CN115250200A - Service authorization authentication method and related equipment thereof - Google Patents

Service authorization authentication method and related equipment thereof Download PDF

Info

Publication number
CN115250200A
CN115250200A CN202210854326.5A CN202210854326A CN115250200A CN 115250200 A CN115250200 A CN 115250200A CN 202210854326 A CN202210854326 A CN 202210854326A CN 115250200 A CN115250200 A CN 115250200A
Authority
CN
China
Prior art keywords
source data
level
preset
classification
service authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210854326.5A
Other languages
Chinese (zh)
Other versions
CN115250200B (en
Inventor
朱鸿程
张国辉
吴震操
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202210854326.5A priority Critical patent/CN115250200B/en
Publication of CN115250200A publication Critical patent/CN115250200A/en
Application granted granted Critical
Publication of CN115250200B publication Critical patent/CN115250200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The embodiment of the application belongs to the field of data analysis and relates to a service authorization authentication method which comprises the steps of obtaining a source data set and carrying out first classification on elements in the source data set; performing second classification on the first classification result; setting corresponding distinguishing credibility levels for the elements in the source data set after the second classification; carrying out integral reliability calculation on the source data set to obtain a reliability result; determining an authorization authentication level corresponding to the reliability result; and judging whether the authorization authentication level meets a preset service authorization level, if not, passing the service authorization without authentication, and if so, passing the service authorization authentication. The authorization authentication steps are simplified, meanwhile, the multi-source data can be completely integrated into the same comparison mechanism, the multi-source data is prevented from being cleaned or processed in other complicated ways, the integrity and the referential performance of the multi-source data are guaranteed, and the processing load of the processor is reduced under the condition that the authorization authentication accuracy is guaranteed.

Description

Service authorization authentication method and related equipment thereof
Technical Field
The present application relates to the technical field of data analysis and service authorization and authentication, and in particular, to a service authorization and authentication method and related devices.
Background
At present, by analyzing multi-source information, such as multi-source information of sex, age, household nationality, marital conditions and the like, target users can be screened out through an algorithm, relevant services can be recommended accurately, and when the recommended product service of the target users is searched, frequent calls can not be made for unspecified users in the manner that only broad-cast network telephone calls can be used before, so that the user's dislike feeling is caused, and even potential user resources are lost.
In the traditional multi-source information processing and screening, in order to ensure the accuracy of service authentication, after multi-source data is obtained, the multi-source data is often cleaned, and preferable data is reserved, however, the obtained results are always optimal results, so that part of the multi-source data cannot exert the reference value of the multi-source data, otherwise, the multi-source data is used as the reference data, but the authority problem of user information cannot be avoided, or the user information is out of date, even if a recommendation algorithm is advanced, the original data has problems, and the result of service authentication is not accurate.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method, an apparatus, a computer device, and a storage medium for service authorization authentication, so that when performing service authorization authentication, authorization authentication steps can be simplified, and multi-source data can be completely integrated into the same comparison mechanism, thereby avoiding cleaning or other complicated processing of the multi-source data, ensuring integrity and referential of the multi-source data, and reducing processing load of a processor under the condition of ensuring accuracy of authorization authentication.
In order to solve the above technical problem, an embodiment of the present application provides a service authorization authentication method, which adopts the following technical solutions:
a service authorization authentication method, comprising the steps of:
acquiring data of a plurality of different sources as a source data set, and performing first classification on elements in the source data set based on a preset first classification condition;
performing second classification on the first classification result based on a preset second classification condition;
setting corresponding different credibility levels for the elements in the source data set after the second classification based on a preset credibility level first strategy;
performing overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result;
determining an authorization authentication level corresponding to the credibility result based on a preset credibility level second strategy;
and judging whether the authorization authentication level meets a preset service authorization level, if not, passing the service authorization without authentication, and if so, passing the service authorization authentication.
Further, the step of performing a first classification on the source data set element based on a preset first classification condition specifically includes:
dividing data sources into an authoritative data source and a non-authoritative data source in advance;
after the source data set is obtained, data sources of all elements in the source data set are identified, and the elements in the source data set are classified into authoritative source data and non-authoritative source data based on the identification result.
Further, the step of performing a second classification on the first classification result based on a preset second classification condition specifically includes:
when a source data set is obtained, obtaining the aging properties of all elements in the source data set;
judging whether the authoritative source data and the non-authoritative source data are over-aged or not based on the aging attribute;
if the currently judged authoritative source data is not over-aged, marking the currently judged authoritative source data as effective authoritative source data;
if the currently judged non-authoritative source data is not over-aged, marking the currently judged non-authoritative source data as effective non-authoritative source data;
if the currently judged authoritative source data is over-aged, marking the currently judged authoritative source data as invalid authoritative source data;
and if the currently judged non-authoritative source data is over-aged, marking the currently judged non-authoritative source data as invalid non-authoritative source data.
Further, the step of setting a corresponding differentiated trust level for the elements in the source data set after the second classification based on the preset trust level first policy specifically includes:
the preset credibility level first strategy specifically comprises the following steps: distinguishing credibility levels in advance based on whether the data are authoritative sources and whether the data are effective or not;
if the current data is invalid non-authoritative source data, setting the current data to be a first credible level;
if the current data is valid non-authoritative source data, setting the current data to be a second credible level;
if the current data is invalid authoritative source data, setting the current data to be a third credible level;
and if the current data is valid authoritative source data, setting the current data to be a fourth credible level.
Further, the step of performing overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result specifically includes:
respectively counting the number of different credible level elements in the source data set;
based on a preset credibility algorithm formula:
Figure BDA0003746575300000031
calculating an overall confidence level of the source data set, wherein l 1 Representing the number of elements of the first level of trust,/ 2 Representing the number of second confidence level elements,/ n-1 Representing the number of (n-1) th confidence level elements, l n Representing the number of nth confidence level elements, n being a positive integer greater than 1.
Further, the step of determining, based on a preset trust level second policy, an authorization and authentication level corresponding to the trust level result specifically includes:
setting data reliability intervals for different authorization authentication levels in advance respectively;
after the source data set credibility is obtained, identifying a data credibility interval corresponding to the source data set credibility, and determining an authorization authentication level corresponding to the data credibility interval.
Further, the step of determining whether the authorization authentication level meets a preset service authorization level specifically includes:
presetting a service authorization level;
judging whether the authorization authentication level is greater than the service authorization level;
if so, the authorization authentication level meets a preset service authorization level;
if the authorization authentication level is smaller than the preset service authorization level, the authorization authentication level does not meet the preset service authorization level.
In order to solve the above technical problem, an embodiment of the present application further provides a service authorization and authentication apparatus, which adopts the following technical solutions:
a service authorization authentication apparatus comprising:
the first classification module is used for acquiring data of a plurality of different sources as a source data set and performing first classification on elements in the source data set based on a preset first classification condition;
the second classification module is used for performing second classification on the first classification result based on a preset second classification condition;
the distinguishing credibility level setting module is used for setting corresponding distinguishing credibility levels for the elements in the source data set after the second classification based on a preset credibility level first strategy;
the reliability algorithm module is used for carrying out overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result;
the authorization authentication level determining module is used for determining an authorization authentication level corresponding to the credibility result based on a preset credibility level second strategy;
and the authorization and authentication judging module is used for judging whether the authorization and authentication level meets a preset service authorization level, if not, the service authorization is not authenticated, and if so, the service authorization and authentication are passed.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects:
according to the service authorization authentication method, the source data set is obtained, and the elements in the source data set are classified firstly; performing second classification on the first classification result; setting corresponding distinguishing credibility levels for the elements in the source data set after the second classification; carrying out integral reliability calculation on the source data set to obtain a reliability result; determining an authorization authentication level corresponding to the credibility result; and judging whether the authorization authentication level meets the preset service authorization level, if not, passing the service authorization without authentication, and if so, passing the service authorization authentication. The authorization authentication steps are simplified, meanwhile, the multi-source data can be completely integrated into the same comparison mechanism, the multi-source data is prevented from being cleaned or processed in other complicated ways, the integrity and the referential performance of the multi-source data are guaranteed, and the processing load of the processor is reduced under the condition that the authorization authentication accuracy is guaranteed.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the description below are some embodiments of the present application, and that other drawings may be obtained by those skilled in the art without inventive effort.
FIG. 1 is an exemplary system architecture diagram to which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method of service authorization authentication according to the present application;
FIG. 3 is a flow diagram for one embodiment of step 202 shown in FIG. 2;
FIG. 4 is a flow diagram of one embodiment of step 203 shown in FIG. 2;
FIG. 5 is a flow diagram for one embodiment of step 206 shown in FIG. 2;
FIG. 6 is a schematic diagram of an embodiment of a service authorization authentication device according to the application;
FIG. 7 is a schematic block diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the service authorization and authentication method provided in the embodiment of the present application is generally executed by a server/terminal device, and accordingly, the service authorization and authentication apparatus is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continuing reference to FIG. 2, a flow diagram of one embodiment of a service authorization authentication method in accordance with the present application is shown. The service authorization authentication method comprises the following steps:
step 201, obtaining a plurality of pieces of data from different sources as a source data set, and performing a first classification on elements in the source data set based on a preset first classification condition.
In this embodiment, the step of performing a first classification on the source data concentrated element based on a preset first classification condition specifically includes: dividing data sources into an authoritative data source and a non-authoritative data source in advance; after the source data set is obtained, data sources of all elements in the source data set are identified, and the elements in the source data set are classified into authoritative source data and non-authoritative source data based on the identification result.
The data sources are divided into authoritative data sources and non-authoritative data sources according to data source channels, and then the acquired source data concentrated elements are divided into authoritative source data and non-authoritative source data according to the data sources, so that the reference value of data can be distinguished according to the data sources when data analysis is carried out, and the distinguishing reference of analysis results is guaranteed.
And 202, performing second classification on the first classification result based on a preset second classification condition.
With continued reference to FIG. 3, FIG. 3 is a flowchart illustrating the execution of one embodiment of step 202 shown in FIG. 2, including the steps of:
step 301, when a source data set is obtained, obtaining the aging properties of all elements in the source data set;
step 302, judging whether the authoritative source data and the non-authoritative source data are over-aged or not based on the aging attribute;
step 303, if the currently judged authoritative source data is not over-aged, marking the currently judged authoritative source data as effective authoritative source data;
step 304, if the currently judged non-authoritative source data is not over-aged, marking the currently judged non-authoritative source data as valid non-authoritative source data;
step 305, if the currently judged authoritative source data is over-aged, marking the currently judged authoritative source data as invalid authoritative source data;
and step 306, if the currently judged non-authoritative source data is over-aged, marking the currently judged non-authoritative source data as invalid non-authoritative source data.
And identifying whether the data is aged or not according to the aging attribute, wherein if the data is aged, the reference value of the data is smaller than that of the data which is not aged, so that the elements in the first classified source data set are subjected to aging classification according to the aging attribute, the distinguishing reference of the analysis result is further ensured, and the analysis result is more accurate.
And step 203, setting corresponding different credibility levels for the elements in the source data set after the second classification based on a preset credibility level first strategy.
With continued reference to FIG. 4, FIG. 4 is a flowchart illustrating the execution of one embodiment of step 203 shown in FIG. 2, including the following steps:
step 401, the preset trusted level first policy specifically includes: distinguishing credibility levels in advance based on whether the data are authoritative sources and whether the data are effective or not;
step 402, if the current data is invalid non-authoritative source data, setting the current data to be a first credible level;
step 403, if the current data is valid non-authoritative source data, setting the current data to be a second credible level;
step 404, if the current data is invalid authoritative source data, setting the current data to be a third credible level;
step 405, if the current data is valid authoritative source data, setting the current data to a fourth trusted level.
And according to whether the data is an authoritative source or not and whether the data is effective or not, a distinguishing credibility level is set for the source data set elements subjected to the second classification, the invalid non-authoritative source data is set as a first credibility level, the effective non-authoritative source data is set as a second credibility level, the invalid authoritative source data is set as a third credibility level, and the effective authoritative source data is set as a fourth credibility level, so that the elements in the source data set are not required to be cleaned, the data is analyzed and calculated, and the complete reference of an analysis result is ensured.
And 204, performing overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result.
In this embodiment, the step of performing overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result specifically includes: respectively counting the source data concentration withoutNumber of elements of the same differentiated trusted level; based on a preset credibility algorithm formula:
Figure BDA0003746575300000091
calculating an overall confidence level of the source data set, wherein l 1 Representing the number of elements of the first level of trust,/ 2 Representing the number of second confidence level elements,/ n-1 Representing the number of elements of the n-1 st confidence level, l n Representing the number of nth confidence level elements, n being a positive integer greater than 1.
The reliability of the source data set is calculated by taking the source data set as a whole through a preset reliability algorithm model, so that the damage to the source data set obtained by multiple sources is avoided, elements in the source data set do not need to be deleted or cleaned, the reliability of the whole source data set is obtained by utilizing the reference value respectively provided by each piece of data, the steps of cleaning the data are reduced, and the referability of the source data set can be ensured.
Step 205, determining an authorization authentication level corresponding to the reliability result based on a preset second policy of the reliability level.
In this embodiment, the step of determining, based on a preset trust level second policy, an authorization authentication level corresponding to the trust level result specifically includes: setting data reliability intervals for different authorization authentication levels in advance; after the source data set credibility is obtained, identifying a data credibility interval corresponding to the source data set credibility, and determining an authorization authentication level corresponding to the data credibility interval.
After the credibility of the source data set is obtained, the authorization authentication level corresponding to the whole source data set is determined, whether service authorization is carried out or not is judged according to the authorization authentication level corresponding to the whole source data set, the whole authentication based on the whole source data set is guaranteed, the authentication only by using the preferred data is avoided, and the authority and the accuracy of the authentication are guaranteed.
Step 206, determining whether the authorization and authentication level meets a preset service authorization level, if not, passing the service authorization and authentication, and if so, passing the service authorization and authentication.
With continuing reference to FIG. 5, FIG. 5 is a flowchart illustrating the execution of one embodiment of step 206 shown in FIG. 2, including the steps of:
step 501, presetting a service authorization level;
step 502, determining whether the authorization authentication level is greater than the service authorization level;
step 503, if the authorization level is greater than the preset service authorization level, the authorization authentication level meets the preset service authorization level;
step 504, if the authorization authentication level is smaller than the preset service authorization level, the authorization authentication level does not meet the preset service authorization level.
The method comprises the steps of presetting a service authorization level, judging whether an authorization authentication level corresponding to a source data set is greater than the service authorization level, if so, determining whether the authorization authentication level meets a preset service authorization level, if not, determining whether the service authorization is performed, and if not, determining whether the service authorization is performed or not in a simple comparison mode.
The method comprises the steps of carrying out first classification on elements in a source data set by acquiring the source data set; performing second classification on the first classification result; setting corresponding distinguishing credibility levels for the elements in the source data set after the second classification; carrying out integral reliability calculation on the source data set to obtain a reliability result; determining an authorization authentication level corresponding to the credibility result; and judging whether the authorization authentication level meets a preset service authorization level, if not, passing the service authorization without authentication, and if so, passing the service authorization authentication. The authorization authentication steps are simplified, meanwhile, the multi-source data can be completely integrated into the same comparison mechanism, the multi-source data is prevented from being cleaned or processed in other complicated ways, the integrity and the referential performance of the multi-source data are guaranteed, and the processing load of the processor is reduced under the condition that the authorization authentication accuracy is guaranteed.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with computer readable instructions, which can be stored in a computer readable storage medium, and when executed, the processes of the embodiments of the methods described above can be included. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless otherwise indicated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of execution is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 6, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a service authorization authentication apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be applied to various electronic devices.
As shown in fig. 6, the service authorization authentication apparatus 600 according to the present embodiment includes: a first classification module 601, a second classification module 602, a differentiated trust level setting module 603, a trust degree algorithm module 604, an authorization authentication level determination module 605 and an authorization authentication judgment module 606. Wherein:
a first classification module 601, configured to obtain data from a plurality of different sources, to serve as a source data set, and perform first classification on elements in the source data set based on a preset first classification condition;
a second classification module 602, configured to perform second classification on the first classification result based on a preset second classification condition;
a distinguishing credibility level setting module 603, configured to set a corresponding distinguishing credibility level for the element in the source data set after the second classification based on a preset credibility level first policy;
the reliability algorithm module 604 is configured to perform overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result;
an authorization authentication level determining module 605, configured to determine, based on a preset trust level second policy, an authorization authentication level corresponding to the trust level result;
an authorization and authentication determining module 606, configured to determine whether the authorization and authentication level meets a preset service authorization level, if not, the service authorization is not authenticated, and if yes, the service authorization is authenticated.
The service authorization authentication device provided by the application classifies the source data concentrated elements through the first classification module and the second classification module; setting corresponding different credibility levels for the elements in the source data set after secondary classification through a different credibility level setting module; then, the reliability algorithm module is used for carrying out integral reliability calculation on the source data set to obtain a reliability result; and finally, judging whether the authorization authentication level meets the preset service authorization level through an authorization authentication level determining module and an authorization authentication judging module, thereby determining whether the service authorization authentication passes. The authorization authentication steps are simplified, meanwhile, the multi-source data can be completely integrated into the same comparison mechanism, the multi-source data is prevented from being cleaned or processed in other complicated ways, the integrity and the referential performance of the multi-source data are guaranteed, and the processing load of the processor is reduced under the condition that the authorization authentication accuracy is guaranteed.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
Specifically, in the embodiment of the present application, when a source data set of multiple sources is obtained, a big data processing technology in an artificial intelligence basic technology may be used for obtaining.
Specifically, in the embodiment of the present application, the service authorization authentication method may be applied to a computer vision technology and a biometric identification technology, such as face identification, at this time, a plurality of pictures acquired through a multi-source channel are used as a source data set, and the shooting time of the plurality of pictures is used as an aging attribute, so as to identify whether the face authentication passes or not; moreover, the service authorization authentication method can also be applied to banking service, at this time, a plurality of account information acquired through a multi-source channel is used as a source data set, and effective time of a plurality of accounts is used as an aging attribute, so that whether a user corresponding to the plurality of accounts authorizes further service permission or not is judged.
The automatic authentication of the service authorization authentication can be further ensured by utilizing an artificial intelligence technology, and the manual operation is reduced.
In order to solve the technical problem, an embodiment of the present application further provides a computer device. Referring to fig. 7, fig. 7 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 7 comprises a memory 71, a processor 72, a network interface 73, which are communicatively connected to each other via a system bus. It is noted that only a computer device 7 having components 71-73 is shown, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user in a keyboard mode, a mouse mode, a remote controller mode, a touch panel mode or a voice control equipment mode.
The memory 71 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 71 may be an internal storage unit of the computer device 7, such as a hard disk or a memory of the computer device 7. In other embodiments, the memory 71 may also be an external storage device of the computer device 7, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the computer device 7. Of course, the memory 71 may also comprise both an internal storage unit of the computer device 7 and an external storage device thereof. In this embodiment, the memory 71 is generally used for storing an operating system installed in the computer device 7 and various application software, such as computer readable instructions of a service authorization authentication method. Further, the memory 71 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 72 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 72 is typically used to control the overall operation of the computer device 7. In this embodiment, the processor 72 is configured to execute computer readable instructions stored in the memory 71 or process data, such as computer readable instructions for executing the service authorization authentication method.
The network interface 73 may comprise a wireless network interface or a wired network interface, and the network interface 73 is generally used for establishing a communication connection between the computer device 7 and other electronic devices.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
It should be understood that the above-described embodiments are merely exemplary of some, and not all, embodiments of the present application, and that the drawings illustrate preferred embodiments of the present application without limiting the scope of the claims appended hereto. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields and are within the protection scope of the present application.

Claims (10)

1. A service authorization authentication method, comprising the steps of:
acquiring data of a plurality of different sources as a source data set, and performing first classification on elements in the source data set based on a preset first classification condition;
performing second classification on the first classification result based on a preset second classification condition;
setting corresponding distinguishing credibility levels for the elements in the source data set after the second classification based on a preset credibility level first strategy;
performing overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result;
determining an authorization authentication level corresponding to the credibility result based on a preset credibility level second strategy;
and judging whether the authorization authentication level meets a preset service authorization level, if not, passing the service authorization without authentication, and if so, passing the service authorization authentication.
2. The method for authenticating service authorization according to claim 1, wherein the step of performing the first classification on the source data concentrated element based on the preset first classification condition specifically includes:
dividing data sources into an authoritative data source and a non-authoritative data source in advance;
after the source data set is obtained, data sources of all elements in the source data set are identified, and the elements in the source data set are classified into authoritative source data and non-authoritative source data based on the identification result.
3. The service authorization and authentication method according to claim 2, wherein the step of performing the second classification on the first classification result based on the preset second classification condition specifically includes:
when a source data set is obtained, obtaining the aging properties of all elements in the source data set;
judging whether the authoritative source data and the non-authoritative source data are over-aged or not based on the aging attribute;
if the currently judged authoritative source data is not over-aged, marking the currently judged authoritative source data as effective authoritative source data;
if the currently judged non-authoritative source data is not over-aged, marking the currently judged non-authoritative source data as effective non-authoritative source data;
if the currently judged authoritative source data is over-aged, marking the currently judged authoritative source data as invalid authoritative source data;
and if the currently judged non-authoritative source data is over-aged, marking the currently judged non-authoritative source data as invalid non-authoritative source data.
4. The service authorization authentication method according to claim 3, wherein the step of setting a corresponding differentiated trust level for the elements in the source data set after the second classification based on the preset trust level first policy specifically includes:
the preset credibility level first strategy specifically comprises the following steps: distinguishing credibility levels in advance based on whether the data are authoritative sources and whether the data are effective or not;
if the current data is invalid non-authoritative source data, setting the current data to be a first credible level;
if the current data is valid non-authoritative source data, setting the current data to be a second credible level;
if the current data is invalid authoritative source data, setting the current data to be a third credible level;
and if the current data is valid authoritative source data, setting the current data to be a fourth credible level.
5. The service authorization authentication method according to claim 4, wherein the step of performing overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result specifically includes:
respectively counting the number of different credible level elements in the source data set;
based on a preset credibility algorithm formula:
Figure FDA0003746575290000021
calculating an overall confidence level of the source data set, wherein l 1 Representing the number of elements of the first level of trust,/ 2 Representing the number of second confidence level elements,/ n-1 Representing the number of (n-1) th confidence level elements, l n Representing the number of nth confidence level elements, n being a positive integer greater than 1.
6. The service authorization and authentication method according to any one of claims 1 to 5, wherein the step of determining the authorization and authentication level corresponding to the trust level result based on a preset trust level second policy specifically includes:
setting data reliability intervals for different authorization authentication levels in advance respectively;
after the source data set credibility is obtained, identifying a data credibility interval corresponding to the source data set credibility, and determining an authorization authentication level corresponding to the data credibility interval.
7. The service authorization and authentication method according to claim 6, wherein the step of determining whether the authorization and authentication level meets a preset service authorization level specifically comprises:
presetting a service authorization level;
judging whether the authorization authentication level is greater than the service authorization level;
if so, the authorization authentication level meets a preset service authorization level;
and if the authorization authentication level is smaller than the preset service authorization level, the authorization authentication level does not meet the preset service authorization level.
8. A service authorization authentication apparatus, comprising:
the first classification module is used for acquiring data of a plurality of different sources as a source data set and performing first classification on elements in the source data set based on a preset first classification condition;
the second classification module is used for performing second classification on the first classification result based on a preset second classification condition;
the distinguishing credibility level setting module is used for setting corresponding distinguishing credibility levels for the elements in the source data set after the second classification based on a preset credibility level first strategy;
the reliability algorithm module is used for carrying out overall reliability calculation on the source data set based on a preset reliability algorithm model to obtain a reliability result;
the authorization authentication level determining module is used for determining an authorization authentication level corresponding to the credibility result based on a preset credibility level second strategy;
and the authorization authentication judging module is used for judging whether the authorization authentication level meets a preset service authorization level, if not, the service authorization is not authenticated, and if so, the service authorization is authenticated.
9. A computer device comprising a memory having computer readable instructions stored therein and a processor which when executed implements the steps of the service authorization authentication method of any of claims 1 to 7.
10. A computer readable storage medium having computer readable instructions stored thereon which, when executed by a processor, implement the steps of the service authorization authentication method according to any of claims 1 to 7.
CN202210854326.5A 2022-07-14 2022-07-14 Service authorization authentication method and related equipment thereof Active CN115250200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210854326.5A CN115250200B (en) 2022-07-14 2022-07-14 Service authorization authentication method and related equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210854326.5A CN115250200B (en) 2022-07-14 2022-07-14 Service authorization authentication method and related equipment thereof

Publications (2)

Publication Number Publication Date
CN115250200A true CN115250200A (en) 2022-10-28
CN115250200B CN115250200B (en) 2023-08-22

Family

ID=83699607

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210854326.5A Active CN115250200B (en) 2022-07-14 2022-07-14 Service authorization authentication method and related equipment thereof

Country Status (1)

Country Link
CN (1) CN115250200B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110047597A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for security data collection and analysis
CN109857936A (en) * 2019-01-25 2019-06-07 武汉市网慧天下科技有限公司 A kind of big data collection analysis and service system
CN111400295A (en) * 2020-03-13 2020-07-10 国电南瑞科技股份有限公司 Power distribution network power failure event analysis method and device and storage medium
CN111783045A (en) * 2020-06-22 2020-10-16 厦门市美亚柏科信息股份有限公司 Data authorization method and device based on hierarchical classification
CN114003600A (en) * 2021-10-25 2022-02-01 展讯半导体(南京)有限公司 Data processing method, system, electronic device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110047597A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for security data collection and analysis
CN109857936A (en) * 2019-01-25 2019-06-07 武汉市网慧天下科技有限公司 A kind of big data collection analysis and service system
CN111400295A (en) * 2020-03-13 2020-07-10 国电南瑞科技股份有限公司 Power distribution network power failure event analysis method and device and storage medium
CN111783045A (en) * 2020-06-22 2020-10-16 厦门市美亚柏科信息股份有限公司 Data authorization method and device based on hierarchical classification
CN114003600A (en) * 2021-10-25 2022-02-01 展讯半导体(南京)有限公司 Data processing method, system, electronic device and storage medium

Also Published As

Publication number Publication date
CN115250200B (en) 2023-08-22

Similar Documents

Publication Publication Date Title
CN113032682B (en) Collaborative filtering-based product recommendation method, device, equipment and storage medium
CN112395390B (en) Training corpus generation method of intention recognition model and related equipment thereof
CN112084752A (en) Statement marking method, device, equipment and storage medium based on natural language
CN112669876A (en) Emotion recognition method and device, computer equipment and storage medium
CN112468658A (en) Voice quality detection method and device, computer equipment and storage medium
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN114996675A (en) Data query method and device, computer equipment and storage medium
US20130230248A1 (en) Ensuring validity of the bookmark reference in a collaborative bookmarking system
CN115250200B (en) Service authorization authentication method and related equipment thereof
CN115373634A (en) Random code generation method and device, computer equipment and storage medium
CN115757075A (en) Task abnormity detection method and device, computer equipment and storage medium
WO2022105120A1 (en) Text detection method and apparatus from image, computer device and storage medium
CN112733645A (en) Handwritten signature verification method and device, computer equipment and storage medium
CN110992067B (en) Message pushing method, device, computer equipment and storage medium
CN111327513B (en) Message data pushing method and device, computer equipment and storage medium
CN112529888B (en) Face image evaluation method, device, equipment and medium based on deep learning
CN115545641A (en) Interface request method, device, computer equipment and storage medium
CN117278263A (en) Authentication processing method, authentication processing device, computer equipment and storage medium
CN117874073A (en) Search optimization method, device, equipment and storage medium thereof
CN117493563A (en) Session intention analysis method, device, equipment and storage medium thereof
CN117272256A (en) Sensitive data detection method and device, computer equipment and storage medium
CN117113400A (en) Data leakage tracing method, device, equipment and storage medium thereof
CN115314404A (en) Service optimization method and device, computer equipment and storage medium
CN115376563A (en) Voice endpoint detection method and device, computer equipment and storage medium
CN115202966A (en) Picture processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant