CN113672709A - Data processing method, device and equipment - Google Patents

Data processing method, device and equipment Download PDF

Info

Publication number
CN113672709A
CN113672709A CN202110886944.3A CN202110886944A CN113672709A CN 113672709 A CN113672709 A CN 113672709A CN 202110886944 A CN202110886944 A CN 202110886944A CN 113672709 A CN113672709 A CN 113672709A
Authority
CN
China
Prior art keywords
information
verified
data processing
target service
processing request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110886944.3A
Other languages
Chinese (zh)
Other versions
CN113672709B (en
Inventor
应缜哲
王维强
王昊天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110886944.3A priority Critical patent/CN113672709B/en
Publication of CN113672709A publication Critical patent/CN113672709A/en
Application granted granted Critical
Publication of CN113672709B publication Critical patent/CN113672709B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/332Query formulation
    • G06F16/3329Natural language query formulation or dialogue systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • G06F40/211Syntactic parsing, e.g. based on context-free grammar [CFG] or unification grammars
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • G06F40/35Discourse or dialogue representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/044Recurrent networks, e.g. Hopfield networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computer Security & Cryptography (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)

Abstract

An embodiment of the specification provides a data processing method, a device and equipment, and the method comprises the following steps: receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying information to be verified, which is input by a user and aims at the target service; sending first prompt information to the terminal equipment so that a user can input information to be verified corresponding to the target service based on the first prompt information; receiving to-be-verified information sent by the terminal equipment, verifying the to-be-verified information by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to the sample verification information.

Description

Data processing method, device and equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data processing method, apparatus, and device.
Background
When the man-machine conversation device works in a telephone customer service scene, the situation that the user needs to verify the identity of the user by inputting some information is often encountered, for example, the user needs to verify the identity of the user by inputting a mobile phone number or identity information and the like.
However, in the process of verifying the user identity information in the above manner, once there is an error in the information input by the user, for example, in the process of verifying the identity information, the user inputs a part of information in the identity information in an error manner, or inputs some information in an omission manner, and the user is often required to repeatedly re-input the information to be verified, so that the efficiency of verifying the information to be verified is reduced.
Disclosure of Invention
An embodiment of the present specification aims to provide a data processing method, device and apparatus, so as to provide a technical scheme capable of effectively improving verification efficiency.
In order to solve the technical problem, the embodiment of the present specification is implemented as follows:
in a first aspect, an embodiment of the present specification provides a data processing method, including: receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying to-be-verified information aiming at the target service, which is input by a user. And sending first prompt information to the terminal equipment so that the user inputs information to be verified corresponding to the target service based on the first prompt information. Receiving to-be-verified information sent by the terminal equipment, verifying the to-be-verified information by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to the sample verification information.
In a second aspect, an embodiment of the present specification provides a data processing method, which is applied to a block chain system, and includes: receiving a first data processing request aiming at a target service, which is sent by a terminal device, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying information to be verified aiming at the target service, which is input by a user. And generating first prompt information based on a first intelligent contract which is deployed in a block chain system in advance, and sending the first prompt information to the terminal equipment so that a user inputs information to be verified corresponding to the target service based on the first prompt information. The method comprises the steps of obtaining information to be verified from terminal equipment based on a first intelligent contract, obtaining a pre-trained preset verification model based on the first intelligent contract, verifying the information to be verified based on the pre-trained preset verification model, and executing a target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to sample verification information.
In a third aspect, an embodiment of the present specification provides a data processing apparatus, including: the first receiving module receives a first data processing request for a target service, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying to-be-verified information input by a user for the target service. And the sending module is used for sending the first prompt information to the terminal equipment so that the user inputs the information to be verified corresponding to the target service based on the first prompt information. The first processing module receives information to be verified sent by the terminal equipment, verifies the information to be verified by adopting a pre-trained preset verification model, and executes a target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to the sample verification information.
In a fourth aspect, an embodiment of the present specification provides a data processing apparatus, which is applied to a blockchain system, and includes: the third receiving module receives a first data processing request aiming at a target service, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying information to be verified aiming at the target service, which is input by a user. And the second processing module is used for generating first prompt information based on a first intelligent contract which is deployed in the block chain system in advance, and sending the first prompt information to the terminal equipment so that the user inputs information to be verified corresponding to the target service based on the first prompt information. And the third processing module is used for acquiring information to be verified from the terminal equipment based on the first intelligent contract, acquiring a pre-trained preset verification model based on the first intelligent contract, verifying the information to be verified based on the pre-trained preset verification model, and executing the target service based on the verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on the information content weight corresponding to the sample verification information.
In a fifth aspect, an embodiment of the present specification provides a data processing apparatus, including: a processor. And a memory arranged to store computer executable instructions that, when executed, cause the processor to: receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying to-be-verified information aiming at the target service, which is input by a user. And sending first prompt information to the terminal equipment so that the user inputs information to be verified corresponding to the target service based on the first prompt information. Receiving to-be-verified information sent by the terminal equipment, verifying the to-be-verified information by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to the sample verification information.
In a sixth aspect, an embodiment of the present specification provides a data processing apparatus, including: a processor. And a memory arranged to store computer executable instructions that, when executed, cause the processor to: receiving a first data processing request aiming at a target service, which is sent by a terminal device, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying information to be verified aiming at the target service, which is input by a user. And generating first prompt information based on a first intelligent contract which is deployed in a block chain system in advance, and sending the first prompt information to the terminal equipment so that a user inputs information to be verified corresponding to the target service based on the first prompt information. The method comprises the steps of obtaining information to be verified from terminal equipment based on a first intelligent contract, obtaining a pre-trained preset verification model based on the first intelligent contract, verifying the information to be verified based on the pre-trained preset verification model, and executing a target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to sample verification information.
In a seventh aspect, an embodiment of the present specification provides a storage medium for storing computer-executable instructions, where the computer-executable instructions, when executed, implement the following processes: receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying to-be-verified information aiming at the target service, which is input by a user. And sending first prompt information to the terminal equipment so that the user inputs information to be verified corresponding to the target service based on the first prompt information. Receiving to-be-verified information sent by the terminal equipment, verifying the to-be-verified information by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to the sample verification information.
In an eighth aspect, embodiments of the present specification provide a storage medium for storing computer-executable instructions, which when executed implement the following processes: receiving a first data processing request aiming at a target service, which is sent by a terminal device, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying information to be verified aiming at the target service, which is input by a user. And generating first prompt information based on a first intelligent contract which is deployed in a block chain system in advance, and sending the first prompt information to the terminal equipment so that a user inputs information to be verified corresponding to the target service based on the first prompt information. The method comprises the steps of obtaining information to be verified from terminal equipment based on a first intelligent contract, obtaining a pre-trained preset verification model based on the first intelligent contract, verifying the information to be verified based on the pre-trained preset verification model, and executing a target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to sample verification information.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1A is a first schematic flowchart of a data processing method provided in an embodiment of the present disclosure;
fig. 1B is a first schematic diagram of a data processing process provided in an embodiment of the present disclosure;
FIG. 2 is a second schematic diagram of a data processing process provided by an embodiment of the present disclosure;
FIG. 3 is a third schematic diagram of a data processing process provided in an embodiment of the present disclosure;
fig. 4 is a fourth schematic diagram of a data processing process provided in an embodiment of the present specification;
fig. 5 is a fifth schematic diagram of a data processing process provided in an embodiment of the present specification;
FIG. 6 is a schematic diagram of a replacement service identifier provided by an embodiment of the present disclosure;
fig. 7A is a second flowchart of a data processing method provided in an embodiment of the present disclosure;
fig. 7B is a sixth schematic diagram of a data processing process provided in the embodiments of the present disclosure;
fig. 8 is a seventh schematic diagram of a data processing process provided in an embodiment of the present specification;
fig. 9 is a schematic diagram illustrating a first module composition of a data processing apparatus according to an embodiment of the present disclosure;
fig. 10 is a schematic diagram illustrating a second module composition of a data processing apparatus according to an embodiment of the present disclosure;
fig. 11 is a schematic structural diagram of a data processing apparatus provided in an embodiment of this specification.
Detailed Description
The embodiment of the specification provides a data processing method, a data processing device and data processing equipment.
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1A and 1B, an execution subject of the method may be a server, where the server may be an independent server or a server cluster composed of a plurality of servers, and the server may verify information to be verified received from a terminal device by using a pre-trained preset verification model, and execute a target service based on a verification result. The method may specifically comprise the steps of:
in step S102, a first data processing request for a target service is received, where the first data processing request carries address information of a terminal device, and the first data processing request is a processing request for verifying information to be verified for the target service, which is input by a user.
As an example, the target service may be a human-computer interaction service, such as a telephone customer service. Specifically, the embodiments of the present specification do not specifically limit the specific content of the target service, such as billing query, password modification, identity authentication, and the like related to the telephone customer service.
In some optional implementation manners, taking the target service as a bill query service as an example, generally, the user needs to verify the identity information of the user in the process of performing the bill query, and the bill query can be executed only after the identity information is verified. Some application programs can be installed in the terminal equipment of the user, and the application programs can have corresponding operation keys for bill inquiry. When a user needs to query the consumption bills within the latest months, the user can click the operation key, so that the terminal device can receive a processing request triggered by the user to query the consumption bills within the latest months, then the terminal device can generate a first data processing request for the target service based on the acquired processing request and the address information of the terminal device, and send the generated first data processing request for the target service to the execution main body, so that the execution main body can receive the first data processing request for the target service from the user.
In step S104, first prompt information is sent to the terminal device, so that the user inputs information to be verified corresponding to the target service based on the first prompt information.
As an example, the first prompt information may prompt the user to speak the information to be verified in a voice manner, or the first prompt information may also prompt the user to input the information to be verified in a key pressing manner, and a specific prompt manner of the first prompt information is not specifically limited in this embodiment of the specification.
In some optional implementation manners, for example, the target service is to verify user identity information, and the first prompt information is to prompt a user to input information to be verified in a key pressing manner, after receiving a first data processing request for the target service sent by the terminal device, the execution main body may send the first prompt information to the terminal device based on address information of the terminal device carried in the first data processing request, and prompt the user to input identity information in a key pressing manner. Thus, after receiving the first prompt message, the user can input information to be verified (such as user identity document information) in the key input area displayed by the terminal device, and the terminal device can receive the information to be verified.
In other optional implementation manners, for example, the target service is used to verify user identity information, in order to improve verification efficiency, a voice input manner may be used to verify information to be verified, which is input by a user, so that, after receiving a first data processing request, which is sent by the terminal device and is directed to the target service, the execution main body may send first prompt information to the terminal device based on address information of the terminal device carried in the first data processing request, and prompt the user to input identity information in a voice manner. In this way, the terminal device may start a voice receiving component such as a microphone in the terminal device to receive the to-be-verified information input by the user in a voice manner when receiving the first prompt information.
In step S106, the to-be-verified information sent by the terminal device is received, the to-be-verified information is verified by using a pre-trained preset verification model, and the target service is executed based on the verification result, where the pre-trained preset verification model is obtained by performing supervised training based on the information content weight corresponding to the sample verification information.
In some optional implementation manners, after receiving to-be-verified information sent by the terminal device, the execution main body may obtain account information of a user based on the target service information, search target information corresponding to the to-be-verified information from preset data based on the account information, and then input the target information and the received to-be-verified information into the pre-trained preset verification model to verify the to-be-verified information.
It should be noted that the pre-trained preset verification model may be obtained by performing supervised training on to-be-verified information corresponding to different target services and based on information content weights corresponding to preset to-be-verified information.
As an example, if the information to be verified corresponding to the target service is a communication number, a smaller weight may be set in advance based on the information content corresponding to the first four digits of the communication number, and a larger weight may be set based on the information content corresponding to the last six digits of the communication number. In this way, after the execution subject inputs the target information (e.g., the communication number of the user found from the preset database based on the account information) and the to-be-verified information (the communication number input by the user) into the pre-trained preset verification model, the preset verification model may determine a matching degree between the target information and the to-be-verified information according to the to-be-verified information input by the user and a preset weight corresponding to the information content, and may determine that the target information and the to-be-verified information pass the verification if the matching degree is greater than a preset threshold. In this way, if the user inputs only a certain digit in the first four digits of the communication number by mistake or neglects to input any digit in the last six digits of the communication number in the process of inputting the communication number in the process of verifying the communication number by the key mode or the voice input mode, the authentication of the user cannot be influenced, and at the moment, the user can pass the verification without requiring to input the information to be verified again. Therefore, on the premise of ensuring the safety of the user account, the verification efficiency of verifying the information to be verified is effectively improved.
As can be seen from the technical solutions provided in the embodiments of the present specification, a first data processing request for a target service is received, where the first data processing request carries address information of a terminal device, the first data processing request is a processing request for verifying information to be verified for the target service, which is input by a user, and first prompt information is sent to the terminal device, so that the user inputs the information to be verified corresponding to the target service based on the first prompt information, then the information to be verified, which is sent by the terminal device, is received, the information to be verified is verified by using a pre-trained preset verification model, and the target service is executed based on a verification result, and the pre-trained preset verification model is obtained by performing supervised training based on information content weights corresponding to sample verification information. Therefore, the method for verifying the information to be verified sent by the terminal equipment by adopting the pre-trained preset verification model effectively improves the verification efficiency of the information to be verified.
Further, the first data processing request may carry account information of the user, as shown in fig. 2, the method may further include the following processing procedure of step S108:
in step S108, target information corresponding to the user account information is determined based on the user account information.
In some optional implementations, the executing entity may determine, based on the received first data processing request for the target service, an information category of information to be verified corresponding to the target service; and then, acquiring target information corresponding to the user information from a preset database corresponding to the information type based on the user account information carried in the first data processing request. Specifically, for example, when the target service is used to verify identity information of a user, the execution main body may determine that an information category of information to be verified corresponding to the target service is an identity information category after receiving a first data processing request for verifying the identity information of the user, and then, the execution main body may obtain, based on user account information carried in the first data processing request, target identity information corresponding to the user information from a preset database corresponding to the identity information category.
As shown in fig. 2, the processing method of step S106 may be various, and an alternative processing method is provided below, which may specifically refer to the following specific processing procedure from step S1062 to step S1064.
In step S1062, information to be verified sent by the terminal device is received, and the information to be verified and the target information are input to a pre-trained preset verification model.
As an example, the pre-trained preset verification model may be a bert model, and the bert model is trained by using bleu as an evaluation index. In an optional implementation manner, after the executing body obtains the target information corresponding to the user account information through the processing, the executing body may input the information to be verified and the target information into the pre-trained bert model.
Wherein, bert is an automatic supervision model, which can learn a good feature representation by itself, and a Transformer network is adopted. BERT uses a bi-directional Transformer, concatenating downstream task features across left-to-right and right-to-left LSTMs. Each character is divided by Token entries, Segment entries and Position entries, wherein the Token entries are used for text classification tasks and each word and special symbols are converted into words to be embedded; the Segment entries are used for segmenting and marking sentences; the Position Embeddings are used for encoding the Position information of each word and sensing the Position relation between each word. The Bert can be used for not only a classification task but also a question and answer task.
Bleu is commonly used in a machine translation task in natural language processing to evaluate an index of a difference between a model-generated sentence (candidate) and an actual sentence (reference). It ranges between 0.0 and 1.0, bleu is 1.0 if the two sentences match (perfect match), whereas bleu has a value of 0 if the two sentences do not match (perfect mismatch).
In some optional implementation manners, a preset number of sample verification information may be obtained in a manual marking manner, or a preset number of sample verification information may also be obtained by a bleu model obtained through pre-training, where the sample verification information may include a positive sample and a negative sample, the positive sample may be a sample in which the matching degree of two sample verification information input as the bleu model is greater than a preset value, and the negative sample may be a sample in which the matching degree of two sample verification information input as the bleu model is less than a preset threshold. Specifically, the method for obtaining the sample verification information may be that a preset number of sample verification information are input into the blue model obtained through the pre-training, based on the values output by the bleu model, the sample with the output value larger than the preset threshold is used as a positive sample of the training bert model, and the sample with the output value smaller than the preset threshold of the bleu model is used as a negative sample of the training bert model.
The process of training the preset bert model may be that a first preset number of sample verification information and corresponding categories are input to an initial architecture of the preset bert model as training sample data information, so as to train the initial architecture of the bert model to obtain initial model parameter information corresponding to the initial architecture; updating the parameter information of the initial architecture of the bert model by adopting the initial model parameter information to obtain a first architecture of the bert model; inputting a second preset number of sample verification information serving as verification sample data information into a first framework of the bert model, and extracting the sample data information through the first framework of the bert model to obtain a sample data information vector; inputting the sample data information vector into a preset loss function, generating a loss value according to a preset category through the preset loss function, training and adjusting the parameter information of the first framework according to the loss value, and taking the bert model obtained after adjustment as a trained preset verification model. The initial architecture may include a plurality of network layers, and each network layer may correspond to a plurality of original parameters. The initial framework may be constructed based on a vector corresponding to the predetermined category, and the original parameter of the initial framework may be parameter information based on a bert model constructed based on a vector corresponding to the predetermined category. The first framework may be obtained by updating the original parameters corresponding to the initial framework by using the obtained initial model parameter information.
In step S1064, a verification result is output through a pre-trained preset verification model, and a target service is executed based on the verification result.
In some optional implementations, as shown in fig. 3, the processing method of step S1064 may be various, and an optional processing method is provided below, which may specifically refer to the specific processing procedures of step S10642 to step S10644 described below.
In step S10642, a pre-trained preset verification model is used to match the information to be verified and the target information, and a matching degree between the information to be verified and the target information is determined.
In step S10644, in the case where the matching degree is greater than the preset threshold, it is determined that the verification is passed.
In some optional implementation manners, for example, when the information to be verified is a mobile phone number, the execution main body may input, as inputs, the mobile phone number to be verified and a target mobile phone number corresponding to user account information determined based on the user account information, and input the input into the pre-trained bert model, and then the bert model may match the mobile phone number to be verified and the target mobile phone number, determine a matching degree between the mobile phone number to be verified and the target mobile phone number, and determine that the verification is passed when it is determined that the matching degree is greater than a preset threshold value.
Further, the first prompt message may prompt the user to input at least one or more of identity information and a communication number by a voice input method.
Further, as shown in fig. 4, the method may further include the following specific processing procedures from step S110 to step S116.
In step S110, a second data processing request for the target service is received, where the second data processing request carries address information of the terminal device and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting a target service based on a transaction prompt.
As an example, the transaction information may be information that requires a target service to be selected based on a transaction prompt, for example, in some scenarios, the transaction information may be: and inquiring the bill by pressing 1, inquiring the transfer service by pressing 2, inquiring the payment by the payment service by pressing 3, and inquiring the transfer service by pressing 4. "
In some optional implementations, when a user needs to perform a certain transaction through a certain application program in a terminal device, an operation key corresponding to the transaction may be triggered, so that the terminal device may receive the transaction request, then generate a second data processing request for a target service based on the transaction information and address information of the terminal device, and send the second data processing request to the execution main body, so that the execution main body may receive the second data processing request for the target service.
In step S112, based on the transaction information, a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services are determined.
As an example, taking the transaction information as the transaction information in the scenario in step S110, the service may be: bill inquiry service, transfer service, payment service, reporting service, etc. The first service identification information may be determined by a designated key identification. For example, the first service identification information corresponding to the plurality of services may be key information corresponding to the services, such as key 1, key 2, key 3, key 4, and the like. Specifically, for example, the first service identification information corresponding to the bill inquiry service may be a key 1, the first service identification information corresponding to the transfer service may be a key 2, the key information corresponding to the payment service may be a key 3, and the first service identification corresponding to the report service may be a key 4.
In step S114, a plurality of first service identification information corresponding to a plurality of services are replaced according to a preset rule, so as to obtain target service identification information corresponding to the service.
In some optional implementation manners, a plurality of first service identification information corresponding to the plurality of services may be replaced according to a preset random manner, so as to obtain target service identification information corresponding to the service.
As an example, taking the transaction information of the scenario in step S112 as an example, the executing entity determines, through the processing in step S112, that the first service identification information corresponding to the bill inquiry service may be the key 1, the first service identification information corresponding to the transfer service may be a key 2, the key information corresponding to the payment service may be a key 3, the first service identification corresponding to the reporting service may be a key 4, the first service identification information corresponding to the above bill inquiry service can be replaced from the original key 1 to the key 3 in a random manner, the first service identification information corresponding to the above-mentioned transfer service is replaced from the original key 2 to the key 4, the first service identification information corresponding to the payment service is replaced by a key 1 from the original key 3, the first service identifier corresponding to the report service is changed from the original key 4 to the key 2. Alternatively, the first service identification information corresponding to the bill inquiry service may be replaced with the key 13 from the original key 1, the first service identification information corresponding to the transfer service may be replaced with the key 24 from the original key 2, the first service identification information corresponding to the payment service may be replaced with the key 31 from the original key 3, and the first service identification corresponding to the report service may be replaced with the key 42 from the original key 4, or the like, in a random manner. In an embodiment of the present specification, a specific replacement method for replacing the plurality of first service identification information corresponding to the plurality of services in a preset random manner is not specifically limited.
In step S116, the user is prompted to conduct a transaction based on the target service identification information corresponding to the service.
In this way, through the processing procedures of the steps S110 to S116, it is effectively avoided that a hacker maliciously guides a user to implement fraud according to their expectations during a transaction process of the user by acquiring the first service identification information corresponding to each service in advance, by making a video in advance, or modifying a word in advance, and the like, and further the property security of the user is ensured.
Further, as shown in fig. 5, the processing procedure of step S114 may be varied, and an alternative processing method is provided below, which may specifically refer to the specific processing procedure of step S1142 to step S1148.
In step S1142, an event identifier corresponding to the transaction information is determined based on the transaction information.
As an example, the event identifier may be transaction ID number information corresponding to the transaction information.
In step S1144, a hash value corresponding to the event identifier is obtained by performing a hash calculation on the event identifier.
In some optional implementation manners, the execution main body may perform hash calculation on the transaction ID number information to obtain a hash value corresponding to the transaction ID number information.
In step S1146, mod is applied to the hash value corresponding to the event identifier to obtain a corresponding remainder.
In step S1148, the number value of the remainder is used as the rotation number, the service or the plurality of first service identification information is fixed, and rotation processing is performed on the service or the plurality of first service identification information according to the preset sequence and the rotation number, so as to obtain target service identification information corresponding to the service.
In some optional implementation manners, as shown in fig. 6, the first service identification information corresponding to the bill inquiry service may be a key 1, the first service identification information corresponding to the transfer service may be a key 2, the key information corresponding to the payment service may be a key 3, the first service identification corresponding to the report service may be a key 4, the remainder is 2, and the preset sequence is from top to bottom, for example, after the first service identification information corresponding to the plurality of services is rotated twice through the fixed service according to the sequence from top to bottom, the obtained target service identification corresponding to the service may be: the first service identification information corresponding to the bill inquiry service may be a key 3, the first service identification information corresponding to the transfer service may be a key 4, the key information corresponding to the payment service may be a key 1, and the first service identification corresponding to the report service may be a key 2.
As can be seen from the technical solutions provided in the embodiments of the present specification, a first data processing request for a target service is received, where the first data processing request carries address information of a terminal device, the first data processing request is a processing request for verifying information to be verified for the target service, which is input by a user, and first prompt information is sent to the terminal device, so that the user inputs the information to be verified corresponding to the target service based on the first prompt information, then the information to be verified, which is sent by the terminal device, is received, the information to be verified is verified by using a pre-trained preset verification model, and the target service is executed based on a verification result, and the pre-trained preset verification model is obtained by performing supervised training based on information content weights corresponding to sample verification information. Therefore, the method for verifying the information to be verified sent by the terminal equipment by adopting the pre-trained preset verification model effectively improves the verification efficiency of the information to be verified.
On the basis of the same technical concept, the data processing method provided by the embodiment of the present specification further provides a data processing method, fig. 7A is a second schematic flowchart of the data processing method provided in the embodiment of the present disclosure, and fig. 7B is a sixth schematic diagram of the data processing process provided in the embodiment of the present disclosure, where an execution subject of the data processing method may be a server, wherein the server may be an independent server or a server cluster composed of a plurality of servers, and, the server may obtain information to be authenticated from the terminal device based on a first intelligent contract pre-deployed in the blockchain system, and acquiring a pre-trained preset verification model based on the first intelligent contract, verifying the information to be verified based on the pre-trained preset verification model, and executing the target service based on the verification result. The method may specifically comprise the steps of:
in step S202, a first data processing request for a target service sent by a terminal device is received, where the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying to-be-verified information for the target service input by a user.
The specific processing procedure of step S202 can be referred to the processing procedure of step S102 described above.
In step S204, first prompt information is generated based on a first intelligent contract pre-deployed in the blockchain system, and the first prompt information is sent to the terminal device, so that the user inputs information to be verified corresponding to the target service based on the first prompt information.
In implementation, a rule for generating first prompt information for a target service may be set in the first intelligent contract, after the blockchain system receives the first data processing request, the blockchain system may invoke the first intelligent contract to generate the first prompt information through the rule set in the first intelligent contract, and at the same time, the generated first prompt information may be provided to the terminal device based on the first intelligent contract, and the other specific processing procedure of the step S204 may refer to the processing procedure of the step S104.
In step S206, information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, the information to be verified is verified based on the pre-trained preset verification model, and the target service is executed based on the verification result, and the pre-trained preset verification model is obtained by performing supervised training based on the information content weight corresponding to the sample verification information.
In implementation, the block chain system may call the first intelligent contract, obtain information to be verified from a terminal device based on the first intelligent contract, and simultaneously, obtain a pre-trained preset verification model based on the first intelligent contract, trigger the pre-trained preset verification model to verify the information to be verified, and execute a target service based on a verification result, where other specific processing procedures in the step S206 may refer to the processing procedure in the step S106.
It should be noted that, in practical applications, a pre-trained predetermined verification model may be stored in the blockchain system, or may be stored in other storage devices, and for a case where the verification model is stored in other storage devices, considering that the verification model may need to be updated periodically or aperiodically, since the blockchain system has a characteristic of being not tampered with, if the verification model is stored in the blockchain system, the verification model in the blockchain system needs to be frequently uploaded, deleted, and authenticated by the uploader, so as to increase the processing pressure of the blockchain system, and to increase the processing efficiency and reduce the processing pressure of the blockchain system, the verification model may be trained in the storage device in advance, and the trained verification model may be stored in a designated storage address of the storage device, and the storage address may be uploaded to the blockchain system, since the storage address can be fixed and stored in the blockchain system, the tamper resistance of the data in the blockchain system is ensured, and meanwhile, the verification model can be updated regularly or irregularly in the storage device, so that the latest verification model obtained by the storage address in the blockchain system is ensured.
As can be seen from the above technical solutions provided in the embodiments of the present specification, a first data processing request for a target service is received and sent by a terminal device, where the first data processing request carries address information of the terminal device, the first data processing request is a processing request for verifying information to be verified for the target service input by a user, then, first prompt information is generated based on a first intelligent contract pre-deployed in a block chain system, and the first prompt information is sent to the terminal device, so that the user inputs information to be verified corresponding to the target service based on the first prompt information, then, the information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, and the information to be verified is verified based on the pre-trained preset verification model, and executing the target service based on the verification result. Therefore, the method for verifying the information to be verified sent by the terminal equipment by adopting the pre-trained preset verification model effectively improves the verification efficiency of the information to be verified.
Further, the first data processing request carries account information of the user, and the method further includes the following processing procedure of step a 2.
In step A2, target information corresponding to user account information is determined based on a first smart contract.
In an implementation, after the blockchain system receives the first data processing request, the first intelligent contract may be invoked, and target information corresponding to the user account information is determined based on the account information of the user carried in the first data processing request, and the specific processing procedure of the step a2 may refer to the specific processing procedure of the step S108.
The specific processing procedure of step S206 may be various, and an alternative processing method is provided below, which may be specifically referred to as the following specific processing procedure of step C2:
in step C2, the following processing is performed based on the first smart contract:
and obtaining the information to be verified from the terminal equipment.
And inputting the information to be verified and the target information into a pre-trained preset verification model to obtain a corresponding verification result.
In implementation, the blockchain system may further invoke the first intelligent contract, obtain information to be verified from the terminal device based on the first intelligent contract, and input the information to be verified and the target information into a pre-trained preset verification model to obtain a corresponding verification result, where the other specific processing procedures of the step C2 may refer to the specific processing procedures of the steps S1062 to S1064.
Further, the specific processing procedure of the step C2 can be varied, and an alternative processing method is provided below, which can be specifically referred to the specific processing procedure of the following steps C22-C24.
In step C22, the information to be verified and the target information are matched by using a pre-trained preset verification model based on the first intelligent contract, and the matching degree between the information to be verified and the target information is determined.
In an implementation, the blockchain system may further invoke the first intelligent contract, match the information to be verified and the target information by using a pre-trained preset verification model based on the first intelligent contract, and determine a matching degree between the information to be verified and the target information, where the other specific processing procedure of the step C22 may refer to the specific processing procedure of the step S10642.
In step C24, in the case where the matching degree is greater than the preset threshold, it is determined that the verification is passed.
In an implementation, after determining the matching degree between the information to be verified and the target information through the processing of the step C22, the blockchain system may call the first intelligent contract, and determine that the verification is passed based on the first intelligent contract when the matching degree is greater than a preset threshold, where other specific processing procedures of the step C24 may refer to the specific processing procedures of the step S10644.
Further, the pre-trained preset verification model is a bert model, and the bert model is obtained by training by using bleu as an evaluation index.
Further, the first prompt message prompts the user to input at least one or more of identity information and a communication number in a voice input mode.
Further, as shown in fig. 8, the method may further include the following processing procedure from step S208 to step S214, and specifically, refer to the following specific processing procedure from step S208 to step S214.
In step S208, a second data processing request for the target service sent by the terminal device is received, where the second data processing request carries address information of the terminal device and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting the target service based on the transaction prompt.
The specific processing procedure of step S208 can be referred to the specific processing procedure of step S110.
In step S210, a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services are determined based on the second smart contract.
In an implementation, the second intelligent contract is pre-deployed in the blockchain system, the second intelligent contract may be provided with a rule for determining a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services, after the blockchain system receives the second data processing request, the blockchain system may invoke the second intelligent contract, and determine a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services based on the rule set in the second intelligent contract, and the other specific processing procedure in the step S210 may refer to the specific processing procedure in the step S112.
In step S212, a plurality of first service identification information corresponding to a plurality of services are replaced based on a preset rule pre-deployed in the second intelligent contract, so as to obtain target service identification information corresponding to the services.
In an implementation, after the blockchain system receives the second data processing request, the blockchain system may invoke the second intelligent contract, and replace, based on a preset rule pre-deployed in the second intelligent contract, a plurality of pieces of first service identification information corresponding to a plurality of services to obtain target service identification information corresponding to the services, where the other specific processing procedure in the step S212 may refer to the specific processing procedure in the step S114.
In step S214, the user is prompted to conduct a transaction based on the target service identification information corresponding to the service.
In implementation, a rule for prompting the user to perform a transaction may be set in the second intelligent contract, after the blockchain system obtains the target service identification information corresponding to the service through the processing in step S212, the rule set in the second intelligent contract may be invoked, and the user is prompted to perform a transaction based on the target service identification information corresponding to the service, and the specific processing procedure in step S214 may refer to the specific processing procedure in step S116.
Further, the specific processing procedure of step S212 may be varied, and an alternative processing method is provided below, which may specifically refer to the specific processing procedure of step E2-step E8 below.
In step E2, an event identifier corresponding to the transaction information is determined based on the transaction information.
In an implementation, the blockchain system may invoke the second intelligent contract, determine an event identifier corresponding to the transaction information based on a rule preset in the second intelligent contract, and refer to the specific processing procedure in step S1142 for the other specific processing procedure in step E2.
In step E4, a hash value corresponding to the event identifier is obtained by performing a hash calculation on the event identifier.
In implementation, the block chain system may call the second intelligent contract, and perform hash calculation on the event identifier based on a rule preset in the second intelligent contract to obtain a hash value corresponding to the event identifier, where the other specific processing procedure in the step E4 may refer to the specific processing procedure in the step S1144.
In step E6, mod is taken to the hash value corresponding to the event id to obtain the corresponding remainder.
In an implementation, the block chain system may call the second intelligent contract, and obtain a corresponding remainder by taking mod from a hash value corresponding to the event identifier based on a rule preset in the second intelligent contract, where the other specific processing procedure of the step E6 may refer to the specific processing procedure of the step S1146.
In step E8, the numerical value of the remainder is used as the rotation number, the service or the plurality of first service identification information is fixed, and rotation processing is performed on the service or the plurality of first service identification information according to the preset sequence and the rotation number, so as to obtain the first service identification information corresponding to the service.
In an implementation, the block chain system may call the second intelligent contract, and based on a rule preset in the second intelligent contract, use a numerical value of a remainder as a rotation number, fix the service or the plurality of pieces of first service identification information, and perform rotation processing on the service or the plurality of pieces of first service identification information according to a preset sequence and the rotation number to obtain first service identification information corresponding to the service, where other specific processing procedures of the step E8 may refer to the specific processing procedure of the step S1148.
Further, the first service identification information is determined by a designated key identification.
As can be seen from the above technical solutions provided in the embodiments of the present specification, a first data processing request for a target service is received and sent by a terminal device, where the first data processing request carries address information of the terminal device, the first data processing request is a processing request for verifying information to be verified for the target service input by a user, then, first prompt information is generated based on a first intelligent contract pre-deployed in a block chain system, and the first prompt information is sent to the terminal device, so that the user inputs information to be verified corresponding to the target service based on the first prompt information, then, the information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, and the information to be verified is verified based on the pre-trained preset verification model, and executing the target service based on the verification result. Therefore, the method for verifying the information to be verified sent by the terminal equipment by adopting the pre-trained preset verification model effectively improves the verification efficiency of the information to be verified.
On the basis of the same technical concept, an embodiment of the present specification further provides a data processing apparatus, and fig. 9 is a schematic diagram illustrating a first module of the data processing apparatus provided in the embodiment of the present specification, where the data processing apparatus is configured to execute the data processing method described in fig. 1 to fig. 6, and as shown in fig. 9, the apparatus includes:
a first receiving module 901, configured to receive a first data processing request for a target service, where the first data processing request carries address information of a terminal device, and the first data processing request is a processing request for verifying to-be-verified information, input by a user, for the target service;
a sending module 902, configured to send a first prompt message to a terminal device, so that a user inputs information to be verified corresponding to a target service based on the first prompt message;
the first processing module 903 is configured to receive information to be verified sent by the terminal device, verify the information to be verified by using a pre-trained preset verification model, and execute a target service based on a verification result, where the pre-trained preset verification model is obtained by performing supervised training based on information content weights corresponding to the sample verification information.
Optionally, the first data processing request carries account information of the user, and the apparatus further includes:
the first determining module is used for determining target information corresponding to the user account information based on the user account information;
the first processing module includes:
the input unit is used for receiving the information to be verified sent by the terminal equipment and inputting the information to be verified and the target information into a pre-trained preset verification model;
and the first processing unit outputs a verification result through a pre-trained preset verification model and executes the target service based on the verification result.
Optionally, the first processing unit includes:
the processing subunit matches the information to be verified and the target information by adopting a pre-trained preset verification model, and determines the matching degree between the information to be verified and the target information;
and the determining subunit determines that the verification is passed under the condition that the matching degree is greater than a preset threshold value.
Optionally, the pre-trained preset verification model is a bert model, and the bert model is obtained by training by using bleu as an evaluation index.
Optionally, the first prompt message is a prompt to prompt the user to input at least one or more of identity information and a communication number by a voice input method.
Optionally, the apparatus further comprises:
the second receiving module is used for receiving a second data processing request aiming at the target service, wherein the second data processing request carries address information of the terminal equipment and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting the target service based on the transaction prompt;
the second determining module is used for determining a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the services based on the transaction information;
the first replacement module is used for replacing a plurality of pieces of first service identification information corresponding to a plurality of services according to a preset rule to obtain target service identification information corresponding to the services;
and the first prompting module prompts the user to carry out transaction based on the target service identification information corresponding to the service.
Optionally, a replacement module comprising:
the determining unit is used for determining an event identifier corresponding to the transaction information based on the transaction information;
the computing unit is used for performing hash computation on the event identifier to obtain a hash value corresponding to the event identifier;
the second processing unit is used for taking mod from the hash value corresponding to the event identifier to obtain a corresponding remainder;
and the third processing unit is used for taking the numerical value of the remainder as the rotation times, fixing the service or the plurality of first service identification information, and performing rotation processing on the service or the plurality of first service identification information according to the preset sequence and the rotation times to obtain target service identification information corresponding to the service.
Optionally, the first service identification information is determined by a designated key identification.
As can be seen from the technical solutions provided in the embodiments of the present specification, a first data processing request for a target service is received, where the first data processing request carries address information of a terminal device, the first data processing request is a processing request for verifying information to be verified for the target service, which is input by a user, and first prompt information is sent to the terminal device, so that the user inputs the information to be verified corresponding to the target service based on the first prompt information, then the information to be verified, which is sent by the terminal device, is received, the information to be verified is verified by using a pre-trained preset verification model, and the target service is executed based on a verification result, and the pre-trained preset verification model is obtained by performing supervised training based on information content weights corresponding to sample verification information. Therefore, the method for verifying the information to be verified sent by the terminal equipment by adopting the pre-trained preset verification model effectively improves the verification efficiency of the information to be verified.
The data processing apparatus provided in the embodiment of the present specification can implement each process in the embodiment corresponding to the data processing method, and is not described here again to avoid repetition.
It should be noted that the data processing apparatus provided in the embodiment of the present disclosure and the data processing method provided in the embodiment of the present disclosure are based on the same inventive concept, and therefore, for specific implementation of the embodiment, reference may be made to implementation of the data processing method, and repeated details are not described again.
On the basis of the same technical concept, an embodiment of the present specification further provides a data processing apparatus, and fig. 10 is a schematic diagram illustrating a module composition of the data processing apparatus provided in the embodiment of the present specification, the data processing apparatus is configured to execute the data processing method described in fig. 7A, fig. 7B, and fig. 8, the data processing apparatus is an apparatus in a block chain system, as shown in fig. 10, the apparatus includes:
a third receiving module 1001, configured to receive a first data processing request for a target service, where the first data processing request carries address information of a terminal device, and the first data processing request is a processing request for verifying information to be verified, which is input by a user and is for the target service;
the second processing module 1002 is configured to generate first prompt information based on a first intelligent contract pre-deployed in the blockchain system, and send the first prompt information to the terminal device, so that a user inputs information to be verified corresponding to a target service based on the first prompt information;
the third processing module 1003 acquires information to be verified from the terminal device based on the first intelligent contract, acquires a pre-trained preset verification model based on the first intelligent contract, verifies the information to be verified based on the pre-trained preset verification model, and executes the target service based on the verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on the information content weight corresponding to the sample verification information.
Optionally, the first data processing request carries account information of a user, and the apparatus further includes:
the third determining module is used for determining target information corresponding to the user account information based on the first intelligent contract;
the third processing module includes:
based on the first intelligent contract, performing the following:
acquiring information to be verified from terminal equipment;
and inputting the information to be verified and the target information into a pre-trained preset verification model to obtain a corresponding verification result.
Optionally, the apparatus further comprises:
the fourth receiving module is used for receiving a second data processing request aiming at the target service, which is sent by the terminal equipment, wherein the second data processing request carries address information of the terminal equipment and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting the target service based on the transaction prompt;
a fourth determining module, which determines a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services based on the second intelligent contract;
the second replacement module is used for replacing a plurality of pieces of first service identification information corresponding to a plurality of services based on a preset rule which is pre-deployed in a second intelligent contract to obtain target service identification information corresponding to the services;
and the second prompting module prompts the user to carry out transaction based on the target service identification information corresponding to the service.
As can be seen from the above technical solutions provided in the embodiments of the present specification, a first data processing request for a target service is received and sent by a terminal device, where the first data processing request carries address information of the terminal device, the first data processing request is a processing request for verifying information to be verified for the target service input by a user, then, first prompt information is generated based on a first intelligent contract pre-deployed in a block chain system, and the first prompt information is sent to the terminal device, so that the user inputs information to be verified corresponding to the target service based on the first prompt information, then, the information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, and the information to be verified is verified based on the pre-trained preset verification model, and executing the target service based on the verification result. Therefore, the method for verifying the information to be verified sent by the terminal equipment by adopting the pre-trained preset verification model effectively improves the verification efficiency of the information to be verified.
The data processing apparatus provided in the embodiment of the present specification can implement each process in the embodiment corresponding to the data processing method, and is not described here again to avoid repetition.
It should be noted that the data processing apparatus provided in the embodiment of the present disclosure and the data processing method provided in the embodiment of the present disclosure are based on the same inventive concept, and therefore, for specific implementation of the embodiment, reference may be made to implementation of the data processing method, and repeated details are not described again.
Corresponding to the data processing method provided by the foregoing embodiment, based on the same technical concept, an embodiment of the present specification further provides a data processing apparatus, as shown in fig. 11, where fig. 11 is a schematic diagram of a hardware structure of the data processing apparatus provided by the embodiment of the present specification, and the data processing apparatus is configured to execute the data processing method described in fig. 1A, fig. 1B, fig. 2 to fig. 6, or fig. 7A, fig. 7B, and fig. 8.
The data processing apparatus, which may vary considerably in configuration or performance, may include one or more processors 1101 and a memory 1102, where the memory 1102 may store one or more stored applications or data. Wherein memory 1102 may be transient or persistent. The application programs stored in memory 1102 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in a distribution facility for tasks. Still further, the processor 1101 may be configured to communicate with the memory 1102 to execute a series of computer-executable instructions in the memory 1102 on the data access device. The data access device may also include one or more power supplies 1103, one or more wired or wireless network interfaces 1104, one or more input-output interfaces 1105, one or more keyboards 1106.
In particular, in this embodiment, the data processing apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions in the distribution facility for tasks, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying information to be verified, which is input by a user and aims at the target service;
sending first prompt information to the terminal equipment so that a user can input information to be verified corresponding to the target service based on the first prompt information;
receiving to-be-verified information sent by the terminal equipment, verifying the to-be-verified information by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to the sample verification information.
Optionally, the first data processing request carries account information of the user, and the method further includes:
determining target information corresponding to the user account information based on the user account information;
receiving to-be-verified information sent by terminal equipment, verifying the to-be-verified information by adopting a pre-trained preset verification model, and executing a target service based on a verification result, wherein the method comprises the following steps:
receiving information to be verified sent by terminal equipment, and inputting the information to be verified and target information into a pre-trained preset verification model;
and outputting a verification result through a pre-trained preset verification model, and executing the target service based on the verification result.
Optionally, outputting a verification result through a pre-trained preset verification model, including:
matching the information to be verified and the target information by adopting a pre-trained preset verification model, and determining the matching degree between the information to be verified and the target information;
and determining that the verification is passed under the condition that the matching degree is greater than a preset threshold value.
Optionally, the pre-trained preset verification model is a bert model, and the bert model is obtained by training by using bleu as an evaluation index.
Optionally, the first prompt message is a prompt to prompt the user to input at least one or more of identity information and a communication number by a voice input method.
Optionally, the method further includes:
receiving a second data processing request aiming at the target service, wherein the second data processing request carries address information of the terminal equipment and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting the target service based on the transaction prompt;
determining a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services based on the transaction information;
replacing a plurality of first service identification information corresponding to a plurality of services according to a preset rule to obtain target service identification information corresponding to the services;
and prompting the user to perform a transaction based on the target service identification information corresponding to the service.
Optionally, replacing a plurality of first service identification information corresponding to a plurality of services according to a preset rule to obtain target service identification information corresponding to the service, including:
determining an event identifier corresponding to the transaction information based on the transaction information;
performing hash calculation on the event identifier to obtain a hash value corresponding to the event identifier;
taking mod from the hash value corresponding to the event identifier to obtain a corresponding remainder;
and taking the numerical value of the remainder as the rotation times, fixing the service or the plurality of first service identification information, and performing rotation processing on the service or the plurality of first service identification information according to a preset sequence and the rotation times to obtain target service identification information corresponding to the service.
Optionally, the first service identification information is determined by a designated key identification.
Alternatively, the data processing device may also be a device in a blockchain system, configured to perform the following computer-executable instructions:
receiving a first data processing request aiming at a target service, which is sent by a terminal device, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying information to be verified aiming at the target service, which is input by a user;
generating first prompt information based on a first intelligent contract which is pre-deployed in a block chain system, and sending the first prompt information to terminal equipment so that a user inputs information to be verified corresponding to a target service based on the first prompt information;
the method comprises the steps of obtaining information to be verified from terminal equipment based on a first intelligent contract, obtaining a pre-trained preset verification model based on the first intelligent contract, verifying the information to be verified based on the pre-trained preset verification model, and executing a target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to sample verification information.
Optionally, the first data processing request carries account information of the user, and the method further includes:
determining target information corresponding to user account information based on the first intelligent contract;
the method comprises the steps of obtaining information to be verified from terminal equipment based on a first intelligent contract, obtaining a pre-trained preset verification model based on the first intelligent contract, and verifying the information to be verified based on the pre-trained preset verification model, and comprises the following steps:
based on the first intelligent contract, performing the following:
acquiring information to be verified from terminal equipment;
and inputting the information to be verified and the target information into a pre-trained preset verification model to obtain a corresponding verification result.
Optionally, the method further includes:
receiving a second data processing request aiming at a target service, which is sent by a terminal device, wherein the second data processing request carries address information of the terminal device and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting the target service based on a transaction prompt;
determining a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services based on the second intelligent contract;
replacing a plurality of first service identification information corresponding to a plurality of services based on a preset rule pre-deployed in a second intelligent contract to obtain target service identification information corresponding to the services;
and prompting the user to perform a transaction based on the target service identification information corresponding to the service.
As can be seen from the above technical solutions provided in the embodiments of the present specification, a first data processing request for a target service is received and sent by a terminal device, where the first data processing request carries address information of the terminal device, the first data processing request is a processing request for verifying information to be verified for the target service input by a user, then, first prompt information is generated based on a first intelligent contract pre-deployed in a block chain system, and the first prompt information is sent to the terminal device, so that the user inputs information to be verified corresponding to the target service based on the first prompt information, then, the information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, and the information to be verified is verified based on the pre-trained preset verification model, and executing the target service based on the verification result. Therefore, the method for verifying the information to be verified sent by the terminal equipment by adopting the pre-trained preset verification model effectively improves the verification efficiency of the information to be verified.
Further, corresponding to the data processing method provided in the foregoing embodiment, an embodiment of the present specification further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by the processor 1101, the steps of the foregoing data processing method embodiment are implemented, and the same technical effects can be achieved, and in order to avoid repetition, details are not described here again. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that the data processing device and the computer-readable storage medium provided in the embodiments of the present specification can implement each process in the foregoing data processing method embodiments, and are not described herein again to avoid repetition.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It is to be understood that the embodiments described in this specification can be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions of the present description, or a combination thereof.
For software implementation, the techniques described above in this specification can be implemented by modules (e.g., procedures, functions, and so on) that perform the functions described above in this specification. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
It should also be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the same element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present specification may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the above methods of the embodiments of the present specification.
While the embodiments of the present disclosure have been described with reference to the accompanying drawings, the present disclosure is not limited to the above-described embodiments, which are intended to be illustrative rather than limiting, and that various modifications and changes may be made by those skilled in the art without departing from the spirit of the disclosure and the scope of the appended claims. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present specification should be included in the scope of the claims of the present specification.

Claims (17)

1. A method of data processing, comprising:
receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying information to be verified, which is input by a user and aims at the target service;
sending first prompt information to the terminal equipment so that a user inputs information to be verified corresponding to the target service based on the first prompt information;
and receiving the information to be verified sent by the terminal equipment, verifying the information to be verified by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on the information content weight corresponding to the sample verification information.
2. The method of claim 1, wherein the first data processing request carries account information of a user, and the method further comprises:
determining target information corresponding to the user account information based on the user account information;
the receiving the to-be-verified information sent by the terminal device, verifying the to-be-verified information by adopting a pre-trained preset verification model, and executing the target service based on a verification result includes:
receiving the information to be verified sent by the terminal equipment, and inputting the information to be verified and the target information into the pre-trained preset verification model;
and outputting a verification result through the pre-trained preset verification model, and executing the target service based on the verification result.
3. The method of claim 2, wherein outputting the verification result through the pre-trained preset verification model comprises:
matching the information to be verified and the target information by adopting the pre-trained preset verification model, and determining the matching degree between the information to be verified and the target information;
and determining that the verification is passed under the condition that the matching degree is greater than a preset threshold value.
4. The method according to any one of claims 1 to 3, wherein the pre-trained pre-set verification model is a bert model, and the bert model is obtained by training by using bleu as an evaluation index.
5. The method of claim 1, wherein the first prompt is to prompt the user to enter at least one or more of identity information, a communication number by voice input.
6. The method of claim 1, further comprising:
receiving a second data processing request aiming at the target service, wherein the second data processing request carries address information of terminal equipment and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting the target service based on a transaction prompt;
determining a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services based on the transaction information;
replacing a plurality of first service identification information corresponding to a plurality of services according to a preset rule to obtain target service identification information corresponding to the services;
and prompting the user to perform transaction based on the target service identification information corresponding to the service.
7. The method of claim 6, wherein replacing a plurality of first service identification information corresponding to a plurality of the services according to a preset rule to obtain target service identification information corresponding to the services comprises:
determining an event identifier corresponding to the transaction information based on the transaction information;
performing hash calculation on the event identifier to obtain a hash value corresponding to the event identifier;
taking mod from the hash value corresponding to the event identifier to obtain a corresponding remainder;
and taking the numerical value of the remainder as the rotation times, fixing the service or the plurality of pieces of first service identification information, and performing rotation processing on the service or the plurality of pieces of first service identification information according to a preset sequence and the rotation times to obtain target service identification information corresponding to the service.
8. The method of claim 6, wherein the first service identification information is determined by a specified key identification.
9. A data processing method is applied to a block chain system, and comprises the following steps:
receiving a first data processing request aiming at a target service, which is sent by a terminal device, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying to-be-verified information aiming at the target service, which is input by a user;
generating first prompt information based on a first intelligent contract which is deployed in the block chain system in advance, and sending the first prompt information to the terminal equipment so that a user can input information to be verified corresponding to the target service based on the first prompt information;
the information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, the information to be verified is verified based on the pre-trained preset verification model, the target service is executed based on a verification result, and the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to sample verification information.
10. The method of claim 9, wherein the first data processing request carries account information of a user, the method further comprising:
determining target information corresponding to the user account information based on the first intelligent contract;
the acquiring the information to be verified from the terminal device based on the first intelligent contract, acquiring a pre-trained preset verification model based on the first intelligent contract, and verifying the information to be verified based on the pre-trained preset verification model includes:
performing the following processing based on the first intelligent contract:
acquiring the information to be verified from the terminal equipment;
and inputting the information to be verified and the target information into the pre-trained preset verification model to obtain a corresponding verification result.
11. The method of claim 9, further comprising:
receiving a second data processing request aiming at the target service, which is sent by the terminal equipment, wherein the second data processing request carries address information of the terminal equipment and transaction information corresponding to the second data processing request, and the second data processing request is a request for selecting the target service based on a transaction prompt;
determining a plurality of services corresponding to the transaction information and a plurality of first service identification information corresponding to the plurality of services based on a second intelligent contract;
replacing a plurality of first service identification information corresponding to a plurality of services based on a preset rule pre-deployed in the second intelligent contract to obtain target service identification information corresponding to the services;
and prompting the user to perform transaction based on the target service identification information corresponding to the service.
12. A data processing apparatus comprising:
the first receiving module is used for receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying to-be-verified information aiming at the target service and input by a user;
the sending module is used for sending first prompt information to the terminal equipment so that a user can input information to be verified corresponding to the target service based on the first prompt information;
the first processing module is used for receiving the information to be verified sent by the terminal equipment, verifying the information to be verified by adopting a pre-trained preset verification model and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by carrying out supervised training based on the information content weight corresponding to the sample verification information.
13. A data processing apparatus, the apparatus being an apparatus in a blockchain system, the apparatus comprising:
the third receiving module is used for receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying information to be verified aiming at the target service, which is input by a user;
the second processing module is used for generating first prompt information based on a first intelligent contract which is deployed in the block chain system in advance, and sending the first prompt information to the terminal equipment so that a user can input information to be verified corresponding to the target service based on the first prompt information;
and the third processing module is used for acquiring the information to be verified from the terminal equipment based on the first intelligent contract, acquiring a pre-trained preset verification model based on the first intelligent contract, verifying the information to be verified based on the pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by carrying out supervised training based on the information content weight corresponding to the sample verification information.
14. A data processing apparatus, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying information to be verified, which is input by a user and aims at the target service;
sending first prompt information to the terminal equipment so that a user inputs information to be verified corresponding to the target service based on the first prompt information;
and receiving the information to be verified sent by the terminal equipment, verifying the information to be verified by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on the information content weight corresponding to the sample verification information.
15. A data processing apparatus, the apparatus being an apparatus in a blockchain system, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a first data processing request aiming at a target service, which is sent by a terminal device, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying to-be-verified information aiming at the target service, which is input by a user;
generating first prompt information based on a first intelligent contract which is deployed in the block chain system in advance, and sending the first prompt information to the terminal equipment so that a user can input information to be verified corresponding to the target service based on the first prompt information;
the information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, the information to be verified is verified based on the pre-trained preset verification model, the target service is executed based on a verification result, and the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to sample verification information.
16. A storage medium for storing computer-executable instructions, which when executed implement the following:
receiving a first data processing request aiming at a target service, wherein the first data processing request carries address information of terminal equipment, and the first data processing request is a processing request for verifying information to be verified, which is input by a user and aims at the target service;
sending first prompt information to the terminal equipment so that a user inputs information to be verified corresponding to the target service based on the first prompt information;
and receiving the information to be verified sent by the terminal equipment, verifying the information to be verified by adopting a pre-trained preset verification model, and executing the target service based on a verification result, wherein the pre-trained preset verification model is obtained by performing supervised training based on the information content weight corresponding to the sample verification information.
17. A storage medium for storing computer-executable instructions, which when executed implement the following:
receiving a first data processing request aiming at a target service, which is sent by a terminal device, wherein the first data processing request carries address information of the terminal device, and the first data processing request is a processing request for verifying to-be-verified information aiming at the target service, which is input by a user;
generating first prompt information based on a first intelligent contract which is deployed in a block chain system in advance, and sending the first prompt information to the terminal equipment so that a user can input information to be verified corresponding to the target service based on the first prompt information;
the information to be verified is obtained from the terminal device based on the first intelligent contract, a pre-trained preset verification model is obtained based on the first intelligent contract, the information to be verified is verified based on the pre-trained preset verification model, the target service is executed based on a verification result, and the pre-trained preset verification model is obtained by performing supervised training based on information content weight corresponding to sample verification information.
CN202110886944.3A 2021-08-03 2021-08-03 Data processing method, device and equipment Active CN113672709B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110886944.3A CN113672709B (en) 2021-08-03 2021-08-03 Data processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110886944.3A CN113672709B (en) 2021-08-03 2021-08-03 Data processing method, device and equipment

Publications (2)

Publication Number Publication Date
CN113672709A true CN113672709A (en) 2021-11-19
CN113672709B CN113672709B (en) 2024-03-29

Family

ID=78541245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110886944.3A Active CN113672709B (en) 2021-08-03 2021-08-03 Data processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN113672709B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114138790A (en) * 2021-12-02 2022-03-04 中国建设银行股份有限公司 Interface element verification method, device, storage medium and program product
CN114826739A (en) * 2022-04-27 2022-07-29 中国银行股份有限公司 Verification method, verification device and server

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107800672A (en) * 2016-09-06 2018-03-13 腾讯科技(深圳)有限公司 A kind of Information Authentication method, electronic equipment, server and information authentication system
CN109583184A (en) * 2018-10-09 2019-04-05 阿里巴巴集团控股有限公司 Auth method and device and electronic equipment
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
CN111159698A (en) * 2019-12-31 2020-05-15 北京交通大学 Terminal implicit identity authentication method based on Sudoku password
CN111241525A (en) * 2018-11-29 2020-06-05 吴德松 Identity authentication method
KR102127171B1 (en) * 2019-08-30 2020-06-26 주식회사 카카오뱅크 Method, server and application for distributed training deep-learning model for id card recognition, and recognition method using the same model
CN112866225A (en) * 2021-01-12 2021-05-28 中国工商银行股份有限公司 Authentication method, authentication device, electronic device, and storage medium
CN112948785A (en) * 2021-03-25 2021-06-11 支付宝(杭州)信息技术有限公司 Account authentication method, device and equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107800672A (en) * 2016-09-06 2018-03-13 腾讯科技(深圳)有限公司 A kind of Information Authentication method, electronic equipment, server and information authentication system
CN109583184A (en) * 2018-10-09 2019-04-05 阿里巴巴集团控股有限公司 Auth method and device and electronic equipment
CN111241525A (en) * 2018-11-29 2020-06-05 吴德松 Identity authentication method
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
KR102127171B1 (en) * 2019-08-30 2020-06-26 주식회사 카카오뱅크 Method, server and application for distributed training deep-learning model for id card recognition, and recognition method using the same model
CN111159698A (en) * 2019-12-31 2020-05-15 北京交通大学 Terminal implicit identity authentication method based on Sudoku password
CN112866225A (en) * 2021-01-12 2021-05-28 中国工商银行股份有限公司 Authentication method, authentication device, electronic device, and storage medium
CN112948785A (en) * 2021-03-25 2021-06-11 支付宝(杭州)信息技术有限公司 Account authentication method, device and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郝磊;介艳良;: "基于云计算的信息网关安全验证方法研究", 自动化与仪器仪表, no. 07, 25 July 2020 (2020-07-25) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114138790A (en) * 2021-12-02 2022-03-04 中国建设银行股份有限公司 Interface element verification method, device, storage medium and program product
CN114826739A (en) * 2022-04-27 2022-07-29 中国银行股份有限公司 Verification method, verification device and server

Also Published As

Publication number Publication date
CN113672709B (en) 2024-03-29

Similar Documents

Publication Publication Date Title
CN109087106B (en) Wind control model training and wind control method, device and equipment for recognizing fraudulent use of secondary number-paying account
CN108665143B (en) Wind control model evaluation method and device
CN111507638B (en) Risk information output and risk information construction method and device
CN112818023B (en) Big data analysis method and cloud computing server in associated cloud service scene
CN109428719A (en) A kind of auth method, device and equipment
CN113672709A (en) Data processing method, device and equipment
CN111883140A (en) Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN111770063B (en) Derivation and verification method, device and equipment for digital identity information
CN110995521B (en) Service providing method, device, equipment and system
CN110933104A (en) Malicious command detection method, device, equipment and medium
CN109800560A (en) A kind of device identification method and device
CN112182506A (en) Data compliance detection method, device and equipment
CN110414197B (en) Bank user identity verification method and device based on behavior characteristics
CN113505393A (en) Block chain payment data processing method applied to big data and cloud server
CN111582868A (en) Transaction request processing method, device and equipment
CN112182509A (en) Method, device and equipment for detecting abnormity of compliance data
CN116225950A (en) Identification method and system of fraud APP based on multi-mode fusion
CN113011891B (en) Core body processing method and device applied to associated payment
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN110830930B (en) Verification code anti-sniffing processing method and device
CN114238887A (en) Method, device and equipment for processing voice authorization and voice related service
CN111899744A (en) Voice information processing method, device, server and storage medium
CN106709294A (en) User authentication method and apparatus
CN117290890B (en) Security risk management and control method and device, electronic equipment and storage medium
US12022016B2 (en) System and method for managing exception request blocks in a blockchain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant