CN114553569A - Method, apparatus, device and medium for establishing home network based on user information - Google Patents

Method, apparatus, device and medium for establishing home network based on user information Download PDF

Info

Publication number
CN114553569A
CN114553569A CN202210183293.6A CN202210183293A CN114553569A CN 114553569 A CN114553569 A CN 114553569A CN 202210183293 A CN202210183293 A CN 202210183293A CN 114553569 A CN114553569 A CN 114553569A
Authority
CN
China
Prior art keywords
user
home network
family
familiarity
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210183293.6A
Other languages
Chinese (zh)
Inventor
张朕
谷丽雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210183293.6A priority Critical patent/CN114553569A/en
Publication of CN114553569A publication Critical patent/CN114553569A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks

Abstract

The disclosure provides a method for establishing a home network based on user information, which can be applied to the technical field of information security. The method comprises the following steps: acquiring family relation information under the condition that a registered user of an application program provides the family relation information; obtaining the use authorization of the family relation information; establishing a home network by the user groups belonging to the same family according to the family relation information of the obtained use authorization; obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network in using the application, based on usage data of the application by each user in the home network; and giving a risk early warning notification authority to at least one user with a familiarity evaluation score greater than or equal to the critical familiarity score in the home network; the present disclosure also provides an apparatus, device, storage medium, and program product for establishing a home network based on user information.

Description

Method, apparatus, device and medium for establishing home network based on user information
Technical Field
The present disclosure relates to the field of information security, and more particularly, to a method, apparatus, device, medium, and program product for establishing a home network based on user information.
Background
When the application program manages users, each registered user is generally managed as an independent individual, so that after different members in a family register the application program respectively, the family members in the application program can be split into independent users, and no difference exists between the independent users and strangers. This does not allow family members to help and support each other when using the application. For example, when a parent or a child encounters a security risk such as telecom fraud or a problem of not being operated while using an application related to family property such as shopping, cell phone banking, internet banking, financing, payment, or the like, assistance or support cannot be sought through the intervention of a trusted family member.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a method, apparatus, device, medium, and program product for establishing a home network based on user information that can improve mutual assistance and support between family members.
According to a first aspect of the present disclosure, there is provided a method of establishing a home network based on user information. The method comprises the following steps: acquiring family relation information under the condition that a registered user of an application program provides the family relation information; obtaining the use authorization of the family relation information; establishing a home network by the user groups belonging to the same family according to the family relation information of which the use authorization is obtained; obtaining a familiarity evaluation score for evaluating a proficiency of each user in the home network in using the application based on usage data of the application by each user in the home network; and assigning a risk pre-warning notification right to at least one user in the home network whose familiarity evaluation score is greater than or equal to a critical familiarity score; wherein the authorized user given the risk pre-warning notification permission has a permission to intervene in the use of the application by other users in the home network.
According to an embodiment of the present disclosure, the obtaining a familiarity evaluation score for evaluating a proficiency level of each user in the home network in using the application based on the usage data of the application by each user in the home network includes: acquiring the use data of each user for each function in the N functions of the application program to obtain N function use data, wherein N is an integer greater than or equal to 1; and performing weighting processing on the N pieces of function use data of each user to obtain the familiarity degree evaluation score of each user.
According to an embodiment of the present disclosure, the usage data comprises at least one dimension data of: based on the wide degree of the transaction amount, the operation frequency based on the operation frequency or the operation familiarity based on the operation time length of the single transaction.
According to an embodiment of the present disclosure, the familiarity evaluation score is positively correlated with the breadth degree and the operation frequency, and negatively correlated with the operation familiarity degree.
According to an embodiment of the present disclosure, the obtaining a familiarity evaluation score for evaluating a proficiency level of each user in the home network using the application based on the usage data of the application by each user in the home network further includes: acquiring the usage data of the application program by each user in the home network through a buried point.
According to an embodiment of the present disclosure, the method further comprises: under the condition that M home networks are established, calculating the average value of the familiarity evaluation scores of the users in each home network to obtain M average values, wherein M is an integer greater than 1; and determining the threshold familiarity score based on the M mean values.
According to an embodiment of the present disclosure, the method further comprises: and setting monitoring contents for other users in the home network based on the operation of the authorized user.
According to an embodiment of the present disclosure, the monitoring content includes at least one of: transaction amount, function of use, or family member.
According to an embodiment of the present disclosure, the method further comprises: when other users in the home network appear operation behaviors in the monitoring content, an approval notice is sent to the authorized user; allowing execution of the operational behavior in the event that a reply message indicating consent of the authorized user is received; and refusing the execution of the operation behavior under the condition that reply information representing refusal of the authorized user is received.
According to an embodiment of the present disclosure, the sending an approval notification to the authorized user when the other user in the home network operates in the monitoring content includes: repeatedly performing the following operations until a reply is received or no unauthorized authorized user in the home network is available: when a plurality of authorized users are included in the home network, preferentially sending the examination and approval notification to the authorized user which is not notified in the home network and has the highest familiarity evaluation score; and when the reply of the notified authorized user is not received within a preset time length, the examination and approval notice is sent to the authorized user with the highest familiarity evaluation score in the rest of the unauthorized users in a forward direction.
According to an embodiment of the present disclosure, the method further comprises: when all the authorized users in the home network do not reply within the preset time length, sending a voting and consulting notice to all the users in the home network; carrying out a consultation on votes of all users in the home network based on a preset rule to obtain a consultation result; in the event that the result of the trial is an agreement, allowing execution of the operational action; and refusing the execution of the operation behavior under the condition that the examination result is refused.
According to an embodiment of the present disclosure, before the obtaining of the family relationship information, the method further includes: and acquiring the family relationship information and the certification information thereof provided by the registered user of the application program.
According to an embodiment of the present disclosure, the obtaining of the family relationship information and the certification information thereof provided by the registered user of the application program includes: providing a proxy registration service; and allowing the registered user to register for other users having a family relationship with the registered user based on the certification information of the family relationship information through the proxy registration service.
In a second aspect of the embodiments of the present disclosure, an apparatus for establishing a home network based on user information is provided. The device comprises a first acquisition module, a second acquisition module, a home network module, a familiarity evaluation module and a family member monitoring authorization module. The first acquisition module is used for acquiring the family relation information under the condition that the registered user of the application program provides the family relation information. And the second acquisition module is used for acquiring the use authorization of the family relationship information. The home network module is used for establishing a home network by the user groups belonging to the same family according to the family relation information of which the use authorization is obtained. The familiarity evaluation module is used for obtaining a familiarity evaluation score for evaluating the proficiency of each user in the home network in using the application program based on the usage data of the application program by each user in the home network. The family member monitoring and authorizing module is used for endowing risk early warning notification authority to at least one user with the familiarity evaluation score being greater than or equal to the critical familiarity score in the family network; wherein the authorized user given the risk pre-warning notification permission has a permission to intervene in the use of the application by other users in the home network.
According to the embodiment of the disclosure, the family member monitoring authorization module is further configured to: under the condition that M home networks are established, calculating the average value of the familiarity evaluation scores of the users in each home network to obtain M average values, wherein M is an integer greater than 1; and determining the threshold familiarity score based on the M mean values.
According to an embodiment of the present disclosure, the apparatus further comprises a family member auxiliary intervention module. The family member auxiliary intervention module is used for setting monitoring contents of other users in the family network based on the operation of the authorized user.
According to an embodiment of the present disclosure, the family member auxiliary intervention module is further configured to: when other users in the home network appear operation behaviors in the monitoring content, an approval notice is sent to the authorized user; allowing execution of the operational behavior in the event that a reply message indicating consent of the authorized user is received; and refusing the execution of the operation behavior under the condition of receiving reply information of the authorized user, wherein the reply information represents refusing.
According to an embodiment of the present disclosure, the family member auxiliary intervention module is further configured to: when all the authorized users in the home network do not reply within the preset time length, sending a voting and consulting notice to all the users in the home network; carrying out a consultation on votes of all users in the home network based on a preset rule to obtain a consultation result; in the event that the result of the trial is an agreement, allowing execution of the operational action; and refusing the execution of the operation behavior under the condition that the examination result is refused.
In a third aspect of the disclosed embodiments, an electronic device is provided. The electronic device includes one or more processors, and one or more memories. The memory is used to store one or more programs which, when executed by the one or more processors, cause the one or more processors to perform the above-described method.
In a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is further provided, on which executable instructions are stored, and when executed by a processor, the instructions cause the processor to execute the above method.
In a fifth aspect of the embodiments of the present disclosure, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements the above method.
According to the embodiment of the disclosure, after the home network is built based on the family relationship information, according to the use proficiency of the user in the home network on the application program, the user with the proficiency degree meeting the condition is selected as the administrator (i.e., the authorized user) of the home network, the operation of other users in the home network on the application program can be interfered (for example, guidance or approval control), a channel for mutual assistance and support among the family members is provided, and a more reliable safety protection way is provided for the family members to deal with risks.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, taken in conjunction with the accompanying drawings of which:
fig. 1 schematically illustrates an application scenario diagram of a method, apparatus, device, medium, and program product for establishing a home network based on user information according to an embodiment of the present disclosure;
fig. 2 schematically shows a flowchart of a method of establishing a home network based on user information according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart for obtaining a familiarity evaluation score in a method according to an embodiment of the present disclosure;
fig. 4 schematically shows a flowchart of a method of establishing a home network based on user information according to another embodiment of the present disclosure;
fig. 5 schematically illustrates a flowchart of a method of establishing a home network based on user information according to still another embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of intervention in the operation of a family member in presence monitoring content in a method according to an embodiment of the present disclosure;
fig. 7 is a block diagram schematically illustrating the construction of an apparatus for establishing a home network based on user information according to an embodiment of the present disclosure;
fig. 8 schematically shows an application flowchart of an apparatus for establishing a home network based on user information according to an embodiment of the present disclosure; and
fig. 9 schematically shows a block diagram of an electronic device adapted to implement a method of establishing a home network based on user information according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, before the personal information (such as the family relationship information of the user) of the user is obtained or collected and used, the authorization or the consent of the user is obtained.
The embodiment of the disclosure provides a method, a device, equipment, a medium and a program product for establishing a home network based on user information. The method comprises the following steps: firstly, acquiring family relation information under the condition that a registered user of an application program provides the family relation information; then obtaining the use authorization of the family relation information; after obtaining the use authorization, establishing a home network by the user groups belonging to the same family according to the family relation information of the obtained use authorization; next, obtaining a familiarity evaluation score for evaluating the proficiency of each user in the home network in using the application program based on the usage data of the application program by each user in the home network; and then endowing risk early warning notification authority to at least one user with the familiarity evaluation score being greater than or equal to the critical familiarity score in the home network. The authorized user given the risk early warning notification authority is equivalent to an administrator of the home network and has the authority of intervening the use of the application program by other users in the home network.
In this way, the embodiment of the present disclosure may integrate the relationship between users of an application program, and group users belonging to a family into a home network under the condition of obtaining the usage authorization of the user, thereby breaking the barrier between users belonging to a family, establishing a user-centric home network, and enabling the users belonging to a family to be associated with each other. Also, according to an embodiment of the present disclosure, in each home network, a user who satisfies a requirement for the use proficiency of an application (i.e., a familiarity evaluation score is greater than or equal to a critical familiarity score) may be granted the right to intervene in the use of the application by other users. Thus, in a home network, the use behaviors of other users can be assisted or managed by authorized users with high proficiency in using the application programs. In this way, a channel of mutual assistance and support between family members is provided, and a more reliable way of safeguarding against risks for the family members is provided. For example, when the application is an electronic bank (e.g., a mobile phone bank, an internet bank, etc.), when the old or the young in the home performs some transactions or operations that may have security risks, the authorized user is notified to check the security of the operations in time, and the property in the home is protected for the first time, so as to prevent the property loss of the home. For another example, when the old and the children use a certain function of the application program in the middle of the card and do not know how to proceed in a certain operation, the old and the children can also request guidance and assistance from authorized users in the home network, and family members can be helped to better acquire services provided by the application program by means of the relationship of the family members.
It should be noted that the method, apparatus, device, medium, and program product for establishing a home network based on user information according to the embodiments of the present disclosure may be used in the financial field, and may also be used in any fields other than the financial field (e.g., education, medical treatment, logistics, consumption, etc.), and the present disclosure does not limit the application field.
In the technical scheme of the embodiment of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure, application and other processes of the personal information (such as family relationship information, user account information and the like) of the related user are all in accordance with the regulations of related laws and regulations, necessary confidentiality measures are taken, and the customs of the public order is not violated.
Fig. 1 schematically illustrates an application scenario diagram of a method, apparatus, device, medium, and program product for establishing a home network based on user information according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the application scenario 100 according to this embodiment may include at least one terminal device (three are shown 101, 102, 103), a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have clients installed with application programs, such as browsers, shopping applications, financial applications, payment applications, electronic banking (mobile banking or internet banking, etc.), instant messaging applications, and the like. The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a back-end management server (for example only) providing back-end management support for client applications used by users with the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the method for establishing a home network based on user information provided by the embodiment of the present disclosure may be generally performed by the server 105. Accordingly, the apparatus, devices, media, and program products for establishing a home network based on user information provided by embodiments of the present disclosure may generally be provided in the server 105. The method for establishing a home network based on user information provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the apparatus, device, medium, and program product for establishing a home network based on user information provided by the embodiments of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
A method for establishing a home network based on user information according to an embodiment of the present disclosure will be described in detail below with reference to fig. 2 to 6 based on the scenario described in fig. 1.
Fig. 2 schematically shows a flowchart of a method of establishing a home network based on user information according to an embodiment of the present disclosure.
As shown in fig. 2, the method of establishing a home network based on user information may include operations S210 to S250.
In operation S210, in the case where the registered user of the application provides the family relationship information, the family relationship information is acquired. The application may provide financial services including payment, shopping, money transfer, depositing, investing or financing, and the like. The family relationship information may include, for example, account information of the user himself and his family, and relationship information between them.
In some embodiments, the user may be given the option of whether to provide family relationship information at his or her discretion. When the user provides the family relationship information, the user can be simultaneously required to provide the certification information of the family relationship information, such as the information of the family registration information, the identification information, the notarization certification provided by the notarization institution, the face recognition, the telephone number and the like, so as to ensure the provided family relationship information to be real, correct and effective.
In other embodiments, the application may provide a proxy registration service for proxy registration among family members. Through the generation registration service, registered users are allowed to register for other users having family relations with the registered users based on the certification information of the family relation information. For example, a user may go through the generation registration service while assisting a child or parent in registering an account with an electronic bank. Thus, the family relationship information provided by the user can be acquired based on the generation registration service.
In operation S220, a usage authorization for the family relationship information is acquired. For example, a request for use authorization is sent to a user who provides family relationship information, and when the user authorizes to use his family relationship information, the use authorization of the family relationship information is acquired. Since the family relationship information relates to a plurality of users, when obtaining the use authorization of the family relationship information, the authorization request should be sent to the plurality of users respectively, and when all member users in the family relationship information allow the use of the family relationship information, the user can obtain the use authorization of the family relationship information.
In operation S230, a home network is established with users belonging to the same home based on the family relation information for which the usage authorization is obtained. For example, when the family relationship information includes account information of the family of each user, the users may be associated with each other according to the account information to establish a home network.
In operation S240, a familiarity evaluation score for evaluating the proficiency of each user in the home network in using the application is obtained based on usage data of the application by each user in the home network.
For example, usage data of an application by each user in a home network through the terminal devices 101, 102, 103 can be acquired by buried point big data analysis. The usage data of the application program may be usage data of the whole application program (such as the number of times of use, a transaction amount, or a single operation time) within a certain period of time, or may be usage data of different functions (such as the number of times of use, the transaction amount, or the single operation time of each function) which are distinguished according to a plurality of functions of the application program, and the usage data of the application program is obtained by weighting the usage data of the different functions.
According to one embodiment of the present disclosure, whether the usage data is collected with the application as a whole as analysis granularity or the usage data is collected with the individual functions in the application as analysis granularity groups, the collected usage data may include at least one of the following dimensional data: based on the wide degree of the transaction amount, the operation frequency based on the operation frequency or the operation familiarity based on the operation time length of the single transaction.
Specifically, based on the extent of the transaction amount, it may be characterized, for example, by a maximum value, an average value, or an accumulated value of the transaction amount over a period of time (e.g., half a year).
The frequency of operation based on the frequency of operation may be characterized, for example, by an accumulated number of operations over a period of time (e.g., half a year), an average number/frequency of operations per month, or a maximum number of operations per month.
The operational familiarity based on the duration of a single transaction operation may be characterized, for example, by an average duration of a single operation of a single transaction over a period of time (e.g., half a year), or a maximum duration of a single transaction, etc.
According to the embodiment of the disclosure, since the operation familiarity is characterized by the operation duration of a single pen or the like, it means that the longer the operation duration is, the lower the familiarity of the user with the application program or the function is. And the higher the degree of breadth and/or frequency of operation, the greater the user's familiarity with the application or function. When the familiarity evaluation score is calculated based on the usage data, the familiarity evaluation score is positively correlated with the extent and the operation frequency, and is negatively correlated with the operation familiarity.
According to an embodiment of the present disclosure, obtaining the familiarity evaluation score may be setting a uniform algorithm model for all users in the application, and then outputting the familiarity evaluation score of each user by the algorithm model according to usage data of each user for the application. The familiarity assessment score thus obtained has general reference meaning across the entire network in which the entire application is running.
Alternatively, the familiarity evaluation score may be obtained by ranking the users in the home network according to a certain rule (for example, according to the size of the transaction amount) for the usage data of each user within the home network, and assigning different familiarity evaluation scores to the ranked users located at different positions. The familiarity evaluation score thus obtained has relativity within one family.
In operation S250, a risk pre-warning notification authority is granted to at least one user in the home network, whose familiarity evaluation score is greater than or equal to the critical familiarity score. Wherein the authorized user given the risk pre-warning notification authority has the authority to intervene in the application program used by other users in the home network.
The threshold familiarity score is a parameter used to distinguish between users being familiar or unfamiliar with the application and may be obtained in any number of ways, including but not limited to: the familiarity evaluation score of the application program is determined according to statistical analysis of familiarity evaluation scores of most users of the application program, or determined according to an average value of familiarity evaluation scores of the users in each home network in the built home network, or determined by performing statistical analysis on the familiarity evaluation scores of the users who frequently use the application program through experimental tests, or determined by setting an initial value according to experience and adjusting according to certain modification conditions in actual operation.
According to the embodiment of the disclosure, by constructing the home network, the family relation information between users is integrated and utilized, and in the user management of the application program, the management mode taking the home network as a unit is expanded. The method and the system give monitoring authority for mutual assistance and mutual supervision to qualified users among family members relatively objectively and safely on the basis of familiarity evaluation scores of the family members using the application programs. Especially for application programs providing financial services, the method of the embodiment of the disclosure can protect the account security of family members from the family perspective, reduce the risk of fraud of the family members, and improve the security risk awareness of each family member user.
According to the embodiment of the disclosure, by means of a user management mode taking a home network as a unit, part of risk monitoring authorities can be released to users in a family, the use proficiency of application programs meets conditions, so that the family can be informed with safety early warning at the first time when safety risks occur, and the safety of family property is guaranteed by using trust between family members. Moreover, the user management mode taking the home network as a unit can help family members to realize the use and mutual support of the on-line hand-held guidance application program.
Fig. 3 schematically illustrates a flowchart of obtaining a familiarity evaluation score in operation S240 in a method according to an embodiment of the present disclosure.
As shown in fig. 3, operation S240 may include operations S301 to S302 according to an embodiment of the present disclosure.
First, in operation S301, usage data of each user for each of N functions of an application is obtained, and N function usage data is obtained, where N is an integer greater than or equal to 1. The "function usage data" indicates usage data of each function of the application program by a user, and the usage data of the N functions can be collected by using a comparative analysis method and/or a grouping analysis method, so that the N function usage data are obtained correspondingly. The granularity of functional division of the application program can be determined according to actual needs. For example, in electronic banking, the fund and the precious metal may be divided into two functions, or the fund and the precious metal may be divided into an investment and financing function.
Then, in operation S302, the N function usage data of each user are weighted to obtain a familiarity degree evaluation score of each user. For example, the weight of the usage data of each function may be set according to the risk level of different functions in the application program, and the N pieces of function usage data may be weighted.
For example, when the application is electronic banking, money transfer, payment, remittance, etc. related to the transfer of property may be regarded as a high risk function, while money purchasing a financial product, purchasing funds, transferring a demand deposit to a regular deposit, etc. are mainly the transfer of user funds between different accounts, and may be regarded as a low risk service. In one embodiment, in the weighting process in operation S302, a higher weight may be set for the high-risk function, and a lower weight may be set for the low-risk service, so that the resulting familiarity evaluation score may reflect more proficiency of the user in operating the high-risk service.
In one embodiment, when the acquired usage data of each function includes the above-described operation familiarity based on the transaction amount, the operation frequency based on the operation frequency, or the operation familiarity based on the operation duration of a single transaction, the familiarity evaluation score of the user may be calculated according to the following formula (1):
Figure BDA0003520252530000131
in the formula (1), P is a familiarity degree evaluation score;
i is the ith function of the application program, wherein the value of i is 1-N;
ωia weight of the ith function of the application;
aithe extent to which the ith function of the application is used by the user, such as the amount of money transferred, the amount of investment financing, or the amount of money transferred; positively correlated with the familiarity evaluation score P;
bithe operation frequency of the ith function of the application program for the user, for example, the accumulated operation frequency or the monthly average operation frequency; positively correlated with the familiarity evaluation score P;
cithe operation familiarity of the ith function of the application program for the user, such as the average single transaction operation time length; inversely correlated with the familiarity evaluation score P.
Fig. 4 schematically shows a flowchart of a method of establishing a home network based on user information according to another embodiment of the present disclosure.
As shown in fig. 4, according to the embodiment, the method of establishing a home network based on user information may further include operations S440 and S450 in addition to operations S210 to S250, wherein the operations S440 and S450 may be performed after operation S240 and before operation S250.
First, a home network is constructed through operations S210 to S240, and a familiarity degree evaluation score of each user in the home network is obtained.
Then, in operation S440, in the case where M home networks are constructed, an average of the familiarity evaluation scores of the users in each home network is calculated to obtain M average values, where M is an integer greater than 1.
Next, in operation S450, a threshold familiarity score is determined based on the M mean values. For example, the M mean values are ranked, the median is taken, or the number ranked at a particular location (e.g., the top 30% location) is taken as the critical familiarity score.
Thereafter, at operation S250, a risk pre-warning notification authority is granted to at least one user in the home network whose familiarity evaluation score is greater than or equal to the critical familiarity score.
The critical familiarity score obtained in the mode considers the personnel composition distribution characteristics in family members, so that the screened authorized users can be more objective and credible, and the condition that the qualified authorized users cannot be screened out in many families due to the fact that the critical familiarity score is set to be too high can be avoided.
Fig. 5 schematically illustrates a flowchart of a method of establishing a home network based on user information according to still another embodiment of the present disclosure.
As shown in fig. 5, the method of establishing a home network based on user information according to the embodiment may further include operations S560 to S580 in addition to the operations S210 to S250.
Specifically, a home network is established through operations S210 to S250, and an authorized user having a risk early warning notification authority is selected. The operations S210 to S250 can refer to the foregoing description, and are not described herein again.
Then, in operation S560, monitoring contents for other users in the home network are set based on the operation of the authorized user. The monitoring content may for example comprise at least one of: transaction amount, function of use, or family member.
The transaction amount monitoring can set that a user in a home network intervenes in a transaction after the transaction amount of external transfer or remittance operation exceeds the corresponding amount, for example.
Using function monitoring, for example, a function menu used by some user in the home network may be set, and the user intervenes when using the function.
Family member monitoring, for example, may set certain users (e.g., children) in the home network to intervene when operating an application.
Then, in operation S570, when other users in the home network appear to monitor the operation behavior in the content, an approval notification is sent to the authorized user.
Next, in operation S580, in case that the authorized user passes the approval, the execution of the operation action is allowed. In particular, the execution of the operation behavior may be allowed in case of receiving reply information indicating an agreement of an authorized user. Accordingly, the execution of the operation behavior may also be denied in case a reply message indicating denial is received from an authorized user.
In one embodiment, when multiple authorized users are included in the home network, approval may be sent to the user with the highest familiarity evaluation score among the multiple authorized users, or an approval notification may be sent to all of the multiple authorized users. In one embodiment, when the approval notification can be sent to a plurality of authorized users, the approval notification can be preferentially sent to the authorized user with the highest familiarity evaluation score in the home network, and when the response of the notified authorized user is not received within a preset time period, the approval notification is sent to the authorized user with the highest familiarity evaluation score in other authorized users; and continuing to continue until an authorized user replies or until no authorized user replies. Or in another embodiment, when the approval notification can be sent to a plurality of authorized users, the approval notification can also be sent to the plurality of authorized users in parallel, and the reply of the authorized user with the earliest feedback is used as the approval result, or the reply of the authorized user with the highest familiarity evaluation score among the plurality of authorized users is used as the approval result. Therefore, the problem that one or more authorized users qualified in the family can not perform intervention processing of monitoring content in time under special conditions such as airplane sitting or information not being returned in time is avoided.
In one embodiment, when all authorized users in the home network do not reply within a predetermined length of time, a poll notification may be sent to all users in the home network; voting the votes of all the users in the home network based on a preset rule (for example, more than half) to obtain a voting result; in the case of agreement of the result of the examination, the execution of the operation behavior is allowed; and refusing the execution of the operation behavior in the case that the examination result is refusal.
According to the embodiment of the disclosure, part of risk monitoring authorities can be downloaded to authorized users with risk early warning notification authorities in families, so that the safety of family property can be further guaranteed by using trust among family members when safety risks occur.
Fig. 6 schematically shows a flow chart of intervention in the operation behavior in the presence monitoring of the family members in a method according to an embodiment of the present disclosure. Fig. 6 illustrates an example of electronic silver behavior, in which s represents the threshold familiarity score.
As shown in fig. 6, the flow may include operations S601 to S608.
In operation S601, the user a performs risk transaction in the monitoring content in the home network.
In operation S602, whether the familiarity evaluation score of the user a is higher than S (i.e., the critical familiarity score). If yes, the transaction is executed directly. If not, intervention of an authorized user with risk early warning notification authority in the home network is required, and the specific intervention process is realized through operation S603-operation S608.
In operation S603, the transaction information is notified to the member having the highest familiarity evaluation score, which has a familiarity evaluation score higher than S and has not been notified, in the home network for approval.
In operation S604, whether the notified user approves for a preset time period (e.g., within k minutes) is performed. If so, it is determined whether the transaction is successful or declined in operation S606 according to the approval result.
If the user notified in operation S604 does not reply upon timeout, it is determined in operation S605 whether there are any users having a familiarity evaluation score higher than S in the home network. And if so, returning to operation S603, and sequentially notifying other users with the risk early warning notification authority in the home network to intervene.
If it is found that the familiarity evaluation scores of the remaining users in the home network are all lower than S after the judgment in operation S605, that is, no risk early warning notification authority exists, a voting and reviewing stage may be entered in operation S607. In which all users in the home network are informed in the voting session of the voting trial of the risk transaction (e.g. the transaction is allowed to proceed with the consent of most people, otherwise the transaction is rejected), in such a way that the family property is protected in time by the intervention of the family members.
For example, the examples are: the xiaoker 5 port, assuming that the same mobile banking application is used, can associate each registered user (e.g., bank account) of the xiaoker in the mobile banking to form a home network under the condition that the mobile banking is authorized to use the family relationship information. And because the small sheets are frequently transacted in the mobile banking and the transaction amount is large, the small sheets can be confirmed as authorized users with risk early warning notification authority in the home network according to the familiarity evaluation score of the small sheets. If the mobile phone bank detects that the father of the small sheet has operation behaviors (for example, the mobile phone bank is subjected to fraud and requires transfer) in the monitoring content according to the monitoring content set by the small sheet, the small sheet can be timely notified to intervene. If the petaloid cannot be replied to in time, other members of the family with familiarity evaluation scores higher than the threshold familiarity score can also be notified in time. And if other members in the family except the small sheets do not have the risk early warning notification authority or other members with the risk early warning notification authority do not reply in time, informing all members in the family network to carry out the examination and voting. In this way, for the problems that the old people are cheated and the like, the family membership can be used for intervening and soothing the relationship of relatives, and especially in the case that some old people are cheated and the old people do not hear the information when bank workers and the like dissuade, the method according to the embodiment of the disclosure can more effectively protect the property safety of the whole family
Based on the method for establishing the home network based on the user information in each embodiment, the embodiment of the disclosure also provides a device for establishing the home network based on the user information. The apparatus will be described in detail below with reference to fig. 7.
Fig. 7 schematically shows a block diagram of an apparatus 700 for establishing a home network based on user information according to an embodiment of the present disclosure.
As shown in fig. 7, according to an embodiment of the present disclosure, the apparatus 700 may include a first obtaining module 710, a second obtaining module 720, a home network module 730, a familiarity evaluation module 740, and a family member monitoring authorization module 750. The apparatus 700 may further include a family member assistance intervention module 760, according to some embodiments of the present disclosure. The apparatus 700 may be used to perform the methods described with reference to fig. 2-6.
The first obtaining module 710 is configured to obtain family relationship information when a registered user of an application provides family relationship information, where the application provides a financial service. In one embodiment, the first obtaining module 710 may perform operation S210 described above.
The second obtaining module 720 is used for obtaining the usage authorization of the family relation information. In one embodiment, the second obtaining module 720 may perform the operation S220 described above.
The home network module 730 is configured to establish a home network from users belonging to the same family according to the family relationship information for obtaining the usage authorization. In one embodiment, the home network module 730 may perform the operation S230 described above.
The familiarity evaluation module 740 is configured to obtain a familiarity evaluation score for evaluating the proficiency of each user in the home network in using the application based on the usage data of the application by each user in the home network. In one embodiment, the familiarity evaluation module 730 may perform operation S240 described previously.
The family member monitoring and authorizing module 750 is used for giving a risk early warning notification authority to at least one user with a familiarity evaluation score greater than or equal to a critical familiarity score in the family network; wherein the authorized user given the risk pre-warning notification authority has the authority to intervene in the application program used by other users in the home network. In one embodiment, the family member monitoring authorization module 750 may perform operation S250 described above.
In some embodiments, the family member monitoring authorization module 750 is further configured to: under the condition that M home networks are established, calculating the average value of the familiarity evaluation scores of the users in each home network to obtain M average values, wherein M is an integer greater than 1; and determining a critical familiarity score based on the M mean values. According to this embodiment, the family member monitoring authorization module 750 may perform operations S440 through S450 described above.
The family member auxiliary intervention module 760 is configured to set monitoring contents for other users in the home network based on operations of the authorized user, send an approval notification to the authorized user when the other users in the home network perform operation behaviors in the monitoring contents, and allow the operation behaviors to be executed if the authorized user passes the approval. In one embodiment, the family member assistance intervention module 760 may perform operations S560 through S580 described above.
In some embodiments, the family member assistant intervention module 760 may be specifically configured to: when other users in the home network appear the operation behavior in the monitoring content, an approval notice is sent to the authorized user; allowing the execution of the operation action in case of receiving reply information indicating agreement of the authorized user; and denying execution of the operation action in the event that a reply message indicating a denial is received from the authorized user.
In other embodiments, the family member assistant intervention module 760 may be specifically configured to: when all authorized users in the home network do not reply within a preset time, sending a voting and consulting notice to all users in the home network; carrying out a trial on votes of all users in the home network based on a preset rule to obtain a trial result; in the case of agreement of the result of the examination, the execution of the operation behavior is allowed; and refusing the execution of the operation behavior in the case that the examination result is refusal.
Fig. 8 schematically shows an application flowchart of an apparatus 700 for establishing a home network based on user information according to an embodiment of the present disclosure. The following describes an exemplary application flow of the apparatus 700 in fig. 8 by taking an application program as an electronic bank. It is to be understood that this description is only an illustrative description and is not intended to limit the scope of the present disclosure in any way.
As shown in fig. 8, referring to fig. 7, the application flow of the apparatus 700 in the electronic banking business may include the following six steps:
step 1, the family network module 730 records the family relationship information of the user and stores the family member information and the relationship in the system database of the module.
And 2, acquiring data of various functions of the electronic bank used by the user from production through a big data platform according to the electronic bank function operation condition and the risk level of the use function of each user in the home network by using the analysis of the buried point big data. Examples may include: importance of the operated function-high risk services such as money transfer, payment, remittance, etc., or low risk services such as financing, fund, periodic deposit, etc.; the user's use of each function to a wide extent, such as the amount of money transferred, the amount of money invested, etc.; the operation frequency of the user using each function-the cumulative number of operations per month; operational familiarity- -e.g., the time a transaction is operated.
By combining the above records of various dimensions, the use of electronic banks by each user is uploaded to the familiarity evaluation module 740.
And 3, the familiarity evaluation module 740 further calculates the operation results of the wide degree, the operation frequency and the operation familiarity of the electronic banking operation of various transactions in the last half year of the customer by using various data downloaded by the big data analysis platform in the step 2 through a comparative analysis method and a grouping analysis method, performs statistical analysis through a model constructed based on a formula (1), calculates parameters of all dimensions to obtain a familiarity evaluation score P, and uploads the results to the home network module for recording.
Step 4, the family member monitoring and authorizing module 750 uses the familiarity evaluation score of each client in the family recorded in the family network module, and the family total score (sum of the respective familiarity evaluation scores of the family members). And weighting and calculating the total family scores of the plurality of family networks to obtain a relatively objective critical familiarity score. And then giving a family member risk early warning notification authority to the family member client with the score larger than the critical familiarity score and the highest family member client, namely when the client in the family members conducts large-amount transaction, receiving system message notification and short message notification early warning and having an approval right to intervene the family member client to complete the transaction. The property of all the members in the family is protected from being lost.
And step 5, the family member auxiliary intervention module 760 is used for enabling the user endowed with the risk early warning notification authority to enter the module, and monitoring content of the user in the family network, including transaction amount monitoring, use function monitoring or family member monitoring, can be set through the module.
Step 6, the family member auxiliary intervention module 760 intervenes the operation behavior of the user when the operation behavior set in the monitoring content occurs to the user in the home network, and the specific process of the intervention may refer to the illustration in fig. 6.
According to an embodiment of the present disclosure, any plurality of the first obtaining module 710, the second obtaining module 720, the home network module 730, the familiarity evaluation module 740, the family member monitoring authorization module 750, and the family member auxiliary intervention module 760 may be combined into one module to be implemented, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the first obtaining module 710, the second obtaining module 720, the home network module 730, the familiarity evaluating module 740, the family member monitoring authorization module 750, and the family member auxiliary intervention module 760 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-a-chip, a system-on-a-substrate, a system-on-a-package, an Application Specific Integrated Circuit (ASIC), or by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or by any one of three implementations of software, hardware, and firmware, or by a suitable combination of any of them. Alternatively, at least one of the first acquisition module 710, the second acquisition module 720, the home network module 730, the familiarity evaluation module 740, the family member monitoring authorization module 750, and the family member auxiliary intervention module 760 may be implemented at least in part as a computer program module that, when executed, may perform corresponding functions.
Fig. 9 schematically shows a block diagram of an electronic device 900 adapted to implement a method of establishing a home network based on user information according to an embodiment of the present disclosure.
As shown in fig. 9, an electronic apparatus 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the electronic apparatus 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the programs may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 900 may also include input/output (I/O) interface 905, input/output (I/O) interface 905 also connected to bus 904, according to an embodiment of the present disclosure. The electronic device 900 may also include one or more of the following components connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement a method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 902 and/or the RAM 903 described above and/or one or more memories other than the ROM 902 and the RAM 903.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the method provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 901. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of a signal on a network medium, and downloaded and installed through the communication section 909 and/or installed from the removable medium 911. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (17)

1. A method of establishing a home network based on user information, comprising:
acquiring family relation information under the condition that a registered user of an application program provides the family relation information;
obtaining the use authorization of the family relation information;
establishing a home network by the user groups belonging to the same family according to the family relation information of which the use authorization is obtained;
obtaining a familiarity evaluation score for evaluating a proficiency of each user in the home network at using the application based on usage data of the application by each user in the home network; and
assigning a risk pre-warning notification permission to at least one user in the home network for which the familiarity evaluation score is greater than or equal to a critical familiarity score; wherein the authorized user given the risk pre-warning notification permission has a permission to intervene in the use of the application by other users in the home network.
2. The method of claim 1, wherein the obtaining a familiarity evaluation score for assessing a proficiency of each user in the home network in using the application based on the usage data of the application by each user in the home network comprises:
acquiring the use data of each user for each function in the N functions of the application program to obtain N function use data, wherein N is an integer greater than or equal to 1; and
and performing weighting processing on the N pieces of function use data of each user to obtain the familiarity degree evaluation score of each user.
3. The method of claim 1 or 2, wherein the usage data comprises at least one of the following dimensional data:
based on the wide degree of the transaction amount, the operation frequency based on the operation frequency or the operation familiarity based on the operation time length of a single transaction.
4. The method of claim 3, wherein,
the familiarity evaluation score is positively correlated with the breadth degree and the operation frequency, and is negatively correlated with the operation familiarity.
5. The method of claim 1, wherein the obtaining a familiarity evaluation score for assessing a proficiency of each user in the home network in using the application based on the usage data of the application by each user in the home network further comprises:
acquiring the usage data of the application program by each user in the home network through a buried point.
6. The method of claim 1, wherein the method further comprises:
under the condition that M home networks are established, calculating the average value of the familiarity evaluation scores of the users in each home network to obtain M average values, wherein M is an integer greater than 1; and
determining the threshold familiarity score based on the M mean values.
7. The method of claim 1, wherein the method further comprises:
and setting monitoring contents for other users in the home network based on the operation of the authorized user.
8. The method of claim 7, wherein the monitoring content comprises at least one of:
transaction amount, function of use, or family member.
9. The method of claim 7 or 8, wherein the method further comprises:
when other users in the home network appear operation behaviors in the monitoring content, an approval notice is sent to the authorized user;
allowing execution of the operational behavior in the event that a reply message indicating consent of the authorized user is received; and
denying execution of the operational action in the event that a reply message indicative of a denial is received from the authorized user.
10. The method of claim 9, wherein the sending an approval notification to the authorized user when the other users in the home network are exposed to the operational behavior in the monitored content comprises:
repeating the following operations until a reply is received or there are no unauthorized authorized users in the home network,
when a plurality of authorized users are included in the home network, preferentially sending the examination and approval notification to the authorized user which is not notified in the home network and has the highest familiarity evaluation score; and
and when the reply of the notified authorized user is not received within a preset time, the examination and approval notice is sent to the authorized user with the highest familiarity evaluation score in the rest of the unauthorized users in a forward direction.
11. The method of claim 9, wherein the method further comprises:
when all the authorized users in the home network do not reply within a preset time, sending a voting and consulting notice to all the users in the home network;
carrying out a consultation on votes of all users in the home network based on a preset rule to obtain a consultation result;
in the event that the result of the trial is an agreement, allowing execution of the operational action; and
and refusing the execution of the operation behavior in the case that the examination result is refused.
12. The method of claim 1, wherein prior to the obtaining the family relationship information, the method further comprises:
and acquiring the family relationship information and the certification information thereof provided by the registered user of the application program.
13. The method of claim 12, wherein the obtaining of the family relationship information and the attestation information thereof provided by the registered user of the application comprises:
providing a proxy registration service; and
and allowing the registered user to register for other users having family relations with the registered user based on the certification information of the family relation information through the proxy registration service.
14. An apparatus for establishing a home network based on user information, comprising:
the first acquisition module is used for acquiring the family relationship information under the condition that a registered user of the application program provides the family relationship information;
the second acquisition module is used for acquiring the use authorization of the family relationship information;
the home network module is used for establishing a home network by the user groups belonging to the same family according to the family relation information of which the use authorization is obtained;
a familiarity evaluation module for obtaining a familiarity evaluation score for evaluating a proficiency level of each user in the home network in using the application program based on usage data of the application program by each user in the home network; and
the family member monitoring and authorizing module is used for endowing risk early warning notification authority to at least one user with the familiarity evaluation score being greater than or equal to the critical familiarity score in the family network; wherein the authorized user given the risk pre-warning notification permission has a permission to intervene in the use of the application by other users in the home network.
15. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-13.
16. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 13.
17. A computer program product comprising a computer program which, when executed by a processor, implements a method according to any one of claims 1 to 13.
CN202210183293.6A 2022-02-25 2022-02-25 Method, apparatus, device and medium for establishing home network based on user information Pending CN114553569A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210183293.6A CN114553569A (en) 2022-02-25 2022-02-25 Method, apparatus, device and medium for establishing home network based on user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210183293.6A CN114553569A (en) 2022-02-25 2022-02-25 Method, apparatus, device and medium for establishing home network based on user information

Publications (1)

Publication Number Publication Date
CN114553569A true CN114553569A (en) 2022-05-27

Family

ID=81679267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210183293.6A Pending CN114553569A (en) 2022-02-25 2022-02-25 Method, apparatus, device and medium for establishing home network based on user information

Country Status (1)

Country Link
CN (1) CN114553569A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106415630A (en) * 2014-05-30 2017-02-15 苹果公司 Family accounts for an online content storage sharing service
CN107025227A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 User is to the determination of the familiarity of product, information sifting, processing method and processing device
CN113723965A (en) * 2021-09-01 2021-11-30 中电金信软件有限公司 Service processing method based on family account, and relationship establishing method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106415630A (en) * 2014-05-30 2017-02-15 苹果公司 Family accounts for an online content storage sharing service
CN107025227A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 User is to the determination of the familiarity of product, information sifting, processing method and processing device
CN113723965A (en) * 2021-09-01 2021-11-30 中电金信软件有限公司 Service processing method based on family account, and relationship establishing method and device

Similar Documents

Publication Publication Date Title
US11803660B2 (en) Secure permissioning of access to user accounts, including secure distribution of aggregated user account data
CA2821095C (en) System and method for detecting fraudulent account access and transfers
US20170061345A1 (en) Systems and methods for electronically monitoring employees to determine potential risk
Lee et al. Profit-maximizing firm investments in customer information security
EP3021274A1 (en) Data privacy management
US20130006844A1 (en) Systems and methods for collateralizing loans
US10187366B2 (en) Systems and methods of user authentication for data services
CA3073714C (en) Method and system for identifying potential fraud activity in a tax return preparation system to trigger an identity verification challenge through the tax return preparation system
WO2012006192A2 (en) Systems and methods for underwriting loans
AU2018291009A1 (en) Detecting synthetic online entities facilitated by primary entities
US11196734B2 (en) Safe logon
US20220067208A1 (en) Systems and Methods for Providing Access Security, Anonymization, and Compliance Evaluation for Enterprise Data
US20220036253A1 (en) Evaluation of a registration process
US20180018747A1 (en) Risk based medical identity theft prevention
Afanu et al. Mobile Money Security: A Holistic Approach
CN114553569A (en) Method, apparatus, device and medium for establishing home network based on user information
US11854103B2 (en) Systems and methods for state-based risk analysis and mitigation for exam registration and delivery processes
US20210350020A1 (en) De-identified Identity Proofing Methods and Systems
Sloane Raising data privacy standards: The united states' need for a uniform data protection regulation
US11961029B2 (en) Systems and methods for electronically monitoring employees to determine potential risk
CN112702410B (en) Evaluation system, method and related equipment based on blockchain network
US11875242B2 (en) Systems and methods for risk analysis and mitigation with nested machine learning models for exam registration and delivery processes
US20220036489A1 (en) Recommendation engine for testing conditions based on evaluation of test entity scores
Isa et al. The Effect Of Trust And Risk On Interest Using Mobile Banking
US20240086923A1 (en) Entity profile for access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination