CN114553569B - Method, device, equipment and medium for establishing home network based on user information - Google Patents

Method, device, equipment and medium for establishing home network based on user information Download PDF

Info

Publication number
CN114553569B
CN114553569B CN202210183293.6A CN202210183293A CN114553569B CN 114553569 B CN114553569 B CN 114553569B CN 202210183293 A CN202210183293 A CN 202210183293A CN 114553569 B CN114553569 B CN 114553569B
Authority
CN
China
Prior art keywords
home network
user
users
familiarity
family
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210183293.6A
Other languages
Chinese (zh)
Other versions
CN114553569A (en
Inventor
张朕
谷丽雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210183293.6A priority Critical patent/CN114553569B/en
Publication of CN114553569A publication Critical patent/CN114553569A/en
Application granted granted Critical
Publication of CN114553569B publication Critical patent/CN114553569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present disclosure provides a method for establishing a home network based on user information, which can be applied to the technical field of information security. The method comprises the following steps: acquiring family relation information under the condition that a registered user of an application program provides the family relation information; obtaining use authorization of family relation information; according to the family relation information of the obtained use authorization, constructing a family network by users belonging to the same family; obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network in using the application based on usage data of the application by each user in the home network; and giving risk early warning notification rights to at least one user in the home network with a familiarity evaluation score greater than or equal to the critical familiarity score; the present disclosure also provides an apparatus, device, storage medium, and program product for establishing a home network based on user information.

Description

Method, device, equipment and medium for establishing home network based on user information
Technical Field
The present disclosure relates to the field of information security, and more particularly, to a method, apparatus, device, medium, and program product for establishing a home network based on user information.
Background
When an application program is used for user management, each registered user is usually managed as an independent individual, so that after different members in a family register the application program respectively, the family members are split into independent users in the application program, and no distinction is made between the independent users and strangers. This does not allow family members to assist and support each other in using the application. For example, when using home property related applications such as shopping, cell phone banking, internet banking, financial, payment, etc., parents and children encounter security risks such as telecommunication fraud or problems that do not operate, help or support cannot be sought through the intervention of trusted family members.
Disclosure of Invention
In view of the foregoing, the present disclosure provides methods, apparatuses, devices, media, and program products for establishing a home network based on user information that may improve the mutual assistance and support between family members.
According to a first aspect of the present disclosure, there is provided a method of establishing a home network based on user information. The method comprises the following steps: acquiring family relation information under the condition that a registered user of an application program provides the family relation information; obtaining use authorization of the family relation information; according to the family relation information of the obtained use authorization, constructing a family network by users belonging to the same family; obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network in using the application program based on usage data of the application program by each user in the home network; and giving risk early warning notification rights to at least one user in the home network having the familiarity evaluation score greater than or equal to a critical familiarity score; wherein the authorized user given the risk early warning notification authority has authority to intervene in the use of the application program by other users in the home network.
According to an embodiment of the present disclosure, the obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network to use the application program based on the usage data of the application program by each user in the home network includes: acquiring the use data of each user for each of N functions of the application program to obtain N function use data, wherein N is an integer greater than or equal to 1; and weighting the N function use data of each user to obtain the familiarity evaluation score of each user.
According to an embodiment of the present disclosure, the usage data includes at least one of the following dimension data: based on the extent of the transaction amount, based on the frequency of operation of the frequency of operation, or based on the familiarity of operation of the individual transaction durations.
According to an embodiment of the present disclosure, the familiarity evaluation score is positively correlated with the degree of breadth and the frequency of operation, and is negatively correlated with the operational familiarity.
According to an embodiment of the present disclosure, the obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network to use the application program based on the usage data of the application program by each user in the home network further includes: the usage data of the application program by each user in the home network is acquired through a buried point.
According to an embodiment of the present disclosure, the method further comprises: under the condition that M home networks are built, calculating the average value of the familiarity evaluation scores of the users in each home network to obtain M average values, wherein M is an integer greater than 1; and determining the critical familiarity score based on the M averages.
According to an embodiment of the present disclosure, the method further comprises: and setting monitoring content of other users in the home network based on the operation of the authorized user.
According to an embodiment of the present disclosure, the monitoring content includes at least one of: transaction amount, function used, or family member.
According to an embodiment of the present disclosure, the method further comprises: when other users in the home network appear the operation behavior in the monitoring content, sending approval notification to the authorized user; allowing execution of the operation behavior in case of receiving a reply message of the authorized user indicating agreement; and refusing the execution of the operation behavior under the condition that the reply information representing refusal of the authorized user is received.
According to an embodiment of the present disclosure, the sending an approval notification to the authorized user when the operation behavior in the monitoring content occurs to other users in the home network includes: repeating the following operations until a reply is received or no authorized user is not notified in the home network: when the home network comprises a plurality of authorized users, preferentially sending the approval notice to the authorized users which are not notified in the home network and have the highest familiarity evaluation scores; and when the reply of the notified authorized user is not received within a preset time, transmitting the approval notice to the authorized user with the highest familiarity evaluation score in the rest non-notified authorized users.
According to an embodiment of the present disclosure, the method further comprises: when all the authorized users in the home network do not reply within the preset time length, sending a voting interrogation notice to all the users in the home network; the votes of all users in the home network are checked based on a preset rule, and a check result is obtained; allowing execution of the operational behaviour if the result of the interrogation is consent; and refusing the execution of the operation behavior under the condition that the result of the interrogation is refusal.
According to an embodiment of the present disclosure, before the obtaining the family relationship information, the method further includes: and acquiring the family relation information and the certification information provided by the registered user of the application program.
According to an embodiment of the present disclosure, the acquiring the family relationship information and the proof information thereof provided by the registered user of the application program includes: providing a generation registration service; and allowing the registered user to register for other users having a family relationship with the registered user based on the certification information of the family relationship information through the generation registration service.
In a second aspect of the disclosed embodiments, an apparatus for establishing a home network based on user information is provided. The device comprises a first acquisition module, a second acquisition module, a home network module, a familiarity evaluation module and a family member monitoring authorization module. The first acquisition module is used for acquiring family relation information under the condition that a registered user of the application program provides the family relation information. And the second acquisition module is used for acquiring the use authorization of the family relation information. The home network module is used for constructing a home network from users belonging to the same home according to the home relation information of the obtained use authorization. The familiarity evaluation module is configured to obtain a familiarity evaluation score for evaluating proficiency of each user in the home network to use the application program based on usage data of the application program by each user in the home network. The family member monitoring and authorizing module is used for giving risk early warning notification authority to at least one user with the familiarity evaluation score being greater than or equal to a critical familiarity score in the home network; wherein the authorized user given the risk early warning notification authority has authority to intervene in the use of the application program by other users in the home network.
According to an embodiment of the present disclosure, the family member monitoring authorization module is further configured to: under the condition that M home networks are built, calculating the average value of the familiarity evaluation scores of the users in each home network to obtain M average values, wherein M is an integer greater than 1; and determining the critical familiarity score based on the M averages.
According to an embodiment of the present disclosure, the apparatus further comprises a family member assisted intervention module. The family member auxiliary intervention module is used for setting monitoring content of other users in the home network based on the operation of the authorized user.
According to an embodiment of the present disclosure, the family member assisted intervention module is further configured to: when other users in the home network appear the operation behavior in the monitoring content, sending approval notification to the authorized user; allowing execution of the operation behavior in case of receiving a reply message of the authorized user indicating agreement; and refusing the execution of the operation behavior under the condition that the reply information representing refusal of the authorized user is received.
According to an embodiment of the present disclosure, the family member assisted intervention module is further configured to: when all the authorized users in the home network do not reply within the preset time length, sending a voting interrogation notice to all the users in the home network; the votes of all users in the home network are checked based on a preset rule, and a check result is obtained; allowing execution of the operational behaviour if the result of the interrogation is consent; and refusing the execution of the operation behavior under the condition that the result of the interrogation is refusal.
In a third aspect of the disclosed embodiments, an electronic device is provided. The electronic device includes one or more processors and one or more memories. The memory is configured to store one or more programs that, when executed by the one or more processors, cause the one or more processors to perform the above-described method.
In a fourth aspect of the disclosed embodiments, there is also provided a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described method.
In a fifth aspect of the disclosed embodiments, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements the above method.
According to the embodiment of the disclosure, after the home network is constructed based on the family relation information, a user with the proficiency degree conforming to the application program is selected as an administrator (i.e. an authorized user) of the home network according to the proficiency degree of the user in the home network, and the operation of other users using the application program in the home network can be interfered (for example, guidance or approval control) to provide a channel for mutual assistance and support among the family members, and provide a more reliable safety protection path for the family members to cope with risks.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
Fig. 1 schematically illustrates an application scenario diagram of a method, apparatus, device, medium and program product for establishing a home network based on user information according to an embodiment of the present disclosure;
fig. 2 schematically illustrates a flowchart of a method of establishing a home network based on user information according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart for obtaining a familiarity evaluation score in a method according to one embodiment of the present disclosure;
Fig. 4 schematically illustrates a flowchart of a method of establishing a home network based on user information according to another embodiment of the present disclosure;
Fig. 5 schematically illustrates a flowchart of a method of establishing a home network based on user information according to still another embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of intervention in operational behavior in a family member presence monitoring content in a method according to an embodiment of the present disclosure;
fig. 7 schematically illustrates a block diagram of an apparatus for establishing a home network based on user information according to an embodiment of the present disclosure;
fig. 8 schematically illustrates an application flowchart of an apparatus for establishing a home network based on user information according to an embodiment of the present disclosure; and
Fig. 9 schematically illustrates a block diagram of an electronic device adapted to implement a method of establishing a home network based on user information according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a convention should be interpreted in accordance with the meaning of one of skill in the art having generally understood the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the authorization or consent of the user is obtained before the personal information (such as the family relation information of the user) of the user is obtained or collected and used.
The embodiment of the disclosure provides a method, a device, equipment, a medium and a program product for establishing a home network based on user information. The method comprises the following steps: firstly, under the condition that a registered user of an application program provides family relation information, acquiring the family relation information; then obtaining the use authorization of family relation information; after obtaining the use authorization, according to the family relation information of obtaining the use authorization, constructing the users belonging to the same family into a family network; next, based on the usage data of the application by each user in the home network, a familiarity evaluation score for evaluating the proficiency of each user in the home network to use the application is obtained; and then, giving risk early warning notification authority to at least one user with the familiarity evaluation score being greater than or equal to the critical familiarity score in the home network. The authorized user given the risk early warning notification authority corresponds to an administrator of the home network, and has authority to intervene in the use of the application program by other users in the home network.
In this way, the embodiments of the present disclosure may integrate the relationship between users of an application program, and under the condition that the use authorization of the users is obtained, the users belonging to one family are built into one home network, thereby breaking the barrier between the users belonging to one family, building a home network with the users as the center, and making the users belonging to one family generate the relationship. Also, according to embodiments of the present disclosure, in each home network, users who meet the requirements of the application's usage proficiency (i.e., familiarity score greater than or equal to the critical familiarity score) may be granted permission to intervene in other users' usage of the application. Thus, in a home network, the use behavior of other users can be assisted or managed by authorized users with high proficiency in the use of the application. In this way, a channel of interaction and support between family members is provided, and a more reliable security approach is provided for family members to deal with risk. For example, when the application program is an electronic bank (e.g., a mobile banking, an internet banking, etc.), the authorized user may be notified to check the security of the operation in time when the old or the child in the home performs some transactions or operations that may have security risks, so that the property security in the home is protected at the first time, and the loss of the property in the home is prevented. For another example, when the old and children do not know how to do so when they are stuck in a certain operation during a certain function of the application program, guidance and assistance can be requested from authorized users in the home network, and the family members can be assisted by virtue of relatives to better acquire services provided by the application program.
It should be noted that the method, apparatus, device, medium and program product for establishing a home network based on user information according to the embodiments of the present disclosure may be used in the financial field, and may also be used in any field other than the financial field (e.g., education, medical treatment, logistics, consumption, etc.), and the present disclosure does not limit the application field.
In the technical scheme of the embodiment of the disclosure, the related processes of collection, storage, use, processing, transmission, provision, disclosure, application and the like of the user personal information (such as family relation information, user account information and the like) all conform to the regulations of related laws and regulations, necessary security measures are adopted, and the public welfare is not violated.
Fig. 1 schematically illustrates an application scenario diagram of a method, apparatus, device, medium and program product for establishing a home network based on user information according to an embodiment of the present disclosure. It should be noted that fig. 1 illustrates only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but it does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments, or scenarios.
As shown in fig. 1, an application scenario 100 according to this embodiment may include at least one terminal device (three 101, 102, 103 are shown in the figure), a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon clients of application programs, such as a browser, a shopping class application, a financial class application, a payment class application, an electronic bank (mobile banking or internet banking, etc.), an instant messaging class application, etc. The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing back-end management support for client applications used by users with the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the method for establishing a home network based on user information provided in the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the apparatus, device, medium, and program product for establishing a home network based on user information provided by the embodiments of the present disclosure may be generally provided in the server 105. The method of establishing a home network based on user information provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the apparatus, device, medium, and program product for establishing a home network based on user information provided by the embodiments of the present disclosure may also be provided in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
A method of establishing a home network based on user information according to an embodiment of the present disclosure will be described in detail with reference to fig. 2 to 6 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flowchart of a method of establishing a home network based on user information according to an embodiment of the present disclosure.
As shown in fig. 2, the method of establishing a home network based on user information may include operations S210 to S250.
In case that the registered user of the application provides the family relationship information, the family relationship information is acquired in operation S210. The application may provide financial services including payment, shopping, transfer, money transfer, deposit, investment or financial, and the like. The family relationship information may include, for example, account information of the user himself and his family, and relationship information between each other.
In some embodiments, the user may be given the option of whether to provide family relationship information at his will. When the user provides the family relation information, the user can be simultaneously required to provide the certification information of the family relation information, such as the household registration information, the identity certification information, the notary certification provided by a notary authority, the face recognition or the telephone number, and the like, so that the provided family relation information is ensured to be real, correct and effective.
In other embodiments, the application may provide a proxy registration service for proxy registration among family members. By this generation registration service, registered users are allowed to register for other users having a family relationship with themselves based on the certification information of their family relationship information. For example, when a user helps a child or parent to register an account with an electronic bank, this may be done through the generation registration service. So that family relation information provided by the user can be acquired based on the generation registration service.
In operation S220, a use authorization for the family relationship information is acquired. For example, a request for use authorization is sent to the user who provided the family relationship information, and when the user authorizes use of his family relationship information, the use authorization of the family relationship information is acquired. Since the family relationship information may involve a plurality of users, when obtaining the use authorization of the family relationship information, authorization requests should be sent to the plurality of users, respectively, and when all member users in the family relationship information allow the use of the family relationship information, the party may obtain the use authorization of the family relationship information.
In operation S230, users belonging to the same home are constructed as a home network according to the home relationship information for which the use authorization is obtained. For example, when the family relationship information includes account information of the family of each user, the users may be associated with each other according to the account information, and a family network may be established.
In operation S240, a familiarity evaluation score for evaluating proficiency of each user in the home network to use the application is obtained based on the usage data of the application by each user in the home network.
For example, the usage data of the application by each user in the home network through the terminal devices 101, 102, 103 may be acquired by buried big data analysis. The usage data of the application program may be the usage data of the whole application program (such as the number of times of usage, transaction amount, or single operation time) in a period of time, or may be the usage data of the application program obtained by respectively differentiating the usage data under different functions (such as the number of times of usage, transaction amount, or single operation time for each function) according to a plurality of functions of the application program and weighting the usage data of the different functions.
According to one embodiment of the present disclosure, whether the usage data is collected with the application as a whole as analysis granularity, or with individual functions in the application as analysis granularity groupings, the collected usage data may include at least one of the following dimension data: based on the extent of the transaction amount, based on the frequency of operation of the frequency of operation, or based on the familiarity of operation of the individual transaction durations.
In particular, based on the extent of the transaction amount, it may be characterized, for example, by a maximum, average, or cumulative value of the transaction amount over a period of time (e.g., half a year).
The frequency of operation based on the frequency of operation may be characterized, for example, by an accumulated number of operations over a period of time (e.g., half a year), an average number of operations per month/frequency, or a maximum number of operations per month.
The operational familiarity based on the operational duration of a single transaction may be characterized, for example, by an average single operational duration of a single transaction over a period of time (e.g., half a year), or a maximum duration of a single transaction, etc.
According to the embodiment of the disclosure, since the operation familiarity is characterized by a single operation duration or the like, meaning that the longer the operation duration, the lower the familiarity of the user with the application or the function is explained. And the higher the degree of breadth and/or frequency of operation, the higher the familiarity of the user with the application or function. Accordingly, when the familiarity evaluation score is calculated based on the usage data, the familiarity evaluation score is positively correlated with the degree of breadth and the frequency of operation, and is negatively correlated with the degree of operation familiarity.
According to an embodiment of the present disclosure, the familiarity evaluation score may be obtained by setting a uniform algorithm model for all users in the application program, and then outputting the familiarity evaluation score for each user from the algorithm model according to the usage data of the application program by each user. The familiarity evaluation score thus obtained has a general reference meaning in the whole network in which the entire application program is run.
Alternatively, the familiarity evaluation score may be obtained by sorting the users in the home network according to a predetermined rule (for example, according to the size of the transaction amount) for each user's usage data within the home network, and assigning different familiarity evaluation scores to the users sorted at different positions. The familiarity evaluation score thus obtained has relativity within one household.
In operation S250, at least one user having a familiarity evaluation score greater than or equal to a critical familiarity score in the home network is given risk early warning notification authority. Wherein the authorized user given the risk early warning notification authority has authority to intervene in the use of the application program by other users in the home network.
The critical familiarity score is a parameter used to distinguish between familiarity or unfamiliarity of a user with an application and may be obtained by any means including, but not limited to: the familiarity evaluation score of the application program is determined according to the statistical analysis of the familiarity evaluation scores of most users of the application program, or according to the average value of the familiarity evaluation scores of users in each home network in the built home network, or is determined by performing the statistical analysis through experimental tests by frequently using the familiarity evaluation score of the user of the application program, or is determined by setting an initial value according to experience and adjusting according to a certain modification condition in actual operation.
According to the embodiment of the disclosure, the home relation information among users is integrated and utilized by constructing the home network, and in user management of the application program, a management mode taking the home network as a unit is expanded. The method is characterized in that the familiarity evaluation score of the family members using the application program is used as a basis, and the monitoring authorities of mutual assistance and mutual supervision are relatively objectively and safely given to the users meeting the requirements in the family members. Especially for an application program providing financial services, the method of the embodiment of the disclosure can protect the account security of family members from the perspective of families, reduce the risk of fraud of the family members and improve the security risk awareness of each family member user.
According to the embodiment of the disclosure, by means of a user management mode taking a home network as a unit, part of risk monitoring authorities can be put down to users meeting the conditions of application program using proficiency in the home, so that the users can be notified to the security early warning at the first time when the security risk occurs, and the security of family property is ensured by using trust among the family members. Moreover, the user management mode taking the home network as a unit can help the family members to realize the use and mutual support of the online handle instruction application program.
Fig. 3 schematically illustrates a flowchart of obtaining a familiarity evaluation score at operation S240 in a method according to an embodiment of the present disclosure.
As shown in fig. 3, operation S240 may include operations S301 to S302 according to an embodiment of the present disclosure.
First, in operation S301, usage data of each of N functions of an application by each user is acquired, and N function usage data is obtained, where N is an integer greater than or equal to 1. The "function usage data" herein indicates that the user uses data of each function of the application program, and the comparison analysis method and/or the grouping analysis method can be used to collect usage data of N functions, so as to obtain N function usage data correspondingly. The granularity of the functional division of the application program can be determined according to actual needs. For example, in electronic banking, the funds and precious metals may be divided into two functions, respectively, or into investment financial functions.
Then, in operation S302, weighting processing is performed on the N function usage data of each user, to obtain a familiarity evaluation score of each user. For example, the weight of the usage data of each function may be set according to the risk level of different functions in the application program, and weighting processing may be performed on the N function usage data.
For example, when the application is electronic banking, transfer of money, payment, remittance, etc. involving the transfer of property may be regarded as a high risk function, while purchase of financial products, purchase of funds, transfer of demand deposit into regular deposits, etc. are mainly transfer of user funds between different accounts, and may be regarded as a low risk service. In one embodiment, during the weighting process in operation S302, a higher weight may be set for the high risk function and a lower weight may be set for the low risk service, so that the resulting familiarity evaluation score may more represent the proficiency of the user in operating the high risk service.
In one embodiment, when the acquired usage data of each function includes the previously described degree of the breadth based on the transaction amount, the frequency of the operation based on the operation frequency, or the operation familiarity based on the operation duration of the single transaction, the familiarity evaluation score of the user may be calculated according to the following formula (1):
In the formula (1), P is a familiarity evaluation score;
i is the ith function of the application program, wherein the value of i is 1-N;
Omega i is the weight of the ith function of the application;
a i is how widely the user uses the ith function of the application, such as transfer amount, investment financial amount, or remittance amount; positively correlating with the familiarity evaluation score P;
b i is the operation frequency of the ith function of the application program used by the user, for example, the accumulated operation times or the average operation times in the month, etc.; positively correlating with the familiarity evaluation score P;
c i is the operational familiarity of the user with the ith function of the application, e.g., average single transaction operational duration; is inversely related to the familiarity evaluation score P.
Fig. 4 schematically illustrates a flowchart of a method of establishing a home network based on user information according to another embodiment of the present disclosure.
As shown in fig. 4, according to the embodiment, the method of establishing a home network based on user information may include operations S440 and S450 in addition to operations S210 to S250, wherein operations S440 and S450 may be performed after operation S240 and before operation S250.
First, a home network is constructed and a familiarity evaluation score is obtained for each user in the home network through operations S210 to S240.
Then, in case of constructing M home networks, an average value of familiarity evaluation scores of users in each home network is calculated to obtain M average values, where M is an integer greater than 1, in operation S440.
Next, in operation S450, a critical familiarity score is determined based on the M average values. For example, M averages are ranked, median taken, or number ranked at a particular location (e.g., the first 30% location) is taken as the critical familiarity score.
Thereafter, at operation S250, at least one user having a familiarity evaluation score greater than or equal to a critical familiarity score in the home network is given risk early warning notification authority.
The critical familiarity score obtained in the method considers the personnel composition distribution characteristics of family members, can enable the screened authorized users to be more objective and reliable, and can avoid the situation that the critical familiarity score is too high to screen out authorized users meeting qualification in many families.
Fig. 5 schematically illustrates a flowchart of a method of establishing a home network based on user information according to still another embodiment of the present disclosure.
As shown in fig. 5, according to the embodiment, the method of establishing a home network based on user information may further include operations S560 to S580 in addition to operations S210 to S250.
Specifically, a home network is built through operations S210 to S250, and an authorized user having a risk early warning notification authority is selected. The operations S210 to S250 may be described with reference to the foregoing descriptions, and are not repeated here.
Then, in operation S560, monitoring contents for other users in the home network are set based on the operation of the authorized user. The monitoring content may include, for example, at least one of: transaction amount, function used, or family member.
The transaction amount monitoring may, for example, set that a user in the home network intervenes in the transaction after the transaction amount of the operations such as external transfer or remittance exceeds the corresponding amount.
Using function monitoring, for example, a menu of functions used by some users in the home network may be set, and intervention is performed when the user uses the functions.
Family member monitoring may, for example, set up that certain users (e.g., children) in the home network intervene when operating an application.
Then in operation S570, when other users in the home network appear to monitor the operation behavior in the content, an approval notification is sent to the authorized user.
Next, in operation S580, in case that the approval of the authorized user passes, the execution of the operation behavior is allowed. In particular, the execution of the operation behavior may be allowed in case a reply message indicating agreement of the authorized user is received. Accordingly, the execution of the operation behavior may be denied in the case where a reply message indicating denial of the authorized user is received.
In one embodiment, when a plurality of authorized users are included in the home network, approval passing may be sent to a user having the highest familiarity evaluation score among the plurality of authorized users, or approval notification may be sent to each of the plurality of authorized users. In one embodiment, when approval notifications can be sent to multiple authorized users, the approval notifications can be sent to the authorized users with the highest familiarity evaluation score in the home network preferentially, and when replies of the notified authorized users are not received within a preset time length, the approval notifications are sent to the authorized users with the highest familiarity evaluation score in other authorized users in a forward manner; and continues until there is a reply from an authorized user, or until there is no more authorized user. Or in another embodiment, when approval notices can be sent to multiple authorized users, the approval notices can also be sent to the multiple authorized users in parallel, and the reply of the authorized user with the earliest feedback is taken as an approval result, or the reply of the authorized user with the highest familiarity evaluation score among the multiple authorized users is taken as an approval result. In this way, the problem that one or more authorized users in the family can not timely perform intervention treatment of monitoring content under special conditions such as airplane taking or information returning in time is avoided.
In one embodiment, a vote-interrogation notification may be sent to all users in the home network when none of the authorized users in the home network reply within a predetermined period of time; the method comprises the steps of conducting a trial on votes of all users in a home network based on preset rules (for example, more than half of the votes) to obtain a trial result; allowing execution of the operation behavior under the condition that the result of the interrogation is consent; and refusing the execution of the operation behavior in case that the result of the interrogation is refusal.
According to the embodiment of the disclosure, part of risk monitoring authorities can be put down to authorized users with risk early warning notification authorities in families, so that the trust among family members can be utilized when security risks occur to further guarantee the security of family property.
Fig. 6 schematically illustrates a flow chart of intervention in an operational behavior in a family member presence monitoring content in a method according to an embodiment of the present disclosure. Wherein fig. 6 illustrates an electronic silver behavior example, the critical familiarity score is represented by s.
As shown in fig. 6, the flow may include operations S601 to S608.
In operation S601, the user a performs a risk transaction in monitoring content in the home network.
In operation S602, whether the familiarity evaluation score of the user a is higher than S (i.e., a critical familiarity score). If yes, the transaction is directly executed. If not, intervention of authorized users with risk early warning notification authority in the home network is needed, and the specific intervention process is realized through operations S603-S608.
In operation S603, the transaction information is notified to the member with the highest familiarity evaluation score that is higher than S score and that is not notified in the home network for approval.
In operation S604, whether the notified user is approved for a preset period of time (e.g., k minutes). If so, a determination is made in operation S606 as to whether the transaction was successful or declined based on the approval results.
If the user notified in operation S604 does not reply over time, it is determined in operation S605 whether there are more users with a familiarity evaluation score higher than S in the home network. If so, returning to operation S603, and informing other users with risk early warning notification authority in the home network in a forward mode to intervene.
If the familiarity evaluation scores of the remaining users in the home network are found to be lower than S after the judgment in operation S605, that is, all have no risk early warning notification authority, the voting interrogation stage may be entered in operation S607. Wherein all users in the home network are informed of the voting interrogation stage to vote for the risk transaction (e.g. allowing the transaction to proceed if most people agree, otherwise rejecting the transaction), in this way it is possible to protect the home property in time by intervention of the family members.
For example, the example: the bank can associate registered users (e.g., bank accounts) of each individual of the small family in the mobile banking as a home network under the condition that the mobile banking is authorized to use the home relationship information when the same mobile banking application is used by the small family 5. And because the small sheets are frequently subjected to financial transactions on the mobile banking, and the transaction amount is more, the small Zhang Que can be considered as an authorized user with risk early warning notification authority in the home network according to the familiarity evaluation score of the small sheets. If the mobile banking detects that the father of the small sheet has an operation behavior (such as a fraud demand transfer) in the monitoring content according to the monitoring content set by the small sheet, the mobile banking can timely inform the small sheet to intervene. If the small sheet cannot be timely replied, other members with familiarity evaluation scores higher than the critical familiarity score in the family can be timely notified. If other members in the family except the small sheets do not have the risk early warning notification authority or other members with the risk early warning notification authority do not reply in time, notifying all members in the home network to conduct the interrogation voting. In this way, aiming at the problems that the old people are fraudulently or the like, the family membership can be utilized to intervene and pacify in relative relationship, and particularly in the case that some old people are fraudulently suffered by being dissuaded by bank staff or the like and are not heard, the method according to the embodiment of the disclosure can more effectively protect the property safety of the whole family
Based on the method for establishing the home network based on the user information in the above embodiments, the embodiment of the present disclosure further provides an apparatus for establishing the home network based on the user information. The device will be described in detail below in connection with fig. 7.
Fig. 7 schematically illustrates a block diagram of an apparatus 700 for establishing a home network based on user information according to an embodiment of the present disclosure.
As shown in fig. 7, an apparatus 700 may include a first acquisition module 710, a second acquisition module 720, a home network module 730, a familiarity evaluation module 740, and a family member monitoring authorization module 750, according to embodiments of the present disclosure. According to some embodiments of the present disclosure, the apparatus 700 may further include a family member assisted intervention module 760. The apparatus 700 may be used to perform the methods described with reference to fig. 2-6.
The first obtaining module 710 is configured to obtain family relationship information in a case where a registered user of an application provides family relationship information, where the application provides a financial service. In one embodiment, the first acquisition module 710 may perform operation S210 described previously.
The second obtaining module 720 is configured to obtain a usage authorization for the family relationship information. In one embodiment, the second acquisition module 720 may perform operation S220 described previously.
The home network module 730 is used for constructing a home network from users belonging to the same home according to the home relationship information for obtaining the use authority. In one embodiment, the home network module 730 may perform operation S230 described previously.
The familiarity evaluation module 740 is for obtaining a familiarity evaluation score for evaluating the proficiency of each user in the home network to use the application based on the usage data of the application by each user in the home network. In one embodiment, the familiarity evaluation module 740 may perform operation S240 described previously.
The family member monitoring authorization module 750 is configured to assign risk early warning notification rights to at least one user in the home network having a familiarity evaluation score greater than or equal to a critical familiarity score; wherein the authorized user given the risk early warning notification authority has authority to intervene in the use of the application program by other users in the home network. In one embodiment, the family member monitoring authorization module 750 may perform operation S250 described previously.
In some embodiments, family member monitoring authorization module 750 is further to: under the condition that M home networks are built, calculating the average value of familiarity evaluation scores of users in each home network to obtain M average values, wherein M is an integer greater than 1; and determining a critical familiarity score based on the M averages. According to this embodiment, the family member monitoring authority module 750 may perform operations S440 to S450 described previously.
The family member auxiliary intervention module 760 is configured to set monitoring content for other users in the home network based on an operation of the authorized user, and send approval notification to the authorized user when the other users in the home network have operation behaviors in the monitoring content, and allow execution of the operation behaviors if the authorized user passes the approval. In one embodiment, the family member auxiliary intervention module 760 may perform operations S560 to S580 described previously.
In some embodiments, the family member assisted intervention module 760 may be specifically configured to: when other users in the home network appear monitoring the operation behavior in the content, an approval notice is sent to the authorized user; allowing execution of the operation behavior in case of receiving a reply message indicating agreement of the authorized user; and refusing the execution of the operation behavior in case of receiving a reply message of the authorized user indicating refusal.
In other embodiments, the family member assisted intervention module 760 may be specifically configured to: when all authorized users in the home network do not reply within a preset time length, sending a voting interrogation notice to all users in the home network; the votes of all users in the home network are checked based on a preset rule, and a check result is obtained; allowing execution of the operation behavior under the condition that the result of the interrogation is consent; and refusing the execution of the operation behavior in case that the result of the interrogation is refusal.
Fig. 8 schematically illustrates an application flowchart of an apparatus 700 for establishing a home network based on user information according to an embodiment of the present disclosure. The following describes an exemplary application flow of the apparatus 700 in fig. 8 using the application program as an electronic bank. It is to be understood that this description is merely an exemplary presentation and is not intended to limit the present disclosure in any way.
Referring to fig. 7, as shown in fig. 8, the application procedure of the apparatus 700 in electronic banking may include the following six steps:
Step1, the home network module 730 records the family relationship information of the user, and stores the family member information and the relationship in the system database of the module.
And 2, analyzing the buried point big data, and acquiring data of various functions of the electronic bank used by the user from production through a big data platform according to the operation condition of the electronic bank functions of each user in the home network and the risk level of the used functions. For example, it may include: the importance of the functions operated-high risk services such as transfer, payment, remittance, etc., or low risk services such as financial, fund, regular deposit, etc.; the user uses each function widely-such as transfer money amount, investment financial amount, etc.; the operation frequency of each function used by the user-the operation accumulated times per month; operational familiarity- -e.g., the time to operate a transaction.
The above various dimension records are combined and the usage of the electronic bank by each user is uploaded to the familiarity evaluation module 740.
And 3, the familiarity evaluation module 740 further uses a comparison analysis method and a grouping analysis method to calculate the operation results of the wide degree, the operation frequency and the operation familiarity of various transactions operated by the electronic bank in the last half year of the customer for various data downloaded by the big data analysis platform in the step 2, performs statistical analysis based on a model constructed by a formula (1), calculates the parameters of all dimensions to obtain a familiarity evaluation score P, and uploads the results to the home network module for recording.
Step 4, the family member monitoring authorization module 750 uses the familiarity evaluation score of each client in the family recorded in the home network module, and the family total score (the sum of the familiarity evaluation scores of the family members, respectively). And (5) after the weighted treatment of the total household scores of the plurality of household networks is recalculated, obtaining a relatively objective critical familiarity score. And then, the household member clients with the highest familiarity score greater than the critical familiarity score can be endowed with household member risk early warning notification rights, namely, when the clients in the household members conduct large-amount transactions, system message notification and short message notification early warning can be received and approval rights are provided for intervention of the household member clients to complete the transactions. And the property of all members in the family is guaranteed not to be lost.
Step 5, a family member auxiliary intervention module 760 is provided, into which the user given the risk early warning notification authority can enter, through which monitoring-like content of the user in the home network can be set, including transaction amount monitoring, usage function monitoring or family member monitoring, etc.
In step 6, the family member auxiliary intervention module 760 intervenes on the operation behavior of the user when the user in the home network appears to monitor the operation behavior set in the content, and the specific process of the intervention can be referred to as the schematic diagram in fig. 6.
According to embodiments of the present disclosure, any of the first acquisition module 710, the second acquisition module 720, the home network module 730, the familiarity evaluation module 740, the family member monitoring authorization module 750, and the family member assisted intervention module 760 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Or at least some of the functionality of one or more of the modules may be combined with, and implemented in, at least some of the functionality of other modules. According to embodiments of the present disclosure, at least one of the first acquisition module 710, the second acquisition module 720, the home network module 730, the familiarity evaluation module 740, the family member monitoring authorization module 750, and the family member assisted intervention module 760 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or as hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or as any one of or a suitable combination of any of the three implementations of software, hardware, and firmware. Or at least one of the first acquisition module 710, the second acquisition module 720, the home network module 730, the familiarity evaluation module 740, the family member monitoring authorization module 750, and the family member assisted intervention module 760 may be at least partially implemented as a computer program module which, when executed, may perform the corresponding functions.
Fig. 9 schematically illustrates a block diagram of an electronic device 900 adapted to implement a method of establishing a home network based on user information according to an embodiment of the present disclosure.
As shown in fig. 9, an electronic device 900 according to an embodiment of the present disclosure includes a processor 901 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. The processor 901 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 901 may also include on-board memory for caching purposes. Processor 901 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the electronic device 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other by a bus 904. The processor 901 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the program may be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the disclosure, the electronic device 900 may also include an input/output (I/O) interface 905, the input/output (I/O) interface 905 also being connected to the bus 904. The electronic device 900 may also include one or more of the following components connected to the I/O interface 905: an input section 906 including a keyboard, a mouse, and the like; an output portion 907 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 908 including a hard disk or the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as needed. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 910 so that a computer program read out therefrom is installed into the storage section 908 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 902 and/or RAM 903 and/or one or more memories other than ROM 902 and RAM 903 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to perform the methods provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 901. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed, and downloaded and installed in the form of a signal on a network medium, via communication portion 909, and/or installed from removable medium 911. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from the network via the communication portion 909 and/or installed from the removable medium 911. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 901. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. These examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (15)

1. A method of establishing a home network based on user information, comprising:
Acquiring family relation information and proving information thereof under the condition that registered users of an application program provide the family relation information, wherein the family relation information comprises account information of a plurality of users and relation information among the plurality of users; the proving information is used for proving that the family relation information is true and effective;
Sending authorization requests for acquiring the use authorization of the family relation information to the plurality of users respectively, and acquiring the use authorization of the family relation information when all users in the family relation information allow the use of the family relation information;
associating account information of the plurality of users according to the family relation information for obtaining the use authorization so as to construct users belonging to the same family into a family network;
acquiring the use data of each user in the court network for the application program;
Obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network in using the application program based on usage data of the application program by each user in the home network; and
Assigning risk early warning notification rights to at least one user in the home network having the familiarity evaluation score greater than or equal to a critical familiarity score; wherein the authorized user given the risk early warning notification authority has authority to intervene in the use of the application program by other users in the home network;
Wherein the critical familiarity score is obtained by any one of the following means:
A statistical analysis determination based on the familiarity evaluation score for a user in the application;
Determining according to an average value of the familiarity evaluation scores of users in a home network that is successfully built; or alternatively
And (3) determining by experimentally testing the familiarity evaluation scores of users who frequently use the application program and performing statistical analysis.
2. The method of claim 1, wherein the obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network in using the application based on the usage data of the application by each user in the home network comprises:
acquiring the use data of each user for each of N functions of the application program to obtain N function use data, wherein N is an integer greater than or equal to 1; and
And weighting the N function use data of each user to obtain the familiarity evaluation score of each user.
3. The method of claim 1 or 2, wherein the usage data comprises at least one of the following dimension data:
based on the extent of the transaction amount, based on the frequency of operation of the frequency of operation, or based on the familiarity of operation of the individual transaction durations.
4. The method of claim 3, wherein,
The familiarity evaluation score is positively correlated with the degree of breadth and the frequency of operation, and is negatively correlated with the degree of operation familiarity.
5. The method of claim 1, wherein the obtaining a familiarity evaluation score for evaluating proficiency of each user in the home network in using the application based on the usage data of the application by each user in the home network further comprises:
The usage data of the application program by each user in the home network is acquired through a buried point.
6. The method of claim 1, wherein the method further comprises:
under the condition that M home networks are built, calculating the average value of the familiarity evaluation scores of the users in each home network to obtain M average values, wherein M is an integer greater than 1; and
The critical familiarity score is determined based on the M averages.
7. The method of claim 1, wherein the method further comprises:
And setting monitoring content of other users in the home network based on the operation of the authorized user.
8. The method of claim 7, wherein the monitoring content comprises at least one of:
Transaction amount, function used, or family member.
9. The method according to claim 7 or 8, wherein the method further comprises:
When other users in the home network appear the operation behavior in the monitoring content, sending approval notification to the authorized user;
allowing execution of the operation behavior in case of receiving a reply message of the authorized user indicating agreement; and
And refusing the execution of the operation behavior under the condition that the reply information representing refusal of the authorized user is received.
10. The method of claim 9, wherein the sending an approval notification to the authorized user when the operational behavior in the monitored content occurs by other users in the home network comprises:
repeating the following operations until a reply is received or there is no authorized user in the home network that is not notified,
When the home network comprises a plurality of authorized users, preferentially sending the approval notice to the authorized users which are not notified in the home network and have the highest familiarity evaluation scores; and
And when the reply of the notified authorized user is not received within a preset time, the approval notification is sent to the authorized user with the highest familiarity evaluation score in the rest of the non-notified authorized users.
11. The method of claim 9, wherein the method further comprises:
When all the authorized users in the home network do not reply within a preset time length, sending a voting interrogation notice to all the users in the home network;
The votes of all users in the home network are checked based on a preset rule, and a check result is obtained;
Allowing execution of the operational behaviour if the result of the interrogation is consent; and
And refusing the execution of the operation behavior under the condition that the result of the interrogation is refusal.
12. The method of claim 1, wherein the acquiring the family relationship information and the attestation information thereof provided by the registered user of the application program comprises:
Providing a generation registration service; and
And allowing the registered user to register for other users with the family relationship by the generation registration service based on the proving information of the family relationship information.
13. An apparatus for establishing a home network based on user information, comprising:
A first obtaining module, configured to obtain family relationship information and proof information thereof when a registered user of an application program provides the family relationship information, where the family relationship information includes account information of a plurality of users and relationship information between the plurality of users; the proving information is used for proving that the family relation information is true and effective;
The second acquisition module is used for respectively sending authorization requests for acquiring the use authorization of the family relation information to the plurality of users, and acquiring the use authorization of the family relation information when all the users in the family relation information allow the use of the family relation information;
A home network module for associating account information of the plurality of users according to the home relation information for obtaining the use authorization, so as to build the users belonging to the same home into a home network;
A familiarity evaluation module for acquiring usage data of the application by each user in the home network, and acquiring a familiarity evaluation score for evaluating a proficiency of the application by each user in the home network based on the usage data of the application by each user in the home network; and
The family member monitoring and authorizing module is used for giving risk early warning notification authority to at least one user with the familiarity evaluation score being greater than or equal to a critical familiarity score in the home network; wherein the authorized user given the risk early warning notification authority has authority to intervene in the use of the application program by other users in the home network;
Wherein the critical familiarity score is obtained by any one of the following means:
A statistical analysis determination based on the familiarity evaluation score for a user in the application;
Determining according to an average value of the familiarity evaluation scores of users in a home network that is successfully built; or alternatively
And (3) determining by experimentally testing the familiarity evaluation scores of users who frequently use the application program and performing statistical analysis.
14. An electronic device, comprising:
One or more processors;
Storage means for storing one or more programs,
Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-12.
15. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1 to 12.
CN202210183293.6A 2022-02-25 2022-02-25 Method, device, equipment and medium for establishing home network based on user information Active CN114553569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210183293.6A CN114553569B (en) 2022-02-25 2022-02-25 Method, device, equipment and medium for establishing home network based on user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210183293.6A CN114553569B (en) 2022-02-25 2022-02-25 Method, device, equipment and medium for establishing home network based on user information

Publications (2)

Publication Number Publication Date
CN114553569A CN114553569A (en) 2022-05-27
CN114553569B true CN114553569B (en) 2024-05-24

Family

ID=81679267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210183293.6A Active CN114553569B (en) 2022-02-25 2022-02-25 Method, device, equipment and medium for establishing home network based on user information

Country Status (1)

Country Link
CN (1) CN114553569B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106415630A (en) * 2014-05-30 2017-02-15 苹果公司 Family accounts for an online content storage sharing service
CN107025227A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 User is to the determination of the familiarity of product, information sifting, processing method and processing device
CN113723965A (en) * 2021-09-01 2021-11-30 中电金信软件有限公司 Service processing method based on family account, and relationship establishing method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106415630A (en) * 2014-05-30 2017-02-15 苹果公司 Family accounts for an online content storage sharing service
CN107025227A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 User is to the determination of the familiarity of product, information sifting, processing method and processing device
CN113723965A (en) * 2021-09-01 2021-11-30 中电金信软件有限公司 Service processing method based on family account, and relationship establishing method and device

Also Published As

Publication number Publication date
CN114553569A (en) 2022-05-27

Similar Documents

Publication Publication Date Title
US20240037225A1 (en) Systems and methods for detecting resources responsible for events
US10764297B2 (en) Anonymized persona identifier
US7172118B2 (en) System and method for overcoming decision making and communications errors to produce expedited and accurate group choices
KR20180013998A (en) Account theft risk identification method, identification device, prevention and control system
CN109344583B (en) Threshold determination and body verification method and device, electronic equipment and storage medium
US11924191B2 (en) Safe logon
US20220036253A1 (en) Evaluation of a registration process
US11736448B2 (en) Digital identity network alerts
US20230046813A1 (en) Selecting communication schemes based on machine learning model predictions
US11854103B2 (en) Systems and methods for state-based risk analysis and mitigation for exam registration and delivery processes
CN114553569B (en) Method, device, equipment and medium for establishing home network based on user information
CN115689571A (en) Abnormal user behavior monitoring method, device, equipment and medium
US20220036489A1 (en) Recommendation engine for testing conditions based on evaluation of test entity scores
US20180018747A1 (en) Risk based medical identity theft prevention
US11875242B2 (en) Systems and methods for risk analysis and mitigation with nested machine learning models for exam registration and delivery processes
CN117808279A (en) Data processing method, device, computer equipment and storage medium
WO2024054781A1 (en) Entity profile for access control
CN116757700A (en) Account management method, device, server and medium based on Internet of things
CN114971897A (en) Abnormal object processing method, device, equipment and medium
CN115689567A (en) Risk control method, apparatus, device, medium, and program product
CN116506157A (en) Security protection method and system for micro-application architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant