes the verification, the credit authentication is carried out on the user, and the specific method can be that the enterprise credit public sentiment of the user is firstly graded to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold, and when the credit line is greater than the preset credit line threshold, the user passes the credit authentication.
The credit line can be acquired by the following method: firstly, capturing comment information of a user on each relevant internet site by a crawler through configuration, dividing comments of the user on each internet site acquired by the crawler into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as 'good' and/or 'good' appear, the comments are positive comments, and if words such as 'poor' appear, the comments are negative comments, and the like, and the details are not repeated herein; then, respectively counting the proportion of the positive comment information and the negative comment information in the total comment information; finally, performing weighting operation on the preset positive comment value, the proportion of the preset negative comment value to the positive comment information, and the proportion of the negative comment information, for example, if the proportion of the positive comment part to the extracted total comment information is 80%, the proportion of the negative comment part to the extracted total comment information is 20%, and the preset values of the positive comment part and the negative comment part are 10 minutes and 2 minutes respectively, the credit line can be expressed by a formula:
credit line 80%. 10+ 20%. 2.4;
the calculation result is the credit limit of the user, namely 8.4 points.
In an alternative embodiment, when the service transaction of the subscriber on the big data credit authentication platform is successful, the stored preset credit limit threshold of the subscriber on the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is decreased.
In another optional embodiment, when the service transaction of the subscriber at the big data credit authentication platform fails, the stored preset credit limit threshold of the subscriber at the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform for subsequent work; and when the logged-in user is not a legal user, the authentication is not passed, and the access request authentication processing method is ended.
The operation request information of the user to the big data credit authentication platform includes but is not limited to reading data, opening a file, creating a file, deleting a file and the like.
It is noted that the above described authentication method is given by way of example only and that other authentication methods are fully available to a person skilled in the art and are within the scope of the present invention.
Example four
An embodiment of the present invention provides a big data authentication platform, and as shown in fig. 4, the authentication platform may specifically include the following modules:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program; the memory may comprise high-speed RAM memory and may also comprise non-volatile memory (non-volatile memory), such as at least one disk memory. The memory may optionally comprise at least one memory device.
A processor for executing the computer program to implement the steps of:
receiving an access request of a user;
the user access request received by the big data credit authentication platform can comprise identity information of the user, identification information of components of the big data credit authentication platform needing to be accessed and operation request information of the big data credit authentication platform.
In practical application, the identity information of the user may be a user name and a password; the components that the user needs to access may be any of the components that make up the big data credit authentication platform. The identification information of the component is used to distinguish from other components, and the identification information of the component may include, but is not limited to, names, numbers, and the like, which is not limited in this specification.
The big data credit authentication platform is usually deployed by a service provider providing a credit evaluation function, a physical carrier of the big data credit authentication platform is usually a server or a server cluster, the big data credit authentication platform can call a payment system to realize a payment function in addition to the credit evaluation function, or the big data credit authentication platform has a payment function, and the description does not specially limit the present invention.
In one example, a user may use a terminal device such as a mobile phone to scan a specified two-dimensional code to initiate an access request. In another example, the user may also access the specified link through a terminal device such as a computer or a mobile phone to initiate the access request. The two-dimensional code and the link can be provided by a big data credit certification platform or other third-party systems, and the description does not specially limit the two-dimensional code and the link. If the two-dimension code and the link are provided by other third-party systems, the third-party systems can send the user information of the user to the big data credit authentication platform.
Verifying the validity of the access request;
in the embodiment of the present invention, specifically, the big data credit authentication platform determines whether the access identifier of the access request matches the access identifier of the big data platform, and if the access identifier of the access request matches the access identifier of the big data platform, the validity of the access request command passes verification.
The verified content may include: security of the access request, entitlement to authorize access to the big data credit authentication platform, and legitimacy of the access request content.
In the case where the access request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a search request command to a predetermined area set by the above-described data processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker wants to access a request, the data processing worker is required to enter legitimate validation information to determine whether the access request has permission to access the data file of the big data credit authentication platform. For example, a big data credit authentication platform of a data owner may preset a legal account, also called a white list user, that allows access to data files.
If the access identifier passes the verification, the access request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified; if the access identifier does not pass the verification, the access request of the initiating user can be confirmed to be possibly illegal, and in order to ensure the initiating safety, the big data credit authentication platform can return a message with potential safety hazard to the initiating user.
And after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
In the embodiment of the invention, after the access identification passes the verification, the credit authentication is carried out on the user, and the specific method can be that the enterprise credit public sentiment of the user is firstly graded to obtain the credit limit of the user; and comparing the credit line with a preset credit line threshold, and when the credit line is greater than the preset credit line threshold, the user passes the credit authentication.
The credit line can be acquired by the following method: firstly, capturing comment information of a user on each relevant internet site by a crawler through configuration, dividing comments of the user on each internet site acquired by the crawler into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value, for example, if words such as 'good' and/or 'good' appear, the comments are positive comments, and if words such as 'poor' appear, the comments are negative comments, and the like, and the details are not repeated herein; then, respectively counting the proportion of the positive comment information and the negative comment information in the total comment information; finally, performing weighting operation on the preset positive comment value, the proportion of the preset negative comment value to the positive comment information, and the proportion of the negative comment information, for example, if the proportion of the positive comment part to the extracted total comment information is 80%, the proportion of the negative comment part to the extracted total comment information is 20%, and the preset values of the positive comment part and the negative comment part are 10 minutes and 2 minutes respectively, the credit line can be expressed by a formula:
credit line 80%. 10+ 20%. 2.4;
the calculation result is the credit limit of the user, namely 8.4 points.
In an alternative embodiment, when the service transaction of the subscriber on the big data credit authentication platform is successful, the stored preset credit limit threshold of the subscriber on the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is decreased.
In another optional embodiment, when the service transaction of the subscriber at the big data credit authentication platform fails, the stored preset credit limit threshold of the subscriber at the big data credit authentication platform may be updated, for example, the preset credit limit threshold of the subscriber is increased.
When the logged-in user is a legal user, the verification is passed, and the user is allowed to access the big data credit authentication platform for subsequent work; and when the logged-in user is not a legal user, the authentication is not passed, and the access request authentication processing method is ended.
The operation request information of the user to the big data credit authentication platform includes but is not limited to reading data, opening a file, creating a file, deleting a file and the like.
It is noted that the above described authentication method is given by way of example only and that other authentication methods are fully available to a person skilled in the art and are within the scope of the present invention.
The processor in this embodiment may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. The processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
EXAMPLE five
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the above-described authentication method.
In summary, the authentication method, the authentication system, the storage medium and the big data authentication platform provided by the embodiments of the present invention verify the validity and the credit of the access request of the user, introduce the public opinion risk factors closely related to the enterprise subject in real time, and dynamically adjust the credit limit threshold of the enterprise subject, thereby providing a timely and effective evaluation basis for the evaluation subject, and having the advantages of real time, high efficiency and reliability.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that the acts and modules illustrated are not necessarily required to practice the invention.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are generated in whole or in part when the computer program instructions are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The available media may be magnetic media (e.g., floppy disks, hard disks, tapes), optical media (e.g., DVDs), or semiconductor media. The semiconductor medium may be a solid state disk.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An authentication method, the method comprising:
receiving an access request of a user;
verifying the validity of the access request;
and after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
2. The method of claim 1, wherein the verifying the legitimacy of the access request comprises:
and verifying the digital signature of the access request by using the public key, wherein if the verification is passed, the validity of the access request is verified.
3. The method of claim 2, wherein the method of generating the access request comprises:
encrypting the access request;
compressing the access request subjected to the encryption processing;
and adding a response protocol to the access request subjected to the encryption processing and the compression processing.
4. The method of claim 1, wherein the verifying the legitimacy of the access request comprises:
and judging whether the access identifier of the access request is matched with the access identifier of the big data platform, if so, verifying the validity of the access request command.
5. The method according to any one of claims 1-4, wherein the user is credit authenticated, the method comprising:
scoring the enterprise credit public sentiment of the user to obtain the credit limit of the user;
and when the credit line is larger than a preset credit line threshold value, the user passes the credit authentication.
6. The method of claim 5, wherein the credit acquisition method comprises:
dividing comments of the user by each internet website point acquired by the crawler into positive comment information and negative comment information according to a preset positive comment value and a preset negative comment value;
and respectively counting the proportion of the positive comment information and the negative comment information in the total comment information, and carrying out weighted operation on the preset positive comment value, the proportion of the preset negative comment value and the positive comment information and the proportion of the negative comment information, wherein the operation result is the credit line.
7. The method of claim 6, further comprising:
when the service transaction of the user on the big data platform is successful, reducing a preset credit limit threshold value of the user;
and when the service transaction of the user on the big data platform fails, increasing a preset credit limit threshold of the user.
8. An authentication system, the system comprising:
the receiving module is used for receiving an access request of a user;
the verification module is used for verifying the validity of the access request;
and the authentication module is used for performing credit authentication on the user after the verification is passed, and allowing the user to access the big data platform if the user passes the credit authentication.
9. A big data authentication platform, the system comprising:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of:
receiving an access request of a user;
verifying the validity of the access request;
and after the verification is passed, performing credit authentication on the user, and if the user passes the credit authentication, allowing the user to access the big data platform.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202010283671.9A 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform Active CN111476640B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010283671.9A CN111476640B (en) 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010283671.9A CN111476640B (en) 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform

Publications (2)

Publication Number Publication Date
CN111476640A true CN111476640A (en) 2020-07-31
CN111476640B CN111476640B (en) 2023-08-04

Family

ID=71752203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010283671.9A Active CN111476640B (en) 2020-04-13 2020-04-13 Authentication method, system, storage medium and big data authentication platform

Country Status (1)

Country Link
CN (1) CN111476640B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112200586A (en) * 2020-11-16 2021-01-08 支付宝(杭州)信息技术有限公司 Identity authentication method and device
CN112818312A (en) * 2021-02-02 2021-05-18 江苏欧软信息科技有限公司 MES system login authentication method based on face recognition technology and MES system
CN114201418A (en) * 2021-12-13 2022-03-18 珠海格力电器股份有限公司 Data access method and device, electronic equipment and storage medium
CN114201418B (en) * 2021-12-13 2024-05-03 珠海格力电器股份有限公司 Data access method, device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
CN107809317A (en) * 2017-11-09 2018-03-16 郑州云海信息技术有限公司 A kind of identity identifying method and system based on token digital signature
CN110941844A (en) * 2019-11-27 2020-03-31 网易(杭州)网络有限公司 Authentication method, system, electronic equipment and readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
CN107809317A (en) * 2017-11-09 2018-03-16 郑州云海信息技术有限公司 A kind of identity identifying method and system based on token digital signature
CN110941844A (en) * 2019-11-27 2020-03-31 网易(杭州)网络有限公司 Authentication method, system, electronic equipment and readable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112200586A (en) * 2020-11-16 2021-01-08 支付宝(杭州)信息技术有限公司 Identity authentication method and device
CN112200586B (en) * 2020-11-16 2022-07-08 支付宝(杭州)信息技术有限公司 Identity authentication method and device
CN112818312A (en) * 2021-02-02 2021-05-18 江苏欧软信息科技有限公司 MES system login authentication method based on face recognition technology and MES system
CN114201418A (en) * 2021-12-13 2022-03-18 珠海格力电器股份有限公司 Data access method and device, electronic equipment and storage medium
CN114201418B (en) * 2021-12-13 2024-05-03 珠海格力电器股份有限公司 Data access method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111476640B (en) 2023-08-04

Similar Documents

Publication Publication Date Title
US11880228B2 (en) Systems and methods for verifying data via blockchain
TWI764037B (en) Interaction method and system across blockchain, computer equipment and storage medium
US11290441B1 (en) Systems and methods for blockchain validation of user identity and authority
KR101881045B1 (en) System and method for providing medical information based on block chain
CN110414270B (en) Personal data protection system and method based on block chain
US20120017266A1 (en) Systems and methods for permission arbitrated transaction services
US11917050B1 (en) Systems and methods for generating a blockchain-based user profile
CN105590055A (en) Method and apparatus for identifying trustworthy user behavior in network interaction system
EP4178155A1 (en) Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN111367965B (en) Target object determining method, device, electronic equipment and storage medium
US20220309501A1 (en) Blockchain-based trusted transaction method for data product
CN112700250B (en) Identity authentication method, device and system in financial scene
CN108154048B (en) Asset information processing method and device
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN112712452A (en) Approval information processing method and device based on block chain
CN111476640B (en) Authentication method, system, storage medium and big data authentication platform
CN114127771A (en) System and method for proof of viewing via blockchain
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
CN113890739A (en) Cross-block-chain authentication method and device, electronic equipment and medium
CN104704521A (en) Multi-factor profile and security fingerprint analysis
CN113114629A (en) Contract management method, device, equipment and storage medium based on block chain
CN116739596A (en) Blockchain-based transaction supervision method, device, equipment, medium and product
KR102498336B1 (en) Method and system for managing user reputation based on blockchain
KR20220088391A (en) Management computers for security management of things, security management systems and methods using them

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant