CN112559334A - Authentication data processing method, device and storage medium - Google Patents

Authentication data processing method, device and storage medium Download PDF

Info

Publication number
CN112559334A
CN112559334A CN202011435712.8A CN202011435712A CN112559334A CN 112559334 A CN112559334 A CN 112559334A CN 202011435712 A CN202011435712 A CN 202011435712A CN 112559334 A CN112559334 A CN 112559334A
Authority
CN
China
Prior art keywords
evaluation
requirement information
information
evaluation requirement
authenticated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011435712.8A
Other languages
Chinese (zh)
Inventor
朱轶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Cloud Computing Changsha Co Ltd
Original Assignee
Tencent Cloud Computing Changsha Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Cloud Computing Changsha Co Ltd filed Critical Tencent Cloud Computing Changsha Co Ltd
Priority to CN202011435712.8A priority Critical patent/CN112559334A/en
Publication of CN112559334A publication Critical patent/CN112559334A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides an authentication data processing method, an authentication data processing device and a storage medium, and relates to a cloud server technology in the technical field of cloud, wherein the method comprises the following steps: acquiring data to be authenticated; determining at least one piece of evaluation requirement information corresponding to the data to be authenticated; matching the at least one evaluation requirement information with the authenticated historical evaluation requirement information in a preset authentication database to obtain a matching result corresponding to the at least one evaluation requirement information; and determining an authentication result corresponding to the data to be authenticated based on the at least one evaluation requirement information and a matching result corresponding to the at least one evaluation requirement information. The invention uses the authenticated historical evaluation requirement information for evaluation, has higher evaluation efficiency and automation degree of the data to be authenticated, can avoid the defect that the same evaluation requirement information obtains different evaluation results due to different personal comprehensions, and has higher evaluation accuracy of the data to be authenticated.

Description

Authentication data processing method, device and storage medium
Technical Field
The invention belongs to the technical field of computers, and particularly relates to an authentication data processing method, an authentication data processing device and a storage medium.
Background
In the prior art, when new certification is launched, firstly, the evaluation requirement of the new certification is disassembled, then, a corresponding product team is determined according to the evaluation requirement, and finally, the product team is organized to evaluate the evaluation requirement.
However, the existing authentication evaluation mode needs to determine a product team based on manual intervention before evaluation, and since the evaluation requirement is not limited to product characteristics, communication with operation, maintenance, quality and other colors for many times may be needed in the evaluation process, so that the evaluation efficiency and the automation degree of new authentication are low; in addition, because the mode based on manual intervention may result in that the same evaluation requirement obtains different evaluation results, the evaluation accuracy is low.
Disclosure of Invention
In order to solve the above technical problem, the present invention provides an authentication data processing method, apparatus and storage medium.
In one aspect, the present invention provides an authentication data processing method, where the method includes:
acquiring data to be authenticated;
determining at least one piece of evaluation requirement information corresponding to the data to be authenticated;
matching the at least one evaluation requirement information with the authenticated historical evaluation requirement information in a preset authentication database to obtain a matching result corresponding to the at least one evaluation requirement information;
and determining an authentication result corresponding to the data to be authenticated based on the at least one evaluation requirement information and a matching result corresponding to the at least one evaluation requirement information.
In another aspect, an embodiment of the present invention provides an authentication data processing apparatus, where the apparatus includes:
the data acquisition module is used for acquiring data to be authenticated;
the information determining module is used for determining at least one piece of evaluation requirement information corresponding to the data to be authenticated;
the information matching module is used for matching the at least one piece of evaluation requirement information with the authenticated historical evaluation requirement information in a preset authentication database to obtain a matching result corresponding to the at least one piece of evaluation requirement information;
and the authentication result determining module is used for determining an authentication result corresponding to the data to be authenticated based on the at least one evaluation requirement information and a matching result corresponding to the at least one evaluation requirement information.
In another aspect, the present invention provides an electronic device for processing authentication data, where the electronic device includes a processor and a memory, where at least one instruction or at least one program is stored in the memory, and the at least one instruction or the at least one program is loaded by the processor and executed to implement the method for processing authentication data as described above.
In another aspect, the present invention provides a computer-readable storage medium, in which at least one instruction or at least one program is stored, and the at least one instruction or the at least one program is loaded and executed by a processor to implement the authentication data processing method as described above.
The authentication processing method, the authentication processing device and the storage medium provided by the embodiment of the invention can accumulate the authenticated historical evaluation requirements to form a preset authentication database, can determine at least one piece of evaluation requirement information corresponding to the data to be authenticated when new data to be authenticated exists, and match the at least one piece of evaluation requirement information with the authenticated historical evaluation requirement information in the preset authentication database to obtain a matching result corresponding to the at least one piece of evaluation requirement information. Then, based on the at least one evaluation requirement information and the corresponding matching result, an authentication result corresponding to the data to be authenticated is determined (for example, it is determined which evaluation requirement information in the data to be authenticated matches the authenticated historical evaluation requirement information, that is, which evaluation requirement information has been authenticated). The embodiment of the invention can automatically match the evaluation requirement information of the data to be authenticated with the authenticated historical evaluation requirement information in the preset authentication database without determining a corresponding product team and organizing the product team to evaluate the evaluation requirement information progress, thereby realizing the automatic and rapid evaluation of the data to be authenticated and improving the evaluation efficiency and the automation degree of the data to be authenticated; in addition, due to the fact that a product team does not need to be organized for corresponding evaluation, the defect that different evaluation results are obtained by the same evaluation requirement information due to different personal comprehensions can be effectively overcome, and therefore the evaluation accuracy rate of the data to be authenticated is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions and advantages of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic diagram of an implementation environment of an authentication data processing method according to an embodiment of the present invention.
Fig. 2 is a flowchart illustrating an authentication data processing method according to an embodiment of the present invention.
Fig. 3 is a flowchart illustrating another authentication data processing method according to an embodiment of the present invention.
Fig. 4 is a schematic flowchart illustrating a process of establishing a predetermined authentication database according to an embodiment of the present invention.
Fig. 5 is a flowchart illustrating an instant messaging group establishment process according to an embodiment of the present invention.
Fig. 6 is a flowchart illustrating another authentication data processing method according to an embodiment of the present invention.
Fig. 7 is a schematic diagram of a first evaluation interface according to an embodiment of the present invention.
Fig. 8 is a flowchart illustrating another authentication data processing method according to an embodiment of the present invention.
Fig. 9 is a schematic diagram of a second evaluation interface according to an embodiment of the present invention.
Fig. 10 is a schematic structural diagram of an authentication data processing apparatus according to an embodiment of the present invention.
Fig. 11 is a block diagram of a hardware structure of a server according to an embodiment of the present invention.
Detailed Description
Cloud technology refers to a hosting technology for unifying serial resources such as hardware, software, network and the like in a wide area network or a local area network to realize calculation, storage, processing and sharing of data.
The cloud technology is a general term of network technology, information technology, integration technology, management platform technology, application technology and the like applied based on a cloud computing business model, can form a resource pool, is used as required, and is flexible and convenient. Background services of the technical network system require a large amount of computing and storage resources, such as video websites, picture-like websites and more web portals. With the high development and application of the internet industry, each article may have its own identification mark and needs to be transmitted to a background system for logic processing, data in different levels are processed separately, and various industrial data need strong system background support and can only be realized through cloud computing. Specifically, cloud technologies include the technical fields of security, big data, databases, industrial applications, networks, storage, management tools, computing, and the like.
Specifically, the embodiment of the invention relates to a computing technology in a cloud technology in the technical field of computers.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a schematic diagram of an implementation environment of authentication data processing according to an embodiment of the present invention. As shown in fig. 1, the implementation environment may include at least a client 01 and an evaluation server 02, and the client 01 and the evaluation server 02 may be directly or indirectly connected through wired or wireless communication, and the present invention is not limited herein. For example, the client 01 may send data to be authenticated to the evaluation server 02 through the connection, and after the evaluation server 02 processes the data to be authenticated, the authentication result corresponding to the data to be authenticated is fed back to the client 01.
Specifically, the client 01 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart television, a smart watch, and the like.
Specifically, the evaluation server 02 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a network service, cloud communication, a middleware service, a domain name service, a security service, a CDN, a big data and artificial intelligence platform, and the like.
It should be noted that fig. 1 is only an example.
Fig. 2 is a flowchart illustrating an authentication data processing method according to an embodiment of the present invention. The authentication data processing method may be used in the implementation environment of fig. 1. The present specification provides steps for the method operations as described in the examples or block diagrams, but may include more or fewer steps based on routine or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. In practice, the system or server product may be implemented in a sequential or parallel manner (e.g., parallel processor or multi-threaded environment) according to the embodiments or methods shown in the figures. Specifically, as shown in fig. 2, the method may include:
s101, obtaining data to be authenticated.
S103, determining at least one piece of evaluation requirement information corresponding to the data to be authenticated.
In the embodiment of the present invention, the data to be authenticated may be a new authentication standard for authenticating the object, which is established by an authenticator (such as a certification authority). For example, the authentication data processing method may be a cloud computing authentication-related processing method, the data to be authenticated may be a cloud computing-related authentication standard, and the corresponding object may be a cloud computing-related product, which includes but is not limited to: server, storage, network, container, etc. The authentication data processing method is not limited to the cloud computing authentication processing method, and may be applied to other authentications.
The data to be authenticated can be composed of at least one evaluation case. The evaluation case can be a textual description of the scenario. For example, the evaluation case may be a description of an evaluation task performed on a specific software product (i.e., a document that guides a user how to evaluate the software product).
Wherein each evaluation case may have different types, including but not limited to function, performance, security, etc. Correspondingly, the data to be authenticated may be composed of at least one evaluation case with different types, for example, the data to be authenticated is composed of an evaluation case in the aspect of function, an evaluation case in the aspect of performance, an evaluation case in the aspect of safety, and the like.
As described above, since the evaluation case in the data to be authenticated is a scenario description in a text form, it generally describes the data to be authenticated in a text form that has xx requirements in function, xx requirements in performance, xx requirements in security, and the like. In order to facilitate the subsequent fast and automatic matching process, before the evaluation server performs the authentication evaluation on the data to be authenticated, as described in S103, the data to be authenticated may be disassembled to obtain at least one evaluation requirement information corresponding to the data to be authenticated. The evaluation server directly disassembles the data to be authenticated to obtain at least one evaluation requirement information, so that the automation degree of the authentication evaluation of the data to be authenticated can be improved.
Accordingly, in some embodiments, as shown in fig. 3, the S103 may include:
s10301, obtaining at least one evaluation case corresponding to the data to be authenticated.
S10303, taking the requirement information corresponding to the at least one evaluation case as the at least one evaluation requirement information.
Because the data to be authenticated can be composed of at least one evaluation case, when disassembling, at least one evaluation case corresponding to the data to be authenticated can be obtained first, and the requirement information of the at least one evaluation case is used as the at least one evaluation requirement information. Each evaluation case has corresponding requirement information, and the requirement information of the evaluation case can be specific matters or wishes proposed for the evaluation case and is expected to be achieved or realized in the evaluation process. For example, if the type of the evaluation case is security, and the software product is a server, the requirement information of the evaluation case may be: when the server is evaluated, the data security of the server needs to reach xx level.
In the embodiment, the data to be authenticated is composed of at least one evaluation case, and the requirement information of the evaluation case is used as the evaluation requirement information corresponding to the data to be authenticated, so that the evaluation requirement information is determined based on the data to be authenticated, the determination of the evaluation requirement information has higher accuracy and reliability, and the determination accuracy of the subsequent matching result and the authentication result can be improved.
In some embodiments, the evaluation server may not be able to directly identify the data form in the data to be authenticated, and in order to avoid a defect that the corresponding evaluation requirement information cannot be accurately obtained due to the fact that the evaluation server is not able to directly identify the data form in the data to be authenticated, the client may also directly disassemble the obtained data to be authenticated to obtain at least one evaluation requirement information corresponding to the data to be authenticated, and upload the at least one disassembled evaluation requirement information to the evaluation server.
In practical application, since the same evaluation requirement information may correspond to different evaluation type information, in a subsequent matching process, the same evaluation requirement information corresponding to the same data to be authenticated may be matched to different historical evaluation requirement information, so that a matching result is inaccurate.
To avoid the above, in some embodiments, as shown in fig. 3, the method may further include: s104, establishing a first mapping relation between the evaluation requirement information and the corresponding evaluation type.
Specifically, the S104 may further include:
s10401, determining evaluation type information corresponding to at least one evaluation case.
S10403, establishing a first mapping relation between evaluation type information corresponding to at least one evaluation case and corresponding evaluation requirement information.
Because each evaluation case has different evaluation type information, a first mapping relation between the evaluation requirement information and the corresponding evaluation type is established, so that in the subsequent matching process, the matching is successful only after the evaluation requirement information and the corresponding evaluation type information are matched, the matching precision of the evaluation requirement information is ensured, and the accuracy of determining the authentication result of the data to be authenticated is improved.
To improve the matching efficiency of the evaluation server, in some embodiments, the first mapping relationship may be stored in a preset format, which includes but is not limited to: excel, txt, csv, etc. The first mapping relationship between the evaluation type information in the excel format and the corresponding evaluation requirement information may be shown in table 1.
TABLE 1 first mapping relationship between evaluation type information and corresponding evaluation requirement information
Numbering Evaluating type information Evaluating requirement information
1 Function(s) XXX
2 Performance of XXX
3 Secure XXX
…… …… ……
And S105, matching the at least one piece of evaluation requirement information with the authenticated historical evaluation requirement information in the preset authentication database to obtain a matching result corresponding to the at least one piece of evaluation requirement information.
In this embodiment of the present invention, before S101, the method may further include a step of establishing the preset authentication database.
In some embodiments, the flowchart of establishing the predetermined authentication database may be as shown in fig. 4, and as shown in fig. 4, the step of establishing the predetermined authentication database may include:
and S001, obtaining the authenticated historical evaluation requirement information.
And S003, determining historical evaluation associated information corresponding to the historical evaluation, wherein the historical evaluation represents evaluation of the target object by using the historical evaluation requirement information.
And S005, establishing a second mapping relation between the historical test requirement information and the historical evaluation association information.
And S007, storing the second mapping relation to obtain a preset authentication database.
In this embodiment, a plurality of authenticated historical evaluation cases may be sorted, and the requirement information of the plurality of historical evaluation cases may be used as the historical evaluation requirement information. And then, performing historical evaluation on the target object by using the historical evaluation requirement information, and taking the information associated with the historical evaluation as the historical evaluation associated information. And then establishing a second mapping relation between the historical test requirement information and the corresponding historical evaluation association information, and finally storing the second mapping relation to obtain the preset authentication database.
The historical evaluation associated information in this embodiment may include: historical evaluation type information corresponding to the historical evaluation requirement information, a specific evaluation process, a corresponding target object, identification information of a historical evaluation interface user executing the evaluation operation and the like. The target object may be the cloud computing-related product described above, which includes but is not limited to: server, storage, network, container, etc. The identification information of the evaluation interface user is used for uniquely identifying the evaluation interface user, and includes but is not limited to: name, identification number (ID), etc.
In this embodiment, the second mapping relationship may be stored according to a preset format, so as to obtain the preset authentication database. The preset format includes but is not limited to: excel, txt, csv, etc. The preset authentication database in the excel format may be as shown in table 2.
Table 2 preset authentication database in excel format
Figure BDA0002828558630000081
In practical application, the at least one piece of evaluation requirement information is matched by using a preset authentication database which is established in advance, and various matching modes can be adopted.
In some embodiments, batch matching may be performed on the at least one evaluation requirement information, and accordingly, as shown in fig. 3, the S105 may include:
s10501, determining at least one search keyword corresponding to evaluation requirement information.
S10503, determining candidate historical evaluation requirement information corresponding to at least one piece of evaluation requirement information from the authenticated historical evaluation requirement information in a preset authentication database based on the search keyword corresponding to the at least one piece of evaluation requirement information.
In this embodiment, the corresponding search keyword may be extracted from the at least one evaluation requirement information based on a semantic analysis technique. And inquiring candidate historical evaluation requirement information corresponding to the corresponding evaluation requirement information in the preset authentication database through the search keyword.
Assuming that the at least one evaluation requirement information includes evaluation requirement information 1, evaluation requirement information 2, and evaluation requirement information 3, the search keyword 1 corresponding to the evaluation requirement information 1, the search keyword 2 corresponding to the evaluation requirement information 2, and the search keyword 3 corresponding to the evaluation requirement information 3 may be extracted by the semantic analysis technique. The search keyword 1 is used for searching candidate historical evaluation requirement information corresponding to the evaluation requirement information 1 in the authenticated historical evaluation requirement information in the preset authentication database, the search keyword 2 is used for searching candidate historical evaluation requirement information corresponding to the evaluation requirement information 2 in the authenticated historical evaluation requirement information in the preset authentication database, and the search keyword 3 is used for searching candidate historical evaluation requirement information corresponding to the evaluation requirement information 3 in the authenticated historical evaluation requirement information in the preset authentication database.
Since not every evaluation requirement information can be matched with the authenticated historical evaluation requirement information in the preset authentication database, that is, there is a case that the authenticated historical evaluation requirement information is not matched in the preset authentication database, in order to improve the matching accuracy and further improve the accuracy of determining the authentication result corresponding to the subsequent data to be authenticated. Before S10505, the embodiment may further include a step of determining whether any evaluation requirement information does not match the corresponding candidate historical evaluation requirement information, if not, it indicates that each evaluation requirement information matches the corresponding historical evaluation requirement information, then S10505-S10509 is performed, if yes, it indicates that not each evaluation requirement information matches the corresponding historical evaluation requirement information, then S10505-S10509 is performed on the evaluation requirement information matching the authenticated historical evaluation requirement information, and S10504-S10508 is performed on any evaluation requirement of the authenticated historical evaluation requirement information not matching.
S10505, determining target evaluation type information corresponding to at least one piece of evaluation requirement information based on the first mapping relation.
S10507, based on the second mapping relation, determining candidate history associated information of candidate history evaluation requirement information corresponding to at least one evaluation requirement information, wherein the candidate history associated information comprises candidate history evaluation type information.
And S10509, when the target evaluation type information corresponding to the at least one evaluation requirement information is matched with the corresponding candidate history evaluation type information, taking the candidate history evaluation requirement information corresponding to the at least one evaluation requirement information and the corresponding candidate history association information as a matching result corresponding to the at least one evaluation requirement information.
In this embodiment, for the evaluation requirement information matched with the historical evaluation requirement information, the target evaluation type information corresponding to the evaluation requirement information may be determined according to a pre-established first mapping relationship, and the candidate historical association information of the candidate historical evaluation requirement information corresponding to the evaluation requirement information may be determined based on a pre-established second mapping relationship, where the candidate historical association information includes the candidate historical evaluation type information. The candidate historical association information corresponds to the historical evaluation association information of the authenticated historical evaluation requirement information matched with the evaluation requirement information, for example, if the authenticated historical evaluation requirement information matched with the evaluation requirement information is number 1 in table 2, the candidate historical association information is evaluation type information corresponding to number 1, an evaluation process, an evaluation result, a target object (i.e., a corresponding product), identification information of an evaluation interface user, and the like. The candidate historical evaluation type information is the evaluation type information corresponding to the number 1 in table 1.
And then judging whether the target evaluation type information is matched with corresponding candidate historical evaluation type information, and finally determining that the evaluation requirement information is successfully matched with the historical evaluation requirement information if the target evaluation type information is matched with the corresponding candidate historical evaluation type information. And using the candidate historical evaluation requirement information corresponding to the evaluation requirement information and the corresponding candidate historical association information as the matching result corresponding to the evaluation requirement information. For example, if the authenticated historical evaluation requirement information matched with a certain evaluation requirement information is number 1 in table 2, and the target evaluation type information of the evaluation requirement information is also matched with the evaluation type information corresponding to the number 1, the evaluation requirement information is considered to be finally successfully matched.
If the target evaluation type information is not matched with the corresponding candidate historical evaluation type information, it is indicated that the target evaluation type information is not matched with the corresponding candidate historical evaluation type information, that is, the evaluation requirement information is not matched with the authenticated historical evaluation requirement information in the preset authentication database. For example, the authenticated historical evaluation requirement information matched with a certain evaluation requirement information is number 1 in table 2, but if the target evaluation type information of the evaluation requirement information is not matched with the evaluation type information corresponding to the number 1, it is determined that the evaluation requirement information is not successfully matched with the authenticated historical evaluation requirement information corresponding to the number 1.
In the embodiment, the preset authentication database is used for automatically matching the evaluation requirements corresponding to the data to be authenticated, and a corresponding product team does not need to be determined according to each evaluation requirement and the product team is reorganized to evaluate the evaluation requirements, so that the matching item (namely the matching result) of the data to be authenticated can be quickly matched, and the efficiency and the degree of automation of the determination of the authentication result of the subsequent data to be authenticated are improved. And because the evaluation requirements do not need to be evaluated by a product team, the defect that different evaluation results are obtained by the same evaluation requirement due to different personal comprehensions can be avoided, the matching accuracy of the evaluation requirement information of the data to be authenticated is further improved, and the accuracy of the determination of the authentication result of the subsequent data to be authenticated is further improved.
In addition, by adopting a common matching mode of 'evaluation requirement information + evaluation type information', even if a certain evaluation requirement information is matched with the corresponding historical evaluation requirement information in the preset authentication database, the matching can not be concluded, but the corresponding evaluation type information is continuously matched, and after the evaluation type information is also matched, the evaluation requirement information and the authenticated historical evaluation requirement information can be proved to be successfully matched. By adopting a common matching mode of 'evaluation requirement information + evaluation type information', the situation that the same evaluation requirement information corresponding to the same data to be authenticated is possibly matched with different historical evaluation requirement information is effectively avoided, so that the matching precision of the evaluation requirement information is ensured, and the accuracy of the subsequent authentication result determination of the data to be authenticated is improved.
S10504, when any evaluation requirement information is not matched with the corresponding candidate historical evaluation requirement information, taking the evaluation requirement information of which any evaluation requirement information and target evaluation type information are not matched with the corresponding candidate historical evaluation type information as the unmatched evaluation requirement information.
S10506, storing the unmatched evaluation requirement information into a preset authentication database so that a preset interface user can determine target evaluation associated information corresponding to target evaluation, wherein the target evaluation represents evaluation of the preset interface user on a target object by using the unmatched evaluation requirement information.
And S10508, updating the preset authentication database through the target evaluation associated information.
In this embodiment, the evaluation requirement information that does not match the historical evaluation requirement information (i.e., the any evaluation requirement information) and the evaluation requirement information that has been queried for the corresponding historical evaluation requirement information but whose target evaluation type information does not match the corresponding candidate historical evaluation type information are taken as the unmatched evaluation requirement information. The unmatched evaluation requirement information can be stored in the preset authentication database, a product team corresponding to the unmatched evaluation requirement information and a preset interface user in the product team are determined, the preset interface user evaluates a target object (such as a server, a storage, a network, a container and the like) by using the unmatched evaluation requirement information to obtain information such as target evaluation type information, a target evaluation process, a target evaluation result and the like related to the evaluation, and the target evaluation type information, the target evaluation process, the target evaluation result, the target object and identification information of the evaluation interface user are used as target evaluation associated information. And finally, supplementing the target evaluation associated information to the preset authentication database so as to update the preset authentication database.
In the embodiment, the unmatched evaluation requirement information is automatically stored in the preset authentication database, and after a preset interface user determines the target evaluation associated information corresponding to the unmatched evaluation requirement information, the target evaluation associated information is used for updating the preset authentication database, so that the content of the preset authentication database is enriched, and the matching range of the preset authentication database is expanded.
S107, determining an authentication result corresponding to the data to be authenticated based on the at least one evaluation requirement information and the matching result corresponding to the at least one evaluation requirement information.
In the embodiment of the invention, the authentication result of the data to be authenticated can be determined according to the at least one piece of evaluation requirement information and the corresponding matching result thereof.
The authentication result corresponding to the result of the data to be authenticated can be the authentication condition of the data to be authenticated, namely the data to be authenticated and the authenticated historical evaluation requirement information in the preset authentication database are in accordance with each other.
In some embodiments, the S107 may include:
a first quantity of at least one evaluation requirement information is determined.
A second quantity of unmatched profile request information is determined.
And determining an authentication result corresponding to the data to be authenticated based on the first quantity and the second quantity.
In this embodiment, the authentication result of the data to be authenticated may be determined according to a first amount of the at least one evaluation requirement information included in the data to be authenticated and a second amount of the unmatched evaluation requirement information. For example, if the first number of the at least one evaluation requirement information is 100 and the second number of the unmatched evaluation requirement information is 20, the authentication result is (100-20)/100 ═ 80%.
In other embodiments, the authentication result of the data to be authenticated may be further determined according to the first quantity of the at least one evaluation requirement information included in the data to be authenticated and the third quantity of the matched evaluation requirement information, and the authentication result may be a ratio of the third quantity to the first quantity. The matched evaluation requirement information is the number of evaluation requirement information (namely, the evaluation requirement information + the evaluation type information are both matched with the historical evaluation requirement information) of which the target evaluation type information is matched with the corresponding candidate historical evaluation type information.
In the embodiment, the authenticated historical evaluation requirement information is used for automatically evaluating the data to be authenticated, and the authentication result corresponding to the data to be authenticated is determined according to the total quantity of the evaluation requirement information corresponding to the data to be authenticated and the quantity of the evaluation requirement information matched (or not matched) with the historical evaluation requirement information. The method and the device can avoid the defect that the same evaluation requirement information obtains different evaluation results due to different personal comprehensions caused by evaluating the evaluation requirement information by an organization product team, improve the evaluation accuracy of the data to be authenticated and ensure the consistency of the evaluation of the authentication conformity of the data to be authenticated.
In some embodiments, the matching result includes identification information of the evaluation interface user, and the method may further include the step of establishing an instant communication group. Fig. 5 is a flowchart illustrating a procedure for establishing an instant messaging group, and as shown in fig. 5, the step of establishing the instant messaging group may include:
s201, responding to an instant communication group establishment request carrying identification information of an evaluation interface user, and establishing an instant communication group corresponding to the evaluation interface user.
And S203, displaying a matching result corresponding to at least one piece of evaluation requirement information and an authentication result corresponding to the data to be authenticated in the instant communication group.
The matching result corresponding to the evaluation requirement information comprises candidate historical evaluation requirement information and corresponding candidate historical association information. The historical candidate association information may include identification information of the evaluation interface user. In order to improve the efficiency of determining the participants of the authentication related team and avoid repeated determination of the participants, thereby improving the efficiency of communication between the communication personnel, in the embodiment, the "push-and-pull group" button can be clicked on the corresponding evaluation interface, so as to establish the instant communication group corresponding to the evaluation interface user, and the matching result and the authentication result are sent to the instant communication group.
In practical application, after the authentication result corresponding to the data to be authenticated is determined, the authentication result can be sent to an authentication mechanism, and if the authentication mechanism needs to communicate with the authentication result, a corresponding evaluation interface user needs to perform technical support. Therefore, in this embodiment, the matching result and the authentication result are sent to the instant messaging group, so that not only can the evaluation interface user in the instant messaging group know the authentication condition of the data to be authenticated in time, but also the communication can be directly continued in the instant messaging group when technical support is subsequently needed, thereby avoiding repeated determination of the participants and improving the communication efficiency of the communication staff.
In some embodiments, to improve user experience, the method may further comprise:
and responding to a data downloading request carrying the identification information of the data to be authenticated, and downloading the matching result and the authentication result.
In this embodiment, if the user wants to download the matching result and the authentication result of the data to be authenticated, the user may click the "export" button on the corresponding evaluation interface, so as to export the matching result and the authentication result.
The authentication data processing method is introduced from the perspective of interaction between the client and the evaluation server, and performs batch matching on the at least one evaluation requirement information. Fig. 6 is a schematic flow chart of the authentication data processing method in this embodiment, and fig. 7 is a schematic diagram of a first evaluation interface in the authentication process:
s301, the client clicks an uploading button in the first evaluation interface, and data to be authenticated is uploaded to the evaluation server.
And S303, the evaluation server disassembles the data to be authenticated to obtain at least one piece of evaluation requirement information corresponding to the data to be authenticated.
It should be noted that, in a possible embodiment, the client may also disassemble the data to be authenticated to obtain at least one evaluation requirement information corresponding to the data to be authenticated, and click an "upload" button in the evaluation interface to upload the at least one evaluation requirement information to the evaluation server.
In other embodiments, in order to improve user experience, when the evaluation requirement information is directly uploaded by the client, the evaluation requirement information can be uploaded in a voice input mode in addition to the uploading by clicking an upload button.
The process of determining at least one evaluation requirement information corresponding to the data to be authenticated may refer to step S103, which is not described herein again.
S305, the evaluation server determines a search keyword corresponding to the at least one evaluation requirement information.
S307, the evaluation server searches a matching result corresponding to the at least one evaluation requirement information from the preset authentication database based on the search keyword corresponding to the at least one evaluation requirement information, and determines an authentication result corresponding to the data to be authenticated according to the matching result.
The process of determining the matching result corresponding to the at least one evaluation requirement information may refer to step S105, and the process of determining the authentication result corresponding to the to-be-authenticated data may refer to step S107, which is not described herein again.
In a feasible embodiment, as shown in fig. 7, in order to more intuitively display the matching result and the matching result to the user and further improve the user experience, the matched evaluation requirement information and the unmatched evaluation requirement information may be displayed in the first evaluation interface in the form of a preset table (such as an excel table), and the authentication condition of the data to be authenticated is briefly described in the first evaluation interface. For example, the data to be authenticated is evaluated at this time, so that xx pieces of evaluation requirement information are shared, xx pieces of historical evaluation requirement information are matched, and the compliance rate is xx%. Unmatched xx evaluation requirement information is stored in the preset authentication database, and the evaluation is finished with a product team as soon as possible.
S309, the client clicks a lead-out button on the first evaluation interface to trigger a data downloading request.
And S3011, the evaluation server responds to the data downloading request and transmits the matching result and the authentication result corresponding to the data to be authenticated to the client.
S3013, the client clicks a push-pull group button of the first evaluation interface to trigger an instant messaging group establishment request.
And S3015, the evaluation server responds to the instant communication group establishment request, establishes an instant communication group corresponding to the corresponding evaluation interface user, and sends the matching result and the authentication result to the instant communication group.
S3017, the evaluation server stores the unmatched evaluation requirement information into the preset authentication database.
The above embodiment describes a process of performing batch matching on the at least one piece of evaluation requirement information, and performing derivation and one-key pull group on a matching result and an authentication result of the batch matching. In some embodiments, matching can also be performed separately for a single evaluation requirement information, and corresponding matching results are derived, namely, a key pull group. In the following, from the perspective of client and evaluation server interaction, a process of individually matching information for a single evaluation requirement is introduced. Fig. 8 is a schematic flow chart of the authentication data processing method in this embodiment, and fig. 9 is a schematic diagram of a second evaluation interface in the authentication process:
s401, the client clicks an upload button in the second evaluation interface, and uploads a target search keyword corresponding to certain target evaluation requirement information to an evaluation server.
In a possible embodiment, the client may also input the target evaluation requirement information through a voice input method.
And S403, the evaluation server determines a matching result corresponding to the target evaluation requirement information from the authenticated historical evaluation requirement information in a preset authentication database based on the target search keyword.
The process of the matching result corresponding to the target evaluation requirement information is similar to that in S105, and is not described herein again.
The matching result corresponding to the target evaluation requirement information may include corresponding evaluation type information, a specific evaluation process, a corresponding target object, identification information of a historical evaluation interface person performing the evaluation operation, and the like.
It should be noted that, because the embodiment of the present invention adopts a common matching manner of "evaluation type + evaluation requirement information", a matching result corresponding to a certain evaluation requirement information is accurately determined. In fig. 9, for a certain target evaluation requirement information, the reason why a plurality of pieces of authenticated historical evaluation requirement information are matched from the preset authentication database may be: in practical application, a plurality of data to be authenticated may be evaluated at the same time, and a certain search keyword may correspond to the plurality of data to be authenticated, so that when matching with the authenticated historical evaluation requirement information in the preset authentication database, a plurality of matching results may be obtained. For example, the data to be authenticated 1 and the data to be authenticated 2 are evaluated at the same time, the data to be authenticated 1 corresponds to the evaluation requirement information a, the data to be authenticated 2 corresponds to the evaluation requirement information B, and the search keywords of the evaluation requirement information a and the evaluation requirement information B are both "xx", so that when the search keyword "xx" is used to search in the preset authentication database, the matching result shown in fig. 9 may be obtained.
S405, the client clicks a lead-out button in the second evaluation interface to trigger a data downloading request.
And S407, the evaluation server sends the matching result corresponding to the target evaluation requirement information to the client.
And S409, the client clicks a one-click group button in the second evaluation interface to trigger the instant messaging group establishment request.
S4011, the evaluation server responds to the instant communication group establishment request, establishes an instant communication group corresponding to the corresponding evaluation interface user, and sends a matching result to the instant communication group.
The method and the device aim at single evaluation requirement information to be matched, can match certain evaluation requirement information according to actual requirements, judge whether certain evaluation requirement information is matched with the authenticated historical evaluation requirement information, and do not need to match all the evaluation requirement information in batch, so that the adaptation range of the authentication conformity evaluation of the data to be authenticated is improved.
As shown in fig. 10, an embodiment of the present invention further provides an authentication data processing apparatus, which may include at least:
the data obtaining module 501 may be configured to obtain data to be authenticated.
The information determining module 503 may be configured to determine at least one evaluation requirement information corresponding to the data to be authenticated.
In some embodiments, the information determining module 503 may further include:
the evaluation case obtaining unit may be configured to obtain at least one evaluation case corresponding to the data to be authenticated.
The evaluation requirement information determining unit may be configured to use requirement information corresponding to at least one evaluation case as the at least one evaluation requirement information.
In some embodiments, the apparatus may further comprise:
the evaluation type information determining unit may be configured to determine evaluation type information corresponding to at least one evaluation case.
The first mapping relationship establishing unit may be configured to establish a first mapping relationship between evaluation type information corresponding to at least one evaluation case and corresponding evaluation requirement information.
The information matching module 505 may be configured to match the at least one evaluation requirement information with the authenticated historical evaluation requirement information in the preset authentication database, so as to obtain a matching result corresponding to the at least one evaluation requirement information.
The authentication result determining module 507 may be configured to determine, based on the at least one evaluation requirement information and the matching result corresponding to the at least one evaluation requirement information, an authentication result corresponding to the to-be-authenticated data.
In some embodiments, the apparatus may further comprise:
and the response module can be used for responding to the instant communication group establishment request carrying the identification information of the evaluation interface user and establishing an instant communication group corresponding to the evaluation interface user.
And the display module can be used for displaying the matching result corresponding to the at least one evaluation requirement information and the authentication result corresponding to the data to be authenticated in the instant communication group.
In some embodiments, the apparatus may further include a preset authentication database establishment module, and the preset authentication database establishment module may include:
the history evaluation requirement information obtaining unit may be configured to obtain authenticated history evaluation requirement information.
The history evaluation associated information determining unit can be used for determining history evaluation associated information corresponding to history evaluation, and the history evaluation represents evaluation of the target object by using the history evaluation requirement information.
The second mapping relation determining unit may be configured to establish a second mapping relation between the historical testing requirement information and the historical evaluation association information.
And the storage unit can be used for storing the second mapping relation to obtain a preset authentication database.
Accordingly, the information matching module 505 may include:
the search keyword determination unit may be configured to determine a search keyword corresponding to at least one evaluation requirement information.
The candidate historical evaluation requirement information determining unit may be configured to determine, based on a search keyword corresponding to at least one evaluation requirement information, candidate historical evaluation requirement information corresponding to the at least one evaluation requirement information from the authenticated historical evaluation requirement information in the preset authentication database.
And the target evaluation type information determining unit can be used for determining target evaluation type information corresponding to at least one piece of evaluation requirement information based on the first mapping relation.
The candidate history association information determining unit may be configured to determine, based on the second mapping relationship, candidate history association information of candidate history evaluation requirement information corresponding to the at least one evaluation requirement information, where the candidate history association information includes candidate history evaluation type information.
The matching result determining unit may be configured to, when the target evaluation type information corresponding to the at least one evaluation requirement information matches the corresponding candidate history evaluation type information, take the candidate history evaluation requirement information corresponding to the at least one evaluation requirement information and the corresponding candidate history association information as a matching result corresponding to the at least one evaluation requirement information.
In some embodiments, the apparatus may further comprise:
the execution module may be configured to execute a step of determining target evaluation type information corresponding to at least one piece of evaluation requirement information based on the first mapping relationship when there is no any piece of evaluation requirement information that is not matched to the corresponding candidate historical evaluation requirement information.
The unmatched evaluation requirement information determining module may be configured to, when any one piece of evaluation requirement information is unmatched to the corresponding candidate historical evaluation requirement information, take the any one piece of evaluation requirement information and the evaluation requirement information of which the target evaluation type information is unmatched to the corresponding candidate historical evaluation type information as the unmatched evaluation requirement information.
The storage module can be used for storing the unmatched evaluation requirement information into the preset authentication database so that a preset interface user can determine target evaluation associated information corresponding to target evaluation, and the target evaluation represents evaluation of the target object by the preset interface user by using the unmatched evaluation requirement information.
And the updating module can be used for updating the preset authentication database through the target evaluation associated information.
In some embodiments, the authentication result determining module 507 may include:
the first quantity determination unit may be configured to determine a first quantity of the at least one evaluation requirement information.
The second quantity determination unit may be configured to determine a second quantity of unmatched evaluation requirement information.
And the authentication result determining unit can be used for determining the authentication result corresponding to the data to be authenticated based on the first number and the second number.
It should be noted that this embodiment provides an apparatus embodiment based on the same inventive concept as the above-described method embodiment.
The embodiment of the present invention further provides an electronic device for processing authentication data, where the electronic device includes a processor and a memory, where the memory stores at least one instruction or at least one program, and the at least one instruction or the at least one program is loaded and executed by the processor to implement the method for processing authentication data provided in the above method embodiment.
Embodiments of the present invention also provide a computer-readable storage medium, which may be disposed in a terminal to store at least one instruction or at least one program for implementing the authentication data processing method in the method embodiments, where the at least one instruction or the at least one program is loaded and executed by a processor to implement the authentication data processing method provided in the method embodiments.
Alternatively, in the present specification embodiment, the storage medium may be located at least one network server among a plurality of network servers of a computer network. Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
The memory of the embodiments of the present disclosure may be used to store software programs and modules, and the processor may execute various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.
The authentication data processing method, the authentication data processing device and the storage medium provided by the embodiment of the invention have the following beneficial effects:
1) in the embodiment of the invention, the preset authentication database is formed by sorting the authenticated historical evaluation requirement information. When new data to be authenticated exists, the evaluation requirement of the data to be authenticated is automatically matched with the preset authentication database, so that a conforming item (namely a matching result) of the data to be authenticated is obtained, and in the whole evaluation process, a product team does not need to be determined and does not need to be organized to evaluate the evaluation requirement information, so that the conforming degree of the data to be authenticated can be rapidly quantized, and the evaluation efficiency and the automation degree of the data to be authenticated are improved.
2) The embodiment of the invention utilizes the authenticated historical evaluation requirement information to carry out automatic evaluation, avoids the defect that the same evaluation requirement information obtains different evaluation results due to different personal comprehensions when an organization product team evaluates the evaluation requirement information, improves the evaluation accuracy of the data to be authenticated and ensures the consistency of the authentication conformity evaluation of the data to be authenticated.
3) In the embodiment of the invention, a 'push-pull group' button can be clicked on a corresponding evaluation interface, so that an instant communication group corresponding to the evaluation interface user is established, and the matching result and the authentication result are sent to the instant communication group, so that the efficiency of determining the participants of the authentication related team is improved, repeated determination of the participants is avoided, and the efficiency of communication personnel is improved.
Embodiments of the present invention also provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions to enable the computer device to execute the authentication data processing method provided by the method embodiment.
The authentication data processing method provided by the embodiment of the invention can be executed in a terminal, a computer terminal, a server or a similar arithmetic device. Taking the example of the operation on a server, fig. 11 is a hardware structure block diagram of the server of the authentication data processing method according to the embodiment of the present invention. As shown in fig. 11, the server 600 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 610 (the CPU 610 may include but is not limited to a Processing device such as a microprocessor MCU or a programmable logic device FPGA), a memory 630 for storing data, and one or more storage media 620 (e.g., one or more mass storage devices) for storing applications 623 or data 622. Memory 630 and storage medium 620 may be, among other things, transient or persistent storage. The program stored on the storage medium 620 may include one or more modules, each of which may include a series of instruction operations for the server. Still further, the central processor 610 may be configured to communicate with the storage medium 620 to execute a series of instruction operations in the storage medium 620 on the server 600. The Server 600 may also include one or more power supplies 660, one or more wired or wireless network interfaces 650, one or more input-output interfaces 640, and/or one or more operating systems 621, such as a Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTMAnd so on.
The input/output interface 640 may be used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the server 600. In one example, i/o Interface 640 includes a Network adapter (NIC) that may be coupled to other Network devices via a base station to communicate with the internet. In one example, the input/output interface 640 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
It will be understood by those skilled in the art that the structure shown in fig. 11 is only an illustration and is not intended to limit the structure of the electronic device. For example, server 600 may also include more or fewer components than shown in FIG. 11, or have a different configuration than shown in FIG. 11.
It should be noted that: the precedence order of the above embodiments of the present invention is only for description, and does not represent the merits of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the device and server embodiments, since they are substantially similar to the method embodiments, the description is simple, and the relevant points can be referred to the partial description of the method embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalent replacements, improvements, etc. within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of processing authentication data, the method comprising:
acquiring data to be authenticated;
determining at least one piece of evaluation requirement information corresponding to the data to be authenticated;
matching the at least one evaluation requirement information with the authenticated historical evaluation requirement information in a preset authentication database to obtain a matching result corresponding to the at least one evaluation requirement information;
and determining an authentication result corresponding to the data to be authenticated based on the at least one evaluation requirement information and a matching result corresponding to the at least one evaluation requirement information.
2. The method according to claim 1, wherein the matching result corresponding to the at least one evaluation requirement information includes identification information of an evaluation interface user, and the method further includes:
responding to an instant communication group establishment request carrying identification information of the evaluation interface user, and establishing an instant communication group corresponding to the evaluation interface user;
and displaying the matching result corresponding to the at least one evaluation requirement information and the authentication result corresponding to the data to be authenticated in the instant messaging group.
3. The method according to claim 1 or 2, wherein the determining at least one evaluation requirement information corresponding to the data to be authenticated comprises:
acquiring at least one evaluation case corresponding to the data to be authenticated;
and taking the requirement information corresponding to the at least one evaluation case as the at least one evaluation requirement information.
4. The method of claim 3, further comprising:
determining evaluation type information corresponding to the at least one evaluation case;
and establishing a first mapping relation between the evaluation type information corresponding to the at least one evaluation case and the corresponding evaluation requirement information.
5. The method according to claim 4, further comprising the step of building the pre-defined authentication database, the step of building the pre-defined authentication database comprising:
obtaining the authenticated historical evaluation requirement information;
determining historical evaluation associated information corresponding to historical evaluation, wherein the historical evaluation represents evaluation of the target object by using the historical evaluation requirement information;
establishing a second mapping relation between the historical test requirement information and the historical evaluation association information;
and storing the second mapping relation to obtain the preset authentication database.
6. The method according to claim 5, wherein the matching the at least one evaluation requirement information with the authenticated historical evaluation requirement information in a preset authentication database to obtain a matching result corresponding to the at least one evaluation requirement information comprises:
determining a search keyword corresponding to the at least one evaluation requirement information;
determining candidate historical evaluation requirement information corresponding to the at least one evaluation requirement information from the authenticated historical evaluation requirement information in the preset authentication database based on the search keyword corresponding to the at least one evaluation requirement information;
determining target evaluation type information corresponding to the at least one evaluation requirement information based on the first mapping relation;
determining candidate historical associated information of candidate historical evaluation requirement information corresponding to the at least one evaluation requirement information based on the second mapping relation, wherein the candidate historical associated information comprises candidate historical evaluation type information;
and when the target evaluation type information corresponding to the at least one evaluation requirement information is matched with the corresponding candidate historical evaluation type information, taking the candidate historical evaluation requirement information corresponding to the at least one evaluation requirement information and the corresponding candidate historical associated information as a matching result corresponding to the at least one evaluation requirement information.
7. The method of claim 5, further comprising:
when any evaluation requirement information does not match with corresponding candidate historical evaluation requirement information, a step of determining target evaluation type information corresponding to the at least one evaluation requirement information based on the first mapping relation is executed;
when any evaluation requirement information is not matched with the corresponding candidate historical evaluation requirement information, taking the evaluation requirement information of which any evaluation requirement information and target evaluation type information are not matched with the corresponding candidate historical evaluation type information as unmatched evaluation requirement information;
storing the unmatched evaluation requirement information into the preset authentication database so that a preset interface user can determine target evaluation associated information corresponding to target evaluation, wherein the target evaluation represents evaluation of the preset interface user on a target object by using the unmatched evaluation requirement information;
and updating the preset authentication database according to the target evaluation associated information.
8. The method according to claim 7, wherein the determining the authentication result corresponding to the data to be authenticated based on the matching result corresponding to the at least one evaluation requirement information and the at least one evaluation requirement information includes:
determining a first quantity of the at least one evaluation requirement information;
determining a second quantity of the unmatched evaluation requirement information;
and determining an authentication result corresponding to the data to be authenticated based on the first quantity and the second quantity.
9. An authentication data processing apparatus, characterized in that the apparatus comprises:
the data acquisition module is used for acquiring data to be authenticated;
the information determining module is used for determining at least one piece of evaluation requirement information corresponding to the data to be authenticated;
the information matching module is used for matching the at least one piece of evaluation requirement information with the authenticated historical evaluation requirement information in a preset authentication database to obtain a matching result corresponding to the at least one piece of evaluation requirement information;
and the authentication result determining module is used for determining an authentication result corresponding to the data to be authenticated based on the at least one evaluation requirement information and a matching result corresponding to the at least one evaluation requirement information.
10. A computer-readable storage medium, in which at least one instruction or at least one program is stored, the at least one instruction or the at least one program being loaded and executed by a processor to implement the authentication data processing method according to any one of claims 1 to 8.
CN202011435712.8A 2020-12-10 2020-12-10 Authentication data processing method, device and storage medium Pending CN112559334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011435712.8A CN112559334A (en) 2020-12-10 2020-12-10 Authentication data processing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011435712.8A CN112559334A (en) 2020-12-10 2020-12-10 Authentication data processing method, device and storage medium

Publications (1)

Publication Number Publication Date
CN112559334A true CN112559334A (en) 2021-03-26

Family

ID=75060449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011435712.8A Pending CN112559334A (en) 2020-12-10 2020-12-10 Authentication data processing method, device and storage medium

Country Status (1)

Country Link
CN (1) CN112559334A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989318A (en) * 2021-05-12 2021-06-18 北京安泰伟奥信息技术有限公司 Authentication detection method and system
CN115099611A (en) * 2022-06-22 2022-09-23 苏州浪潮智能科技有限公司 Authentication task management method, system, storage medium and equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989318A (en) * 2021-05-12 2021-06-18 北京安泰伟奥信息技术有限公司 Authentication detection method and system
CN115099611A (en) * 2022-06-22 2022-09-23 苏州浪潮智能科技有限公司 Authentication task management method, system, storage medium and equipment
CN115099611B (en) * 2022-06-22 2024-01-09 苏州浪潮智能科技有限公司 Authentication task management method, system, storage medium and equipment

Similar Documents

Publication Publication Date Title
CN109918205B (en) Edge equipment scheduling method, system, device and computer storage medium
US9639444B2 (en) Architecture for end-to-end testing of long-running, multi-stage asynchronous data processing services
CN104731595A (en) Big-data-analysis-oriented mixing computing system
US10223397B1 (en) Social graph based co-location of network users
US11327879B1 (en) Evaluation infrastructure for testing real-time content search
CN112559334A (en) Authentication data processing method, device and storage medium
EP3182351A1 (en) Generation and handling of situation definitions
CN112433941A (en) Test analysis method, device, equipment and storage medium
US11106650B2 (en) Data selection system and data selection method
CN112947919A (en) Method and device for constructing service model and processing service request
CN116827774A (en) Service analysis method, device, equipment and storage medium
CN109902196B (en) Trademark category recommendation method and device, computer equipment and storage medium
CN112182460B (en) Resource pushing method and device, storage medium and electronic device
CN111488386A (en) Data query method and device
CN111339170A (en) Data processing method and device, computer equipment and storage medium
WO2019094462A1 (en) Interactive guidance system for selecting thermodynamics methods in process simulations
CN117009430A (en) Data management method, device, storage medium and electronic equipment
CN110471708A (en) The method and device that configuration item based on Reusable Module obtains
CN113095788B (en) Problem distribution method, device, electronic equipment and storage medium
CN114139039B (en) Service stability determination method, device, equipment and storage medium
CN117726262A (en) Logistics track generation method, device and storage medium
CN114663073A (en) Abnormal node discovery method and related equipment
CN117493202A (en) Financial system-based test data construction method, device, equipment and medium
CN116467195A (en) Test task distribution method and device, electronic equipment, storage medium and product
CN113434432A (en) Performance test method, device, equipment and medium for recommendation platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40040465

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination