WO2019144505A1 - 一种鉴权通道选取方法、装置、电子设备及介质 - Google Patents

一种鉴权通道选取方法、装置、电子设备及介质 Download PDF

Info

Publication number
WO2019144505A1
WO2019144505A1 PCT/CN2018/082309 CN2018082309W WO2019144505A1 WO 2019144505 A1 WO2019144505 A1 WO 2019144505A1 CN 2018082309 W CN2018082309 W CN 2018082309W WO 2019144505 A1 WO2019144505 A1 WO 2019144505A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
channel
channels
duration
preset
Prior art date
Application number
PCT/CN2018/082309
Other languages
English (en)
French (fr)
Inventor
陈文博
刘�英
赵增杰
洪宇明
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019144505A1 publication Critical patent/WO2019144505A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing

Definitions

  • the present application belongs to the field of data processing technologies, and in particular, to a method, an apparatus, an electronic device, and a medium for selecting an authentication channel.
  • the authentication system collects the identity information that the user needs to verify, and compares the identity information with the legal identity information through the authentication channel to authenticate the user.
  • the legal identity information required for authentication is stored in an authentication server provided by the public security system or other third-party companies.
  • the existing authentication system is to set up an authentication channel connected to the selected authentication server, and use the authentication channel to upload and download the user identity information to complete the verification of the user identity.
  • the authentication channel may be faulty due to various factors, and once the authentication channel is abnormal, the authentication system cannot verify the authentication of the user identity. Therefore, the authentication system of the prior art is System reliability is difficult to secure.
  • the embodiment of the present application provides a method, an apparatus, an electronic device, and a medium for selecting an authentication channel, so as to solve the problem that the system reliability of the authentication system in the prior art is low.
  • a first aspect of the embodiments of the present application provides a method for selecting an authentication channel, including:
  • N is a positive integer
  • the identity information is sequentially verified by using the N authentication channels until the verification of the identity information is completed.
  • a second aspect of the embodiments of the present application provides an authentication channel selection apparatus, including:
  • a channel identification module configured to identify currently available N authentication channels from a preset plurality of authentication channels according to the identity information required to be verified, and calculate an authentication price, a channel stability value, and a channel stability value of the N authentication channels, and The authentication time is long, each of the plurality of authentication channels is respectively connected to a different authentication server, and N is a positive integer;
  • a performance calculation module configured to determine channel performance of each of the N authentication channels according to the authentication price, the channel stability value, and the authentication duration;
  • the authentication module is configured to sequentially verify the identity information by using the N authentication channels according to the channel performance from high to low until the verification of the identity information is completed.
  • a third aspect of the embodiments of the present application provides an authentication channel selection electronic device, including a memory and a processor, where the computer stores computer readable instructions executable on the processor, where the processor executes
  • the computer readable instructions implement the following steps:
  • N is a positive integer
  • the identity information is sequentially verified by using the N authentication channels until the verification of the identity information is completed.
  • a fourth aspect of the embodiments of the present application provides a computer readable storage medium storing computer readable instructions, wherein the computer readable instructions are implemented by at least one processor The following steps:
  • N is a positive integer
  • the identity information is sequentially verified by using the N authentication channels until the verification of the identity information is completed.
  • the performance of the available authentication channels is evaluated according to the three dimensions of the authentication price, the channel stability value and the authentication duration, and the high-performance authentication channel is preferentially used to verify the user's identity information, only in high performance.
  • the authentication channel with lower performance is used to verify the identity information until the identity information is verified by using an authentication channel. The higher the performance of the authentication channel, the better.
  • the probability of identity information verification is greater, so the identity information is verified by the high-to-low performance mechanism, which ensures the reliability of the user identity authentication and improves the reliability of the authentication system.
  • FIG. 1 is a schematic flowchart of an implementation process of an authentication channel selection method according to Embodiment 1 of the present application;
  • FIG. 2 is a schematic flowchart of an implementation process of an authentication channel selection method according to Embodiment 2 of the present application;
  • FIG. 3 is a schematic flowchart of an implementation process of an authentication channel selection method according to Embodiment 3 of the present application.
  • FIG. 4 is a schematic flowchart of an implementation process of an authentication channel selection method according to Embodiment 4 of the present application.
  • FIG. 5 is a schematic flowchart of an implementation process of an authentication channel selection method provided in Embodiment 5 of the present application;
  • FIG. 6 is a schematic structural diagram of an apparatus for selecting an authentication channel according to Embodiment 6 of the present application.
  • FIG. 7 is a schematic diagram of an electronic device for selecting an authentication channel according to Embodiment 7 of the present application.
  • FIG. 1 is a flowchart showing an implementation of an authentication channel selection method according to Embodiment 1 of the present application, which is described in detail as follows:
  • an authentication channel that is currently enabled and can be used to verify the identity information required for verification. Since the authentication servers connected to each authentication channel are different, the identity information that can be verified is also different, and the authentication channel is not necessarily opened in real time. Therefore, it is necessary to first determine the authentication that satisfies both requirements.
  • the channel can guarantee the effective verification of the identity information.
  • the authentication price refers to the current price charged by the authentication channel for each authentication. Because the charging standards provided by different companies are different, some are fixed price charges, that is, each authentication is charged the same fee. For example, if each authentication fee is fixed at 2 yuan, and some is used to charge the gradient within the cycle time, for example, in a month period, the first 10,000 charge in a month is 2.5 yuan / pen, after more than 10,000 pens The fee is 1 yuan/pen, so the charge for the corresponding authentication channel may be different for each authentication. Therefore, in the embodiment of the present application, after the N authentication channels currently available are determined, the reading is performed. The real-time charging price corresponding to each of the authentication channels is taken out for subsequent use. In the embodiment of the present application, the charging standard of the authentication channel needs to be pre-recorded into the authentication system by the technical staff, and the real-time charging price is calculated by the authentication system when the actual authentication is used.
  • Channel stability refers to whether the authentication channel is stable and reliable for a certain period of time. Since the result of the authentication has three possibilities, the authentication succeeds, the authentication fails, or the authentication error, wherein the authentication success or failure means that the authentication channel has completed verification of the user identity information, only because of the user identity information itself. The correctness or not results in the difference in the authentication result. Therefore, both of the results indicate that the authentication channel is normally available, and the authentication error indicates that the authentication channel itself has a problem, which makes it impossible to verify the user identity information. Therefore, when performing stability identification on the authentication channel, it is necessary to refer to the case where the authentication channel is authenticated incorrectly or the authentication is completed normally within a certain period of time, and based on the quantitative calculation, the stability of the representative channel is obtained.
  • the channel stability value such as calculating the ratio of the number of authentication completions of the authentication channel to the total number of authentication pens in a certain period of time.
  • the authentication duration refers to the average time required for the authentication channel to complete an authentication normally.
  • the data can be obtained by reading the time taken by all the normally completed authentications in the authentication channel for a certain period of time and obtaining the average value.
  • the abnormal value in the acquired time data may be first removed, and then the authentication duration is calculated to ensure the validity of the authentication duration.
  • S102 Determine, according to the authentication price, the channel stability value, and the authentication duration, the channel performance of each of the N authentication channels.
  • the channel performance evaluation is performed on the authentication channel from the three dimensions of the authentication price, the channel stability, and the authentication duration.
  • the specific evaluation method needs to be set by the technician according to the actual situation, including It is not limited to, for example, processing three dimensions using a weighting method to obtain a channel performance score of an authentication channel, and the like.
  • S103 The identity information is sequentially verified by using N authentication channels according to the channel performance from high to low until the identity information is verified.
  • the verification processing of the user identity information is started. Since the authentication of the identity information only needs one authentication channel, no multi-channel repeated authentication is needed, and the stronger the channel performance, the greater the probability that the identity information can be verified normally. Therefore, in order to improve the efficiency of verifying the identity information of the user, Reliability, in the embodiment of the present application, an authentication channel with the strongest channel performance is preferentially used to verify the identity information of the user. If the result of successful authentication or failure of the user identity information is obtained normally, the authentication channel is used for the user. The authentication of the identity information is completed normally. At this time, the authentication of the user identity is completed. If the result is an authentication error, the authentication channel is faulty.
  • the authentication in order to ensure timely verification of the user identity information, the authentication will be used.
  • the authentication channel with the strongest channel performance in the remaining authentication channels is used to verify the user identity information, and the selection process of the authentication channel is repeated according to the authentication result until the authentication of the user identity information is completed.
  • a plurality of optional authentication servers and corresponding authentication channels are set for the user to perform identity information verification, and the currently available authentication channels are filtered before the identity information is verified, thereby ensuring even When the authentication channel is abnormal, the user identity information can be verified normally, which improves the reliability of the authentication system.
  • the performance of the available authentication channels is evaluated according to the three dimensions of the authentication price, the channel stability value and the authentication duration, and the high-performance authentication channel is preferentially used to verify the user's identity information, only in high performance.
  • the authentication channel with lower performance is used to verify the identity information until the identity information is verified by using an authentication channel. The higher the performance of the authentication channel, the better.
  • the probability of identity information verification is greater, so the identity information is verified by the high-to-low performance mechanism, which ensures the reliability of the user identity authentication and improves the reliability of the authentication system.
  • the method includes:
  • the A authentication channel supports the verification of the user a bank account and the b bank account.
  • the B authentication channel supports the verification of the user a bank account and the c bank account
  • the C authentication channel supports the verification of the user d bank account
  • the D authentication channel supports the verification of the user a bank account and the d bank account
  • the subsequent authentication channels are available. For example, when the user needs to verify the bank account, only three authentication channels of the ABD can be selected as the alternative authentication channel.
  • the authentication channel is not necessarily opened in real time, and may be temporarily or permanently closed due to a fault or the like, and the closed authentication channel authentication system is unavailable, so the embodiment of the present application determines After the authentication channel supporting the identity information verification, the authenticated channel that needs to be opened is also selected to ensure that the finally identified authentication channels are currently available in the real-time authentication channel.
  • the opened authentication channel may also be searched first, and the N authentication channels supporting the verification of the user identity information are filtered out in the cluster.
  • the method includes:
  • S301 Normalize the authentication price, the channel stability value, and the authentication duration based on the lowest authentication price in the authentication price, the highest channel stability value in the channel stability value, and the minimum authentication duration in the authentication duration. Processing, obtaining an authentication price score, a channel stability value score, and an authentication duration score of the N authentication channels.
  • the method for calculating the weights of different measurement units is often to assign a fixed score value to each parameter after sorting the parameters, such as setting the first name to 100 points and the second name to 90. Divided, although unified quantification can be achieved by this method, it does not reflect the actual difference of each dimension between each authentication channel, and the influence of the artificially set fractional value is too large, and the final result is also obtained. It is difficult to accurately and reliably reflect the actual performance of the channel of the authentication channel.
  • the embodiment of the present application selects the normalization of the parameters based on the original parameters in the three dimensions, and considers that the authentication price is lower in the three dimensions.
  • the authentication cost of the authentication company is responsible, and at the same time, in order to more accurately and reliably realize the quantification of the performance of the authentication channel, in the embodiment of the present application, the authentication price is The minimum authentication price, the highest channel stability value in the channel stability value, and the minimum authentication duration in the authentication duration are used to normalize the authentication price, the channel stability value, and the authentication duration to make the three
  • the data of the dimensions can be quantified by the unified standard for subsequent unified calculation processing.
  • the embodiment of the present application calculates the weight value of the three dimensions by using the set weight coefficient to obtain the specific performance weight index of each authentication channel, and the performance of the authentication channel.
  • the formula for calculating the weight index is as follows:
  • F n is the performance weight index of the nth authentication channel
  • x n , y n , z n are respectively the authentication price score, the channel stability value score, and the authentication duration score of the nth authentication channel
  • a, b And c are the weight coefficients corresponding to the three dimensions of the authentication price, the channel stability value, and the authentication duration.
  • the weighting coefficient directly determines the authentication price, the channel stability, or the authentication time limit when the authentication is finally selected, the assignment of the weighting coefficient is more important in the embodiment of the present application.
  • the weighting coefficients corresponding to the three dimensions may be preset by the technician according to the actual needs of the user.
  • the adjustment and modification of the weight coefficient may be performed by the user.
  • the weight coefficient used by the user history modification may be used as a basis to estimate the weight coefficient required by the user to authenticate the user and serve as a default value of the current authentication weight coefficient.
  • the user can make adjustments and modifications by himself to ensure that the weight coefficient of the final use is the actual value of the user.
  • the method before identifying the currently available N authentication channels, the method further includes:
  • S401 Perform authentication error monitoring on the preset multiple authentication channels, and count the number of consecutive authentication errors of each of the plurality of authentication channels.
  • the authentication channel that presets the number of consecutive authentication errors in the plurality of authentication channels to be greater than the continuous error threshold is closed.
  • the authentication channel may be faulty due to various factors, and the authentication channel may not be used normally.
  • the authentication channel performs real-time monitoring to determine whether the authentication channel is normal.
  • the authentication channel When the authentication channel has an authentication error multiple times, it indicates that the authentication channel has a large problem and may be completely damaged. Therefore, in the embodiment of the present application, the authentication is permanently closed to prevent the user identity information from being authenticated. interference.
  • the specific value of the error threshold can be set by the technician according to the actual application requirements. As an embodiment of the present application, the technician can perform maintenance after the failure of the authentication channel is determined. Therefore, in the embodiment of the present application, the technician can manually re-enable the authentication after the maintenance channel is repaired. aisle.
  • the method further includes:
  • the number of authentication errors and the authentication error rate of each of the plurality of authentication channels in the preset time period are counted according to the first preset duration, and the preset time period is the current time to the current time.
  • the time period within the second preset duration before the time, the first preset duration is greater than or equal to the second preset duration.
  • the authentication channel with the number of authentication errors in the plurality of authentication channels is greater than the error threshold, or the authentication error rate is greater than the error rate threshold, and is turned off after the third preset duration.
  • the number of authentication errors refers to the number of authentication errors of the authentication channel in a certain period of time.
  • the authentication error rate refers to the ratio of the number of authentication errors to the total number of authentication times in a certain period of time.
  • the authentication channel may be interfered by various factors and cause the authentication channel to be unable to be used normally, but it does not cause substantial damage.
  • the communication line signal is unstable due to weather.
  • the transient instability of the authentication channel is made.
  • the number of authentication errors and the authentication error rate of the authentication channel are counted at a certain frequency interval, and the threshold is determined.
  • the authentication channel is unstable, and the authentication channel is temporarily closed. Because the workload of the authentication error number and the authentication error rate data is large, the workload of the authentication system is reduced.
  • the data of the periodic frequency is counted at intervals of the first preset duration, and only the data within the second preset duration before the current time is counted to determine whether the authentication channel is stable.
  • the first preset duration, the second preset duration, and the third preset duration may be set by the technician according to actual conditions. To ensure the validity of the statistics, the first preset duration should be greater than or equal to the second preset duration. .
  • a plurality of optional authentication servers and corresponding authentication channels are set for the user to perform identity information verification, and the currently available authentication channels are filtered before the identity information is verified, thereby ensuring that even When the authentication channel is abnormal, the user identity information can be verified normally, which improves the reliability of the authentication system.
  • it also monitors whether the authentication channel is abnormal in real time, and closes the abnormal authentication channel in time to ensure the normal availability of the authentication channel, and then according to the three dimensions of authentication price, channel stability value and authentication duration. Perform weight calculation performance evaluation on the available authentication channels, and preferentially use the high-performance authentication channel to verify the user's identity information. Only when the high-performance authentication channel is incorrectly authenticated, the performance is lower.
  • the right channel verifies the identity information until the identity information is verified by using an authentication channel.
  • the higher the performance of the authentication channel the greater the probability that the identity information can be verified normally. Therefore, the performance is high to low.
  • the mechanism verifies the identity information, ensures the reliability of the user identity authentication, and improves the reliability of the authentication system.
  • FIG. 6 is a structural block diagram of an authentication channel selecting apparatus provided by an embodiment of the present application.
  • the authentication channel selection device illustrated in FIG. 6 may be the execution body of the authentication channel selection method provided in the foregoing first embodiment.
  • the authentication channel selection device includes:
  • the channel identification module 61 is configured to identify the currently available N authentication channels from the preset plurality of authentication channels according to the identity information that is required to be verified, and calculate an authentication price and a channel stability value of the N authentication channels. And the authentication duration, each of the plurality of authentication channels is respectively connected to a different authentication server, and N is a positive integer.
  • the performance calculation module 62 is configured to determine channel performance of each of the N authentication channels according to the authentication price, the channel stability value, and the authentication duration.
  • the authentication module 63 is configured to sequentially verify the identity information by using the N authentication channels according to the channel performance from high to low until the verification of the identity information is completed.
  • the channel identification module 61 includes:
  • the first channel identification submodule is configured to filter, from the preset plurality of authentication channels, M authentication channels that support verification of the identity information, where M is a positive integer greater than or equal to N.
  • the second channel identification submodule is configured to find the N authentication channels that have been opened from the M authentication channels.
  • the performance calculation module 62 includes:
  • determining, according to a lowest authentication price in the authentication price, a highest channel stability value in the channel stability value, and a minimum authentication duration in the authentication duration, the authentication price, the channel stability value, and The authentication durations are respectively normalized to obtain an authentication price score, a channel stability value score, and an authentication duration score of the N authentication channels.
  • the authentication channel selecting device further includes:
  • the error monitoring module is configured to perform an authentication error monitoring on the preset multiple authentication channels, and count the consecutive authentication error times of each of the preset plurality of authentication channels.
  • a permanent shutdown module configured to close the authentication channel in the preset plurality of authentication channels that the number of consecutive authentication errors is greater than a continuous error threshold.
  • the authentication channel selecting device further includes:
  • the error statistic module is configured to collect, by using the first preset duration, a number of authentication errors and an authentication error rate of each of the plurality of authentication channels in a preset time period, where the The time period is a time period from a current time to a second preset time length before the current time, and the first preset time length is greater than or equal to the second preset time length.
  • the temporary closing module is configured to close the authentication channel in which the number of authentication errors in the preset plurality of authentication channels is greater than an error threshold, or the authentication error rate is greater than an error rate threshold, and is in a third preset duration Then turn it back on.
  • first, second, and the like are used in the text to describe various elements in the embodiments of the present application, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
  • the first contact can be named a second contact, and similarly, the second contact can be named the first contact without departing from the scope of the various described embodiments. Both the first contact and the second contact are contacts, but they are not the same contact.
  • FIG. 7 is a schematic diagram of a data table backup electronic device according to an embodiment of the present application.
  • the data table backup electronic device 7 of this embodiment includes a processor 70, a memory 71 in which computer readable instructions 72 executable on the processor 70 are stored.
  • the processor 70 executes the computer readable instructions 72 to implement the steps in the various data table backup method embodiments described above, such as steps 101 through 106 shown in FIG.
  • the processor 70 when executing the computer readable instructions 72, implements the functions of the various modules/units in the various apparatus embodiments described above, such as the functions of the modules 61-66 shown in FIG.
  • the data table backup electronic device 7 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server.
  • the data table backup electronic device may include, but is not limited to, a processor 70 and a memory 71. It will be understood by those skilled in the art that FIG. 7 is only an example of the data table backup electronic device 7, and does not constitute a limitation on the data table backup electronic device 7, and may include more or less components than the illustration, or a combination of certain A component, or a different component, such as the datasheet backup electronic device, may also include an input transmitting device, a network access device, a bus, and the like.
  • the so-called processor 70 can be a central processing unit (Central Processing Unit, CPU), can also be other general purpose processors, digital signal processors (DSP), application specific integrated circuits (Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 71 may be an internal storage unit of the data table backup electronic device 7, such as a hard disk or memory of the data table backup electronic device 7.
  • the memory 71 may also be an external storage device of the data table backup electronic device 7, for example, a plug-in hard disk equipped with the data table backup electronic device 7, a smart memory card (SMC), and a secure digital device. (Secure Digital, SD) card, flash card, etc.
  • SMC smart memory card
  • secure digital device Secure Digital, SD
  • the memory 71 may also include both an internal storage unit of the data table backup electronic device 7 and an external storage device.
  • the memory 71 is configured to store the computer readable instructions and other programs and data required by the data table backup electronic device.
  • the memory 71 can also be used to temporarily store data that has been sent or is about to be transmitted.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated modules/units if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium.
  • the present application implements all or part of the processes in the foregoing embodiments, and may also be implemented by computer readable instructions, which may be stored in a computer readable storage medium.
  • the computer readable instructions when executed by a processor, may implement the steps of the various method embodiments described above.
  • the computer readable instructions comprise computer readable instruction code, which may be in the form of source code, an object code form, an executable file or some intermediate form or the like.
  • the computer readable medium may include any entity or device capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electrical carrier signals, telecommunications signals, and software distribution media. It should be noted that the content contained in the computer readable medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction, for example, in some jurisdictions, according to legislation and patent practice, computer readable media Does not include electrical carrier signals and telecommunication signals.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种鉴权通道选取方法、装置、电子设备以及介质,适用于数据处理技术领域,该方法包括:根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;根据鉴权价格、通道稳定值以及鉴权时长确定出N条鉴权通道中每一条鉴权通道的通道性能;根据通道性能从高至低的顺序,利用N条鉴权通道依次对身份信息进行验证直至对身份信息验证完成为止。利用从性能高至低的机制来对身份信息进行验证,保证了对用户身份鉴权的可靠性,提升了鉴权系统的可靠性。

Description

一种鉴权通道选取方法、装置、电子设备及介质
本申请要求于2018年01月29日提交中国专利局、申请号为201810083960.7、发明名称为“一种鉴权通道选取方法及终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请属于数据处理技术领域,尤其涉及一种鉴权通道选取方法、装置、电子设备及介质。
背景技术
用户在进行需要身份验证的操作时,鉴权系统会采集用户所需验证的身份信息,并通过鉴权通道来将这些身份信息与合法身份信息进行对比验证,以实现对用户的鉴权。实际应用中,身份验证所需的合法身份信息都是存储在公安系统或其他第三方公司所提供的认证服务器中。现有的鉴权系统都是通过设置一条与选定认证服务器连接的鉴权通道,并利用该鉴权通道来进行用户身份信息的上传下载,以完成对用户身份的验证。
然而实际情况中,鉴权通道可能会因各种因素出现故障,而一旦鉴权通道出现异常,鉴权系统就会无法实现对用户身份的鉴权验证,因此,现有技术中鉴权系统的系统可靠性难以得到保障。
技术问题
有鉴于此,本申请实施例提供了一种鉴权通道选取方法、装置、电子设备及介质,以解决现有技术中鉴权系统的系统可靠性较低的问题。
技术解决方案
本申请实施例的第一方面提供了一种鉴权通道选取方法,包括:
根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
本申请实施例的第二方面提供了一种鉴权通道选取装置,包括:
通道识别模块,用于根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
性能计算模块,用于根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
鉴权模块,用于根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
本申请实施例的第三方面提供了一种鉴权通道选取电子设备,包括存储器、处理器,所述存储器上存储有可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
本申请实施例的第四方面提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被至少一个处理器执行时实现如下步骤:
根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
有益效果
为用户设置多个可选的认证服务器以及对应的鉴权通道来进行身份信息的验证,且在身份信息验证前先进行当前可用鉴权通道的筛选,从而保证了即使在有鉴权通道异常时也能对用户身份信息进行正常验证,提升了鉴权系统的可靠性。同时,根据鉴权价格、通道稳定值以及鉴权时长三个维度来对可用的鉴权通道进行性能评估,并优先利用性能高的鉴权通道来对用户的身份信息进行验证,只有在高性能的鉴权通道鉴权错误时才利用性能低一级的鉴权通道来对身份信息进行验证,直至利用某一鉴权通道对身份信息验证完成,由于鉴权通道的性能越高其可正常进行身份信息验证的概率越大,因此利用从性能高至低的机制来对身份信息进行验证,保证了对用户身份鉴权的可靠性,提升了鉴权系统的可靠性。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例一提供的鉴权通道选取方法的实现流程示意图;
图2是本申请实施例二提供的鉴权通道选取方法的实现流程示意图;
图3是本申请实施例三提供的鉴权通道选取方法的实现流程示意图;
图4是本申请实施例四提供的鉴权通道选取方法的实现流程示意图;
图5是本申请实施例五提供的鉴权通道选取方法的实现流程示意图;
图6是本申请实施例六提供的鉴权通道选取装置的结构示意图;
图7是本申请实施例七提供的鉴权通道选取电子设备的示意图。
本发明的实施方式
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。
为了说明本申请所述的技术方案,下面通过具体实施例来进行说明。
图1示出了本申请实施例一提供的鉴权通道选取方法的实现流程图,详述如下:
S101,根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数。
其中,当前可用是指当前已开启且可用于对所需验证的身份信息进行验证的鉴权通道。由于每个鉴权通道连接的认证服务器各不相同,所能够验证的身份信息也有所差异,同时鉴权通道也不一定是实时开启的,因此需要先确定出同时满足上述两个要求的鉴权通道,才能保证后续对身份信息的有效验证。
鉴权价格是指鉴权通道当前对每笔鉴权的收费价格,由于不同公司提供的鉴权通道的收费标准不尽相同,一些是固定价格收费即每一笔鉴权都是收取相同的费用,如每笔鉴权固定收费2元,而一些则是在周期时间内进行梯度收费,如以一个月为周期,在一个月内前一万笔收费为2.5元/笔,超出一万笔之后收费为1元/笔,因此对于每笔鉴权,其对应的鉴权通道的收费都可能会有所差异,因此本申请实施例中需要在确定出当前可用的N条鉴权通道之后,读取出其中每条鉴权通道对应的实时收费价格以供后续使用。在本申请实施例中,鉴权通道的收费标准需由技术人员预先录入至鉴权系统中,并由鉴权系统在实际鉴权使用时计算实时的收费价格。
通道稳定性是指鉴权通道在一定时间内的进行鉴权是否稳定可靠。由于鉴权的结果有三种可能,鉴权成功、鉴权失败或者鉴权错误,其中鉴权成功或失败都意味着鉴权通道已经完成了对用户身份信息的验证,只是由于用户身份信息本身的正确与否导致了鉴权结果的差异,因此这两者结果都说明了鉴权通道是正常可用的,而鉴权错误则说明鉴权通道本身出现了问题,导致无法对用户身份信息进行正常验证,因此,在对鉴权通道进行稳定性鉴别的时候,需要参考鉴权通道在一定时间内鉴权错误或者正常完成鉴权的情况,并以之为基础进行量化计算,得到代表通道稳定性的通道稳定值,如计算鉴权通道在一定时间内的鉴权完成笔数占总鉴权笔数的比例值等。
鉴权时长是指鉴权通道正常完成一笔鉴权所需的平均时间,该数据可以通过读取鉴权通道一定时间内所有正常完成的鉴权所花费的时间并求均值得到。作为一种优选实施方式,可以将获取到的时间数据中异常值先进行剔除后,再计算鉴权时长,以保证鉴权时长的有效性。
S102,根据鉴权价格、通道稳定值以及鉴权时长确定出N条鉴权通道中每一条鉴权通道的通道性能。
在本申请实施例中,会从鉴权价格、通道稳定性以及鉴权时长三个维度来对鉴权通道进行通道性能评估,具体评估的方法需由技术人员根据实际情况进行设定,包括但不限于如利用加权方法来对三个维度进行处理,以得到鉴权通道的通道性能分数等。
S103,根据通道性能从高至低的顺序,利用N条鉴权通道依次对身份信息进行验证直至对身份信息验证完成为止。
本申请实施例中,在确定出N个鉴权通道的通道性能之后,开始对用户身份信息的验证处理。由于身份信息的验证只需要一条鉴权通道即可,无需多通道重复鉴权,而通道性能越强其可正常进行身份信息验证的概率越大,因此,为了提高对用户身份信息验证的效率以及可靠性,本申请实施例中会优先使用通道性能最强的一个鉴权通道开始对用户的身份信息进行验证,若正常得到用户身份信息鉴权成功或失败的结果,说明该鉴权通道对用户身份信息鉴权正常完成,此时对用户身份的鉴权完成,若得到的结果是鉴权错误,说明该鉴权通道出现了故障,此时为了保证能及时对用户身份信息进行验证,会使用剩余的鉴权通道中通道性能最强的一个鉴权通道来对用户身份信息进行验证,并根据鉴权结果重复上述鉴权通道的选取过程,直至完成对用户身份信息的鉴权。
在本申请实施例中,为用户设置多个可选的认证服务器以及对应的鉴权通道来进行身份信息的验证,且在身份信息验证前先进行当前可用鉴权通道的筛选,从而保证了即使在有鉴权通道异常时也能对用户身份信息进行正常验证,提升了鉴权系统的可靠性。同时,根据鉴权价格、通道稳定值以及鉴权时长三个维度来对可用的鉴权通道进行性能评估,并优先利用性能高的鉴权通道来对用户的身份信息进行验证,只有在高性能的鉴权通道鉴权错误时才利用性能低一级的鉴权通道来对身份信息进行验证,直至利用某一鉴权通道对身份信息验证完成,由于鉴权通道的性能越高其可正常进行身份信息验证的概率越大,因此利用从性能高至低的机制来对身份信息进行验证,保证了对用户身份鉴权的可靠性,提升了鉴权系统的可靠性。
作为本申请实施例二识别当前可用的N条鉴权通道的一种具体实现方式,如图2所示,包括:
S201,从预设多个鉴权通道中筛选出支持对身份信息进行验证的M条鉴权通道,其中M为大于或等于N的正整数。
由于不同公司提供的认证服务器支持验证的身份信息有所不同,因此不同的鉴权通道所能支持验证的身份信息也有所差异,如A鉴权通道支持对用户a银行账户以及b银行账户的验证,B鉴权通道支持对用户a银行账户以及c银行账户的验证,C鉴权通道支持对用户d银行账户的验证,而D鉴权通道支持对用户a银行账户以及d银行账户的验证,此时,需要从这些鉴权通道中找出支持用户所需验证的身份信息的鉴权通道出来,以保证后续鉴权通道的可用。如当用户需要验证的是a银行账户,此时只能选取ABD三个鉴权通道来作为备选的鉴权通道。
S202,从M条鉴权通道查找出已开启的N条鉴权通道。
由于在实际应用中,鉴权通道并非一定是实时开启的,如可能由于故障等原因被暂时或永久关闭了,而已关闭的鉴权通道鉴权系统是无法使用的,因此本申请实施例在确定出支持身份信息验证的鉴权通道后,还需从中挑选出已开启的鉴权通道,以保证最终识别出的鉴权通道都是当前实时可用的鉴权通道。
作为本申请的另一个实施例,在进行当前可用的鉴权通道的识别时,也可以先查找已开启的鉴权通道,在丛中筛选出支持对用户身份信息验证的N条鉴权通道。
作为本申请实施例三利用鉴权价格、通道稳定值以及鉴权时长三个维度来确定出鉴权通道的通道性能的一种具体实现方式,如图3所示,包括:
S301,基于鉴权价格中的最低鉴权价格、通道稳定值中的最高通道稳定值以及鉴权时长中的最小鉴权时长,对鉴权价格、通道稳定值以及鉴权时长分别进行归一化处理,得到N条鉴权通道的鉴权价格分数、通道稳定值分数以及鉴权时长分数。
由于三个维度的参数使用的计量单位各不相同,正常情况下是无法直接进行权重计算处理的,因此需要对三个维度的参数重新进行赋值处理。现有技术中对不同计量单位进行赋值权重计算的方法往往是将参数进行大小排序后,直接对各个参数赋予一个固定的分数值,如将第一名设置为100分,第二名设置为90分,虽然通过这种方法能够实现统一量化,但无法很好地体现出每个鉴权通道之间各个维度的实际差异,同时受人为设置的分数值大小的影响过大,得到的最终结果也难以准确可靠地体现出鉴权通道的通道实际性能。
正是基于现有技术中存在的上述缺陷,本申请实施例选用了基于三个维度中的原始参数为基础来对参数自身进行归一化处理,同时考虑到三个维度中鉴权价格越低,对负责鉴权公司的鉴权成本就越低,通道稳定值越高,鉴权通道可正常鉴权的可能性越高,而鉴权时长越短则说明鉴权通道鉴权的效率越高,因此,为了帮助用户实现更可靠高效的鉴权保证负责鉴权公司的鉴权成本,同时也是为了更加真实可靠地实现对鉴权通道性能的量化,本申请实施例中会以鉴权价格中的最低鉴权价格、通道稳定值中的最高通道稳定值以及鉴权时长中的最小鉴权时长为基础,来对鉴权价格、通道稳定值以及鉴权时长进行归一化处理,以使得三个维度的数据能得到统一标准的量化,以便于后续的统一计算处理。
以鉴权价格为例进行说明,假设A、B、D三条鉴权通道当前实时鉴权价格分别为1元/笔、2元/笔以及2.5元/笔,此时本申请实施例中会以鉴权价格最低的1元/笔作为基准1,并对BD鉴权通道进行归一化转换,则B鉴权通道对应的鉴权价格分数为1/2=0.5,D鉴权通道对应的鉴权价格分数为1/2.5=0.4,此时得到了三个鉴权通道对应的鉴权价格分数。同理,可以得到各个通道的通道稳定值分数以及鉴权时长分数。
S302,读取鉴权价格、通道稳定值以及鉴权时长分别对应的权重系数,并利用权重系数对鉴权价格分数、通道稳定值分数以及鉴权时长分数进行权重计算,得到N条鉴权通道分别对应的性能权重指数,确定出N条鉴权通道中每一条鉴权通道的通道性能。
在得到鉴权通道三维度的分数后,本申请实施例会利用设置好的权重系数对三个维度的分数值进行权重计算,以得到每个鉴权通道的具体性能权重指数,对鉴权通道性能权重指数的计算公式如下:
F n=a*x n  + b*y n  + c*z n,n ∈ 1~N     (1)
其中F n为第n个鉴权通道的性能权重指数,x n、y n、z n分别为第n个鉴权通道的鉴权价格分数、通道稳定值分数以及鉴权时长分数,a、b、c分别为鉴权价格、通道稳定值以及鉴权时长三个维度对应的权重系数。
由于权重系数直接决定了本笔鉴权最终选取鉴权通道的偏重点时鉴权价格、通道稳定性还是鉴权时效,因此对权重系数的赋值在本申请实施例中比较重要。作为本申请的一种具体实现方式,考虑到不同用户所关注的侧重点各不相同,本申请实施例中可以由技术人员根据用户的实际需求类预先设置好三个维度分别对应的权重系数。
作为本申请的另一种具体实现方式,在技术人员设定权重系数的基础上,还可以由用户自行进行权重系数的调整修改。作为本申请的又一种具体实现方式,还可以根据用户历史修改使用的权重系数作为基础,来预估用户本笔鉴权用户所需的权重系数并作为本次鉴权权重系数的默认值,同时可以由用户自行进行调整修改,以保证最终使用的权重系数是用户实际需求的数值。
作为本申请实施例四,如图4所示,在识别当前可用的N条鉴权通道之前,还包括:
S401,对预设多个鉴权通道进行鉴权错误监测,并统计预设多个鉴权通道中每个鉴权通道的连续鉴权错误次数。
S402,将预设多个鉴权通道中连续鉴权错误次数大于连续出错阈值的鉴权通道进行关闭。
由于实际应用情况中,鉴权通道可能会受到各种因素的干扰而出现故障,使得鉴权通道无法正常使用,为了保证开启的鉴权通道都是可用的,本申请实施例中会对所有的鉴权通道进行实时监测,判断鉴权通道是否正常。
当鉴权通道连续多次出现鉴权错误时,说明该鉴权通道存在极大地问题,可能已经彻底损坏,因此本申请实施例中会将其进行永久关闭,以防对用户身份信息鉴权造成干扰。其中出错阈值的具体数值,可由技术人员根据实际应用需求进行设定。作为本申请的一个实施例,由于一般在鉴权通道确定出现故障后,都会有技术人员进行维修,因此本申请实施例中,技术人员可以在对鉴权通道维修完成后,手动重新开启鉴权通道。
作为本申请实施例五,如图5所示,在识别当前可用的N条鉴权通道之前,还包括:
S501,以第一预设时长为周期对多个鉴权通道中每个鉴权通道在预设时间段内的鉴权错误数以及鉴权错误率进行统计,预设时间段为当前时间至当前时间前的第二预设时长内的时间段,第一预设时长大于或等于第二预设时长。
S502,将预设多个鉴权通道中鉴权错误数大于出错阈值,或者鉴权错误率大于出错率阈值的鉴权通道进行关闭,并在第三预设时长后重新开启。
其中鉴权错误数是指一定时间内鉴权通道鉴权错误的次数,鉴权错误率是指一定时间内鉴权错误数占鉴权总次数的比例值。
由于实际应用情况中,鉴权通道可能会受到各种因素的干扰而出现故障,使得鉴权通道无法正常使用,但又并未造成实质性的损坏,如天气原因导致的通信线路信号不稳定,使得鉴权通道的短暂性的不稳定。为了保证开启的鉴权通道都是可用的,本申请实施例中会以一定频率间隔,对鉴权通道在一定时间内的鉴权错误数以及鉴权错误率进行统计,并在其超出阈值判定鉴权通道不稳定,并将鉴权通道临时关闭,由于对鉴权错误数和鉴权错误率数据统计的工作量较大,因此为了减小鉴权系统的工作负荷,本申请实施例中会以第一预设时长为间隔来进行周期频率的数据统计,并仅统计当前时间前第二预设时长内的数据以判断鉴权通道是否稳定。其中的第一预设时长、第二预设时长以及第三预设时长均可由技术人员根据实际情况进行设定,为了保证统计的有效性第一预设时长应当大于或等于第二预设时长。
本申请实施例中,为用户设置多个可选的认证服务器以及对应的鉴权通道来进行身份信息的验证,且在身份信息验证前先进行当前可用鉴权通道的筛选,从而保证了即使在有鉴权通道异常时也能对用户身份信息进行正常验证,提升了鉴权系统的可靠性。同时还会实时监控鉴权通道是否存在异常,并对异常的鉴权通道进行及时关闭处理,保证了鉴权通道的正常可用,再根据鉴权价格、通道稳定值以及鉴权时长三个维度来对可用的鉴权通道进行权重计算性能评估,并优先利用性能高的鉴权通道来对用户的身份信息进行验证,只有在高性能的鉴权通道鉴权错误时才利用性能低一级的鉴权通道来对身份信息进行验证,直至利用某一鉴权通道对身份信息验证完成,由于鉴权通道的性能越高其可正常进行身份信息验证的概率越大,因此利用从性能高至低的机制来对身份信息进行验证,保证了对用户身份鉴权的可靠性,提升了鉴权系统的可靠性。
对应于上文实施例的方法,图6示出了本申请实施例提供的鉴权通道选取装置的结构框图,为了便于说明,仅示出了与本申请实施例相关的部分。图6示例的鉴权通道选取装置可以是前述实施例一提供的鉴权通道选取方法的执行主体。
参照图6,该鉴权通道选取装置包括:
通道识别模块61,用于根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数。
性能计算模块62,用于根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能。
鉴权模块63,用于根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
进一步地,通道识别模块61,包括:
第一通道识别子模块,用于从所述预设多个鉴权通道中筛选出支持对所述身份信息进行验证的M条鉴权通道,其中M为大于或等于N的正整数。
第二通道识别子模块,用于从所述M条鉴权通道查找出已开启的所述N条鉴权通道。
进一步地,性能计算模块62,包括:
基于所述鉴权价格中的最低鉴权价格、所述通道稳定值中的最高通道稳定值以及所述鉴权时长中的最小鉴权时长,对所述鉴权价格、所述通道稳定值以及所述鉴权时长分别进行归一化处理,得到所述N条鉴权通道的鉴权价格分数、通道稳定值分数以及鉴权时长分数。
读取所述鉴权价格、所述通道稳定值以及所述鉴权时长分别对应的权重系数,并利用所述权重系数对所述鉴权价格分数、所述通道稳定值分数以及所述鉴权时长分数进行权重计算,得到所述N条鉴权通道分别对应的性能权重指数,确定出所述N条鉴权通道中每一条鉴权通道的所述通道性能。
进一步地,该鉴权通道选取装置,还包括:
错误监测模块,用于对所述预设多个鉴权通道进行鉴权错误监测,并统计所述预设多个鉴权通道中每个鉴权通道的连续鉴权错误次数。
永久关闭模块,用于将所述预设多个鉴权通道中所述连续鉴权错误次数大于连续出错阈值的鉴权通道进行关闭。
进一步地,该鉴权通道选取装置,还包括:
错误统计模块,用于以第一预设时长为周期对所述多个鉴权通道中每个鉴权通道在预设时间段内的鉴权错误数以及鉴权错误率进行统计,所述预设时间段为当前时间至当前时间前的第二预设时长内的时间段,所述第一预设时长大于或等于所述第二预设时长。
临时关闭模块,用于将所述预设多个鉴权通道中所述鉴权错误数大于出错阈值,或者鉴权错误率大于出错率阈值的鉴权通道进行关闭,并在第三预设时长后重新开启。
本申请实施例提供的鉴权通道选取装置中各模块实现各自功能的过程,具体可参考前述图1至4所示实施例的描述,此处不再赘述。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解的是,虽然术语“第一”、“第二”等在文本中在一些本申请实施例中用来描述各种元素,但是这些元素不应该受到这些术语的限制。这些术语只是用来将一个元素与另一元素区分开。例如,第一接触可以被命名为第二接触,并且类似地,第二接触可以被命名为第一接触,而不背离各种所描述的实施例的范围。第一接触和第二接触都是接触,但是它们不是同一接触。
图7是本申请一实施例提供的数据表备份电子设备的示意图。如图7所示,该实施例的数据表备份电子设备7包括:处理器70、存储器71,所述存储器71中存储有可在所述处理器70上运行的计算机可读指令72。所述处理器70执行所述计算机可读指令72时实现上述各个数据表备份方法实施例中的步骤,例如图1所示的步骤101至106。或者,所述处理器70执行所述计算机可读指令72时实现上述各装置实施例中各模块/单元的功能,例如图6所示模块61至66的功能。
所述数据表备份电子设备7可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述数据表备份电子设备可包括,但不仅限于,处理器70、存储器71。本领域技术人员可以理解,图7仅仅是数据表备份电子设备7的示例,并不构成对数据表备份电子设备7的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述数据表备份电子设备还可以包括输入发送设备、网络接入设备、总线等。
所称处理器70可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
所述存储器71可以是所述数据表备份电子设备7的内部存储单元,例如数据表备份电子设备7的硬盘或内存。所述存储器71也可以是所述数据表备份电子设备7的外部存储设备,例如所述数据表备份电子设备7上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器71还可以既包括所述数据表备份电子设备7的内部存储单元也包括外部存储设备。所述存储器71用于存储所述计算机可读指令以及所述数据表备份电子设备所需的其他程序和数据。所述存储器71还可以用于暂时地存储已经发送或者将要发送的数据。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,也可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一计算机可读存储介质中,该计算机可读指令在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机可读指令包括计算机可读指令代码,所述计算机可读指令代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机可读指令代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使对应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种鉴权通道选取方法,其特征在于,包括:
    根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
    根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
    根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
  2. 如权利要求1所述的鉴权通道选取方法,其特征在于,所述根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,包括
    从所述预设多个鉴权通道中筛选出支持对所述身份信息进行验证的M条鉴权通道,其中M为大于或等于N的正整数;
    从所述M条鉴权通道查找出已开启的所述N条鉴权通道。
  3. 如权利要求1所述的鉴权通道选取方法,其特征在于,所述根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能,包括:
    基于所述鉴权价格中的最低鉴权价格、所述通道稳定值中的最高通道稳定值以及所述鉴权时长中的最小鉴权时长,对所述鉴权价格、所述通道稳定值以及所述鉴权时长分别进行归一化处理,得到所述N条鉴权通道的鉴权价格分数、通道稳定值分数以及鉴权时长分数;
    读取所述鉴权价格、所述通道稳定值以及所述鉴权时长分别对应的权重系数,并利用所述权重系数对所述鉴权价格分数、所述通道稳定值分数以及所述鉴权时长分数进行权重计算,得到所述N条鉴权通道分别对应的性能权重指数,确定出所述N条鉴权通道中每一条鉴权通道的所述通道性能。
  4. 如权利要求1或2所述的鉴权通道选取方法,其特征在于,在所述根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道之前,还包括:
    对所述预设多个鉴权通道进行鉴权错误监测,并统计所述预设多个鉴权通道中每个鉴权通道的连续鉴权错误次数;
    将所述预设多个鉴权通道中所述连续鉴权错误次数大于连续出错阈值的鉴权通道进行关闭。
  5. 如权利要求1至3任意一项所述的鉴权通道选取方法,其特征在于,在所述根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道之前,还包括:
    以第一预设时长为周期对所述多个鉴权通道中每个鉴权通道在预设时间段内的鉴权错误数以及鉴权错误率进行统计,所述预设时间段为当前时间至当前时间前的第二预设时长内的时间段,所述第一预设时长大于或等于所述第二预设时长;
    将所述预设多个鉴权通道中所述鉴权错误数大于出错阈值,或者鉴权错误率大于出错率阈值的鉴权通道进行关闭,并在第三预设时长后重新开启。
  6. 一种鉴权通道选取装置,其特征在于,包括:
    通道识别模块,用于根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
    性能计算模块,用于根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
    鉴权模块,用于根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
  7. 如权利要求6所述的鉴权通道选取装置,其特征在于,所述通道识别模块,包括:
    第一通道识别子模块,用于从所述预设多个鉴权通道中筛选出支持对所述身份信息进行验证的M条鉴权通道,其中M为大于或等于N的正整数;
    第二通道识别子模块,用于从所述M条鉴权通道查找出已开启的所述N条鉴权通道。
  8. 如权利要求6所述的鉴权通道选取装置,其特征在于,所述性能计算模块,包括:
    基于所述鉴权价格中的最低鉴权价格、所述通道稳定值中的最高通道稳定值以及所述鉴权时长中的最小鉴权时长,对所述鉴权价格、所述通道稳定值以及所述鉴权时长分别进行归一化处理,得到所述N条鉴权通道的鉴权价格分数、通道稳定值分数以及鉴权时长分数;
    读取所述鉴权价格、所述通道稳定值以及所述鉴权时长分别对应的权重系数,并利用所述权重系数对所述鉴权价格分数、所述通道稳定值分数以及所述鉴权时长分数进行权重计算,得到所述N条鉴权通道分别对应的性能权重指数,确定出所述N条鉴权通道中每一条鉴权通道的所述通道性能。
  9. 如权利要求6所述的鉴权通道选取装置,其特征在于,还包括:
    错误监测模块,用于对所述预设多个鉴权通道进行鉴权错误监测,并统计所述预设多个鉴权通道中每个鉴权通道的连续鉴权错误次数;
    永久关闭模块,用于将所述预设多个鉴权通道中所述连续鉴权错误次数大于连续出错阈值的鉴权通道进行关闭。
  10. 如权利要求6所述的鉴权通道选取装置,其特征在于,还包括:
    错误统计模块,用于以第一预设时长为周期对所述多个鉴权通道中每个鉴权通道在预设时间段内的鉴权错误数以及鉴权错误率进行统计,所述预设时间段为当前时间至当前时间前的第二预设时长内的时间段,所述第一预设时长大于或等于所述第二预设时长;
    临时关闭模块,用于将所述预设多个鉴权通道中所述鉴权错误数大于出错阈值,或者鉴权错误率大于出错率阈值的鉴权通道进行关闭,并在第三预设时长后重新开启。
  11. 一种鉴权通道选取电子设备,其特征在于,所述鉴权通道选取处理电子设备包括存储器、处理器,所述存储器上存储有可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
    根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
    根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
    根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
  12. 如权利要求11所述鉴权通道选取电子设备,其特征在于,所述根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,包括:
    从所述预设多个鉴权通道中筛选出支持对所述身份信息进行验证的M条鉴权通道,其中M为大于或等于N的正整数;
    从所述M条鉴权通道查找出已开启的所述N条鉴权通道。
  13. 如权利要求11所述鉴权通道选取电子设备,其特征在于,所述根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能,具体包括:
    基于所述鉴权价格中的最低鉴权价格、所述通道稳定值中的最高通道稳定值以及所述鉴权时长中的最小鉴权时长,对所述鉴权价格、所述通道稳定值以及所述鉴权时长分别进行归一化处理,得到所述N条鉴权通道的鉴权价格分数、通道稳定值分数以及鉴权时长分数;
    读取所述鉴权价格、所述通道稳定值以及所述鉴权时长分别对应的权重系数,并利用所述权重系数对所述鉴权价格分数、所述通道稳定值分数以及所述鉴权时长分数进行权重计算,得到所述N条鉴权通道分别对应的性能权重指数,确定出所述N条鉴权通道中每一条鉴权通道的所述通道性能。
  14. 如权利要求11所述鉴权通道选取电子设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:
    对所述预设多个鉴权通道进行鉴权错误监测,并统计所述预设多个鉴权通道中每个鉴权通道的连续鉴权错误次数;
    将所述预设多个鉴权通道中所述连续鉴权错误次数大于连续出错阈值的鉴权通道进行关闭。
  15. 如权利要求11所述鉴权通道选取电子设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:
    以第一预设时长为周期对所述多个鉴权通道中每个鉴权通道在预设时间段内的鉴权错误数以及鉴权错误率进行统计,所述预设时间段为当前时间至当前时间前的第二预设时长内的时间段,所述第一预设时长大于或等于所述第二预设时长;
    将所述预设多个鉴权通道中所述鉴权错误数大于出错阈值,或者鉴权错误率大于出错率阈值的鉴权通道进行关闭,并在第三预设时长后重新开启。
  16. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被至少一个处理器执行时实现如下步骤:
    根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,并计算所述N条鉴权通道的鉴权价格、通道稳定值以及鉴权时长,所述多个鉴权通道中的每个鉴权通道分别与不同的认证服务器连接,N为正整数;
    根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能;
    根据所述通道性能从高至低的顺序,利用所述N条鉴权通道依次对所述身份信息进行验证直至对所述身份信息验证完成为止。
  17. 如权利要求16所述的计算机可读存储介质,其特征在于,所述根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道,包括
    从所述预设多个鉴权通道中筛选出支持对所述身份信息进行验证的M条鉴权通道,其中M为大于或等于N的正整数;
    从所述M条鉴权通道查找出已开启的所述N条鉴权通道。
  18. 如权利要求16所述的计算机可读存储介质,其特征在于,所述根据所述鉴权价格、所述通道稳定值以及所述鉴权时长确定出所述N条鉴权通道中每一条鉴权通道的通道性能,包括:
    基于所述鉴权价格中的最低鉴权价格、所述通道稳定值中的最高通道稳定值以及所述鉴权时长中的最小鉴权时长,对所述鉴权价格、所述通道稳定值以及所述鉴权时长分别进行归一化处理,得到所述N条鉴权通道的鉴权价格分数、通道稳定值分数以及鉴权时长分数;
    读取所述鉴权价格、所述通道稳定值以及所述鉴权时长分别对应的权重系数,并利用所述权重系数对所述鉴权价格分数、所述通道稳定值分数以及所述鉴权时长分数进行权重计算,得到所述N条鉴权通道分别对应的性能权重指数,确定出所述N条鉴权通道中每一条鉴权通道的所述通道性能。
  19. 如权利要求16或17所述的计算机可读存储介质,其特征在于,在所述根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道之前,还包括:
    对所述预设多个鉴权通道进行鉴权错误监测,并统计所述预设多个鉴权通道中每个鉴权通道的连续鉴权错误次数;
    将所述预设多个鉴权通道中所述连续鉴权错误次数大于连续出错阈值的鉴权通道进行关闭。
  20. 如权利要求16至18任意一项所述的计算机可读存储介质,其特征在于,在所述根据所需验证的身份信息从预设多个鉴权通道中识别当前可用的N条鉴权通道之前,还包括:
    以第一预设时长为周期对所述多个鉴权通道中每个鉴权通道在预设时间段内的鉴权错误数以及鉴权错误率进行统计,所述预设时间段为当前时间至当前时间前的第二预设时长内的时间段,所述第一预设时长大于或等于所述第二预设时长;
    将所述预设多个鉴权通道中所述鉴权错误数大于出错阈值,或者鉴权错误率大于出错率阈值的鉴权通道进行关闭,并在第三预设时长后重新开启。
PCT/CN2018/082309 2018-01-29 2018-04-09 一种鉴权通道选取方法、装置、电子设备及介质 WO2019144505A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810083960.7A CN108092996B (zh) 2018-01-29 2018-01-29 一种鉴权通道选取方法及终端设备
CN201810083960.7 2018-01-29

Publications (1)

Publication Number Publication Date
WO2019144505A1 true WO2019144505A1 (zh) 2019-08-01

Family

ID=62183457

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/082309 WO2019144505A1 (zh) 2018-01-29 2018-04-09 一种鉴权通道选取方法、装置、电子设备及介质

Country Status (2)

Country Link
CN (1) CN108092996B (zh)
WO (1) WO2019144505A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935125B (zh) * 2020-08-05 2022-10-21 嘉联支付有限公司 基于分布式架构的鉴权方法、装置及微服务系统
CN113793153A (zh) * 2021-08-18 2021-12-14 宜卡科技(深圳)有限公司 鉴权通道选择方法、终端及可读存储介质
CN114257650B (zh) * 2021-10-29 2024-03-12 四川新网银行股份有限公司 一种银行个人用户联网核查方法、系统及设备
CN114448717A (zh) * 2022-03-02 2022-05-06 深圳酷宅科技有限公司 基于智能家居的通信状态检测分析方法、系统及云平台

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699894A (zh) * 2009-11-10 2010-04-28 广州杰赛科技股份有限公司 在认证服务器集群中处理认证请求的方法和装置
CN104299141A (zh) * 2014-09-28 2015-01-21 小米科技有限责任公司 数据处理方法及装置
WO2016065318A1 (en) * 2014-10-24 2016-04-28 Netflix, Inc. Efficient start-up for secured connections and related services
CN107231363A (zh) * 2017-06-12 2017-10-03 华南理工大学 一种分布式认证方法与认证模型

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546633A (zh) * 2012-01-10 2012-07-04 中兴通讯股份有限公司 Web认证服务器的选择方法及装置
KR101834849B1 (ko) * 2015-08-19 2018-03-06 삼성전자주식회사 전자 장치 및 전자 장치의 사용자 인증 방법
CN106815099B (zh) * 2017-01-19 2020-09-18 腾讯科技(深圳)有限公司 鉴权系统和方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699894A (zh) * 2009-11-10 2010-04-28 广州杰赛科技股份有限公司 在认证服务器集群中处理认证请求的方法和装置
CN104299141A (zh) * 2014-09-28 2015-01-21 小米科技有限责任公司 数据处理方法及装置
WO2016065318A1 (en) * 2014-10-24 2016-04-28 Netflix, Inc. Efficient start-up for secured connections and related services
CN107231363A (zh) * 2017-06-12 2017-10-03 华南理工大学 一种分布式认证方法与认证模型

Also Published As

Publication number Publication date
CN108092996B (zh) 2020-02-28
CN108092996A (zh) 2018-05-29

Similar Documents

Publication Publication Date Title
WO2019144505A1 (zh) 一种鉴权通道选取方法、装置、电子设备及介质
US10356114B2 (en) Method and system of distinguishing between human and machine
WO2020082579A1 (zh) 一种风险审批方法、装置、存储介质和服务器
CN108449327B (zh) 一种账号清理方法、装置、终端设备及存储介质
WO2020062690A1 (zh) 基于大数据分析的非法用户识别方法及装置、电子设备
CN108667828A (zh) 一种风险控制方法、装置及存储介质
CN108134944B (zh) 一种收入异常主播用户的识别方法、装置及电子设备
CN108875365B (zh) 一种入侵检测方法及入侵检测检测装置
CN108762898A (zh) 一种线程接口的管理方法、终端设备及计算机可读存储介质
WO2019029149A1 (zh) 保单的险种状态信息统计方法、终端设备及存储介质
WO2019056496A1 (zh) 图片复审概率区间生成方法及图片复审判定方法
WO2019052112A1 (zh) 一种增量数据同步方法、可读存储介质、终端设备及装置
WO2019037449A1 (zh) 基于资金归集的余额计算方法、装置、终端设备及介质
TW202109304A (zh) 共用電子設備管理方法及裝置
CN108959865A (zh) 一种验证方法及装置
CN111159169B (zh) 数据治理方法及设备
CN104504308B (zh) 一种禁止虚拟机使用软件的许可证验证方法
CN109684033A (zh) 云平台裸机管理方法、存储介质、电子设备及系统
CN113886242A (zh) 数据处理方法、装置、终端及存储介质
US10055522B2 (en) Automated checker generation
CN113452533B (zh) 计费自巡检、自愈合方法、装置、计算机设备和存储介质
CN117294652A (zh) 流量控制方法、服务器、电子设备及计算机可读存储介质
CN113592645A (zh) 数据验证的方法和装置
CN111966286A (zh) 一种多数据池分级迁移的方法及系统
WO2022088382A1 (zh) 一种在线办公网络扰动处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18902966

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 12/11/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18902966

Country of ref document: EP

Kind code of ref document: A1