CN112508568A - Core product pushing and core method and system - Google Patents
Core product pushing and core method and system Download PDFInfo
- Publication number
- CN112508568A CN112508568A CN202011439348.2A CN202011439348A CN112508568A CN 112508568 A CN112508568 A CN 112508568A CN 202011439348 A CN202011439348 A CN 202011439348A CN 112508568 A CN112508568 A CN 112508568A
- Authority
- CN
- China
- Prior art keywords
- user
- core
- information
- category
- product
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 79
- 238000012795 verification Methods 0.000 claims description 67
- 230000008569 process Effects 0.000 claims description 26
- 238000013145 classification model Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 8
- 230000007613 environmental effect Effects 0.000 claims description 6
- 238000013210 evaluation model Methods 0.000 description 16
- 230000006399 behavior Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 7
- 238000011156 evaluation Methods 0.000 description 6
- 239000010410 layer Substances 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000003238 somatosensory effect Effects 0.000 description 4
- 238000005728 strengthening Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 239000012792 core layer Substances 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012508 change request Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012954 risk control Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the specification provides a core product pushing and core method and system, the type of a core product pushed to a user is comprehensively determined through user basic information, online operating environment information and historical operating information, core products with different safety can be selected for the user according to the actual situation of the user, and core flexibility is improved.
Description
Technical Field
The specification relates to the technical field of data processing, in particular to a core product pushing and core method and system.
Background
The core system is an important link of wind control and is an important basis for outputting risk control actions. By checking the identity, the account can be checked to be owned by the user, and the account is prevented from being stolen due to non-personal operation. Therefore, there is a need for improved nuclear approaches.
Disclosure of Invention
Based on this, this specification provides a core body product push and core body method and system.
According to a first aspect of embodiments of the present specification, there is provided a core product pushing method, the method including: determining the category of the core product pushed to the user according to the user basic information, the online operation environment information and the historical operation information of the user; if the category is a first category with lower core security, verifying the first category according to the user basic information, the online operation environment information and the historical operation information; and if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are all verified, pushing the core products of the first category to the user.
Optionally, the method further comprises: and if any verification result obtained according to the user basic information, the on-line operating environment information and the historical operating information does not pass the verification, pushing a second type of core body product with higher core body safety to the user.
Optionally, the step of determining the category of the core product pushed to the user according to the user basic information, the online operation environment information, and the historical operation information includes: respectively grading the user basic information, the on-line operating environment information and the historical operating information to obtain corresponding scores; determining the score of the core product according to the score corresponding to the user basic information, the score corresponding to the on-line operating environment information and the score corresponding to the historical operating information; if the score of the core product is smaller than or equal to a preset value, determining that the category is a first category; otherwise, determining the category as a second category.
Optionally, after determining the category of the core product pushed to the user according to the user basic information, the online operation environment information, and the historical operation information, the method further includes: and if the type of the core body product pushed to the user is determined to be a second type with higher safety, pushing the core body product of the second type to the user.
Optionally, the step of verifying the first category according to the user basic information, the online operating environment information, and the historical operating information respectively includes: acquiring the acceptance characteristic of the user on the nuclear product according to the user basic information, inputting the acceptance characteristic into a pre-trained first classification model, and acquiring a verification result corresponding to the user basic information; wherein the receptiveness characteristics are used for characterizing the receptiveness of the user to the first category of core-body products; and/or acquiring high-risk environmental characteristics in the online operating environment information, inputting the high-risk environmental characteristics into a pre-trained second classification model, and acquiring a verification result corresponding to the online operating environment information; and/or acquiring high-risk operation characteristics in the historical operation information, inputting the high-risk operation characteristics into a pre-trained third classification model, and acquiring a verification result corresponding to the historical operation information.
Optionally, the receptiveness characteristics include the completeness and/or feedback result of the user on the historically pushed core-body product; and/or the high risk environmental characteristics comprise the existence of reported records in common addresses and/or IP addresses; and/or the high risk operating characteristics include large capital expenditure, frequent performance of the same operation for a short period of time.
Optionally, the method further comprises: obtaining feedback results of a user on each flow in a core product pushed historically; and determining a core body process in the core body product pushed to the user in the future time according to the feedback result.
Optionally, the first category of core body products includes a biological information core body product and/or a bank card core body product; and/or the second category of the core body products comprises a short message verification code core body product and/or a mailbox verification code core body product.
Optionally, the number of core products to the user is greater than 1.
According to a second aspect of embodiments herein, there is provided a method of coring, the method comprising: adopting a core product to core the user information; the core product is obtained according to the method of any one of the embodiments.
Optionally, the method further comprises: if the number of the core body products pushed to the user is larger than 1, when one of the core body products passes through the core body, the core body is judged to pass through.
According to a third aspect of embodiments herein, there is provided a core product pusher apparatus, the apparatus including: the determining module is used for determining the category of the core product pushed to the user according to the user basic information, the online operating environment information and the historical operating information of the user; the verification module is used for verifying the first category according to the user basic information, the online operation environment information and the historical operation information if the category is the first category with lower core security; and the pushing module is used for pushing the core product of the first category to the user if the verification results obtained according to the user basic information, the online operating environment information and the historical operating information are all verified.
According to a fourth aspect of embodiments herein, there is provided a core device, the device comprising: the core body module is used for adopting a core body product to core the user information; the core product is obtained according to the method of any one of the embodiments.
According to a fifth aspect of embodiments herein, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the embodiments.
According to a sixth aspect of embodiments herein, there is provided a computer apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the embodiments when executing the program.
By applying the scheme of the embodiment of the specification, the types of the core products pushed to the user are comprehensively determined through the user basic information, the online operation environment information and the historical operation information, the core products with different safety can be selected for the user according to the actual condition of the user, and the core flexibility is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the specification.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present specification and together with the description, serve to explain the principles of the specification.
FIG. 1 is a core body scenario diagram of an embodiment.
Fig. 2 is a flowchart of a core product pushing method according to an embodiment of the present disclosure.
Fig. 3(a) is an overall architecture diagram of a core product push system according to an embodiment of the present specification.
Fig. 3(b) is a general flowchart of a core product pushing method according to an embodiment of the present disclosure.
Fig. 4 is a flow chart of a core-body method according to an embodiment of the present disclosure.
Fig. 5 is a block diagram of a core product pushing device according to an embodiment of the present disclosure.
Fig. 6 is a block diagram of a core device according to an embodiment of the present disclosure.
FIG. 7 is a schematic diagram of a computer device for implementing methods of embodiments of the present description, according to an embodiment of the present description.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Fig. 1 is a schematic diagram of a nuclear scene according to an embodiment. The verification of identity is meant by verification of identity. The core product can comprise a face recognition core product, a short message verification code core product and the like. In some active scenarios (e.g., modifying a password for checking the body, and replacing a bound mobile phone number for checking the body), a user may trigger the body checking process through a client, for example, may trigger the body checking process by sending an account information (password, bound mobile phone number, etc.) change request to a server. The server may return one or more of the core products to the client under the trigger. The user returns the identity authentication information required by the core product through the client, such as a short message authentication code, a face image, fingerprint information and the like, and the server authenticates the information returned by the user and returns the core result to the client. If the verification is successful, the account information is allowed to be changed; otherwise, the account information is not allowed to be changed. By the method, the identity of the operator can be verified, the condition that the account is stolen is reduced, and the account security of the user is guaranteed.
Based on this, the present specification provides a core product pushing method, as shown in fig. 2, the method may include:
step 202: determining the category of the core product pushed to the user according to the user basic information, the online operation environment information and the historical operation information of the user;
step 204: if the category is a first category with lower core security, verifying the first category according to the user basic information, the online operation environment information and the historical operation information;
step 206: and if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are all verified, pushing the core products of the first category to the user.
In step 202, the user basic information, the online operating environment information, and the historical operating information may be collectively used as a basis for determining the core product category to be pushed to the user. The user basic information may include personal information of the user, such as the user's academic calendar, age, registration time, whether to authenticate the user, and the like. The user basic information can be acquired during user registration, or the user basic information can be requested to be provided after the core body process is triggered. Before obtaining the user basic information, the user authorization can be requested, and the user basic information can be obtained only after the authorization is successful. The user basic information can be used as a basis for judging the acceptance degree of the user to the core products with different core difficulties. The information of the online operating environment may be used to represent the security of the network operating environment currently used by the user, and specifically may include information such as a network type (public network, home network, and the like), a history reported number of times of a network IP address, and whether a currently located network IP address is a common address. The historical operation information may be used to represent whether operations performed on the account by the user in the historical time period are risky, and may specifically include information such as fund expenditure information, time interval information for performing the operations (i.e., whether the same operation is frequently performed in a short time), and the like.
The category of the core product is related to the safety and operational complexity of the core product. Generally, the core product categories can be classified into a first category and a second category, wherein the first category is a category with low core security, and the core product categories generally include several core processes with low complexity. The second category is a category with higher core security, and core products in this category generally include several core processes with higher complexity. A first category of core products may be referred to as weak cores and a second category of core products may be referred to as strong cores. Generally, the security guarantee of the strong nuclear body to the account is higher than that of the weak nuclear body; meanwhile, the operation cost is high more easily caused by the body strengthening mode compared with the body weak mode, so that part of users cannot pass the verification, and finally the account is abandoned.
By taking the user basic information, the online operating environment information and the historical operating information as the basis for determining the type of the core product pushed to the user, the experience feeling of the user on the core product and the potential core threat can be comprehensively considered, and certain safety is guaranteed while the user experience is improved.
In one embodiment, the user basic information, the online operation environment information and the historical operation information may be scored respectively to obtain corresponding scores; determining the score of the core product according to the score corresponding to the user basic information, the score corresponding to the on-line operating environment information and the score corresponding to the historical operating information; if the score of the core product is smaller than or equal to a preset value, determining that the category is a first category; otherwise, determining the category as a second category.
The score corresponding to the basic user information can be used for representing the degree of accepting the core-strengthening by the user, and the higher the score is, the higher the degree of accepting the core-strengthening by the user is. For example, the longer the user registration time is, the higher the score corresponding to the basic user information is, and the higher the user receives the core-building degree can be considered. The score corresponding to the online operating environment information can be used for representing the risk of the current online operating environment of the user, and the higher the score is, the higher the risk is, so that the larger the requirement for adopting a strong core body is. The score corresponding to the historical operation information can be used for representing whether the operation of the user on the account has risks, and the higher the score is, the higher the risks are, so that the larger the requirement for adopting a strong core is. Determining the score of the core product according to the score corresponding to the user basic information, the score corresponding to the online operating environment information and the score corresponding to the historical operating information, wherein the score corresponding to the user basic information, the score corresponding to the online operating environment information and the score corresponding to the historical operating information are weighted and averaged, or the score corresponding to the user basic information, the score corresponding to the online operating environment information and the score corresponding to the historical operating information are solved according to a preset algorithm or model, so that the score of the core product is obtained. The higher the score of the core product is, the higher the tendency to push the core product of the second category to the user is indicated; conversely, it indicates that the higher the propensity to push the first category of core products to the user.
In this step, the current situation of the user can be comprehensively evaluated, for example, not only the environment information such as the basic network and the like can be evaluated under the current operation, but also a comprehensive score can be obtained according to the basic information of the user, the operation behavior change, the recent incoming message and other consultation information and used as a threshold value for preliminarily distinguishing the strong and weak core bodies.
In step 204, if the class determined in step 202 is the first class with lower core security, the determination result may be verified again to determine the reliability of the core product in the first class. In this way, the reliability of the core product can be further improved.
This step can execute three verifications, which are: and verifying according to the user basic information, verifying according to the online operation environment information, and verifying according to the historical operation information. Specifically, three verifications may be performed by:
when verification is performed according to user basic information, the acceptance characteristic of a user on a nuclear product can be obtained according to the user basic information, the acceptance characteristic is input into a pre-trained first classification model, and a verification result corresponding to the user basic information is obtained; wherein the receptiveness characteristics are used for characterizing the receptiveness of the user to the first category of core-body products.
The first classification model in the step can be realized by adopting a somatosensory evaluation model, and the somatosensory evaluation model can be a classifier for evaluating the psychological acceptance of the current user in the use process and mainly focuses on the safety experience, the use complaint and the acceptance degree of the user. Wherein, the receptiveness characteristics can comprise the completeness of the core product pushed by the user in the history and/or the feedback result. For example, the user's completion of the core product pushed within the last month may be obtained. The completion degree can be calculated by the proportion of the completed core-body flow to the whole core-body flow. If the completion degree is greater than the preset completion degree threshold value, the core product can be used as one of the alternative core products pushed to the user, and when pushing is needed, at least one of the alternative core products is pushed to the user. And if the completion degree is smaller than the completion degree threshold value, not pushing the nuclear product to the user. The feedback result may be a feedback result of the user on the whole nuclear body product, for example, a feedback result obtained by means of questionnaire or the like that the user accepts the nuclear body product is "yes" or "no"; the feedback information may also be obtained by the background, for example, the core product includes three processes of obtaining a short message verification code, performing face recognition and inputting a bound bank card number, and the user exits the core process each time the user needs to perform face recognition in the core process.
The receptivity characteristic is input into a first classification model which is trained in advance, so that the class to which the user belongs, namely the class which tends to accept the strong core body or the class which tends to accept the weak core body, can be obtained. If the verification result shows that the user is a category which tends to accept strong core, the verification is failed; if the verification result shows that the user is in a category which tends to accept weak kernels, the verification is successful.
When verification is performed according to the online operating environment information, high-risk environment characteristics in the online operating environment information can be acquired, the high-risk environment characteristics are input into a pre-trained second classification model, and a verification result corresponding to the online operating environment information is acquired.
The second classification model of this step may be implemented by using an environment assessment model, which may be used to assess whether the current operating environment is at risk. The high-risk environment characteristics can include characteristics that the reported records do not exist in common addresses and/or IP addresses. And inputting the high-risk environment characteristics into a pre-trained second classification model, so that the category of the current operating environment, namely the category with risk or the category without risk can be obtained. If the verification result shows that the current operating environment is of a risk type, indicating that the verification fails; and if the verification result shows that the current operating environment is of the type without risk, the verification is successful.
When verification is performed according to historical operation information, high-risk operation characteristics in the historical operation information can be obtained, the high-risk operation characteristics are input into a third classification model trained in advance, and a verification result corresponding to the historical operation information is obtained.
The third classification model in this step can be realized by adopting a behavior evaluation model, and the behavior evaluation model can be used for evaluating the operation process of the user and evaluating the high-risk situation of the user operation or causing the high-risk situation. Wherein the high-risk operation characteristics may include characteristics of large capital expenditure, frequent performance of the same operation in a short time, and the like. And inputting the high-risk operation characteristics into a third classification model trained in advance, so that the category of the current operation behavior, namely the category with risk or the category without risk, can be obtained. If the verification result shows that the current operation behavior is of a risk type, the verification is failed; and if the verification result shows that the current operation behavior is the category without risk, the verification is successful.
In one embodiment, if it is determined that the type of the core body product pushed to the user is the second type with higher security, the core body product of the second type can be pushed to the user directly without verification.
In step 206, if any of the verification results obtained according to the user basic information, the online operating environment information, and the historical operating information does not pass the verification, it indicates that the currently adopted first type of core product may not be in accordance with the actual situation, for example, the user is more inclined to adopt a second type of core product with higher security, or the current operating environment or the user operating behavior has a risk and needs to adopt a safer core mode, and therefore, the second type of core product with higher core security may be pushed to the user.
In one embodiment, feedback results of the user on each flow in the core product pushed by the history can be obtained; and determining a core body process in the core body product pushed to the user in the future time according to the feedback result. For example, if the core product historically pushed to the user includes processes a, B, and C, and the feedback result indicates that the user has a low acceptance level for process B, process B may be removed from the core product pushed to the user in the future. The process B may be replaced by a process D, where the process D may be a process pre-stored in the database. Therefore, different core processes can be included in the core product pushed to the user each time, on one hand, the core product meets the requirements of practical application better, and on the other hand, the difficulty of risk countermeasures of lawbreakers is improved.
In one embodiment, the first category of core products may be core products including a number of processes with lower difficulty factors, and the second category of core products may be core products including a number of processes with higher difficulty factors. The difficulty factor of each process may be preset. For example, the second category of core body products includes biometric information core body products and/or bank card core body products; the first category of core body products comprises short message verification code core body products and/or mailbox verification code core body products.
In one embodiment, the number of core products to the user is greater than 1. That is, if it is determined to push the core body products of the first category to the user, a plurality of core body products of the first category may be pushed to the user at a time. Similarly, if it is determined that the second category of core body products is to be pushed to the user, a plurality of second category of core body products may be pushed to the user each time. When the user performs the body checking, the user can select one of the body checking products by himself, and the user is indicated that the body checking passes as long as the body checking of one of the body checking products passes. The user can actively select the selection scheme by providing multiple selection schemes, so that the autonomous selectivity, the volume polarity and the passing rate of the user can be improved, and the user experience is further improved.
The solution of the embodiment of the present specification may be implemented by the core product pushing system shown in fig. 3(a) executing the flow shown in fig. 3 (b). The system may include a data layer, an evaluation layer, and a core layer. The data layer can collect user basic information, operation environment information and historical operation information. The evaluation layer can comprise a user comprehensive scoring module, a motion sensing evaluation model, an environment evaluation model and a behavior evaluation model, wherein the motion sensing evaluation model, the environment evaluation model and the behavior evaluation model can be respectively realized by adopting a two-classifier. The core layer may include a strong check decision module, a weak check decision module, and a core verification module. The user comprehensive grading module can comprehensively grade the basic information, the operating environment information and the historical operating information of the user, and if the obtained value is larger than a preset value, a strong body check decision is adopted; and if the obtained score is less than or equal to a preset value, further verifying through the somatosensory evaluation model, the environment evaluation model and the behavior evaluation model, and determining to adopt a strong core body verification decision or a weak core body verification decision according to a verification result. If any one of the somatosensory evaluation model, the environment evaluation model and the behavior evaluation model is judged to adopt strong verification, adopting strong verification; if the three are judged to adopt weak verification, weak verification is adopted. If the evaluation result of the evaluation layer is strong core body check, executing the function of a strong check decision module; and if the evaluation result of the evaluation layer is weak core verification, executing the function of a weak verification decision module. The strong/weak verification decision module can determine the core product pushed to the user, and the core verification module can adopt the core product to perform core verification.
The scheme of the embodiment of the specification provides a set of safe and friendly core-body verification while identifying the use environment and considering user behaviors, safety feeling and self appeal. The body checking mode is based on comprehensive grading of body feeling, online environment and historical operation of the user, and meanwhile user characteristics, operation rationality and environmental risk are considered, so that a set of different feelings according to different complaints of the user is formed, and different user groups and different groups are checked in a differentiated mode. The system can perform the core in a mode that the user can more accept according to the self requirement and the feeling of the user on the premise of ensuring the environmental safety, thereby effectively improving the core volume polarity and the success rate of the user and being flexible in core system configuration.
As shown in fig. 4, embodiments of the present disclosure further provide a core method, which may include step 402: adopting a core product to core the user information; wherein the core product is obtained according to the method of any embodiment.
Further, if the number of the core products pushed to the user is greater than 1, when one of the core products passes through the core, the core is judged to pass through.
The various technical features in the above embodiments can be arbitrarily combined, so long as there is no conflict or contradiction between the combinations of the features, but the combination is limited by the space and is not described one by one, and therefore, any combination of the various technical features in the above embodiments also falls within the scope disclosed in the present specification.
Corresponding to the above method, an embodiment of the present specification further provides a core product pushing device, and as shown in fig. 5, the device may include:
a determining module 502, configured to determine a category of a core product to be pushed to a user according to user basic information of the user, online operating environment information, and historical operating information;
a verification module 504, configured to verify the first category according to the user basic information, the online operating environment information, and the historical operating information, if the category is the first category with lower core security;
a pushing module 506, configured to push the core product of the first category to the user if verification results obtained according to the user basic information, the online operating environment information, and the historical operating information all pass verification.
As shown in fig. 6, embodiments of the present specification further provide a core device, which may include: a core module 602, configured to core the user information by using a core product; the core product is obtained according to the method of any one of the embodiments.
The specific details of the implementation process of the functions and actions of each module in the device are referred to the implementation process of the corresponding step in the method, and are not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
The embodiments of the apparatus of the present specification can be applied to a computer device, such as a server or a terminal device. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and as a logical device, the device is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory for operation through the processor in which the file processing is located. From a hardware aspect, as shown in fig. 7, it is a hardware structure diagram of a computer device in which the apparatus of this specification is located, except for the processor 702, the memory 704, the network interface 706, and the nonvolatile memory 708 shown in fig. 7, a server or an electronic device in which the apparatus is located in an embodiment may also include other hardware according to an actual function of the computer device, which is not described again.
Accordingly, the embodiments of the present specification also provide a computer storage medium on which a computer program is stored, and the program is executed by a processor to implement the method of any one of the embodiments.
Accordingly, the embodiments of the present specification also provide a computer device, which includes a memory, a processor and a computer program stored in the memory and running on the processor, and when the processor executes the program, the method according to any embodiment is implemented.
This application may take the form of a computer program product embodied on one or more storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having program code embodied therein. Computer-usable storage media include permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of the storage medium of the computer include, but are not limited to: phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technologies, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by a computing device.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
The above description is only exemplary of the present disclosure and should not be taken as limiting the disclosure, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.
Claims (16)
1. A core product push method, the method comprising:
acquiring user basic information, online operation environment information and historical operation information of a user;
determining the target category of the core product according to the user basic information, the online operating environment information and the historical operating information, wherein the user basic information is used for determining the acceptance degree of the user to the core products with different core difficulties, the online operating environment information is used for determining the safety of the network operating environment currently used by the user, and the historical operating information is used for determining the current safety of the account of the user;
and pushing the corresponding core product to the user according to the target category.
2. The method of claim 1, wherein determining the target class of the core product according to the user basic information, the online operating environment information, and the historical operating information comprises:
respectively grading the user basic information, the on-line operating environment information and the historical operating information to obtain corresponding scores;
determining the score of the core product according to the score corresponding to the user basic information, the score corresponding to the on-line operating environment information and the score corresponding to the historical operating information;
if the score of the core product is smaller than or equal to a preset value, determining that the target category is a first category; otherwise, determining the target category as a second category.
3. The method of claim 1, the pushing the corresponding core product to the user according to the target category, comprising:
if the target category is a first category with lower core security, verifying the first category according to the user basic information, the online operation environment information and the historical operation information;
and if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are all verified, pushing the core products of the first category to the user.
4. The method of claim 3, the verifying the first category according to the user basic information, online operating environment information, and historical operating information, respectively, comprising:
acquiring the acceptance characteristic of the user on the nuclear product according to the user basic information, inputting the acceptance characteristic into a pre-trained first classification model, and acquiring a verification result corresponding to the user basic information; wherein the receptiveness characteristics are used for characterizing the receptiveness of the user to the first category of core-body products; and/or
Acquiring high-risk environment characteristics in the online operating environment information, inputting the high-risk environment characteristics into a pre-trained second classification model, and acquiring a verification result corresponding to the online operating environment information; and/or
And acquiring high-risk operation characteristics in the historical operation information, inputting the high-risk operation characteristics into a pre-trained third classification model, and acquiring a verification result corresponding to the historical operation information.
5. The method of claim 4, the receptiveness characteristics comprising user completions and/or feedback results for historically pushed core products; and/or
The high-risk environmental characteristics comprise that the reported records do not exist in common addresses and/or IP addresses; and/or
The high-risk operation features include large capital expenditure and frequent performance of the same operation in a short time.
6. The method of claim 3, further comprising:
and if any verification result obtained according to the user basic information, the on-line operating environment information and the historical operating information does not pass the verification, pushing a second type of core body product with higher core body safety to the user.
7. The method of claim 1, the pushing the corresponding core product to the user according to the target category, comprising:
and if the target category is a second category with higher core body safety, pushing the core body products of the second category to the user.
8. The method of claim 1, further comprising:
obtaining feedback results of a user on each flow in a core product pushed historically;
and determining a core body process in the core body product pushed to the user in the future time according to the feedback result.
9. The method of claim 1, wherein the target category is a first category or a second category, the first category of the core product comprises a short message verification code core product and/or a mailbox verification code core product, and the second category of the core product comprises a biological information core product and/or a bank card core product.
10. The method of any one of claims 1 to 7, wherein the number of core products pushed to the user is greater than 1.
11. A method of coring a body, the method comprising:
adopting a core product to core the user information;
the core product obtained according to the method of any one of claims 1 to 10.
12. The method of claim 11, further comprising:
if the number of the core body products pushed to the user is larger than 1, when one of the core body products passes through the core body, the core body is judged to pass through.
13. A core product pusher device, the device comprising:
the acquisition module is used for acquiring user basic information, on-line operating environment information and historical operating information of a user;
the determining module is used for determining the target category of the core product according to the user basic information, the on-line operating environment information and the historical operating information, wherein the user basic information is used for determining the acceptance degree of the user to the core product with different core difficulties, the on-line operating environment information is used for determining the security of the network operating environment currently used by the user, and the historical operating information is used for determining the current security of the account of the user;
and the pushing module is used for pushing the corresponding core product to the user according to the target category.
14. A nuclear device, the device comprising:
the core body module is used for adopting a core body product to core the user information;
the core product obtained according to the method of any one of claims 1 to 10.
15. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of any one of claims 1 to 12.
16. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 12 when executing the program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011439348.2A CN112508568B (en) | 2018-08-15 | 2018-08-15 | Nuclear product pushing and nuclear method and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011439348.2A CN112508568B (en) | 2018-08-15 | 2018-08-15 | Nuclear product pushing and nuclear method and system |
CN201810931250.5A CN109359972B (en) | 2018-08-15 | 2018-08-15 | Core product pushing and core method and system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810931250.5A Division CN109359972B (en) | 2018-08-15 | 2018-08-15 | Core product pushing and core method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112508568A true CN112508568A (en) | 2021-03-16 |
CN112508568B CN112508568B (en) | 2024-08-30 |
Family
ID=65350025
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810931250.5A Active CN109359972B (en) | 2018-08-15 | 2018-08-15 | Core product pushing and core method and system |
CN202011439348.2A Active CN112508568B (en) | 2018-08-15 | 2018-08-15 | Nuclear product pushing and nuclear method and system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810931250.5A Active CN109359972B (en) | 2018-08-15 | 2018-08-15 | Core product pushing and core method and system |
Country Status (3)
Country | Link |
---|---|
CN (2) | CN109359972B (en) |
TW (1) | TWI751422B (en) |
WO (1) | WO2020034761A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966243A (en) * | 2021-03-30 | 2021-06-15 | 支付宝(杭州)信息技术有限公司 | Privacy-protecting core-body verification processing method and device |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359972B (en) * | 2018-08-15 | 2020-10-30 | 创新先进技术有限公司 | Core product pushing and core method and system |
CN110071915B (en) * | 2019-04-10 | 2021-08-06 | 创新先进技术有限公司 | Identity verification product pushing method, device, equipment and system architecture |
CN110659466B (en) * | 2019-09-26 | 2021-11-23 | 支付宝(杭州)信息技术有限公司 | Method and device for processing encryption behavior |
CN110795707A (en) * | 2019-10-25 | 2020-02-14 | 支付宝(杭州)信息技术有限公司 | Core body strategy recommendation method and device and electronic equipment |
CN110879865B (en) * | 2019-10-31 | 2022-08-12 | 支付宝(杭州)信息技术有限公司 | Recommendation method and device for nuclear products |
CN112084486A (en) * | 2020-09-08 | 2020-12-15 | 中国平安财产保险股份有限公司 | User information verification method and device, electronic equipment and storage medium |
CN115767537B (en) * | 2022-11-15 | 2023-10-17 | 南京鼎山信息科技有限公司 | Permission processing method and device for short message verification code and computer equipment |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120060207A1 (en) * | 2010-09-03 | 2012-03-08 | Ebay Inc. | Role-based attribute based access control (rabac) |
CN103888255A (en) * | 2012-12-21 | 2014-06-25 | 中国移动通信集团公司 | Identity authentication method, device and system |
KR20140103004A (en) * | 2013-02-15 | 2014-08-25 | 주식회사 안랩 | User authenticating method and apparatus |
CN104063150A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | Mobile terminal capable of entering corresponding scene modes by means of face recognition and implementation method thereof |
CN104301117A (en) * | 2014-10-22 | 2015-01-21 | 中国联合网络通信集团有限公司 | Identity verification method and device |
US20150229623A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | User authentication based on historical transaction data |
US20150229624A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | User authentication based on historical user behavior |
US20160110528A1 (en) * | 2014-10-15 | 2016-04-21 | Qualcomm Incorporated | Methods and Systems for Using Behavioral Analysis Towards Efficient Continuous Authentication |
CN105704155A (en) * | 2016-03-31 | 2016-06-22 | 广州华多网络科技有限公司 | Information push method and device |
CN105933328A (en) * | 2016-06-12 | 2016-09-07 | 北京三快在线科技有限公司 | Method and device for processing user access behaviors |
CN106251214A (en) * | 2016-08-02 | 2016-12-21 | 东软集团股份有限公司 | account monitoring method and device |
CN106713241A (en) * | 2015-11-16 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Identity verification method, device and system |
CN106899567A (en) * | 2016-08-24 | 2017-06-27 | 阿里巴巴集团控股有限公司 | User's core body method, apparatus and system |
US20170230362A1 (en) * | 2014-09-30 | 2017-08-10 | Huawei Technologies Co., Ltd. | Identity Authentication Method and Apparatus, and User Equipment |
CN107104973A (en) * | 2017-05-09 | 2017-08-29 | 北京潘达互娱科技有限公司 | The method of calibration and device of user behavior |
CN107124420A (en) * | 2017-05-10 | 2017-09-01 | 北京潘达互娱科技有限公司 | Auth method and device |
CN107872433A (en) * | 2016-09-27 | 2018-04-03 | 腾讯科技(深圳)有限公司 | A kind of auth method and its equipment |
CN108076018A (en) * | 2016-11-16 | 2018-05-25 | 阿里巴巴集团控股有限公司 | Identity authorization system, method, apparatus and account authentication method |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9311499B2 (en) * | 2000-11-13 | 2016-04-12 | Ron M. Redlich | Data security system and with territorial, geographic and triggering event protocol |
CN101073219A (en) * | 2003-09-12 | 2007-11-14 | Rsa安全公司 | System and method for risk based authentication |
TW200642408A (en) * | 2004-12-07 | 2006-12-01 | Farsheed Atef | System and method for identity verification and management |
CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
CN104349313B (en) * | 2013-07-23 | 2018-12-07 | 阿里巴巴集团控股有限公司 | Business authorization method, equipment and system |
CN106295349B (en) * | 2015-05-29 | 2020-06-05 | 阿里巴巴集团控股有限公司 | Account stolen risk identification method, identification device and prevention and control system |
CN105678544A (en) * | 2015-12-31 | 2016-06-15 | 深圳前海微众银行股份有限公司 | Risk monitoring method of remote account opening and server |
CN107645482B (en) * | 2016-07-22 | 2020-08-07 | 创新先进技术有限公司 | Risk control method and device for business operation |
CN112769834B (en) * | 2016-08-30 | 2023-09-26 | 创新先进技术有限公司 | Identity verification system, method and platform |
CN109359972B (en) * | 2018-08-15 | 2020-10-30 | 创新先进技术有限公司 | Core product pushing and core method and system |
-
2018
- 2018-08-15 CN CN201810931250.5A patent/CN109359972B/en active Active
- 2018-08-15 CN CN202011439348.2A patent/CN112508568B/en active Active
-
2019
- 2019-06-17 TW TW108120846A patent/TWI751422B/en active
- 2019-06-24 WO PCT/CN2019/092516 patent/WO2020034761A1/en active Application Filing
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120060207A1 (en) * | 2010-09-03 | 2012-03-08 | Ebay Inc. | Role-based attribute based access control (rabac) |
CN103888255A (en) * | 2012-12-21 | 2014-06-25 | 中国移动通信集团公司 | Identity authentication method, device and system |
KR20140103004A (en) * | 2013-02-15 | 2014-08-25 | 주식회사 안랩 | User authenticating method and apparatus |
US20150229623A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | User authentication based on historical transaction data |
US20150229624A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | User authentication based on historical user behavior |
CN104063150A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | Mobile terminal capable of entering corresponding scene modes by means of face recognition and implementation method thereof |
US20170230362A1 (en) * | 2014-09-30 | 2017-08-10 | Huawei Technologies Co., Ltd. | Identity Authentication Method and Apparatus, and User Equipment |
US20160110528A1 (en) * | 2014-10-15 | 2016-04-21 | Qualcomm Incorporated | Methods and Systems for Using Behavioral Analysis Towards Efficient Continuous Authentication |
CN104301117A (en) * | 2014-10-22 | 2015-01-21 | 中国联合网络通信集团有限公司 | Identity verification method and device |
CN106713241A (en) * | 2015-11-16 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Identity verification method, device and system |
CN105704155A (en) * | 2016-03-31 | 2016-06-22 | 广州华多网络科技有限公司 | Information push method and device |
CN105933328A (en) * | 2016-06-12 | 2016-09-07 | 北京三快在线科技有限公司 | Method and device for processing user access behaviors |
CN106251214A (en) * | 2016-08-02 | 2016-12-21 | 东软集团股份有限公司 | account monitoring method and device |
CN106899567A (en) * | 2016-08-24 | 2017-06-27 | 阿里巴巴集团控股有限公司 | User's core body method, apparatus and system |
CN107872433A (en) * | 2016-09-27 | 2018-04-03 | 腾讯科技(深圳)有限公司 | A kind of auth method and its equipment |
CN108076018A (en) * | 2016-11-16 | 2018-05-25 | 阿里巴巴集团控股有限公司 | Identity authorization system, method, apparatus and account authentication method |
CN107104973A (en) * | 2017-05-09 | 2017-08-29 | 北京潘达互娱科技有限公司 | The method of calibration and device of user behavior |
CN107124420A (en) * | 2017-05-10 | 2017-09-01 | 北京潘达互娱科技有限公司 | Auth method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966243A (en) * | 2021-03-30 | 2021-06-15 | 支付宝(杭州)信息技术有限公司 | Privacy-protecting core-body verification processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112508568B (en) | 2024-08-30 |
WO2020034761A1 (en) | 2020-02-20 |
CN109359972B (en) | 2020-10-30 |
TW202009834A (en) | 2020-03-01 |
CN109359972A (en) | 2019-02-19 |
TWI751422B (en) | 2022-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109359972B (en) | Core product pushing and core method and system | |
EP3884410B1 (en) | System and method for adaptively determining an optimal authentication scheme | |
US11075942B2 (en) | Identity verification and account information updating methods and apparatuses | |
CN110348188B (en) | Core body checking method and device | |
CN111985703B (en) | User identity state prediction method, device and equipment | |
US20230004972A1 (en) | Dynamic Question Presentation in Computer-Based Authentication Processes | |
US11960592B2 (en) | Preventing unauthorized access to personal data during authentication processes | |
US20220335433A1 (en) | Biometrics-Infused Dynamic Knowledge-Based Authentication Tool | |
CN109344582B (en) | Authentication method, device and storage medium | |
US12079810B2 (en) | Method for determining the likelihood for someone to remember a particular transaction | |
CN116756716B (en) | Security verification method, system, equipment and storage medium based on big data | |
US20240062211A1 (en) | User Authentication Based on Account Transaction Information in Text Field | |
CN111047146A (en) | Risk identification method, device and equipment for enterprise users | |
US11816672B1 (en) | Flexible authentication | |
US11218493B2 (en) | Identity verification | |
US20220036219A1 (en) | Systems and methods for fraud detection using game theory | |
CN108876386B (en) | Object authentication method and device, and transaction method and device based on object authentication | |
EP3842966A1 (en) | Identifying a user from the sequence of windows opened on a user interface | |
EP4075364A1 (en) | Method for determining the likelihood for someone to remember a particular transaction | |
US20240370867A1 (en) | Method for Determining the Likelihood for Someone to Remember a Particular Transaction | |
CN113450124B (en) | Outbound method and device based on user behavior, electronic equipment and medium | |
RU2801674C2 (en) | Method and system for user identification by sequence of opened windows of the user interface | |
US20220101342A1 (en) | Risk/reward scoring in transactional relationships | |
CN117522407A (en) | Identity authentication method, identity authentication device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40049164 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |