CN115578071A - Personal information authorization scoring method and device, computer equipment and storage medium - Google Patents

Personal information authorization scoring method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115578071A
CN115578071A CN202211328726.9A CN202211328726A CN115578071A CN 115578071 A CN115578071 A CN 115578071A CN 202211328726 A CN202211328726 A CN 202211328726A CN 115578071 A CN115578071 A CN 115578071A
Authority
CN
China
Prior art keywords
authorization
text
personal
score
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211328726.9A
Other languages
Chinese (zh)
Inventor
苏媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202211328726.9A priority Critical patent/CN115578071A/en
Publication of CN115578071A publication Critical patent/CN115578071A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The application discloses a personal information authorization scoring method which is applied to the field of personal information security. The method provided by the application comprises the following steps: acquiring a personal authorization text and a personal authorization mode from a target service system; analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text; analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode; and weighting and summing the first authorization score and the second authorization score according to preset score weights to obtain an authorization comprehensive score. Judging whether the authorization comprehensive score is smaller than a preset authorization early warning score or not; if so, using the personal authorization text, the personal authorization mode, the calculation process of the authorization comprehensive score and the calculation result as early warning information; and sending the early warning information to an early warning message queue, wherein the early warning message queue is connected with the target service system.

Description

Personal information authorization scoring method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of personal information security, and in particular, to a method and an apparatus for evaluating personal information authorization, a computer device, and a storage medium.
Background
After the personal information protection law is implemented, the legal regulations related to personal information processing for various information technology products are gradually improved, and service providers of various information technology products need to generate various personal information authorization texts and personal authorization modes based on the understanding of the products. For example, the functions of disease auxiliary diagnosis, health management, remote consultation and the like provided by the digital medical service platform need to generate the personal information authorization text and the personal authorization mode for the user. For another example, financial products such as insurance products, financial products, credit card products, credit products, etc. provided by the finance and technology service platform also need to generate the personal information authorization text and the personal authorization mode for the user.
However, in the prior art, service operators of various information technology products generate the personal information authorization text and the personal authorization mode according to text information of a certain law and regulation or based on the judgment of the service operators.
In the prior art, the method for generating the personal information authorization text and the personal authorization mode lacks fairness and rationality and logical judgment standards, and further can generate the compliance risk of the information technology products.
Disclosure of Invention
The embodiment of the application provides a personal information authorization scoring method, a personal information authorization scoring device, a computer device and a storage medium, and aims to solve the problem that in the prior art, a user's personal authorization text and a personal authorization mode lack logical judgment standards.
In a first aspect of the present application, a personal information authorization scoring method is provided, including:
acquiring a personal authorization text and a personal authorization mode of a user from a target service system;
analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text;
analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode;
and weighting and summing the first authorization score and the second authorization score according to preset score weights to obtain an authorization comprehensive score.
Optionally, the analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text includes:
detecting whether the personal authorization text contains a preset text field by using a preset text analysis tool to obtain a key field detection result;
extracting a preset content tag from the personal authorization text by using a preset text analysis tool to obtain an authorization detail dimension result;
and obtaining the first authorization score according to the key field detection result, the authorization detail dimension result and a preset authorization text scoring rule.
Optionally, the analyzing the personal authorization pattern by using a preset authorization manner model, and obtaining a second authorization score of the personal authorization pattern includes:
acquiring a first judgment result of whether the personal authorization text is agreed by default;
acquiring a second judgment result of whether the personal authorization text is associated with the target service selected by the user;
and obtaining the second authorization score according to the first judgment result, the second judgment result and a preset authorization model scoring rule.
Optionally, before analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text, the method further includes:
detecting whether a preset text defect exists in the personal authorization text by using a preset text analysis tool;
if so, correcting the text defects in the personal authorization text by using a preset text correction tool;
if not, detecting whether an illegal text exists in the personal authorization text by using a preset text analysis tool;
if yes, returning the personal authorization text and the illegal text to the target service system, and receiving the modified personal authorization text sent by the target service system.
Optionally, the weighting and summing the first authorization score and the second authorization score according to a preset score weight further includes:
acquiring legal text information and legal text information associated with the target service system;
analyzing whether the personal authorization text and the personal authorization pattern match the legal text information and the legal text information using a preset text analysis tool.
Optionally, the weighting and summing the first authorization score and the second authorization score according to a preset score weight further includes:
judging whether the authorization comprehensive score is smaller than a preset authorization early warning score or not;
if so, using the personal authorization text, the personal authorization mode, the calculation process of the authorization comprehensive score and the calculation result as early warning information;
and sending the early warning information to an early warning message queue, wherein the early warning message queue is connected with the target service system.
In a second aspect of the present application, there is provided a personal information authorization scoring apparatus, including:
the data acquisition module is used for acquiring the personal authorization text and the personal authorization mode of the user from the target service system;
the first authorization scoring module is used for analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text;
the second authorization scoring module is used for analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode;
and the authorization comprehensive scoring module is used for weighting and summing the first authorization score and the second authorization score according to preset scoring weight to obtain an authorization comprehensive score.
In a third aspect of the present application, a computer device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the steps of the above-mentioned personal-information authorization scoring method when executing the computer program.
In a fourth aspect of the present application, a computer-readable storage medium is provided, which stores a computer program, and the computer program, when executed by a processor, implements the steps of the above-mentioned personal-information-authorization scoring method.
According to the personal information authorization scoring method, the personal information authorization scoring device, the computer equipment and the storage medium, the personal authorization text and the personal authorization mode of the user are obtained from the target service system; analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text; analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode; and weighting and summing the first authorization score and the second authorization score according to preset score weights to obtain an authorization comprehensive score. The reasonability of the judgment standard of the personal authorization text and the personal authorization mode is ensured, and the large batch of personal authorization texts and the personal authorization modes of a plurality of target systems can be monitored simultaneously, so that the control strength of the personal authorization texts and the personal authorization modes is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic diagram of an application environment of a personal information authorization scoring method according to an embodiment of the present application;
FIG. 2 is a flowchart of a personal information authorization scoring method according to an embodiment of the present application;
FIG. 3 is a flowchart of a method for authorizing and scoring personal information according to another embodiment of the present application;
FIG. 4 is a schematic structural diagram of a personal information authorization scoring device according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first", "second" and "third" in the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first," "second," or "third" may explicitly or implicitly include at least one of the feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise. All directional indicators (such as up, down, left, right, front, and back … …) in the embodiments of the present invention are only used to explain the relative positional relationship between the components, the movement, and the like in a specific posture (as shown in the drawings), and if the specific posture is changed, the directional indicator is changed accordingly. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The personal information authorization scoring method provided by the application can be applied to an application environment shown in fig. 1, wherein a computer device can be but not limited to various personal computers and notebook computers, the computer device can also be a server, and the server can be an independent server or a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, content Delivery Network (CDN), big data, an artificial intelligence platform and the like. It will be appreciated that the number of computer devices in figure 1 is merely illustrative and any number of extensions may be made according to actual requirements.
In an embodiment, as shown in fig. 2, a method for evaluating authorization of personal information is provided, which is described by taking the computer device in fig. 1 as an example, and includes the following steps S101 to S104:
step S101, obtaining the personal authorization text and the personal authorization mode of the user from the target service system.
When the user uses the service provided by the target service system, the target service system needs to acquire and process the personal information of the user, at this time, the user needs to authorize the personal information of the user to the target service system, and meanwhile, the target service system also needs to provide the personal authorization text to inform the user of the personal information range which needs the user to authorize, and the authorization mode, namely the personal authorization mode. For example, when a user purchases an automobile insurance using an insurance sales App, the insurance sales App requires personal information such as a user authorization name, an identification number, and a mobile phone number, and therefore the insurance sales App provides a personal authorization text to explain to the user that the user needs to acquire the personal information such as the user's name, identification number, and mobile phone number for insurance purchase.
Step S102, analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text.
Specifically, a preset text analysis tool is used for detecting whether the personal authorization text contains a preset text field or not, and a key field detection result is obtained. For example, the preset text analysis tool is used for detecting and analyzing the target personal authorization text provided by the insurance sales class App, and text contents like "how to use", "what to collect", "where to transmit", and the like in the target personal authorization text are extracted, wherein the text contents include preset text fields of "use", "collect", "transmit". And then, extracting a preset content tag from the personal authorization text by using a preset text analysis tool to obtain an authorization detail dimension result. For example, the preset text analysis tool is used to extract a plurality of preset content tags such as "name", "identification card number", "mobile phone number", "face" and the like from the target personal authorization text provided by the aforementioned insurance sales class App. And finally, obtaining the first authorization score according to the key field detection result, the authorization detail dimension result and a preset authorization text scoring rule.
In another more specific embodiment, on the first aspect, if the result of detecting the key field includes all the preset text fields, the detection score of the key field is set to 20 minutes, if the result of detecting the key field does not include any of the preset text fields, the detection score of the key field is set to 0 minutes, and otherwise, the detection score of the key field is decreased by the equal step length from 20 minutes to 0 minutes according to the number of the preset text fields. In a second aspect, the level of the preset content tag is divided into four files, wherein the first file is the identity card information of the user, the second file is the financial information of the user, the third file is the biological information of the user, and the fourth file is other information of the user. If the authorization detail dimension result contains a first-file preset content tag, adding 2 points to the authorization detail dimension score, and keeping the maximum score not to exceed 20 points; if the authorization detail dimension result contains a second-file preset content tag, adding 2 points to the authorization detail dimension score, and keeping the maximum score not to exceed 15 points; if the authorization detail dimension result contains a third-file preset content tag, adding 2 points to the authorization detail dimension score, wherein the maximum value is not more than 10 points; and if the authorization detail dimension result contains a fourth file preset content label, adding 1 to the authorization detail dimension score, and keeping the highest authorization detail dimension score not to exceed 5. And finally, performing weighted summation processing on the key field detection score and the authorization detail dimension score to obtain the first authorization score. Further, the specific bonus score value setting and the highest score value setting involved in the calculation process of the key field detection score and the authorization detail dimension score may be adaptively adjusted according to the technical effect in the actual application process, and the specific adaptive adjustment steps are not described in detail herein.
Further, before analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text, the method further includes: firstly, a preset text analysis tool is used for detecting whether a preset text defect exists in the personal authorization text. If so, correcting the text defects in the personal authorization text by using a preset text correction tool. For example, if the preset text analysis tool is used to detect that a wrong word such as "strong risk" appears in the target personal text provided by the insurance sales class App, the preset text correction tool is used to correct the wrong "strong risk" text into the correct "strong risk". If not, detecting whether the illegal text exists in the personal authorization text by using a preset text analysis tool. If yes, returning the personal authorization text and the illegal text to the target service system, and receiving the modified personal authorization text sent by the target service system. For example, if the target personal authorization text provided by the insurance sales class App is detected by the preset text analysis tool to have an illegal text, the step of performing score calculation on the target personal authorization text and the target personal authorization pattern provided by the insurance sales class App is stopped, the target personal authorization text is returned to the operation manager of the insurance sales class App for modification, and the target personal authorization text which is correctly modified is waited to be received.
Step S103, analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode.
Specifically, first, a first determination result of whether to agree with the personal authorization text by default is acquired. For example, the first determination result of whether the insurance sales class App defaults that the user agrees to the target personal preferred text in the App is obtained. And then, acquiring a second judgment result of whether the personal authorization text is associated with the target service selected by the user. For example, a process of determining whether the target personal preferred text in the insurance sales class App is used by the associated user for car insurance purchase is obtained. And finally, obtaining the second authorization score according to the first judgment result, the second judgment result and a preset authorization model score rule.
In another more specific embodiment, the preset authorization model scoring rule divides the combination of the first judgment result and the second judgment result into four rules. The first rule is that the personal authorization text is agreed upon by default and is not associated with the target service; the second rule is that the personal authorization text is not agreed by default and is associated with the target service; a third rule is that the personal authorization text is agreed upon by default and is not associated with a target service; a fourth rule is that the personal authorization text is agreed upon by default and is associated with a target service. Meanwhile, the authorization model scoring rule sets the authorization model scoring calculation mode of the first rule as the first authorization score multiplied by 100%, the authorization model scoring calculation mode of the second rule as the first authorization score multiplied by 80%, the authorization model scoring calculation mode of the third rule as the first authorization score multiplied by 70%, and the authorization model scoring calculation mode of the first rule as the first authorization score multiplied by 60%. Further, the percentage coefficients in the authorization score rules in different calculation manners for the first rule, the second rule, the third rule, and the fourth rule may be adaptively adjusted according to a technical effect in an actual application process, and specific adaptive adjustment steps are not described in detail herein.
And step S104, carrying out weighted summation on the first authorization score and the second authorization score according to preset score weight to obtain an authorization comprehensive score.
In another more specific embodiment, the first weight of the first authorization score is set to 70% and the second weight of the second authorization score is set to 30%, while the score of the authorization composite score is no more than 100 points at the most. Further, the first weight and the second weight may be adaptively adjusted according to a technical effect in an actual application process, and specific adaptive adjustment steps are not described in detail herein.
Further, the weighting and summing the first authorization score and the second authorization score according to a preset score weight further includes: firstly, legal text information and legal text information associated with the target service system are obtained. Further, a local law and regulation text information base is set, a timing task for updating the law and regulation text information base from a preset channel at regular time is generated, and the timing task is started to update the law and regulation text information base so as to ensure that the judgment standards of the personal authorization text and the personal authorization mode are up to date. Then, whether the personal authorization text and the personal authorization pattern match the legal text information and the legal text information is analyzed using a preset text analysis tool. Further, the source of the legal text information and the legal text information also includes the local legal and legal text information library. Preferably, laws and regulations according to which the calculation process of the first authorization score and the calculation process of the second authorization score are based are further sent to a manual checking system, professional laws and regulations analysts check the calculation process of the first authorization score and the calculation process of the second authorization score, and correct wrong parts in the calculation process of the first authorization score and the calculation process of the second authorization score, for example, according to the latest laws and regulations text information, bonus score setting of different calculation rules in the authorization detail dimension score calculation rules is unreasonable.
Further, the weighting and summing the first authorization score and the second authorization score according to a preset scoring weight further includes: firstly, judging whether the authorization comprehensive score is smaller than a preset authorization early warning score. If so, using the personal authorization text, the personal authorization mode, and the calculation process and calculation result of the authorization comprehensive score as the warning information, for example, setting the authorization warning score to 60 minutes, and if the target personal authorization text and the target authorization comprehensive score corresponding to the target personal authorization mode provided by the insurance sales class App are lower than 60 minutes, using the target personal authorization text and the target personal authorization mode provided by the insurance sales class App, and the calculation process and calculation result of the target authorization comprehensive score as the target warning information. And then sending the early warning information to an early warning message queue, wherein the early warning message queue is connected with the target business system. The implementation manner of the early warning message queue includes but is not limited to: activeMQ, rabbitMQ, zeroMQ, kafka, metaMQ, rocktMQ, and the like.
Further, generating the personal authorization text and the personal authorization mode for monitoring the scored target system to determine whether the personal authorization text and the personal authorization mode are changed, and if so, acquiring the personal authorization text and the personal authorization mode from the target system again to calculate the corresponding authorization comprehensive score. Furthermore, comparing the new version with the old version of the personal authorization text and the personal authorization mode which are changed to obtain a version change difference, and finally judging whether to recalculate the corresponding authorization comprehensive score according to the version change difference.
Fig. 3 is a flowchart illustrating a method for rating personal information authorization according to another embodiment of the present invention. It should be noted that the method of the present invention is not limited to the flow sequence shown in fig. 3 if the results are substantially the same. As shown in fig. 3, the method for rating the authorization of the personal information includes the steps of:
step S201, obtaining the personal authorization text and the personal authorization mode of the user from the target service system.
Step S202, analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text.
Step S203, analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode.
Step S204, uploading the personal authorization text, the personal authorization mode, the first authorization score and the second authorization score to a blockchain, so that the personal authorization text, the personal authorization mode, the first authorization score and the second authorization score are stored in an encrypted mode.
Step S205, carrying out weighted summation on the first authorization score and the second authorization score according to preset score weight to obtain an authorization comprehensive score.
In step S204, corresponding digest information is obtained based on the personal authorization text, the personal authorization pattern, the first authorization score and the second authorization score, respectively, and specifically, the digest information is obtained by performing hash processing on the personal authorization text, the personal authorization pattern, the first authorization score and the second authorization score, for example, by using a sha256S algorithm. Uploading summary information to the blockchain can ensure the safety and the fair transparency of the user. The user device may download the summary information from the blockchain to verify whether the personal authorization text, the personal authorization schema, the first authorization score, and the second authorization score are tampered. The blockchain referred to in this example is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, and the like. A block chain (Blockchain), which is essentially a decentralized database, is a string of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, which is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
For other steps, specific reference is made to the description of the foregoing embodiments, and details are not repeated here.
According to the personal information authorization scoring method provided by the embodiment of the invention, the personal authorization text and the personal authorization mode of a user are acquired from a target service system; analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text; analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode; and carrying out weighted summation on the first authorization score and the second authorization score according to preset score weight to obtain an authorization comprehensive score. The reasonability of the judgment standards of the personal authorization texts and the personal authorization modes is guaranteed, the large batch of personal authorization texts and the personal authorization modes of a plurality of target systems can be monitored simultaneously, the control strength of the personal authorization texts and the personal authorization modes is further improved, the latest legal information and the calculation standards of legal information updating scores are obtained, and the timeliness of legal compliance of the personal authorization texts and the personal authorization modes is guaranteed.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In an embodiment, a personal information authorization scoring device 100 is provided, and the personal information authorization scoring device 100 corresponds to the personal information authorization scoring method in the above embodiments one to one. As shown in fig. 3, the personal information authorization scoring device 100 includes a data acquisition module 11, a first authorization scoring module 12, a second authorization scoring module 13, and an authorization comprehensive scoring module 14. The functional modules are explained in detail as follows:
the data acquisition module 11 is used for acquiring the personal authorization text and the personal authorization mode of the user from the target service system;
the first authorization scoring module 12 is configured to analyze the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text;
a second authorization score module 13, configured to analyze the personal authorization pattern by using a preset authorization manner model, so as to obtain a second authorization score of the personal authorization pattern;
and the authorization comprehensive scoring module 14 is configured to perform weighted summation on the first authorization score and the second authorization score according to preset scoring weights, so as to obtain an authorization comprehensive score.
Further, the first authorization scoring module 12 further includes:
the key field detection submodule is used for detecting whether the personal authorization text contains a preset text field by using a preset text analysis tool to obtain a key field detection result;
the authorization detail dimension submodule is used for extracting a preset content tag from the personal authorization text by using a preset text analysis tool to obtain an authorization detail dimension result;
and the first authorization score calculation submodule is used for obtaining the first authorization score according to the key field detection result, the authorization detail dimension result and a preset authorization text score rule.
Further, the second authorization scoring module 13 further includes:
the first judgment result submodule is used for acquiring a first judgment result of whether the personal authorization text is agreed by default;
the second judgment result submodule is used for acquiring a second judgment result whether the personal authorization text is related to the target service selected by the user;
and the second authorization score calculating submodule is used for obtaining a second authorization score according to the first judgment result, the second judgment result and a preset authorization model score rule.
Further, the first authorization scoring module 12 further includes:
the text defect detection submodule is used for detecting whether a preset text defect exists in the personal authorization text by using a preset text analysis tool;
the text defect correction submodule is used for correcting the text defects in the personal authorization text by using a preset text correction tool if the text defects are found;
the illegal text detection submodule is used for detecting whether the illegal text exists in the personal authorization text or not by using a preset text analysis tool if the illegal text does not exist in the personal authorization text;
and the illegal text returning submodule is used for returning the personal authorization text and the illegal text to the target service system and receiving the modified personal authorization text sent by the target service system if the personal authorization text and the illegal text are the same.
Further, the authorization composite score module 14 further includes:
acquiring legal text information and legal text information associated with the target service system;
analyzing whether the personal authorization text and the personal authorization pattern match the legal text information and the legal text information using a preset text analysis tool.
Further, the authorization composite score module 14 further includes:
the authorization comprehensive score comparison sub-module is used for judging whether the authorization comprehensive score is smaller than a preset authorization early warning score or not;
the early warning message generation submodule is used for using the personal authorization text, the personal authorization mode and the calculation process and the calculation result of the authorization comprehensive score as early warning information if the personal authorization text, the personal authorization mode and the calculation result of the authorization comprehensive score are the same;
and the early warning message queue submodule is used for sending the early warning information to an early warning message queue, wherein the early warning message queue is connected with the target service system.
Wherein the meaning of "first" and "second" in the above modules/units is only to distinguish different modules/units, and is not used to define which module/unit has higher priority or other defining meaning. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules explicitly listed, but may include other steps or modules not explicitly listed or inherent to such process, method, article, or apparatus, and such that a division of modules presented in this application is merely a logical division and may be implemented in a practical application in a further manner.
For specific limitations of the personal-information-authorization scoring device, reference may be made to the above limitations of the personal-information-authorization scoring method, which are not described herein again. All or part of each module in the personal information authorization and evaluation device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data involved in the personal information authorization scoring method. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a personal information authorization scoring method.
In one embodiment, a computer device is provided, which includes a memory, a processor and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the steps of the personal information authorization scoring method in the above embodiments are implemented, for example, steps S101 to S104 shown in fig. 2 and steps S201 to S205 shown in fig. 3, and other extensions of the method and extensions of related steps. Alternatively, the processor, when executing the computer program, implements the functions of the modules/units of the personal-information-authorization scoring device in the above-described embodiment, for example, the functions of the modules 11 to 14 shown in fig. 4. To avoid repetition, further description is omitted here.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like which is the control center for the computer device and which connects the various parts of the overall computer device using various interfaces and lines.
The memory may be used to store the computer programs and/or modules, and the processor may implement various functions of the computer device by running or executing the computer programs and/or modules stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, video data, etc.) created according to the use of the cellular phone, etc.
The memory may be integrated in the processor or may be provided separately from the processor.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the steps of the personal information authorization scoring method in the above-described embodiments, such as the steps S101 to S104 shown in fig. 2 and the steps S201 to S205 shown in fig. 3, and other extensions of the method and related steps. Alternatively, the computer program is executed by the processor to implement the functions of the modules/units of the personal-information-authorization scoring device in the above-described embodiment, for example, the functions of the modules 11 to 14 shown in fig. 4. To avoid repetition, further description is omitted here.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
It should be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional units and modules is only used for illustration, and in practical applications, the above function distribution may be performed by different functional units and modules as needed, that is, the internal structure of the apparatus may be divided into different functional units or modules to perform all or part of the above described functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A personal information authorization scoring method, comprising:
acquiring a personal authorization text and a personal authorization mode of a user from a target service system;
analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text;
analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode;
and carrying out weighted summation on the first authorization score and the second authorization score according to preset score weight to obtain an authorization comprehensive score.
2. The method of claim 1, wherein analyzing the personal authorization text using a predetermined text evaluation model to obtain a first authorization score of the personal authorization text comprises:
detecting whether the personal authorization text contains a preset text field by using a preset text analysis tool to obtain a key field detection result;
extracting a preset content tag from the personal authorization text by using a preset text analysis tool to obtain an authorization detail dimension result;
and obtaining the first authorization score according to the key field detection result, the authorization detail dimension result and a preset authorization text scoring rule.
3. The method of claim 1, wherein the analyzing the personal authorization pattern using a preset authorization model to obtain a second authorization score of the personal authorization pattern comprises:
acquiring a first judgment result of whether the personal authorization text is agreed by default;
acquiring a second judgment result of whether the personal authorization text is related to the target service selected by the user;
and obtaining the second authorization score according to the first judgment result, the second judgment result and a preset authorization model scoring rule.
4. The method as claimed in claim 1, wherein the analyzing the personal authorization text using a preset text evaluation model to obtain the first authorization score of the personal authorization text further comprises:
detecting whether a preset text defect exists in the personal authorization text by using a preset text analysis tool;
if so, correcting the text defects in the personal authorization text by using a preset text correction tool;
if not, detecting whether an illegal text exists in the personal authorization text by using a preset text analysis tool;
if yes, returning the personal authorization text and the illegal text to the target business system;
and receiving the modified personal authorization text sent by the target business system.
5. The method for authorizing and scoring of personal information as claimed in claim 1, wherein the weighting and summing the first authorization score and the second authorization score according to the preset scoring weight further comprises:
acquiring legal text information and legal text information associated with the target service system;
analyzing whether the personal authorization text and the personal authorization pattern match the legal text information and the legal text information using a preset text analysis tool.
6. The method for authorizing and scoring of personal information as claimed in claim 1, wherein the weighting and summing the first authorization score and the second authorization score according to the preset scoring weight further comprises:
judging whether the authorization comprehensive score is smaller than a preset authorization early warning score or not;
if so, using the personal authorization text, the personal authorization mode, the calculation process of the authorization comprehensive score and the calculation result as early warning information;
and sending the early warning information to an early warning message queue, wherein the early warning message queue is connected with the target service system.
7. A personal information authorization scoring device, comprising:
the data acquisition module is used for acquiring the personal authorization text and the personal authorization mode of the user from the target service system;
the first authorization scoring module is used for analyzing the personal authorization text by using a preset text evaluation model to obtain a first authorization score of the personal authorization text;
the second authorization scoring module is used for analyzing the personal authorization mode by using a preset authorization mode model to obtain a second authorization score of the personal authorization mode;
and the authorization comprehensive scoring module is used for weighting and summing the first authorization score and the second authorization score according to preset scoring weight to obtain an authorization comprehensive score.
8. The personal information authorization scoring device of claim 7, wherein the first authorization scoring module further comprises:
the key field detection sub-module is used for detecting whether the personal authorization text contains a preset text field by using a preset text analysis tool to obtain a key field detection result;
the authorization detail dimension submodule is used for extracting a preset content tag from the personal authorization text by using a preset text analysis tool to obtain an authorization detail dimension result;
and the first authorization score calculation submodule is used for obtaining the first authorization score according to the key field detection result, the authorization detail dimension result and a preset authorization text score rule.
9. A computer device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of the personal information authorization scoring method according to any one of claims 1 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the personal information authorization scoring method according to any one of claims 1 to 7.
CN202211328726.9A 2022-10-27 2022-10-27 Personal information authorization scoring method and device, computer equipment and storage medium Pending CN115578071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211328726.9A CN115578071A (en) 2022-10-27 2022-10-27 Personal information authorization scoring method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211328726.9A CN115578071A (en) 2022-10-27 2022-10-27 Personal information authorization scoring method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115578071A true CN115578071A (en) 2023-01-06

Family

ID=84587268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211328726.9A Pending CN115578071A (en) 2022-10-27 2022-10-27 Personal information authorization scoring method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115578071A (en)

Similar Documents

Publication Publication Date Title
CN108156237B (en) Product information pushing method and device, storage medium and computer equipment
CN110782240B (en) Business data processing method and device, computer equipment and storage medium
CN104954353B (en) The method of calibration and device of APK file bag
KR20180113229A (en) Loan service providing method using black chain and system performing the same
CN110489415B (en) Data updating method and related equipment
CN110851872B (en) Risk assessment method and device for private data leakage
CN107730385A (en) Simulation process method, apparatus, storage medium and the computer equipment of sequence information
CN110851298B (en) Abnormality analysis and processing method, electronic device and storage medium
TWI751590B (en) Violation presumption system, violation presumption method and program products
CN112700250B (en) Identity authentication method, device and system in financial scene
CN110598478A (en) Block chain based evidence verification method, device, equipment and storage medium
CN113987182A (en) Fraud entity identification method, device and related equipment based on security intelligence
CN113505393A (en) Block chain payment data processing method applied to big data and cloud server
CN111489175B (en) Online identity authentication method, device, system and storage medium
KR102143510B1 (en) Risk management system for information cecurity
CN112702410A (en) Evaluation system and method based on block chain network and related equipment
CN111639903A (en) Review processing method for architecture change and related equipment
CN111651500A (en) User identity recognition method, electronic device and storage medium
CN115578071A (en) Personal information authorization scoring method and device, computer equipment and storage medium
KR102304231B1 (en) compliance management support system using hierarchical structure and method therefor
CN115018625A (en) Credit fusion report generation method, device, equipment and storage medium
CN114078049A (en) Data processing method and device for supply chain financial credit-information service
CN108632348B (en) Service checking method and device
EP3761197A1 (en) Method and system for producing a scoring model
CN109740131B (en) Form data processing method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination