CN111832956A - Data verification method, device, electronic equipment and medium - Google Patents

Data verification method, device, electronic equipment and medium Download PDF

Info

Publication number
CN111832956A
CN111832956A CN202010702583.8A CN202010702583A CN111832956A CN 111832956 A CN111832956 A CN 111832956A CN 202010702583 A CN202010702583 A CN 202010702583A CN 111832956 A CN111832956 A CN 111832956A
Authority
CN
China
Prior art keywords
user
level
users
task processing
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010702583.8A
Other languages
Chinese (zh)
Inventor
黄翠萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010702583.8A priority Critical patent/CN111832956A/en
Publication of CN111832956A publication Critical patent/CN111832956A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a data verification method, a data verification device, electronic equipment and a medium, and relates to the field of cloud computing and big data. The data verification method comprises the following steps: acquiring user data of a plurality of users, and dividing the plurality of users into a plurality of levels based on the user data, wherein a plurality of verification modes are respectively set for the plurality of levels; distributing tasks to be processed to a plurality of users respectively; and acquiring a task processing result of the user of each level on the assigned task to be processed, and verifying the accuracy of the task processing result of the user of the level by utilizing a verification mode set for the level for each level in the plurality of levels.

Description

Data verification method, device, electronic equipment and medium
Technical Field
The application relates to the technical field of computers, in particular to a cloud computing and big data technology.
Background
With the continuous development of the internet, the application of the crowdsourcing technology is more and more extensive. The crowdsourcing technology means that a business party distributes tasks to be processed to internet users for processing. After the service side receives the task processing result of the task to be processed by the user, the service side needs to verify the accuracy of the task processing result. In the related art, when verifying the accuracy of the task processing results of the users, the service side usually adopts the same verification mode for the task processing results of all the users. However, since the processing quality of each user to the task to be processed is different, the same verification method is adopted for the task processing results of all users, which results in lower verification efficiency and higher verification cost.
Disclosure of Invention
The application provides a method, a device, equipment and a storage medium for data verification.
According to a first aspect, the present application provides a data verification method, comprising: the method comprises the steps of obtaining user data of a plurality of users, dividing the users into a plurality of levels based on the user data, setting a plurality of verification modes aiming at the levels respectively, distributing tasks to be processed to the users respectively, obtaining task processing results of the users of each level on the distributed tasks to be processed, and verifying the accuracy of the task processing results of the users of the levels by the verification modes set aiming at the levels for each level of the levels.
According to a second aspect, the present application provides a data verification apparatus comprising: the system comprises a user dividing module, a task distributing module and a verifying module. The user dividing module is used for acquiring user data of a plurality of users and dividing the plurality of users into a plurality of levels based on the user data, wherein a plurality of verification modes are respectively set for the plurality of levels. And the task allocation module is used for allocating tasks to be processed to the plurality of users respectively. The verification module is used for acquiring the task processing result of each level of user to the distributed task to be processed, and for each level in the multiple levels, verifying the accuracy of the task processing result of the level of user by using a verification mode set for the level.
According to a third aspect, the present application provides an electronic device comprising: at least one processor and a memory communicatively coupled to the at least one processor. Wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method as described above.
According to a fourth aspect, the present application provides a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method as described above.
According to the technology of the application, the problems of low verification efficiency and high verification cost of the task processing result of the task to be processed are solved, the verification efficiency of the task processing result is improved, and the verification cost is reduced.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 schematically shows a system architecture of a data verification method and a data verification apparatus according to an embodiment of the present application;
FIG. 2 schematically illustrates a flow diagram of a data validation method according to an embodiment of the present application;
FIG. 3 schematically illustrates a flow diagram of a data validation method according to another embodiment of the present application;
FIG. 4 schematically illustrates a flow diagram of a data validation method according to another embodiment of the present application;
FIG. 5 schematically illustrates a schematic diagram of a data validation method according to an embodiment of the application;
FIG. 6 schematically shows a block diagram of a data validation apparatus according to an embodiment of the present application; and
fig. 7 is a block diagram of an electronic device for implementing the data verification method of the embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
An embodiment of the present application provides a data verification method, including: the method comprises the steps of obtaining user data of a plurality of users, dividing the plurality of users into a plurality of levels based on the user data, and setting a plurality of verification modes aiming at the plurality of levels respectively. Then, tasks to be processed are respectively allocated to the plurality of users. Next, a task processing result of the user of each level on the assigned task to be processed is acquired, and for each of the plurality of levels, the accuracy of the task processing result of the user of the level is verified using a verification method set for the level.
Fig. 1 schematically shows a system architecture of a data verification method and a data verification apparatus according to an embodiment of the present application. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present application may be applied to help those skilled in the art understand the technical content of the present application, and does not mean that the embodiments of the present application may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the data verification method provided in the embodiment of the present application may be generally executed by the server 105. Accordingly, the data verification apparatus provided in the embodiment of the present application may be generally disposed in the server 105. The data verification method provided by the embodiment of the present application may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the data verification apparatus provided in the embodiment of the present application may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
A data verification method according to an exemplary embodiment of the present application is described below with reference to fig. 2 to 5 in conjunction with the system architecture of fig. 1. It should be noted that the above-described system architecture is only shown for the convenience of understanding the spirit and principles of the present application, and the embodiments of the present application are not limited in any way in this respect.
Fig. 2 schematically shows a flow chart of a data verification method according to an embodiment of the present application.
As shown in fig. 2, the data verification method according to the embodiment of the present application may include, for example, operations S210 to S230.
In operation S210, user data of a plurality of users is acquired, and the plurality of users are divided into a plurality of levels based on the user data, wherein a plurality of authentication manners are respectively set for the plurality of levels.
In operation S220, tasks to be processed are respectively allocated to a plurality of users.
Next, in operation S230, a task processing result of each level of users on the assigned task to be processed is acquired, and for each of the plurality of levels, the accuracy of the task processing result of the level of users is verified using a verification manner set for the level.
Different users often have different quality of task processing results obtained by processing tasks to be processed. According to the embodiment of the application, a plurality of users are divided into a plurality of levels according to user data (for example, data capable of reflecting task processing experience or processing quality of the users, such as registration time, number of processed tasks, accuracy rate of processed tasks and the like), the tasks to be processed are distributed to the users, and then task processing results of the users at the corresponding levels are verified by different verification modes according to the task processing results of the users at different levels.
In one example, for a user with a higher quality of task processing results at a level, a looser verification manner may be adopted to verify the task processing results of the user at the level; for a user with a level with a low quality of task processing results, a stricter verification mode can be adopted to verify the task processing results of the user with the level. In the embodiment of the present application, that the quality of the task processing result is high may indicate that the accuracy of the task processing result of the user at the level is high, and that the quality of the task processing result is low may indicate that the accuracy of the task processing result of the user at the level is low.
The accuracy may include two cases, that is, the task processing result is accurate or inaccurate. The accuracy rate may include a ratio between a number of tasks of the user processed tasks for which the processing result is accurate and a total number of processed tasks.
It can be understood that, in the embodiment of the application, the accuracy of the task processing result of the task to be processed by the user at the level is verified by performing level division on a plurality of users and adopting different verification modes for different levels. Therefore, by the technical scheme of the embodiment of the application, the task processing result can be verified in a targeted manner, so that the data verification efficiency is improved, and the data verification cost is reduced.
Fig. 3 schematically shows a flow chart of a data verification method according to another embodiment of the present application.
As shown in fig. 3, the data verification method according to the embodiment of the present application may include operations S310 to S330 and operations S341 to S343, for example. Operations S310 and S320 may be implemented in the same manner as operations S210 and S220 described in fig. 2, respectively, and will not be described herein again. The specific implementation manner of operation S230 illustrated in fig. 2 includes, for example, operations S341 to S343.
According to an embodiment of the present application, the plurality of levels may include a first level, a second level, and a third level. Wherein the second level is for example lower than the first level and the third level is for example lower than the second level. The quality of the task processing result of the user at the first level is high, the quality of the task processing result of the user at the second level is medium, and the quality of the task processing result of the user at the third level is low.
The task processing result of the task to be processed includes at least one of result data and question feedback data. The problem feedback data may include, for example, that the task to be processed cannot be processed, or that the task to be processed lacks relevant information.
In operation S330, a level of the user is determined. When the determination result indicates that the user is at the first level, operation S341 is performed. And when the determination result indicates that the user is at the second level, performing operation S342. And when the determination result indicates that the user is in the third level, performing operation S343.
For the first level, verifying the accuracy of the task processing result of the user of the level using the verification manner set for the level includes operation S341.
In operation S341, for the result data in the task processing result of the first level user, the accuracy of the result data is verified by combining task handler verification and cross-verification with other users. And for the problem feedback data in the task processing result of the user at the first level, the default problem feedback data is accurate.
According to the embodiment of the application, compared with two modes of the task processing program verification and the other user cross verification, the task processing program verification mode is looser, and the task processing program verification mode is stricter than the other user cross verification mode.
That is, the quality of the result of the task processing is high due to the first level of users. Therefore, for the result data in the task processing result of the user of the first level, the accuracy of the result data can be verified in a looser task processing program verification mode and a stricter cross-verification mode with other users. In one example, the result data may be verified by first using a task handler verification method, and in the case that the result data is not verified accurately by the task handler, the result data may be further verified by using a cross-verification method with other users, so as to improve the verification efficiency.
In the embodiment of the application, the quality of the task processing result of the user at the first level is higher, so that the accuracy of the task processing result of the user at the first level is higher. For the problem feedback data in the task processing result of the first-level user, the accuracy of the problem feedback data is high, so that the accuracy of the problem feedback data can be defaulted, verification for the problem feedback data is not needed, and the verification efficiency is improved.
For the second level, verifying the accuracy of the task processing result of the user of the level using the verification manner set for the level includes operation S342.
In operation S342, for the result data in the task processing result of the user of the second level, the accuracy of the result data is verified by a combination of task handler verification and cross-verification with other users. And verifying the accuracy of the question feedback data in the task processing result of the user at the second level in a cross-verification mode with other users.
I.e. the quality of the task processing results of the users of the second level is medium. For the result data in the task processing result of the second level user, the accuracy of the result data can be verified in a loose task processing program verification mode and a strict cross verification mode with other users. In one example, the result data may be verified by first using a task handler verification method, and in the case that the result data is not verified accurately by the task handler, the result data may be further verified by using a cross-verification method with other users, so as to improve the verification efficiency.
In the embodiment of the present application, for the question feedback data in the task processing result of the user at the second level, the accuracy of the question feedback data needs to be verified. The accuracy of the problem feedback data can be verified in a cross-verification mode with other users.
For the third level, verifying the accuracy of the task processing result of the user of the level using the verification manner set for the level includes operation S343.
In operation S343, for the result data in the task processing result of the user of the third level, the accuracy of the result data is verified in a cross-validation manner with other users. And verifying the accuracy of the problem feedback data in the task processing result of the user at the third level in a cross-verification mode with other users.
That is, the quality of the task processing result of the user of the third level is low. For the result data in the task processing result of the user of the third level, the accuracy of the result data can be verified in a strict cross-validation mode with other users. In one embodiment, since the user at the third level is a user who just registered, the user has a low degree of knowledge about the task processing rules, which causes the data format of the result data of the user to generally not conform to the preset format, and if the result data of the user at the third level is verified by the task processing program, the verification accuracy is low. Therefore, the embodiment of the application verifies the accuracy of the result data of the user at the third level by means of cross-verification with other users.
In the embodiment of the present application, for the question feedback data in the task processing result of the user at the third level, the accuracy of the question feedback data needs to be verified. The accuracy of the problem feedback data can be verified in a cross-verification mode with other users.
According to the embodiment of the present application, the verifying the accuracy of the result data in the combination of the task handler verification and the cross-validation with other users in operation S341 or operation S342 includes:
first, task processing is performed on an assigned task using a task processing program, and the accuracy of result data in a task processing result of a user is verified based on the task processing result of the task processing program. Then, in the case where the result data is verified to be inaccurate based on the task processing result of the task processing program, the accuracy of the result data is further verified by means of cross-validation with other users.
According to the embodiment of the application, the task processing program is a processing mode for automatically processing the task to be processed. Verifying the accuracy of the result data by the task processing program includes, for example, processing the task to be processed by the task processing program to obtain a processing result, and then comparing the processing result of the task processing program with the task processing result of the user at the first level or the second level. If the processing result of the task processing program is consistent with the task processing result of the user, the task processing result of the user can be confirmed to pass the verification, namely the task processing result of the user is accurate, and at the moment, the user does not need to continue to further verify in a mode of cross-verifying with other users. If the processing result of the task processing program is inconsistent with the task processing result of the user, the task processing result of the user can be confirmed to be inaccurate, and the user can continue to perform further verification in a cross-verification mode with other users.
According to the embodiment of the application, the cross-validation with other users comprises the following steps: and comparing the task processing result of the user with the task processing results of other users aiming at each task to be processed, and determining that the task processing result of the user is accurate if the task processing result of the user is consistent with the task processing results of other users.
It can be understood that, in the embodiment of the application, the accuracy of the task processing result of the task to be processed by the user at the level is verified by performing level division on a plurality of users and adopting different verification modes for different levels. Specifically, the task processing result of the user includes result data and question feedback data, and the accuracy of the result data and the accuracy of the question feedback data can be verified respectively through corresponding verification modes. Therefore, according to the technical scheme of the embodiment of the application, different verification modes are set for users at different levels, and the accuracy of the result data and the accuracy of the problem feedback data can be verified respectively through the corresponding verification modes aiming at the result data and the problem feedback data included in the task processing result of the user at the level. Therefore, the embodiment of the application can realize targeted verification of the task processing result, thereby improving the efficiency of data verification and reducing the cost of data verification.
Fig. 4 schematically shows a flow chart of a data verification method according to another embodiment of the present application.
As shown in fig. 4, the data verification method according to the embodiment of the present application may include, for example, operations S410 to S480. Operation S410, operation S420, and operation S470 may be implemented in the same manner as operation S210, operation S220, and operation S230 described in fig. 2, respectively, and are not described herein again.
In operation S430, a detection task is allocated to a user lower than a preset level among a plurality of levels, wherein a task processing result of the detection task is known, and the detection task is allocated to the user lower than the preset level together with a task to be processed.
According to the embodiment of the application, the preset level is, for example, a first level, and users lower than the preset level in the plurality of levels include users of a second level and users of a third level. Since the second level and the third level are lower levels, in order to improve the efficiency of authentication, the users of the second level and the users of the third level are first pre-authenticated. And if the second-level user and the third-level user pass the pre-verification, further verifying the accuracy of the task processing result of the second-level user and the task processing result of the third-level user.
Specifically, the detection task and the task to be processed may be sent together to a user below a preset level. For example, the user cannot know that the received task is a detection task or a task to be processed.
In operation S440, a processing result of the detection task by the user below the preset level is acquired.
In one example, a user below a preset level may simultaneously feed back a processing result of the detection task and a task processing result of the to-be-processed task. And then, firstly, pre-verifying the processing result of the detection task, and further verifying the task processing result of the task to be processed after the processing result of the detection task passes the pre-verification. If the processing result of the detection task does not pass the pre-verification, indicating that the processing quality of the task by the user lower than the preset level is low, the task processing result of the user lower than the preset level can be determined to be inaccurate, and the accuracy of the task processing result of the user lower than the preset level does not need to be further verified.
In operation S450, a user below a preset level is pre-authenticated by comparing a result of processing of the detection task by the user below the preset level with a known task processing result of the detection task.
And if the processing result of the user lower than the preset level on the detection task is consistent with the known task processing result of the detection task, determining that the user lower than the preset level passes the pre-verification. And if the processing result of the user lower than the preset level on the detection task is inconsistent with the known task processing result of the detection task, determining that the user lower than the preset level fails the pre-verification.
In operation S460, it is determined whether the user below the preset level passes the pre-authentication. If the pre-verification is passed, operation S470 is performed. If the pre-authentication is not passed, operation S480 is performed.
Next, in operation S480, if the processing result of the detection task of the user below the preset level does not pass the pre-authentication, it may be determined that the user does not pass the pre-authentication. For the user who fails to pass the pre-verification, the accuracy of the task processing result of the user can not be further verified.
As an example, when pre-authenticating a user below a preset level, pre-authentication may be performed for a user of a second level and a user of a third level, respectively. For example, for a user at the second level or a user at the third level, a plurality of tasks including a detection task and a task to be processed are sent to the user at the level (the second level or the third level). And then, receiving task processing results of the user at the level to the tasks, pre-verifying the processing results of the detection tasks in the task processing results, and if the pre-verification fails, not further verifying the task processing results of the tasks to be processed at the level. That is, the present example can perform pre-verification in one level as a whole, thereby improving the efficiency of pre-verification.
As an example, the plurality of tasks sent to each of the low-level users includes a detection task and a pending task, for each of the users. And then receiving task processing results of the user for a plurality of tasks, pre-verifying the processing results of the detection tasks in the task processing results, and if the pre-verification fails, not further verifying the task processing results of the tasks to be processed of the user. That is, the present example can perform pre-authentication on a user basis, thereby achieving pre-authentication for each user below a preset level.
In the embodiment of the application, the detection task is used as a stub and can be used for pre-verifying the user to prevent the user from cheating in the process of processing the task. In addition, the detection task may also be used to guide the user to perform task processing. For example, when a plurality of tasks including a detection task are sent to a user below a preset level, when the user below the preset level processes the plurality of tasks, the first task processed by the user may be the detection task, and if the processing result of the detection task by the user is inaccurate, a prompt message may be sent to the user to prompt the user about the relevant rule of task processing.
It can be understood that, because the processing quality of the to-be-processed task by the user lower than the preset level is low, in order to improve the verification efficiency of the task processing result of the to-be-processed task, the embodiment of the present application performs pre-verification on the user lower than the preset level first. If the user lower than the preset level passes the pre-verification, the accuracy of the task processing result of the user lower than the preset level is further verified, so that the verification efficiency is improved, and the verification cost is reduced.
A specific implementation process of dividing a plurality of users into a plurality of levels will be described below.
In the embodiment of the application, the user data comprises the registration time length of the user, the number of the tasks processed by the user and the accuracy rate of the tasks processed by the user. Dividing the plurality of users into a plurality of levels based on the user data includes, for each user of the plurality of users:
and under the conditions that the registration time of the user is more than or equal to the preset time, the number of the tasks processed by the user is more than or equal to the preset number, and the accuracy of the tasks processed by the user is more than or equal to the preset accuracy, dividing the user into a first level.
And under the condition that the registration time of the user is more than or equal to the preset time and the accuracy of the task processed by the user is less than the preset accuracy, dividing the user into a second level.
And under the condition that the registration time length of the user is less than the preset time length, dividing the user into a third level.
In the embodiment of the present application, the preset time period may be, for example, 30 days, 60 days, or the like. The number of tasks processed by the user is, for example, the number of tasks processed by the user in a last period of time (e.g., 30 days), or may be the number of tasks processed by the user from registration to present, and the preset number may be 1000, 2000, or the like. The accuracy of the processed tasks of the user is, for example, a ratio between the number of tasks with accurate processing results in the processed tasks of the user and the total number of the processed tasks. For example, the total number of tasks processed by the user is 1000, and the processing result of 800 tasks in 1000 tasks is accurate, so the accuracy rate of the tasks processed by the user may be 800/1000-80%. Wherein, the accuracy rate of the processed task of the user may be the accuracy rate of the processed task in the last period of time (for example, 30 days) of the user, or may also be the accuracy rate of the processed task from the registration of the user to the present. Wherein the preset accuracy may be 80%, 90%, etc.
When the user is classified into levels, it may be first determined whether the registration duration of the user is greater than or equal to a preset duration, and if not, the user is classified into a third level. If yes, further determining the number of the tasks processed by the user and the accuracy of the tasks processed by the user, and if the number of the tasks processed by the user is larger than or equal to a preset number and the accuracy of the tasks processed by the user is larger than or equal to a preset accuracy, dividing the user into a first level. If the accuracy of the tasks processed by the user is less than the preset accuracy, the user is divided into a second level, and the number of the tasks processed by the user at the second level is greater than or equal to the preset number or less than the preset number.
As an example of the present application, a to-be-processed task of an embodiment of the present application may include an image to be recognized, a task processing result includes a recognition result of the image to be recognized, and result data includes text information recognized from the image to be recognized. The text information may be text, numbers, symbols, etc. in the image to be recognized. The question feedback data may include a question description of the image to be recognized, the question description including at least one of blurring of the image to be recognized and absence of textual information in the image to be recognized. The task processing program may include an Optical Character Recognition (OCR) program.
The process of verifying the recognition result of the image to be recognized will be described below with reference to fig. 5.
An example of the operation of the data verification method of fig. 4 will be described below with reference to fig. 5.
Fig. 5 schematically shows a schematic diagram of a data verification method according to an embodiment of the application.
For convenience of description, fig. 5 illustrates, by way of example, 6 users a1, a2, a6, but the embodiment of the present application is not limited thereto, and the number of users may be any value as needed in practical applications. As shown in fig. 5, users a1, a 2.., a6 are divided into three levels, i.e., a first level, a second level, and a third level, according to user data of the users.
The users belonging to the first level are for example high quality users. For example, the user whose registration time is longer than or equal to a preset time, the number of the tasks processed by the user is greater than or equal to a preset number, and the accuracy of the tasks processed by the user is greater than or equal to a preset accuracy is classified into a first level. In fig. 5, a user a1, a user a2, etc. are classified into a first level. The users belonging to the second level are, for example, ordinary users. For example, users whose registration time is longer than or equal to a preset time and whose accuracy rate of the tasks processed by the users is less than a preset accuracy rate are classified into a second level, for example, user A3, user a4, and the like are classified into a second level. The users belonging to the third level are for example primary users. For example, the users whose registration time is less than the preset time are classified into the third level, for example, the user a5, the user a6, and the like are classified into the third level.
As shown in fig. 5, the user of the first level may be assigned with the image to be recognized, and the users of the second level and the third level may be assigned with the image to be recognized and the detection image. The recognition result of the detection image is known, and the detection image serves as a sort of stub for performing pre-verification on the recognition result of the user with respect to the detection image. In fig. 5, the users of the second and third levels are normal users and primary users, and thus the users of the second and third levels are pre-authenticated, whereas the users of the first level are high quality users, and thus the users of the first level are not pre-authenticated.
And pre-verifying the identification result of the detection image aiming at the users of the second level and the third level. For example, the second-level user or the third-level user is pre-authenticated by comparing the recognition result of the detection image by the second-level user or the third-level user with the known recognition processing result of the detection image. And if the identification result of the second-level user or the third-level user on the detection image is consistent with the known identification processing result of the detection image, the identification result of the second-level user or the third-level user on the detection image passes the pre-verification. If not, it indicates that the pre-verification is not passed.
The recognition result of the image to be recognized by the user may include at least one of text information and a question description. For example, if the user successfully identifies the text in the image, the text may be uploaded to the server as text information, and if the user thinks that the image has a problem and needs feedback, the feedback data may be uploaded to the server together with the text information. If the user cannot recognize the text content in the image, feedback data can be uploaded to the server, such as unclear image, damaged image file, and the like.
For the recognition result of the user of the first level, the text information in the recognition result can be verified by combining the optical character recognition program verification and the cross verification with other users, and for the problem description in the recognition result, the problem description can be accurate by default.
For the recognition result of the user of the second level, the text information in the recognition result can be verified in a mode of combining optical character recognition program verification and cross-verification with other users, and the problem description in the recognition result can be verified in a mode of cross-verification with other users.
For the identification result of the user at the third level, the text information in the identification result can be verified in a cross-validation manner with other users, and the problem description in the identification result can be verified in a cross-validation manner with other users.
Fig. 6 schematically shows a block diagram of a data verification device according to an embodiment of the present application.
As shown in fig. 6, the data verification apparatus 600 according to the embodiment of the present application includes, for example, a user dividing module 610, a task allocating module 620, and a verification module 630.
The user dividing module 610 may be configured to obtain user data of a plurality of users, and divide the plurality of users into a plurality of levels based on the user data, where a plurality of authentication manners are respectively set for the plurality of levels. According to the embodiment of the present application, the user dividing module 610 may, for example, perform operation S210 described above with reference to fig. 2, which is not described herein again.
The task assignment module 620 may be configured to assign the tasks to be processed to the plurality of users, respectively. According to the embodiment of the present application, the task allocation module 620 may, for example, perform operation S220 described above with reference to fig. 2, which is not described herein again.
The verification module 630 may be configured to obtain a task processing result of each level of users on the assigned task to be processed, and verify, for each level of the multiple levels, accuracy of the task processing result of the level of users by using a verification manner set for the level. According to the embodiment of the present application, the verification module 630 may, for example, perform the operation S230 described above with reference to fig. 2, which is not described herein again.
According to an embodiment of the present application, the apparatus 600 may further include: the device comprises a detection task distribution module, a processing result acquisition module and a pre-verification module. The detection task allocation module is used for allocating detection tasks to users lower than a preset level in a plurality of levels, wherein the task processing result of the detection tasks is known, and the detection tasks and the tasks to be processed are allocated to the users lower than the preset level. The processing result acquisition module is used for acquiring the processing result of the detection task of the user lower than the preset level. The pre-verification module is used for pre-verifying the user below the preset level by comparing the processing result of the user below the preset level on the detection task with the known task processing result of the detection task, and executing the accuracy of the task processing result of the user below the verification level under the condition that the user below the preset level passes the pre-verification.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
Fig. 7 is a block diagram of an electronic device for implementing the data verification method of the embodiment of the present application.
Fig. 7 is a block diagram of an electronic device according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 7, the electronic apparatus includes: one or more processors 701, a memory 702, and interfaces for connecting the various components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 7, one processor 701 is taken as an example.
The memory 702 is a non-transitory computer readable storage medium as provided herein. The memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method of data validation provided herein. The non-transitory computer readable storage medium of the present application stores computer instructions for causing a computer to perform the method of data validation provided herein.
Memory 702, which is a non-transitory computer-readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the methods of data validation in embodiments of the present application (e.g., user partitioning module 610, task assignment module 620, and validation module 630 shown in fig. 6). The processor 701 executes various functional applications of the server and data processing, i.e., a method of implementing data verification in the above-described method embodiments, by executing non-transitory software programs, instructions, and modules stored in the memory 702.
The memory 702 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the stored data area may store data created from use of the electronic device for data verification, and the like. Further, the memory 702 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 702 may optionally include memory located remotely from the processor 701, which may be connected to a data-validating electronic device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the method of data verification may further comprise: an input device 703 and an output device 704. The processor 701, the memory 702, the input device 703 and the output device 704 may be connected by a bus or other means, and fig. 7 illustrates an example of a connection by a bus.
The input device 703 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the data-verified electronic apparatus, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointer, one or more mouse buttons, a track ball, a joystick, or other input device. The output devices 704 may include a display device, auxiliary lighting devices (e.g., LEDs), and tactile feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (13)

1. A method of data verification, comprising:
acquiring user data of a plurality of users, and dividing the plurality of users into a plurality of levels based on the user data, wherein a plurality of verification modes are respectively set for the plurality of levels;
distributing tasks to be processed to the plurality of users respectively; and
and acquiring a task processing result of each level of users on the distributed tasks to be processed, and verifying the accuracy of the task processing result of the level of users by utilizing a verification mode set for the level for each level in the plurality of levels.
2. The method of claim 1, wherein the plurality of levels includes a first level, wherein the task processing results of the task to be processed include at least one of result data and issue feedback data, and wherein verifying the accuracy of the task processing results of the users of the levels using a verification means set for the levels comprises:
verifying the accuracy of the result data in the task processing result of the first-level user in a mode of combining task processing program verification and cross verification with other users; and
and for the question feedback data in the task processing result of the user of the first level, the question feedback data is acquiescent to be accurate.
3. The method of claim 2, wherein the plurality of levels further comprises a second level lower than the first level, and wherein verifying the accuracy of the task processing results of the users of the levels using the verification means set for the levels comprises:
verifying the accuracy of the result data in the task processing result of the second-level user in a mode of combining task processing program verification and cross verification with other users; and
and verifying the accuracy of the question feedback data in the task processing result of the second-level user in a cross-verification mode with other users.
4. The method of claim 3, wherein the plurality of levels further includes a third level lower than the second level, and wherein verifying the accuracy of the task processing results of the users of the levels using the verification means set for the levels comprises:
verifying the accuracy of the result data in the task processing result of the user of the third level in a cross-verification mode with other users; and
and verifying the accuracy of the question feedback data in the task processing result of the user of the third level in a cross-verification mode with other users.
5. The method of claim 2 or 3, wherein verifying the accuracy of the result data by a combination of task handler validation and cross-validation with other users comprises:
executing task processing on the distributed tasks by using a task processing program, and verifying the accuracy of result data in the task processing result of the user based on the task processing result of the task processing program; and
in the case that the result data is verified to be inaccurate based on the task processing result of the task processing program, the accuracy of the result data is further verified in a cross-verification manner with other users.
6. The method of claim 1, further comprising:
allocating a detection task to a user lower than a preset level among the plurality of levels, wherein a task processing result of the detection task is known, and the detection task is allocated to the user lower than the preset level together with the task to be processed;
acquiring a processing result of the user lower than the preset level on the detection task;
pre-verifying the user below the preset level by comparing the processing result of the user below the preset level on the detection task with the known task processing result of the detection task; and
and under the condition that the user lower than the preset level passes the pre-verification, performing the verification on the accuracy of the task processing result of the user at the level.
7. The method of claim 1, wherein the user data includes a registration duration of the user, a number of tasks processed by the user, and an accuracy rate of tasks processed by the user, and wherein the dividing the plurality of users into the plurality of levels based on the user data includes, for each of the plurality of users:
under the condition that the registration time of the user is longer than or equal to a preset time, the number of the tasks processed by the user is larger than or equal to a preset number, and the accuracy of the tasks processed by the user is larger than or equal to a preset accuracy, dividing the user into a first level;
under the condition that the registration time of the user is greater than or equal to a preset time and the accuracy of the task processed by the user is less than a preset accuracy, dividing the user into a second level; and
and under the condition that the registration time length of the user is less than the preset time length, dividing the user into a third level.
8. The method according to any one of claims 2 to 4, wherein the task to be processed comprises an image to be recognized, the task processing result comprises a recognition result of the image to be recognized, the result data comprises text information recognized from the image to be recognized, the question feedback data comprises a question description of the image to be recognized, and the task processing program comprises an optical character recognition program.
9. The method of claim 8, wherein the problem description comprises at least one of: the image to be recognized is fuzzy, and no character information exists in the image to be recognized.
10. The method according to any of claims 2 to 4, wherein the cross-validating with other users comprises:
and comparing the task processing result of the user with the task processing results of other users aiming at each task to be processed, and determining that the task processing result of the user is accurate if the task processing result of the user is consistent with the task processing results of other users.
11. A data verification apparatus, comprising:
the system comprises a user dividing module, a verification module and a verification module, wherein the user dividing module is used for acquiring user data of a plurality of users and dividing the plurality of users into a plurality of levels based on the user data, and a plurality of verification modes are respectively set for the plurality of levels;
the task allocation module is used for allocating tasks to be processed to the plurality of users respectively; and
and the verification module is used for acquiring the task processing result of each level of user on the distributed task to be processed, and verifying the accuracy of the task processing result of the level of user by utilizing a verification mode set for the level for each level in the plurality of levels.
12. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 10.
13. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1 to 10.
CN202010702583.8A 2020-07-20 2020-07-20 Data verification method, device, electronic equipment and medium Pending CN111832956A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010702583.8A CN111832956A (en) 2020-07-20 2020-07-20 Data verification method, device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010702583.8A CN111832956A (en) 2020-07-20 2020-07-20 Data verification method, device, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN111832956A true CN111832956A (en) 2020-10-27

Family

ID=72923726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010702583.8A Pending CN111832956A (en) 2020-07-20 2020-07-20 Data verification method, device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN111832956A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8170897B1 (en) * 2004-11-16 2012-05-01 Amazon Technologies, Inc. Automated validation of results of human performance of tasks
CN108197202A (en) * 2017-12-28 2018-06-22 百度在线网络技术(北京)有限公司 Data verification method, device, server and the storage medium of crowdsourcing task
CN108629560A (en) * 2018-04-18 2018-10-09 平安科技(深圳)有限公司 Task distributing method, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8170897B1 (en) * 2004-11-16 2012-05-01 Amazon Technologies, Inc. Automated validation of results of human performance of tasks
CN108197202A (en) * 2017-12-28 2018-06-22 百度在线网络技术(北京)有限公司 Data verification method, device, server and the storage medium of crowdsourcing task
CN108629560A (en) * 2018-04-18 2018-10-09 平安科技(深圳)有限公司 Task distributing method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20200004617A1 (en) Techniques for managing and analyzing log data
CN111694646B (en) Resource scheduling method, device, electronic equipment and computer readable storage medium
CN111639027B (en) Test method and device and electronic equipment
CN111666546A (en) Application login method and device
US20160125360A1 (en) Candidate pipeline builder
CN111860644A (en) Abnormal account identification method, device, equipment and storage medium
US20210342194A1 (en) Computer resource allocation based on categorizing computing processes
CN111241396B (en) Information pushing method and device, electronic equipment and storage medium
CN115222176A (en) Risk control method, apparatus, device and medium
CN112269706A (en) Interface parameter checking method and device, electronic equipment and computer readable medium
US20140129598A1 (en) Dynamic management of log persistence
CN111865720A (en) Method, apparatus, device and storage medium for processing request
CN112069137A (en) Method and device for generating information, electronic equipment and computer readable storage medium
WO2023169193A1 (en) Method and device for generating smart contract
CN111596897A (en) Code multiplexing processing method and device and electronic equipment
US20200202230A1 (en) Cognitive device support for potentially affected devices
CN111832956A (en) Data verification method, device, electronic equipment and medium
US11405349B1 (en) Viral message detection and control in social media messaging
CN111835857B (en) Method and apparatus for accessing data
US20220172102A1 (en) Machine learning model trained using features extracted from n-grams of mouse event data
CN111680508B (en) Text processing method and device
US20170024745A1 (en) Network management event escalation
CN112069071A (en) Method and device for determining program suitability
CN112752323A (en) Method and device for changing hotspot access state
US10600032B2 (en) Prioritization of e-mail files for migration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination