CN112000945B - Authorization method, device, equipment and medium based on artificial intelligence - Google Patents
Authorization method, device, equipment and medium based on artificial intelligence Download PDFInfo
- Publication number
- CN112000945B CN112000945B CN202010859942.0A CN202010859942A CN112000945B CN 112000945 B CN112000945 B CN 112000945B CN 202010859942 A CN202010859942 A CN 202010859942A CN 112000945 B CN112000945 B CN 112000945B
- Authority
- CN
- China
- Prior art keywords
- user
- users
- authorization
- similarity
- calculating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the technical field of artificial intelligence and intelligent decision making, and provides an authorization method, device, equipment and medium based on the artificial intelligence, which can acquire the number of clicks of each URL of a user of a configuration system from test run data according to buried points in a detection period and conduct similarity analysis, average the number of clicks of each user relative to the URL in the configuration system based on the artificial intelligence, effectively reduce the influence of numerical differences of variable individuals on the similarity among variables, improve the accuracy of the similarity analysis, pre-authorize the use authority of a designated function to a user with high similarity in response to an authorization request of the designated function, further pre-authorize based on the artificial intelligence, automatically add similar user role authorities to the system, automatically authorize the maintained authorization data directly loaded once the user applies for authorization of the designated function, improve the authorization efficiency, reduce the waiting time of the user, and store the pre-authorized related data into a blockchain.
Description
Technical Field
The invention relates to the technical field of artificial intelligence and intelligent decision making, in particular to an authorization method, device, equipment and medium based on artificial intelligence.
Background
At present, most internet products support a home page or a workbench operated by a user, but the use of some functions of the home page or the workbench also needs background configuration and management authorization, and meanwhile, the use of functions of the product inside also needs the system administrator to initialize configuration and definer for use. If the user has a plurality of roles and needs to frequently modify the home page or function authorization, the user needs to frequently report to a system administrator, and the system administrator carries out modification and authorization after auditing.
In addition, most organizations have the situation that the same type of roles form the role groups, and how to assign different functions or cards to different role groups, and meanwhile, the common property and the individuality are considered, so that the method is a problem that the industry is difficult to process.
Disclosure of Invention
In view of the foregoing, it is necessary to provide an authorization method, device, equipment and medium based on artificial intelligence, which can perform pre-authorization based on artificial intelligence technology, automatically add user role rights similar to the target user into the system, and once the users apply for authorization to the specified function, automatically authorize the user by directly loading the maintained authorization data, thereby improving the authorization efficiency and reducing the waiting time of the user.
An artificial intelligence based authorization method, the artificial intelligence based authorization method comprising:
acquiring all URLs of a configuration system, and burying points for all URLs;
after the configuration system is online, recording test operation data of the configuration system;
determining a detection period, and acquiring the number of clicks of each user to each URL in all users of the configuration system from the test run data according to the buried points in the detection period;
performing combination operation on each two users as a group to obtain at least one user combination;
performing similarity analysis on the users in the at least one user combination according to the click number to obtain the similarity between the users in each user combination as the similarity between every two users;
responding to an authorization request of a target user for a designated function of the configuration system, and sorting the similarity between all users and the target user according to the similarity between every two users from high to low;
acquiring users with the similarity row of the target users at the preset position from all the users;
and pre-authorizing the use authority of the designated function to the acquired user.
According to a preferred embodiment of the present invention, the determining the detection period includes:
dividing the designated duration into at least one time period;
dividing each time period into a plurality of time periods at preset time intervals;
determining an amount of user access by the configuration system for each of the plurality of time periods;
determining a time period with the lowest user access amount in each time period according to the user access amount in each time period, and obtaining a plurality of lowest time periods;
calculating the duty ratio of each lowest time period in the plurality of lowest time periods;
and determining the lowest time period with the highest duty ratio as the detection time period.
According to a preferred embodiment of the present invention, the performing similarity analysis on the users in the at least one user combination according to the number of clicks, to obtain the similarity between the users in each user combination as the similarity between every two users includes:
for a first user and a second user in each user combination, determining all first URLs clicked by the first user and the number of clicks of the first user on each first URL according to the number of clicks, and determining all second URLs clicked by the second user and the number of clicks of the second user on each second URL;
Calculating a first average value of all the first URLs clicked by the first user, and calculating a second average value of all the second URLs clicked by the second user;
calculating at least one first difference of the number of clicks of the first user on each first URL relative to the first average value, and calculating at least one second difference of the number of clicks of the second user on each second URL relative to the second average value;
calculating the product of each first difference value and the corresponding second difference value to obtain at least one first product;
calculating an accumulated sum of the at least one first product;
calculating a first sum of squares of the at least one first difference value and calculating a second sum of squares of the at least one second difference value;
calculating a square root of a second product of the first sum of squares and the second sum of squares;
taking the ratio of the accumulated sum to the square root as the similarity between users in the user combination;
and integrating the similarity between the users in each user combination as the similarity between every two users.
According to a preferred embodiment of the present invention, the pre-authorizing the usage rights of the specified function to the acquired user includes:
acquiring authorization data corresponding to the designated function of the target user;
Maintaining the obtained authorization data of the user according to the authorization data of the target user;
and recording the acquired authorization data of the user to the configuration system and the blockchain node.
According to a preferred embodiment of the present invention, the artificial intelligence based authorization method further comprises:
recommending the specified function to the acquired user.
According to a preferred embodiment of the present invention, the artificial intelligence based authorization method further comprises:
when detecting that a first user requests authorization of the specified function in the acquired users, acquiring first request data of the first user;
matching the first request data with recorded authorization data;
for the successfully matched data, authorizing the first user according to the recorded authorization data; and
And for the data with failed matching, generating confirmation information according to the data with failed matching, and sending the confirmation information to the first terminal equipment for confirmation.
According to a preferred embodiment of the present invention, the artificial intelligence based authorization method further comprises:
when the second user request for authorization of the specified function is detected in the obtained users, the security attribute of the configuration system is obtained;
When the configuration system is the appointed security attribute, second request data of the second user are obtained;
feeding back the second request data to a second terminal device;
and when the authorization permission of the second terminal equipment is received, authorizing the second user according to the recorded authorization data.
An artificial intelligence based authorization device, the artificial intelligence based authorization device comprising:
the embedded point unit is used for acquiring all URLs of the configuration system and embedding points for all URLs;
the recording unit is used for recording the test operation data of the configuration system after the configuration system is on line;
the acquisition unit is used for determining a detection period, and acquiring the click number of each URL of each user in all users of the configuration system from the test run data according to the buried points in the detection period;
the operation unit is used for carrying out combination operation on all the users by taking every two users as a group to obtain at least one user combination;
the analysis unit is used for carrying out similarity analysis on the users in the at least one user combination according to the click number to obtain the similarity between the users in each user combination as the similarity between every two users;
The ordering unit is used for responding to an authorization request of a target user for a specified function of the configuration system, and ordering the similarity between all users and the target user according to the similarity between every two users from high to low;
the acquisition unit is further used for acquiring users with the similarity row with the target user at the preset position from all the users;
and the authorization unit is used for pre-authorizing the use authority of the specified function to the acquired user.
According to a preferred embodiment of the present invention, the acquiring unit determining the detection period includes:
dividing the designated duration into at least one time period;
dividing each time period into a plurality of time periods at preset time intervals;
determining an amount of user access by the configuration system for each of the plurality of time periods;
determining a time period with the lowest user access amount in each time period according to the user access amount in each time period, and obtaining a plurality of lowest time periods;
calculating the duty ratio of each lowest time period in the plurality of lowest time periods;
and determining the lowest time period with the highest duty ratio as the detection time period.
According to a preferred embodiment of the invention, the analysis unit is specifically adapted to:
For a first user and a second user in each user combination, determining all first URLs clicked by the first user and the number of clicks of the first user on each first URL according to the number of clicks, and determining all second URLs clicked by the second user and the number of clicks of the second user on each second URL;
calculating a first average value of all the first URLs clicked by the first user, and calculating a second average value of all the second URLs clicked by the second user;
calculating at least one first difference of the number of clicks of the first user on each first URL relative to the first average value, and calculating at least one second difference of the number of clicks of the second user on each second URL relative to the second average value;
calculating the product of each first difference value and the corresponding second difference value to obtain at least one first product;
calculating an accumulated sum of the at least one first product;
calculating a first sum of squares of the at least one first difference value and calculating a second sum of squares of the at least one second difference value;
calculating a square root of a second product of the first sum of squares and the second sum of squares;
taking the ratio of the accumulated sum to the square root as the similarity between users in the user combination;
And integrating the similarity between the users in each user combination as the similarity between every two users.
According to a preferred embodiment of the present invention, the authorizing unit pre-authorizes the usage rights of the specified function to the acquired user includes:
acquiring authorization data corresponding to the designated function of the target user;
maintaining the obtained authorization data of the user according to the authorization data of the target user;
and recording the acquired authorization data of the user to the configuration system and the blockchain node.
According to a preferred embodiment of the present invention, the artificial intelligence based authorization device further comprises:
and the recommending unit is used for recommending the specified function to the acquired user.
According to a preferred embodiment of the present invention, the acquiring unit is further configured to acquire first request data of a first user when it is detected that the first user requests authorization of the specified function among the acquired users;
the artificial intelligence based authorization device further comprises:
the matching unit is used for matching the first request data with the recorded authorization data;
the authorization unit is further used for authorizing the first user according to the recorded authorization data for successfully matching data; and
And the generating unit is used for generating confirmation information according to the data which fail to match and sending the confirmation information to the first terminal equipment for confirmation.
According to a preferred embodiment of the present invention, the acquiring unit is further configured to acquire a security attribute of the configuration system when it is detected that a second user requests authorization of the specified function among the acquired users;
the acquiring unit is further configured to acquire second request data of the second user when the configuration system designates a security attribute;
the artificial intelligence based authorization device further comprises:
the feedback unit is used for feeding back the second request data to the second terminal equipment;
the authorization unit is further configured to, when receiving the authorization permission of the second terminal device, authorize the second user according to the recorded authorization data.
An electronic device, the electronic device comprising:
a memory storing at least one instruction; and
And a processor executing instructions stored in the memory to implement the artificial intelligence based authorization method.
A computer-readable storage medium having stored therein at least one instruction for execution by a processor in an electronic device to implement the artificial intelligence based authorization method.
According to the technical scheme, the invention can acquire all URLs of a configuration system, burial points are carried out on all URLs, after the configuration system is on line, test run data of the configuration system are recorded, a detection period is determined, in the detection period, according to burial points, the number of clicks of each user on each URL in all users of the configuration system is acquired from the test run data, the data acquisition is carried out in the detection period, the calculated amount is effectively reduced, the system performance is improved, further, combination operation is carried out on all users in a group of two users, at least one user combination is obtained, similarity analysis is carried out on the users in the at least one user combination according to the number of clicks, the similarity between the users in each user combination is obtained as the similarity between each two users, the influence of each user on the variable similarity is effectively reduced based on the number of clicks of each user in the configuration system, the similarity analysis is improved, in response to the target user, the function is automatically applied for the function is automatically acquiring the preset between the assigned users according to the preset authority of the preset user, the user authorization is authorized to be authorized by the user, the user can be directly authorized by the user, and the user authorization is authorized to be authorized by the target users, and the user can be automatically authorized by the user based on the preset function before the user authorization is authorized by the target users, the authorization efficiency is improved and the waiting time of the user is reduced.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the artificial intelligence based authorization method of the present invention.
FIG. 2 is a functional block diagram of a preferred embodiment of the artificial intelligence based authorization device of the invention.
FIG. 3 is a schematic diagram of an electronic device implementing a preferred embodiment of an artificial intelligence based authorization method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
FIG. 1 is a flow chart of a preferred embodiment of the artificial intelligence based authorization method of the present invention. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs.
The authorization method based on artificial intelligence is applied to one or more electronic devices, wherein the electronic device is a device capable of automatically performing numerical calculation and/or information processing according to preset or stored instructions, and the hardware of the electronic device comprises, but is not limited to, a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a programmable gate array (Field-Programmable Gate Array, FPGA), a digital processor (Digital Signal Processor, DSP), an embedded device and the like.
The electronic device may be any electronic product that can interact with a user in a human-computer manner, such as a personal computer, tablet computer, smart phone, personal digital assistant (Personal Digital Assistant, PDA), game console, interactive internet protocol television (Internet Protocol Television, IPTV), smart wearable device, etc.
The electronic device may also include a network device and/or a user device. Wherein the network device includes, but is not limited to, a single network server, a server group composed of a plurality of network servers, or a Cloud based Cloud Computing (Cloud Computing) composed of a large number of hosts or network servers.
The network in which the electronic device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a virtual private network (Virtual Private Network, VPN), and the like.
S10, acquiring all URLs (Uniform Resource Locator, uniform resource locators) of a configuration system, and burying all the URLs.
The configuration system may be any system that requires assistance for authorization.
And, the URL may include URLs of all pages and functions of the configuration system.
According to the embodiment, through burying points on all URLs, comprehensive monitoring of user operation on the configuration system can be achieved.
Specifically, call chain monitoring CAT may be used to perform embedded point, ensuring that all URLs are monitored at maximum likelihood.
S11, after the configuration system is online, the test operation data of the configuration system are recorded.
In this embodiment, after the configuration system is online, the configuration system needs to be first commissioned.
Further, the commissioning data of the configuration system is recorded for subsequent use.
Wherein the commissioning data includes, but is not limited to, one or more of the following combinations of data: user ID, URL clicked by the user.
S12, determining a detection period, and acquiring the number of clicks of each user to each URL in all users of the configuration system from the test run data according to the buried points in the detection period.
Wherein the detection period refers to the determined optimal detection time.
Specifically, the determining the detection period includes:
dividing the designated duration into at least one time period;
dividing each time period into a plurality of time periods at preset time intervals;
determining an amount of user access by the configuration system for each of the plurality of time periods;
determining a time period with the lowest user access amount in each time period according to the user access amount in each time period, and obtaining a plurality of lowest time periods;
Calculating the duty ratio of each lowest time period in the plurality of lowest time periods;
and determining the lowest time period with the highest duty ratio as the detection time period.
It can be understood that, in the detection period determined in the above manner, the user has the lowest access to the configuration system, so that the number of users is smaller, the number of user combinations obtained by subsequent calculation is smaller, and similarly, the calculation amount in subsequent calculation is reduced due to the smaller number of user combinations.
Therefore, by the above embodiment, the detection period can be determined based on the user access amount of the configuration system, that is, the period with the lowest user access amount to the configuration system is selected as the detection period, and the calculation of the similarity between the users is performed in the detection period, so that the situation that the calculated amount is too large due to too many users and too many related resources are occupied is avoided, and the system performance is further reduced.
In addition, since the calculation of the data requires a large amount of memory space and CPU (central processing unit ), a period with a small access to the user of the configuration system is selected as the detection period, and at this time, when the occupied resources of the configuration system for external service are also small, the resources can be free for calculation, thereby further avoiding influencing the external service.
S13, carrying out combination operation on each two users as a group to obtain at least one user combination.
Wherein, a permutation formula can be adoptedThe combination operation is performed, n may be the total number of users, and m is the number of users in each combination.
Specifically, parameters such as a user name or a user identifier and the like capable of uniquely identifying one user can be used as a basis for distinguishing each user, and the users can be combined pairwise by combining the formulas.
For example: when all the users include user 1, user 2 and user 3, the formula is adoptedAfter the combination operation, three user combinations obtained after the combination operation are respectively as follows: user 1, user 2; user 2, user 3; user 1, user 3.
Through the combination operation, the relation between every two users can be presented in a user combination mode without repetition, and the subsequent calculation of the similarity between every two users according to the user combination is facilitated.
S14, carrying out similarity analysis on the users in the at least one user combination according to the click number to obtain the similarity between the users in each user combination as the similarity between every two users.
In at least one embodiment of the present invention, the performing similarity analysis on the users in the at least one user combination according to the click number, where obtaining the similarity between the users in each user combination as the similarity between every two users includes:
For a first user and a second user in each user combination, determining all first URLs clicked by the first user and the number of clicks of the first user on each first URL according to the number of clicks, and determining all second URLs clicked by the second user and the number of clicks of the second user on each second URL;
calculating a first average value of all the first URLs clicked by the first user, and calculating a second average value of all the second URLs clicked by the second user;
calculating at least one first difference of the number of clicks of the first user on each first URL relative to the first average value, and calculating at least one second difference of the number of clicks of the second user on each second URL relative to the second average value;
calculating the product of each first difference value and the corresponding second difference value to obtain at least one first product;
calculating an accumulated sum of the at least one first product;
calculating a first sum of squares of the at least one first difference value and calculating a second sum of squares of the at least one second difference value;
calculating a square root of a second product of the first sum of squares and the second sum of squares;
taking the ratio of the accumulated sum to the square root as the similarity between users in the user combination;
And integrating the similarity between the users in each user combination as the similarity between every two users.
By the implementation mode, the click number of each user relative to the URL in the configuration system can be averaged based on artificial intelligence, the influence of numerical value differences of variable individuals on the similarity among variables is effectively reduced, and the accuracy of similarity analysis is improved.
S15, responding to an authorization request of a target user for a specified function of the configuration system, and sorting the similarity between all users and the target user according to the similarity between every two users from high to low.
For example: when the target user is user a, it is detected that the user a requests authorization for a new function M, at this time, it is determined that the users of the configuration system are user B, user C, and user D, respectively, and the similarity between the user B and the user a is x, the similarity between the user C and the user a is y, the similarity between the user D and the user a is z, and x > y > z, and then the final ranking is: user B, user C, user D.
Through the sorting, other users similar to the target user can be intuitively provided, and the similarity degree is clear.
S16, acquiring the users with the similarity row of the target users at the preset position from all the users.
In this embodiment, the pre-set bit may be obtained by calculating a post-median based on a bayesian formula, and the application of the bayesian formula is wider, which is not described here.
Of course, in other embodiments, the value of the pre-set bit may be configured by user-defined according to the requirement or may be configured by an empirical value, which is not limited by the present invention.
S17, pre-authorizing the use authority of the designated function to the acquired user.
Wherein, the specified functions may include newly added page functions, etc.
In at least one embodiment of the present invention, the pre-authorizing the usage rights of the specified function to the acquired user includes:
acquiring authorization data corresponding to the designated function of the target user;
maintaining the obtained authorization data of the user according to the authorization data of the target user;
and recording the acquired authorization data of the user to the configuration system and the blockchain node.
It can be appreciated that in the conventional authorization manner, an administrator is required to manually add authorization data such as users, roles, rights and the like in the system, and then confirm the authorization, and the adding action is complicated, because a plurality of pull-down options are required to add, or other options are used to add, once the number of applications is large, the workload is huge.
Through the embodiment, the user role authority similar to the target user is automatically added into the system based on the pre-authorization of the artificial intelligence technology, so that once the users apply for authorization of the designated function, the maintained authorization data can be directly loaded, the authorization efficiency is improved, the waiting time of the users is reduced, and meanwhile, the security of the data can be improved by recording the authorization data in the blockchain node.
In at least one embodiment of the present invention, the artificial intelligence based authorization method further comprises:
recommending the specified function to the acquired user.
Through the embodiment, the users with higher similarity with the target user are found first, and because the users have similar use conditions on the URLs of the functions, the users are very likely to have use requirements on the designated functions, and therefore, the user experience can be effectively improved through intelligent recommendation.
Further, the authorization method based on artificial intelligence further comprises the following steps:
when detecting that a first user requests authorization of the specified function in the acquired users, acquiring first request data of the first user;
matching the first request data with recorded authorization data;
For the successfully matched data, authorizing the first user according to the recorded authorization data; and
And for the data with failed matching, generating confirmation information according to the data with failed matching, and sending the confirmation information to the first terminal equipment for confirmation.
By the embodiment, the quick authorization of the user can be further realized on the basis of the pre-authorization, and the authorization efficiency is improved.
In at least one embodiment of the present invention, the artificial intelligence based authorization method further comprises:
when the second user request for authorization of the specified function is detected in the obtained users, the security attribute of the configuration system is obtained;
when the configuration system is the appointed security attribute, second request data of the second user are obtained;
feeding back the second request data to a second terminal device;
and when the authorization permission of the second terminal equipment is received, authorizing the second user according to the recorded authorization data.
The specified security attribute refers to a security attribute of a system with a higher security level requirement, and a full-automatic authorization mode does not meet the security requirement of the system, so that other devices are required to assist in authorization.
Through the embodiment, the user can be quickly authorized by one-key authorization with the assistance of the pre-authorization and other devices, authorization data do not need to be added one by one, and the authorization process is quickened.
According to the technical scheme, the invention can acquire all URLs of a configuration system, burial points are carried out on all URLs, after the configuration system is on line, test run data of the configuration system are recorded, a detection period is determined, in the detection period, according to burial points, the number of clicks of each user on each URL in all users of the configuration system is acquired from the test run data, the data acquisition is carried out in the detection period, the calculated amount is effectively reduced, the system performance is improved, further, combination operation is carried out on all users in a group of two users, at least one user combination is obtained, similarity analysis is carried out on the users in the at least one user combination according to the number of clicks, the similarity between the users in each user combination is obtained as the similarity between each two users, the influence of each user on the variable similarity is effectively reduced based on the number of clicks of each user in the configuration system, the similarity analysis is improved, in response to the target user, the function is automatically applied for the function is automatically acquiring the preset between the assigned users according to the preset authority of the preset user, the user authorization is authorized to be authorized by the user, the user can be directly authorized by the user, and the user authorization is authorized to be authorized by the target users, and the user can be automatically authorized by the user based on the preset function before the user authorization is authorized by the target users, the authorization efficiency is improved and the waiting time of the user is reduced.
FIG. 2 is a functional block diagram of a preferred embodiment of the artificial intelligence based authorization device of the invention. The authorization device 11 based on artificial intelligence comprises a buried point unit 110, a recording unit 111, an acquisition unit 112, an operation unit 113, an analysis unit 114, a sequencing unit 115, an authorization unit 116, a recommendation unit 117, a matching unit 118, a generation unit 119 and a feedback unit 120. The module/unit referred to in the present invention refers to a series of computer program segments capable of being executed by the processor 13 and of performing a fixed function, which are stored in the memory 12. In the present embodiment, the functions of the respective modules/units will be described in detail in the following embodiments.
The embedded point unit 110 acquires all URLs (Uniform Resource Locator, uniform resource locators) configuring the system, and embeds the all URLs.
The configuration system may be any system that requires assistance for authorization.
And, the URL may include URLs of all pages and functions of the configuration system.
According to the embodiment, through burying points on all URLs, comprehensive monitoring of user operation on the configuration system can be achieved.
Specifically, call chain monitoring CAT may be used to perform embedded point, ensuring that all URLs are monitored at maximum likelihood.
After the configuration system is brought on line, the recording unit 111 records test run data of the configuration system.
In this embodiment, after the configuration system is online, the configuration system needs to be first commissioned.
Further, the commissioning data of the configuration system is recorded for subsequent use.
Wherein the commissioning data includes, but is not limited to, one or more of the following combinations of data: user ID, URL clicked by the user.
The acquisition unit 112 determines a detection period in which the number of clicks per URL by each of all the users of the configuration system is acquired from the test run data according to the buried point.
Wherein the detection period refers to the determined optimal detection time.
Specifically, the acquisition unit 112 determines that the detection period includes:
dividing the designated duration into at least one time period;
dividing each time period into a plurality of time periods at preset time intervals;
determining an amount of user access by the configuration system for each of the plurality of time periods;
determining a time period with the lowest user access amount in each time period according to the user access amount in each time period, and obtaining a plurality of lowest time periods;
Calculating the duty ratio of each lowest time period in the plurality of lowest time periods;
and determining the lowest time period with the highest duty ratio as the detection time period.
It can be understood that, in the detection period determined in the above manner, the user has the lowest access to the configuration system, so that the number of users is smaller, the number of user combinations obtained by subsequent calculation is smaller, and similarly, the calculation amount in subsequent calculation is reduced due to the smaller number of user combinations.
Therefore, by the above embodiment, the detection period can be determined based on the user access amount of the configuration system, that is, the period with the lowest user access amount to the configuration system is selected as the detection period, and the calculation of the similarity between the users is performed in the detection period, so that the situation that the calculated amount is too large due to too many users and too many related resources are occupied is avoided, and the system performance is further reduced.
In addition, since the calculation of the data requires a large amount of memory space and CPU (central processing unit ), a period with a small access to the user of the configuration system is selected as the detection period, and at this time, when the occupied resources of the configuration system for external service are also small, the resources can be free for calculation, thereby further avoiding influencing the external service.
The operation unit 113 performs a combination operation on the group of every two of the users to obtain at least one user combination.
Wherein, a permutation formula can be adoptedThe combination operation is performed, n may be the total number of users, and m is the number of users in each combination.
Specifically, parameters such as a user name or a user identifier and the like capable of uniquely identifying one user can be used as a basis for distinguishing each user, and the users can be combined pairwise by combining the formulas.
For example: when all the users include user 1, user 2 and user 3, the formula is adoptedAfter the combination operation, three user combinations obtained after the combination operation are respectively as follows: user 1, user 2; user 2, user 3; user 1, user 3.
Through the combination operation, the relation between every two users can be presented in a user combination mode without repetition, and the subsequent calculation of the similarity between every two users according to the user combination is facilitated.
The analysis unit 114 performs similarity analysis on the users in the at least one user combination according to the click number, so as to obtain the similarity between the users in each user combination as the similarity between every two users.
In at least one embodiment of the present invention, the analyzing unit 114 performs similarity analysis on the users in the at least one user combination according to the number of clicks, and obtaining the similarity between the users in each user combination as the similarity between every two users includes:
for a first user and a second user in each user combination, determining all first URLs clicked by the first user and the number of clicks of the first user on each first URL according to the number of clicks, and determining all second URLs clicked by the second user and the number of clicks of the second user on each second URL;
calculating a first average value of all the first URLs clicked by the first user, and calculating a second average value of all the second URLs clicked by the second user;
calculating at least one first difference of the number of clicks of the first user on each first URL relative to the first average value, and calculating at least one second difference of the number of clicks of the second user on each second URL relative to the second average value;
calculating the product of each first difference value and the corresponding second difference value to obtain at least one first product;
calculating an accumulated sum of the at least one first product;
Calculating a first sum of squares of the at least one first difference value and calculating a second sum of squares of the at least one second difference value;
calculating a square root of a second product of the first sum of squares and the second sum of squares;
taking the ratio of the accumulated sum to the square root as the similarity between users in the user combination;
and integrating the similarity between the users in each user combination as the similarity between every two users.
By the implementation mode, the click number of each user relative to the URL in the configuration system can be averaged based on artificial intelligence, the influence of numerical value differences of variable individuals on the similarity among variables is effectively reduced, and the accuracy of similarity analysis is improved.
The ranking unit 115 ranks the similarities between all users and the target user from high to low according to the similarities between every two users in response to an authorization request of the target user for a specified function of the configuration system.
For example: when the target user is user a, it is detected that the user a requests authorization for a new function M, at this time, it is determined that the users of the configuration system are user B, user C, and user D, respectively, and the similarity between the user B and the user a is x, the similarity between the user C and the user a is y, the similarity between the user D and the user a is z, and x > y > z, and then the final ranking is: user B, user C, user D.
Through the sorting, other users similar to the target user can be intuitively provided, and the similarity degree is clear.
The obtaining unit 112 obtains, from among the all users, users whose similarity ranks with the target user are at a preset position.
In this embodiment, the pre-set bit may be obtained by calculating a post-median based on a bayesian formula, and the application of the bayesian formula is wider, which is not described here.
Of course, in other embodiments, the value of the pre-set bit may be configured by user-defined according to the requirement or may be configured by an empirical value, which is not limited by the present invention.
The authorization unit 116 pre-authorizes the usage rights of the specified functions to the acquired user.
Wherein, the specified functions may include newly added page functions, etc.
In at least one embodiment of the present invention, the authorizing unit 116 pre-authorizes the usage rights of the specified function to the acquired user, including:
acquiring authorization data corresponding to the designated function of the target user;
maintaining the obtained authorization data of the user according to the authorization data of the target user;
and recording the acquired authorization data of the user to the configuration system and the blockchain node.
It can be appreciated that in the conventional authorization manner, an administrator is required to manually add authorization data such as users, roles, rights and the like in the system, and then confirm the authorization, and the adding action is complicated, because a plurality of pull-down options are required to add, or other options are used to add, once the number of applications is large, the workload is huge.
Through the embodiment, the user role authority similar to the target user is automatically added into the system based on the pre-authorization of the artificial intelligence technology, so that once the users apply for authorization of the designated function, the maintained authorization data can be directly loaded, the authorization efficiency is improved, the waiting time of the users is reduced, and meanwhile, the security of the data can be improved by recording the authorization data in the blockchain node.
In at least one embodiment of the present invention, the recommending unit 117 recommends the specified function to the acquired user.
Through the embodiment, the users with higher similarity with the target user are found first, and because the users have similar use conditions on the URLs of the functions, the users are very likely to have use requirements on the designated functions, and therefore, the user experience can be effectively improved through intelligent recommendation.
Further, when it is detected that there is a first user request for authorization of the specified function among the acquired users, the acquisition unit 112 acquires first request data of the first user;
matching unit 118 matches the first request data with the recorded authorization data;
for successfully matched data, the authorization unit 116 authorizes the first user according to the recorded authorization data; and
For the data of the matching failure, the generating unit 119 generates acknowledgement information according to the data of the matching failure, and sends the acknowledgement information to the first terminal device for acknowledgement.
By the embodiment, the quick authorization of the user can be further realized on the basis of the pre-authorization, and the authorization efficiency is improved.
In at least one embodiment of the present invention, the acquiring unit 112 acquires the security attribute of the configuration system when it is detected that a second user requests authorization of the specified function among the acquired users;
when the configuration system is a designated security attribute, the acquiring unit 112 acquires second request data of the second user;
the feedback unit 120 feeds back the second request data to the second terminal device;
When receiving the authorization permission of the second terminal device, the authorization unit 116 authorizes the second user according to the recorded authorization data.
The specified security attribute refers to a security attribute of a system with a higher security level requirement, and a full-automatic authorization mode does not meet the security requirement of the system, so that other devices are required to assist in authorization.
Through the embodiment, the user can be quickly authorized by one-key authorization with the assistance of the pre-authorization and other devices, authorization data do not need to be added one by one, and the authorization process is quickened.
According to the technical scheme, the invention can acquire all URLs of a configuration system, burial points are carried out on all URLs, after the configuration system is on line, test run data of the configuration system are recorded, a detection period is determined, in the detection period, according to burial points, the number of clicks of each user on each URL in all users of the configuration system is acquired from the test run data, the data acquisition is carried out in the detection period, the calculated amount is effectively reduced, the system performance is improved, further, combination operation is carried out on all users in a group of two users, at least one user combination is obtained, similarity analysis is carried out on the users in the at least one user combination according to the number of clicks, the similarity between the users in each user combination is obtained as the similarity between each two users, the influence of each user on the variable similarity is effectively reduced based on the number of clicks of each user in the configuration system, the similarity analysis is improved, in response to the target user, the function is automatically applied for the function is automatically acquiring the preset between the assigned users according to the preset authority of the preset user, the user authorization is authorized to be authorized by the user, the user can be directly authorized by the user, and the user authorization is authorized to be authorized by the target users, and the user can be automatically authorized by the user based on the preset function before the user authorization is authorized by the target users, the authorization efficiency is improved and the waiting time of the user is reduced.
Fig. 3 is a schematic structural diagram of an electronic device according to a preferred embodiment of the present invention for implementing an artificial intelligence based authorization method.
The electronic device 1 may comprise a memory 12, a processor 13 and a bus, and may further comprise a computer program stored in the memory 12 and executable on the processor 13, such as an artificial intelligence based authorization program.
It will be appreciated by those skilled in the art that the schematic diagram is merely an example of the electronic device 1 and does not constitute a limitation of the electronic device 1, the electronic device 1 may be a bus type structure, a star type structure, the electronic device 1 may further comprise more or less other hardware or software than illustrated, or a different arrangement of components, for example, the electronic device 1 may further comprise an input-output device, a network access device, etc.
It should be noted that the electronic device 1 is only used as an example, and other electronic products that may be present in the present invention or may be present in the future are also included in the scope of the present invention by way of reference.
The memory 12 includes at least one type of readable storage medium including flash memory, a removable hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 12 may in some embodiments be an internal storage unit of the electronic device 1, such as a mobile hard disk of the electronic device 1. The memory 12 may in other embodiments also be an external storage device of the electronic device 1, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device 1. Further, the memory 12 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 12 may be used not only for storing application software installed in the electronic device 1 and various types of data, such as codes of an artificial intelligence-based authorization program, etc., but also for temporarily storing data that has been output or is to be output.
The processor 13 may be comprised of integrated circuits in some embodiments, for example, a single packaged integrated circuit, or may be comprised of multiple integrated circuits packaged with the same or different functions, including one or more central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors, a combination of various control chips, and the like. The processor 13 is a Control Unit (Control Unit) of the electronic device 1, connects the respective components of the entire electronic device 1 using various interfaces and lines, executes or executes programs or modules stored in the memory 12 (e.g., executes an artificial intelligence-based authorization program, etc.), and invokes data stored in the memory 12 to perform various functions of the electronic device 1 and process data.
The processor 13 executes the operating system of the electronic device 1 and various types of applications installed. The processor 13 executes the application program to implement the steps of the various embodiments of the artificial intelligence based authorization method described above, such as the steps shown in fig. 1.
Alternatively, the processor 13 may implement the functions of the modules/units in the above-described device embodiments when executing the computer program, for example:
Acquiring all URLs of a configuration system, and burying points for all URLs;
after the configuration system is online, recording test operation data of the configuration system;
determining a detection period, and acquiring the number of clicks of each user to each URL in all users of the configuration system from the test run data according to the buried points in the detection period;
performing combination operation on each two users as a group to obtain at least one user combination;
performing similarity analysis on the users in the at least one user combination according to the click number to obtain the similarity between the users in each user combination as the similarity between every two users;
responding to an authorization request of a target user for a designated function of the configuration system, and sorting the similarity between all users and the target user according to the similarity between every two users from high to low;
acquiring users with the similarity row of the target users at the preset position from all the users;
and pre-authorizing the use authority of the designated function to the acquired user.
Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory 12 and executed by the processor 13 to complete the present invention. The one or more modules/units may be a series of instruction segments of a computer program capable of performing a specific function for describing the execution of the computer program in the electronic device 1. For example, the computer program may be divided into a buried point unit 110, a recording unit 111, an acquisition unit 112, an operation unit 113, an analysis unit 114, a sorting unit 115, an authorization unit 116, a recommendation unit 117, a matching unit 118, a generation unit 119, and a feedback unit 120.
The integrated units implemented in the form of software functional modules described above may be stored in a computer readable storage medium. The software functional modules described above are stored in a storage medium and include instructions for causing a computer device (which may be a personal computer, a computer device, or a network device, etc.) or processor (processor) to perform portions of the artificial intelligence-based authorization method according to various embodiments of the invention.
The integrated modules/units of the electronic device 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on this understanding, the present invention may also be implemented by a computer program for instructing a relevant hardware device to implement all or part of the procedures of the above-mentioned embodiment method, where the computer program may be stored in a computer readable storage medium and the computer program may be executed by a processor to implement the steps of each of the above-mentioned method embodiments.
Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
Further, the computer-usable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created from the use of blockchain nodes, and the like.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The bus may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one arrow is shown in FIG. 3, but only one bus or one type of bus is not shown. The bus is arranged to enable a connection communication between the memory 12 and at least one processor 13 or the like.
Although not shown, the electronic device 1 may further comprise a power source (such as a battery) for powering the various components, which may preferably be logically connected to the at least one processor 13 via a power management means, so as to perform functions such as charge management, discharge management, and power consumption management via the power management means. The power supply may also include one or more of any of a direct current or alternating current power supply, recharging device, power failure detection circuit, power converter or inverter, power status indicator, etc. The electronic device 1 may further include various sensors, bluetooth modules, wi-Fi modules, etc., which will not be described herein.
Further, the electronic device 1 may also comprise a network interface, optionally the network interface may comprise a wired interface and/or a wireless interface (e.g. WI-FI interface, bluetooth interface, etc.), typically used for establishing a communication connection between the electronic device 1 and other electronic devices.
The electronic device 1 may optionally further comprise a user interface, which may be a Display, an input unit, such as a Keyboard (Keyboard), or a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device 1 and for displaying a visual user interface.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
Fig. 3 shows only an electronic device 1 with components 12-13, it being understood by a person skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or may combine certain components, or a different arrangement of components.
In connection with fig. 1, the memory 12 in the electronic device 1 stores a plurality of instructions to implement an artificial intelligence based authorization method, the processor 13 being executable to implement:
acquiring all URLs of a configuration system, and burying points for all URLs;
after the configuration system is online, recording test operation data of the configuration system;
determining a detection period, and acquiring the number of clicks of each user to each URL in all users of the configuration system from the test run data according to the buried points in the detection period;
performing combination operation on each two users as a group to obtain at least one user combination;
performing similarity analysis on the users in the at least one user combination according to the click number to obtain the similarity between the users in each user combination as the similarity between every two users;
Responding to an authorization request of a target user for a designated function of the configuration system, and sorting the similarity between all users and the target user according to the similarity between every two users from high to low;
acquiring users with the similarity row of the target users at the preset position from all the users;
and pre-authorizing the use authority of the designated function to the acquired user.
Specifically, the specific implementation method of the above instructions by the processor 13 may refer to the description of the relevant steps in the corresponding embodiment of fig. 1, which is not repeated herein.
In the several embodiments provided in the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the system claims can also be implemented by means of software or hardware by means of one unit or means. The terms second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.
Claims (9)
1. An artificial intelligence based authorization method, characterized in that the artificial intelligence based authorization method comprises:
acquiring all URLs of a configuration system, and burying points for all URLs;
after the configuration system is online, recording test operation data of the configuration system;
determining a detection period, and acquiring the number of clicks of each user to each URL in all users of the configuration system from the test run data according to the buried points in the detection period;
performing combination operation on each two users as a group to obtain at least one user combination;
and carrying out similarity analysis on the users in the at least one user combination according to the click number to obtain the similarity between the users in each user combination as the similarity between every two users, wherein the similarity comprises the following steps: for a first user and a second user in each user combination, determining all first URLs clicked by the first user and the number of clicks of the first user on each first URL according to the number of clicks, and determining all second URLs clicked by the second user and the number of clicks of the second user on each second URL; calculating a first average value of all the first URLs clicked by the first user, and calculating a second average value of all the second URLs clicked by the second user; calculating at least one first difference of the number of clicks of the first user on each first URL relative to the first average value, and calculating at least one second difference of the number of clicks of the second user on each second URL relative to the second average value; calculating the product of each first difference value and the corresponding second difference value to obtain at least one first product; calculating an accumulated sum of the at least one first product; calculating a first sum of squares of the at least one first difference value and calculating a second sum of squares of the at least one second difference value; calculating a square root of a second product of the first sum of squares and the second sum of squares; taking the ratio of the accumulated sum to the square root as the similarity between users in the user combination; integrating the similarity between the users in each user combination as the similarity between every two users;
Responding to an authorization request of a target user for a designated function of the configuration system, and sorting the similarity between all users and the target user according to the similarity between every two users from high to low;
acquiring users with the similarity row of the target users at the preset position from all the users;
and pre-authorizing the use authority of the designated function to the acquired user.
2. The artificial intelligence based authorization method according to claim 1, wherein the determining a detection period includes:
dividing the designated duration into at least one time period;
dividing each time period into a plurality of time periods at preset time intervals;
determining an amount of user access by the configuration system for each of the plurality of time periods;
determining a time period with the lowest user access amount in each time period according to the user access amount in each time period, and obtaining a plurality of lowest time periods;
calculating the duty ratio of each lowest time period in the plurality of lowest time periods;
and determining the lowest time period with the highest duty ratio as the detection time period.
3. The artificial intelligence based authorization method according to claim 1, wherein pre-authorizing the usage rights of the specified functions to the acquired user includes:
Acquiring authorization data corresponding to the designated function of the target user;
maintaining the obtained authorization data of the user according to the authorization data of the target user;
and recording the acquired authorization data of the user to the configuration system and the blockchain node.
4. The artificial intelligence-based authorization method according to claim 1, further comprising:
recommending the specified function to the acquired user.
5. The artificial intelligence-based authorization method according to claim 3, further comprising:
when detecting that a first user requests authorization of the specified function in the acquired users, acquiring first request data of the first user;
matching the first request data with recorded authorization data;
for the successfully matched data, authorizing the first user according to the recorded authorization data; and
And for the data with failed matching, generating confirmation information according to the data with failed matching, and sending the confirmation information to the first terminal equipment for confirmation.
6. The artificial intelligence-based authorization method according to claim 1, further comprising:
when the second user request for authorization of the specified function is detected in the obtained users, the security attribute of the configuration system is obtained;
when the configuration system is the appointed security attribute, second request data of the second user are obtained;
feeding back the second request data to a second terminal device;
and when the authorization permission of the second terminal equipment is received, authorizing the second user according to the recorded authorization data.
7. An artificial intelligence based authorization device, the artificial intelligence based authorization device comprising:
the embedded point unit is used for acquiring all URLs of the configuration system and embedding points for all URLs;
the recording unit is used for recording the test operation data of the configuration system after the configuration system is on line;
the acquisition unit is used for determining a detection period, and acquiring the click number of each URL of each user in all users of the configuration system from the test run data according to the buried points in the detection period;
The operation unit is used for carrying out combination operation on all the users by taking every two users as a group to obtain at least one user combination;
the analysis unit is configured to perform similarity analysis on the users in the at least one user combination according to the number of clicks, and obtain a similarity between the users in each user combination as a similarity between every two users, where the analysis unit includes: for a first user and a second user in each user combination, determining all first URLs clicked by the first user and the number of clicks of the first user on each first URL according to the number of clicks, and determining all second URLs clicked by the second user and the number of clicks of the second user on each second URL; calculating a first average value of all the first URLs clicked by the first user, and calculating a second average value of all the second URLs clicked by the second user; calculating at least one first difference of the number of clicks of the first user on each first URL relative to the first average value, and calculating at least one second difference of the number of clicks of the second user on each second URL relative to the second average value; calculating the product of each first difference value and the corresponding second difference value to obtain at least one first product; calculating an accumulated sum of the at least one first product; calculating a first sum of squares of the at least one first difference value and calculating a second sum of squares of the at least one second difference value; calculating a square root of a second product of the first sum of squares and the second sum of squares; taking the ratio of the accumulated sum to the square root as the similarity between users in the user combination; integrating the similarity between the users in each user combination as the similarity between every two users;
The ordering unit is used for responding to an authorization request of a target user for a specified function of the configuration system, and ordering the similarity between all users and the target user according to the similarity between every two users from high to low;
the acquisition unit is further used for acquiring users with the similarity row with the target user at the preset position from all the users;
and the authorization unit is used for pre-authorizing the use authority of the specified function to the acquired user.
8. An electronic device, the electronic device comprising:
a memory storing at least one instruction; and
A processor executing instructions stored in the memory to implement the artificial intelligence based authorization method according to any one of claims 1 to 6.
9. A computer-readable storage medium, characterized by: the computer-readable storage medium having stored therein at least one instruction for execution by a processor in an electronic device to implement the artificial intelligence based authorization method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010859942.0A CN112000945B (en) | 2020-08-24 | 2020-08-24 | Authorization method, device, equipment and medium based on artificial intelligence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010859942.0A CN112000945B (en) | 2020-08-24 | 2020-08-24 | Authorization method, device, equipment and medium based on artificial intelligence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112000945A CN112000945A (en) | 2020-11-27 |
CN112000945B true CN112000945B (en) | 2023-12-29 |
Family
ID=73471436
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010859942.0A Active CN112000945B (en) | 2020-08-24 | 2020-08-24 | Authorization method, device, equipment and medium based on artificial intelligence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112000945B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537282A (en) * | 2014-12-04 | 2015-04-22 | 中国电子科技集团公司第二十二研究所 | Encryption flash disk and large data computation technology based authorization use method |
CN106844649A (en) * | 2017-01-22 | 2017-06-13 | 河北中废通网络技术有限公司 | A kind of waste and old industry commending system based on mixing various modes and its method |
CN106874719A (en) * | 2016-12-28 | 2017-06-20 | 北京握奇智能科技有限公司 | A kind of license confirmation method and mobile terminal device based on accelerometer |
WO2018191195A1 (en) * | 2017-04-10 | 2018-10-18 | Dipankar Dasgupta | Multi-user permission strategy to access sensitive information |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7165105B2 (en) * | 2001-07-16 | 2007-01-16 | Netgenesis Corporation | System and method for logical view analysis and visualization of user behavior in a distributed computer network |
US20160239641A1 (en) * | 2015-02-18 | 2016-08-18 | Jean Lafleur | Method and System for Scan and Matching Media for Streaming Authorization |
US11489839B2 (en) * | 2019-01-31 | 2022-11-01 | Salesforce, Inc. | Automatic user permission refinement through cluster-based learning |
-
2020
- 2020-08-24 CN CN202010859942.0A patent/CN112000945B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537282A (en) * | 2014-12-04 | 2015-04-22 | 中国电子科技集团公司第二十二研究所 | Encryption flash disk and large data computation technology based authorization use method |
CN106874719A (en) * | 2016-12-28 | 2017-06-20 | 北京握奇智能科技有限公司 | A kind of license confirmation method and mobile terminal device based on accelerometer |
CN106844649A (en) * | 2017-01-22 | 2017-06-13 | 河北中废通网络技术有限公司 | A kind of waste and old industry commending system based on mixing various modes and its method |
WO2018191195A1 (en) * | 2017-04-10 | 2018-10-18 | Dipankar Dasgupta | Multi-user permission strategy to access sensitive information |
Also Published As
Publication number | Publication date |
---|---|
CN112000945A (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112559535B (en) | Multithreading-based asynchronous task processing method, device, equipment and medium | |
CN112015663B (en) | Test data recording method, device, equipment and medium | |
CN114185776B (en) | Big data tracking method, device, equipment and medium for application | |
CN113706249B (en) | Data recommendation method and device, electronic equipment and storage medium | |
CN114691782B (en) | Database table increment synchronization method, device and storage medium | |
CN112000945B (en) | Authorization method, device, equipment and medium based on artificial intelligence | |
CN116306591B (en) | Flow form generation method, device, equipment and medium | |
CN114185588B (en) | Incremental package generation method, device, equipment and storage medium | |
CN114185502B (en) | Log printing method, device, equipment and medium based on production line environment | |
CN114157634B (en) | Unique account identification method, device, equipment and storage medium | |
CN113886493B (en) | System log security query method, device, equipment and storage medium | |
CN114036068B (en) | Update detection method, device, equipment and storage medium based on privacy security | |
CN113364848B (en) | File caching method and device, electronic equipment and storage medium | |
CN114897624A (en) | Policy data consolidation method, device, device and storage medium | |
CN114331661A (en) | Data verification method and device, electronic equipment and storage medium | |
CN114387021A (en) | Service state generation method, apparatus, device and storage medium | |
CN113343226A (en) | Sensitive data tracking monitoring method, device, equipment and medium based on grouping | |
CN114564483B (en) | Data structure-based data checking method and device, electronic equipment and medium | |
CN111797429A (en) | Method and device for maintaining security and privacy levels, electronic equipment and storage medium | |
CN114598624B (en) | Cluster monitoring method and device, electronic equipment and readable storage medium | |
CN113435295B (en) | Face recognition aggregation method, device, equipment and medium | |
CN117316359B (en) | Blood detection process tracking method, device, equipment and medium | |
CN113626533B (en) | Ultraviolet power detection method and device and electronic equipment | |
CN114640666B (en) | File sharing downloading method, electronic equipment and readable storage medium | |
CN114489915B (en) | Mobile equipment-based open screen picture display method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |