[go: up one dir, main page]

CN112508568B - Identity verification product push and identity verification method and system - Google Patents

Identity verification product push and identity verification method and system Download PDF

Info

Publication number
CN112508568B
CN112508568B CN202011439348.2A CN202011439348A CN112508568B CN 112508568 B CN112508568 B CN 112508568B CN 202011439348 A CN202011439348 A CN 202011439348A CN 112508568 B CN112508568 B CN 112508568B
Authority
CN
China
Prior art keywords
user
information
category
nuclear
product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011439348.2A
Other languages
Chinese (zh)
Other versions
CN112508568A (en
Inventor
李飏
陈新
梅珏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN202011439348.2A priority Critical patent/CN112508568B/en
Publication of CN112508568A publication Critical patent/CN112508568A/en
Application granted granted Critical
Publication of CN112508568B publication Critical patent/CN112508568B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本说明书实施例提供一种核身产品推送及核身方法和系统,通过用户基础信息、线上操作环境信息以及历史操作信息综合确定向用户推送的核身产品的类别,能够根据用户实际情况为用户选择具有不同安全性的核身产品,提高了核身灵活性。

The embodiments of this specification provide a method and system for pushing and authenticating an authentication product, which comprehensively determines the category of the authentication product pushed to the user through basic user information, online operating environment information, and historical operating information. It can select authentication products with different security levels for the user based on the user's actual situation, thereby improving the flexibility of authentication.

Description

Nuclear product pushing and nuclear method and system
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a method and system for pushing and checking a core product.
Background
The nuclear body system is an important link of wind control and is an important basis for outputting risk management and control actions. Through the verification, verification that the account is held by the user can be realized, and account theft caused by operation of non-user is prevented. Therefore, there is a need for improvements in the ways of shaping the body.
Disclosure of Invention
Based on this, the specification provides a core product pushing and core method and system.
According to a first aspect of embodiments of the present disclosure, there is provided a method for pushing a core product, the method including: determining the category of a nuclear product pushed to a user according to user basic information, online operation environment information and historical operation information of the user; if the category is a first category with lower security, verifying the first category according to the user basic information, the online operation environment information and the historical operation information; and if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are verification passing, pushing the first category of nuclear body products to the user.
Optionally, the method further comprises: and if any verification result obtained according to the user basic information, the online operation environment information and the historical operation information does not pass verification, pushing a second type of nuclear product with higher nuclear security to the user.
Optionally, the step of determining the category of the nuclear product pushed to the user according to the user basic information, the online operation environment information and the historical operation information includes: scoring the user basic information, the online operation environment information and the historical operation information respectively to obtain corresponding scores; determining the score of the nuclear product according to the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information; if the score of the nuclear product is smaller than or equal to a preset value, determining the category as a first category; otherwise, determining the category as a second category.
Optionally, after determining the category of the core product pushed to the user according to the user basic information, the online operation environment information and the historical operation information, the method further comprises: and if the category of the nuclear body product pushed to the user is determined to be a second category with higher safety, pushing the nuclear body product of the second category to the user.
Optionally, the step of verifying the first category according to the user basic information, the online operation environment information and the historical operation information includes: acquiring the acceptance characteristic of a user on a nuclear product according to the user basic information, inputting the acceptance characteristic into a pre-trained first classification model, and acquiring a verification result corresponding to the user basic information; wherein the acceptance characteristic is used for representing the acceptance degree of the first category of nuclear body products by a user; and/or acquiring high-risk environmental characteristics in the online operation environment information, inputting the high-risk environmental characteristics into a pre-trained second classification model, and acquiring a verification result corresponding to the online operation environment information; and/or acquiring high-risk operation characteristics in the historical operation information, inputting the high-risk operation characteristics into a pre-trained third classification model, and acquiring a verification result corresponding to the historical operation information.
Optionally, the acceptance degree feature comprises the completion degree and/or feedback result of the user on the history pushed nuclear body product; and/or the high-risk environmental features include not having reported records at common addresses and/or IP addresses; and/or the high risk operating characteristics include a large expenditure of funds and frequent performance of the same operation for a short period of time.
Optionally, the method further comprises: obtaining feedback results of the user on each process in the history pushed nuclear product; and determining the core flow in the core product pushed to the user in future time according to the feedback result.
Optionally, the first category of core products includes a short message authentication code core product and/or a mailbox authentication code core product, and the second category of core products includes a biological information core product and/or a bank card core product.
Optionally, the number of nuclear products to the user is greater than 1.
According to a second aspect of embodiments of the present specification, there is provided a method of a nuclear body, the method comprising: the user information is subjected to body checking by adopting a body checking product; the core product is obtained according to the method of any of the embodiments.
Optionally, the method further comprises: if the number of the nuclear body products pushed to the user is greater than 1, when one nuclear body product passes through the nuclear body, judging that the nuclear body passes through.
According to a third aspect of embodiments of the present specification, there is provided a nuclear product pushing device, the device comprising: the determining module is used for determining the category of the nuclear product pushed to the user according to the user basic information, the online operation environment information and the historical operation information of the user; the verification module is used for verifying the first category according to the user basic information, the online operation environment information and the historical operation information if the category is the first category with lower security; and the pushing module is used for pushing the first category of nuclear product to the user if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are all verified.
According to a fourth aspect of embodiments of the present description, there is provided a nuclear body device, the device comprising: the core body module is used for carrying out core body on the user information by adopting a core body product; the core product is obtained according to the method of any of the embodiments.
According to a fifth aspect of embodiments of the present description, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the embodiments.
According to a sixth aspect of embodiments of the present specification, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the embodiments when executing the program.
By applying the scheme of the embodiment of the specification, the category of the nuclear body product pushed to the user is comprehensively determined through the basic information of the user, the on-line operation environment information and the historical operation information, the nuclear body product with different safety can be selected for the user according to the actual situation of the user, and the flexibility of the nuclear body is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the specification and together with the description, serve to explain the principles of the specification.
FIG. 1 is a schematic diagram of a core scene of an embodiment.
Fig. 2 is a flowchart of a core product pushing method according to an embodiment of the present disclosure.
Fig. 3 (a) is a general architecture diagram of a core product pushing system according to one embodiment of the present disclosure.
Fig. 3 (b) is a general flow chart of a core product pushing method according to an embodiment of the present specification.
Fig. 4 is a flowchart of a core method according to an embodiment of the present disclosure.
Fig. 5 is a block diagram of a core product pushing device according to one embodiment of the present disclosure.
Fig. 6 is a block diagram of a core device according to an embodiment of the present disclosure.
FIG. 7 is a schematic diagram of a computer device for implementing the method of an embodiment of the present specification, according to an embodiment of the present specification.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present description as detailed in the accompanying claims.
The terminology used in the description presented herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this specification to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" depending on the context.
As shown in fig. 1, a schematic diagram of a core scene of an embodiment is shown. The nuclear body refers to checking identity. The core product can comprise a face recognition core product, a short message verification code core product and the like. Under some active scenarios (e.g., modifying a password kernel, changing a bound phone number kernel), a user may trigger the kernel flow through a client, e.g., by sending an account information (password, bound phone number, etc.) change request to a server. The server may return one or more core products to the client under the trigger. The user returns identity verification information such as short message verification codes, face images, fingerprint information and the like required by the nuclear product through the client, and the server verifies the information returned by the user and returns the nuclear result to the client. If the verification is successful, allowing the account information to be changed; otherwise, the account information is not allowed to be changed. By the method, the identity of the operator can be verified, the condition that the account is stolen is reduced, and the account safety of the user is ensured.
Based on this, the embodiment of the present disclosure provides a method for pushing a core product, as shown in fig. 2, the method may include:
Step 202: determining the category of a nuclear product pushed to a user according to user basic information, online operation environment information and historical operation information of the user;
Step 204: if the category is a first category with lower security, verifying the first category according to the user basic information, the online operation environment information and the historical operation information;
Step 206: and if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are verification passing, pushing the first category of nuclear body products to the user.
In step 202, the user basic information, the online operation environment information and the historical operation information may be used together as a basis for determining the category of the core product pushed to the user. The user basic information may include user personal information such as the user's academic, age, registration time, whether to authenticate the user, and the like. The user basic information can be acquired when the user registers, or the user can be requested to provide the user basic information after the user's body checking flow is triggered. Before the user basic information is acquired, the user authorization can be requested first, and the user basic information is acquired only after the authorization is successful. The user basic information can be used as a basis for judging the acceptance degree of the user to the nuclear products with different nuclear difficulties. The online operation environment information may be used to characterize security of a network operation environment currently used by a user, and may specifically include information such as a network type (public network, home network, etc.), a number of times a historical report of a network IP address is made, whether the network IP address where the user is currently located is a common address, and the like. The historical operation information may be used to characterize whether there is a risk in the operation performed on the account by the user during the historical period of time, and may specifically include information such as capital expenditure information, time interval information for performing the operation (i.e., whether the same operation is frequently performed in a short period of time), and the like.
The category of the nuclear product is related to the safety and the operation complexity of the nuclear product. Generally, the categories of the core product can be divided into a first category and a second category, wherein the first category is a category with lower core security, and the core product of the category generally comprises a plurality of core processes with lower complexity. The second category is a category with higher security of the core, and the core product of this category usually includes several core flows with higher complexity. The first category of core products may be referred to as weak cores and the second category of core products may be referred to as strong cores. Generally, the security of the strong kernel body to the account is higher than that of the weak kernel body; meanwhile, compared with the weak nuclear body, the nuclear body strengthening mode is also easier to cause high operation cost, so that part of users cannot pass verification, and the final account is abandoned.
By taking the user basic information, the online operation environment information and the historical operation information together as the basis for determining the category of the nuclear product pushed to the user, the experience of the user on the nuclear product and the potential nuclear threat can be comprehensively considered, and certain safety is ensured while the user experience is improved.
In one embodiment, the user basic information, the online operation environment information and the historical operation information may be scored respectively to obtain corresponding scores; determining the score of the nuclear product according to the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information; if the score of the nuclear product is smaller than or equal to a preset value, determining the category as a first category; otherwise, determining the category as a second category.
The score corresponding to the user basic information can be used for representing the degree of the user accepting the strengthening body, and the higher the score is, the higher the degree of the user accepting the strengthening body is. For example, the longer the user registration time, the higher the score corresponding to the user base information, and the higher the degree to which the user accepts strengthening the body can be considered. The score corresponding to the online operation environment information can be used for representing the risk of the current online operation environment of the user, and the higher the score is, the higher the risk is, so that the higher the demand of adopting the body building is. The score corresponding to the historical operation information can be used for representing whether the user has risk on the operation of the account, and the higher the score is, the higher the risk is, so that the higher the demand of building the body is. The score of the core product is determined according to the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information, which may be obtained by weighted average of the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information, or may be obtained by solving the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information according to a preset algorithm or model. The higher the score of the core product, the higher the tendency to push the core product of the second category to the user; conversely, the higher the tendency to push the first category of core products to the user is indicated.
The present step can comprehensively evaluate the current situation of the user, for example, not only the environment information such as basic network can be evaluated under the current operation, but also a comprehensive score can be obtained as a threshold value for primarily distinguishing the strong and weak bodies according to the basic information, the operation behavior change, the recent incoming messages and other consultation information of the user.
In step 204, if the category determined in step 202 is the first category with low security, the determination result may be verified again to determine the reliability of the first category. Thus, the reliability of the nuclear product can be further improved.
This step may be performed three times of verification, respectively: the authentication is performed according to user basic information, the authentication is performed according to online operation environment information, and the authentication is performed according to historical operation information. Specifically, the three verifications can be performed by the following means, respectively:
When verification is carried out according to user basic information, the acceptability characteristic of a user on a nuclear product can be obtained according to the user basic information, the acceptability characteristic is input into a first pre-trained classification model, and a verification result corresponding to the user basic information is obtained; wherein the acceptance characteristic is used for representing the acceptance degree of the first category of nuclear body products by the user.
The first classification model of this step may be implemented using a somatosensory evaluation model, which may be a classifier that evaluates the mental acceptability of the current user, mainly focusing on the user's safety experience, use appeal, and acceptability. The acceptance characteristic may include the completion degree of the core product pushed by the user on the history and/or feedback result. For example, the user's degree of completion of the core product pushed in the last month may be obtained. The completion may be calculated by the proportion of the completed core flow to the total core flow. If the completion is greater than a preset completion threshold, the core product can be used as one of the candidate core products pushed to the user, and at least one of the candidate core products is pushed to the user when the pushing is required. If the completion is less than the completion threshold, not pushing the core product to the user. The feedback result may be a feedback result of the user on the whole nuclear product, for example, the feedback result of the nuclear product is received by the user 'yes' or 'no' obtained by a questionnaire survey or the like; the feedback result of the user to a certain process in the core product can also be obtained, for example, the core product comprises three processes of acquiring a short message verification code, carrying out face recognition and inputting a bound bank card number, and the user can exit the core process when needing to carry out face recognition in the core process each time, so that the feedback information can be obtained through the background.
The receptivity feature is input to a first classification model trained in advance, so that the category to which the user belongs, that is, the category which tends to accept a strong nuclear body or the category which tends to accept a weak nuclear body, can be acquired. If the verification result shows that the user is in a category which is prone to accept the strengthening body, the verification is failed; if the verification result shows that the user is in a category which is prone to accept weak nuclear bodies, the verification is successful.
When the on-line operation environment information is verified, the high-risk environment characteristics in the on-line operation environment information can be obtained, the high-risk environment characteristics are input into a pre-trained second classification model, and a verification result corresponding to the on-line operation environment information is obtained.
The second classification model of this step may be implemented using an environmental assessment model that may be used to assess whether the current operating environment is at risk. The high-risk environmental features may include features such as not having reported records at common addresses and/or IP addresses. The high-risk environmental features are input into a pre-trained second classification model, so that the category of the current operating environment, namely the category with risk or the category without risk, can be acquired. If the verification result shows that the current operation environment is the category with risk, the verification is failed; and if the verification result shows that the current operation environment is of a category without risk, the verification is successful.
When verification is performed according to the historical operation information, high-risk operation features in the historical operation information can be obtained, the high-risk operation features are input into a pre-trained third classification model, and a verification result corresponding to the historical operation information is obtained.
The third classification model of the step can be implemented by adopting a behavior evaluation model, and the behavior evaluation model can be used for evaluating the operation process of the user and evaluating the high risk of the user operation or the situation of high risk. The high-risk operation features can comprise large capital expenditure, frequent operation in a short time and the like. The high-risk operation characteristics are input into a pre-trained third classification model, so that the category of the current operation behavior, namely the category with risk or the category without risk, can be obtained. If the verification result shows that the current operation behavior is a category with risk, the verification is failed; and if the verification result shows that the current operation behavior is of a category without risk, the verification is successful.
In one embodiment, if the category of the core product pushed to the user is determined to be a second category with higher security, the core product of the second category may be directly pushed to the user without verification.
In step 206, if any verification result obtained according to the user basic information, the online operation environment information and the historical operation information does not pass the verification, it indicates that the currently adopted first category of core product may not be in line with the actual situation, for example, the user is more prone to adopting the second category of core product with higher security, or the current operation environment or the user operation behavior has risk, and a safer core mode needs to be adopted, so that the core product with the second category of core product with higher security can be pushed to the user.
In one embodiment, feedback results of the user on each process in the history pushed core product can also be obtained; and determining the core flow in the core product pushed to the user in future time according to the feedback result. For example, the core product of which the history is pushed to the user includes the processes a, B and C, and the feedback result indicates that the user has a low acceptance degree for the process B, so that the process B can be removed from the core product pushed to the user in the future. The process B may also be replaced by a process D, where the process D may be a process pre-stored in a database. Therefore, the nuclear body products pushed to the user each time possibly comprise different nuclear body processes, so that the requirements of practical application are met better on one hand, and the difficulty of risk countermeasure of lawbreakers is improved on the other hand.
In one embodiment, the first category of core products may be core products that include a number of processes with a lower difficulty factor, and the second category of core products may be core products that include a number of processes with a higher difficulty factor. The difficulty coefficient of each flow can be preset. For example, the second category of nuclear products includes bioinformatic nuclear products and/or bank card nuclear products; the first category of core products comprises short message verification code core products and/or mailbox verification code core products.
In one embodiment, the number of nuclear products to the user is greater than 1. That is, if it is determined to push the first category of core products to the user, a plurality of first categories of core products may be pushed to the user at a time. Similarly, if it is determined to push the second category of core products to the user, a plurality of second categories of core products may be pushed to the user at a time. When the user performs the nuclear body, the user can select one nuclear body product by himself, and only if the nuclear body verification of one nuclear body product is passed, the nuclear body of the user is indicated to pass. By providing multiple selection schemes for the active selection of the user, the autonomous selectivity, the nuclear activity and the passing rate of the user can be improved, and the user experience is further improved.
The solution of the embodiment of the present disclosure may be implemented by the core product pushing system shown in fig. 3 (a) executing the flow shown in fig. 3 (b). The system may include a data layer, an assessment layer, and a core layer. The data layer can collect user basic information, operation environment information and historical operation information. The evaluation layer may include a user comprehensive scoring module, and a somatosensory evaluation model, an environmental evaluation model, and a behavioral evaluation model, wherein the somatosensory evaluation model, the environmental evaluation model, and the behavioral evaluation model may be implemented using one classifier, respectively. The core layer may include a strong check decision module, a weak check decision module, and a core verification module. The user comprehensive scoring module can comprehensively score the basic information, the operation environment information and the historical operation information of the user, and if the obtained score is larger than a preset value, a strong check decision is adopted; if the obtained score is smaller than or equal to a preset value, further verifying through a somatosensory evaluation model, an environment evaluation model and a behavior evaluation model, and determining to adopt a strong nuclear body verification decision or a weak nuclear body verification decision according to a verification result. If any one of the somatosensory evaluation model, the environment evaluation model and the behavior evaluation model is judged to be adopting strong verification, adopting strong verification; if all three are judged to be weak verification, weak verification is adopted. If the evaluation result of the evaluation layer is the strong check, executing the function of the strong check decision module; and if the evaluation result of the evaluation layer is weak core verification, executing the function of the weak verification decision module. The strong/weak verification decision module can determine a nuclear product pushed to a user, and the nuclear verification module can carry out nuclear verification by adopting the nuclear product.
The scheme of the embodiment of the specification provides a set of safe and friendly verification of the nuclear body in consideration of user behaviors, safety feeling and self-appeal while identifying the use environment. The core body mode is based on comprehensive scores of core body feeling, online environment and historical operation of a user, and simultaneously considers the characteristics, operation rationality and environment risk of the user, so that a set of core body verification is formed for different user groups and different groups according to different complaints and different experiences of the user. The system can carry out the nuclear body in a more acceptable mode according to the self demand and feel of the user on the premise of ensuring the environmental safety, effectively improves the nuclear body enthusiasm and success rate of the user, and has flexible configuration.
As shown in fig. 4, the embodiment of the present disclosure further provides a method for a core, which may include step 402: the user information is subjected to body checking by adopting a body checking product; wherein the core product is obtained according to the method of any of the embodiments.
Further, if the number of the nuclear products pushed to the user is greater than 1, when one of the nuclear products passes through the nuclear, the nuclear is judged to pass through.
The various technical features in the above embodiments may be arbitrarily combined as long as there is no conflict or contradiction between the combinations of the features, but are not described in detail, so that the arbitrary combination of the various technical features in the above embodiments also falls within the scope of the disclosure of the present specification.
Corresponding to the above method, the embodiment of the present disclosure further provides a core product pushing device, as shown in fig. 5, where the device may include:
The determining module 502 is configured to determine a category of a core product pushed to a user according to user basic information, online operation environment information and historical operation information of the user;
The verification module 504 is configured to verify the first category according to the user basic information, the online operation environment information, and the historical operation information, if the category is the first category with lower security;
And the pushing module 506 is configured to push the first category of core product to the user if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are all verified.
As shown in fig. 6, the embodiment of the present disclosure further provides a core body device, which may include: the core module 602 is configured to core the user information by using a core product; the core product is obtained according to the method of any of the embodiments.
Specific details of the implementation process of the functions and roles of each module in the device are shown in the implementation process of the corresponding steps in the method, and are not repeated here.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The apparatus embodiments described above are merely illustrative, wherein the modules illustrated as separate components may or may not be physically separate, and the components shown as modules may or may not be physical, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purposes of the present description. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The embodiments of the apparatus of this specification may be applied to a computer device, such as a server or a terminal device. The apparatus embodiments may be implemented by software, or may be implemented by hardware or a combination of hardware and software. Taking software implementation as an example, the device in a logic sense is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory through a processor of the file processing where the device is located. In the hardware level, as shown in fig. 7, a hardware structure diagram of a computer device where the apparatus of the present disclosure is located is shown in fig. 7, and in addition to the processor 702, the memory 704, the network interface 706, and the nonvolatile memory 708 shown in fig. 7, a server or an electronic device where the apparatus is located in an embodiment may generally include other hardware according to an actual function of the computer device, which will not be described herein again.
Accordingly, the present description also provides a computer storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the embodiments.
Accordingly, the present disclosure also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of the embodiments when executing the program.
The present application may take the form of a computer program product embodied on one or more storage media (including, but not limited to, magnetic disk storage, CD-ROM, optical storage, etc.) having program code embodied therein. Computer-usable storage media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to: phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by the computing device.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
The foregoing description of the preferred embodiments of the present disclosure is not intended to limit the disclosure, but rather to cover all modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present disclosure.

Claims (16)

1. A method of pushing a core product, the method comprising:
Acquiring user basic information, online operation environment information and historical operation information of a user;
determining target categories of nuclear products according to the user basic information, the online operation environment information and the historical operation information, wherein the user basic information is used for determining the acceptance degree of the user on the nuclear products with different nuclear difficulties, the online operation environment information is used for determining the security of the network operation environment currently used by the user, and the historical operation information is used for determining whether the user carries out operations on accounts in a historical time period;
pushing the corresponding nuclear product to the user according to the target category; the category of the nuclear body product comprises a first category and a second category, wherein the nuclear body safety and the operation complexity of the first category are lower than those of the second category; the user basic information at least comprises user registration time length, and the user registration time length and the acceptance degree of the user accepting the nuclear body products of the second category are in positive correlation.
2. The method of claim 1, wherein determining the target category of the nuclear product based on the user base information, the online operation environment information, and the historical operation information comprises:
scoring the user basic information, the online operation environment information and the historical operation information respectively to obtain corresponding scores;
Determining the score of the nuclear product according to the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information;
if the score of the nuclear product is smaller than or equal to a preset value, determining the target category as a first category; otherwise, determining the target category as a second category.
3. The method of claim 1, the pushing the corresponding core product to the user according to the target category, comprising:
if the target class is a first class with lower security, verifying the first class according to the user basic information, the online operation environment information and the historical operation information;
And if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are verification passing, pushing the first category of nuclear body products to the user.
4. The method of claim 3, the verifying the first category based on the user base information, on-line operating environment information, and historical operating information, respectively, comprising:
acquiring the acceptance characteristic of a user on a nuclear product according to the user basic information, inputting the acceptance characteristic into a pre-trained first classification model, and acquiring a verification result corresponding to the user basic information; wherein the acceptance characteristic is used for representing the acceptance degree of the first category of nuclear body products by a user; and/or
Acquiring high-risk environmental characteristics in the online operation environment information, inputting the high-risk environmental characteristics into a pre-trained second classification model, and acquiring a verification result corresponding to the online operation environment information; and/or
And acquiring high-risk operation characteristics in the historical operation information, inputting the high-risk operation characteristics into a pre-trained third classification model, and acquiring a verification result corresponding to the historical operation information.
5. The method of claim 4, wherein the acceptance feature comprises a user's completion and/or feedback result of the history pushed core product; and/or
The high-risk environmental characteristics comprise reported records which do not exist in common addresses and/or IP addresses; and/or
The high-risk operation characteristics comprise large capital expenditure and frequent operation in a short time.
6. A method according to claim 3, the method further comprising:
And if any verification result obtained according to the user basic information, the online operation environment information and the historical operation information does not pass verification, pushing a second type of nuclear product with higher nuclear security to the user.
7. The method of claim 1, the pushing the corresponding core product to the user according to the target category, comprising:
and if the target category is a second category with higher core security, pushing the core product of the second category to the user.
8. The method of claim 1, the method further comprising:
obtaining feedback results of the user on each process in the history pushed nuclear product;
And determining the core flow in the core product pushed to the user in future time according to the feedback result.
9. The method of claim 1, wherein the target category is a first category or a second category, the first category of core products includes a short message authentication code core product and/or a mailbox authentication code core product, and the second category of core products includes a biometric information core product and/or a bank card core product.
10. The method of any one of claims 1 to 7, wherein the number of core products pushed to the user is greater than 1.
11. A method of nucleating a body, the method comprising:
the user information is subjected to body checking by adopting a body checking product;
the nuclear product obtained according to the method of any one of claims 1 to 10.
12. The method of claim 11, the method further comprising:
if the number of the nuclear body products pushed to the user is greater than 1, when one nuclear body product passes through the nuclear body, judging that the nuclear body passes through.
13. A nuclear product pushing device, the device comprising:
The acquisition module is used for acquiring user basic information, online operation environment information and historical operation information of a user;
The system comprises a determining module, a processing module and a processing module, wherein the determining module is used for determining the target category of the nuclear product according to the user basic information, the online operation environment information and the historical operation information, wherein the user basic information is used for determining the acceptance degree of the nuclear product with different nuclear difficulty by a user, the online operation environment information is used for determining the security of the network operation environment currently used by the user, and the historical operation information is used for determining whether the operation of the user on an account is at risk in a historical time period;
The pushing module is used for pushing the corresponding nuclear body products to the user according to the target category; the category of the nuclear body product comprises a first category and a second category, wherein the nuclear body safety and the operation complexity of the first category are lower than those of the second category; the user basic information at least comprises user registration time length, and the user registration time length and the acceptance degree of the user accepting the nuclear body products of the second category are in positive correlation.
14. A nuclear body device, the device comprising:
the core body module is used for carrying out core body on the user information by adopting a core body product;
the nuclear product obtained according to the method of any one of claims 1 to 10.
15. A computer readable storage medium having stored thereon a computer program which when executed by a processor implements the method of any of claims 1 to 12.
16. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 12 when the program is executed.
CN202011439348.2A 2018-08-15 2018-08-15 Identity verification product push and identity verification method and system Active CN112508568B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011439348.2A CN112508568B (en) 2018-08-15 2018-08-15 Identity verification product push and identity verification method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011439348.2A CN112508568B (en) 2018-08-15 2018-08-15 Identity verification product push and identity verification method and system
CN201810931250.5A CN109359972B (en) 2018-08-15 2018-08-15 Core body product push and core body method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810931250.5A Division CN109359972B (en) 2018-08-15 2018-08-15 Core body product push and core body method and system

Publications (2)

Publication Number Publication Date
CN112508568A CN112508568A (en) 2021-03-16
CN112508568B true CN112508568B (en) 2024-08-30

Family

ID=65350025

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011439348.2A Active CN112508568B (en) 2018-08-15 2018-08-15 Identity verification product push and identity verification method and system
CN201810931250.5A Active CN109359972B (en) 2018-08-15 2018-08-15 Core body product push and core body method and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810931250.5A Active CN109359972B (en) 2018-08-15 2018-08-15 Core body product push and core body method and system

Country Status (3)

Country Link
CN (2) CN112508568B (en)
TW (1) TWI751422B (en)
WO (1) WO2020034761A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112508568B (en) * 2018-08-15 2024-08-30 创新先进技术有限公司 Identity verification product push and identity verification method and system
CN110071915B (en) * 2019-04-10 2021-08-06 创新先进技术有限公司 An identity verification product push method, device, device and system architecture
CN114417279B (en) * 2019-09-26 2025-08-26 支付宝(杭州)信息技术有限公司 Method and device for handling encryption modification behavior
CN110795707A (en) * 2019-10-25 2020-02-14 支付宝(杭州)信息技术有限公司 Core body strategy recommendation method and device and electronic equipment
CN110879865B (en) * 2019-10-31 2022-08-12 支付宝(杭州)信息技术有限公司 Recommended method and apparatus for core body products
CN112084486A (en) * 2020-09-08 2020-12-15 中国平安财产保险股份有限公司 User information verification method, device, electronic device and storage medium
CN112966243B (en) * 2021-03-30 2022-09-09 支付宝(杭州)信息技术有限公司 Privacy-protected verification processing method and device
CN115767537B (en) * 2022-11-15 2023-10-17 南京鼎山信息科技有限公司 Permission processing method and device for short message verification code and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063150A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 Mobile terminal capable of entering corresponding scene modes by means of face recognition and implementation method thereof
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN106251214A (en) * 2016-08-02 2016-12-21 东软集团股份有限公司 account monitoring method and device

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9311499B2 (en) * 2000-11-13 2016-04-12 Ron M. Redlich Data security system and with territorial, geographic and triggering event protocol
CN104200152B (en) * 2003-09-12 2020-02-14 Emc公司 System and method for risk-based authentication
TW200642408A (en) * 2004-12-07 2006-12-01 Farsheed Atef System and method for identity verification and management
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
US8474018B2 (en) * 2010-09-03 2013-06-25 Ebay Inc. Role-based attribute based access control (RABAC)
CN103888255B (en) * 2012-12-21 2017-12-22 中国移动通信集团公司 A kind of identity identifying method, apparatus and system
KR101436404B1 (en) * 2013-02-15 2014-09-01 주식회사 안랩 User authenticating method and apparatus
CN110087241B (en) * 2013-07-23 2022-06-03 创新先进技术有限公司 Service authorization method, device and system
US9331994B2 (en) * 2014-02-07 2016-05-03 Bank Of America Corporation User authentication based on historical transaction data
US9185101B2 (en) * 2014-02-07 2015-11-10 Bank Of America Corporation User authentication based on historical user behavior
CN110489952A (en) * 2014-09-30 2019-11-22 华为技术有限公司 Identity authentication method, device and user equipment
US9684775B2 (en) * 2014-10-15 2017-06-20 Qualcomm Incorporated Methods and systems for using behavioral analysis towards efficient continuous authentication
CN106295349B (en) * 2015-05-29 2020-06-05 阿里巴巴集团控股有限公司 Account stolen risk identification method, identification device and prevention and control system
CN106713241B (en) * 2015-11-16 2019-09-27 腾讯科技(深圳)有限公司 A kind of auth method, device and system
CN105678544A (en) * 2015-12-31 2016-06-15 深圳前海微众银行股份有限公司 Risk monitoring method of remote account opening and server
CN105704155B (en) * 2016-03-31 2018-11-09 广州华多网络科技有限公司 Information-pushing method and device
CN105933328B (en) * 2016-06-12 2017-07-18 北京三快在线科技有限公司 A kind for the treatment of method and apparatus of user access activity
CN107645482B (en) * 2016-07-22 2020-08-07 创新先进技术有限公司 Risk control method and device for business operation
CN106899567B (en) * 2016-08-24 2019-12-13 阿里巴巴集团控股有限公司 User authentication method, device and system
CN107018119B (en) * 2016-08-30 2020-11-24 创新先进技术有限公司 Authentication system, method and platform
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment
CN108076018A (en) * 2016-11-16 2018-05-25 阿里巴巴集团控股有限公司 Identity authentication system, method, device and account authentication method
CN107104973A (en) * 2017-05-09 2017-08-29 北京潘达互娱科技有限公司 The method of calibration and device of user behavior
CN107124420A (en) * 2017-05-10 2017-09-01 北京潘达互娱科技有限公司 Auth method and device
CN112508568B (en) * 2018-08-15 2024-08-30 创新先进技术有限公司 Identity verification product push and identity verification method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063150A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 Mobile terminal capable of entering corresponding scene modes by means of face recognition and implementation method thereof
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN106251214A (en) * 2016-08-02 2016-12-21 东软集团股份有限公司 account monitoring method and device

Also Published As

Publication number Publication date
WO2020034761A1 (en) 2020-02-20
TWI751422B (en) 2022-01-01
CN109359972B (en) 2020-10-30
CN112508568A (en) 2021-03-16
TW202009834A (en) 2020-03-01
CN109359972A (en) 2019-02-19

Similar Documents

Publication Publication Date Title
CN112508568B (en) Identity verification product push and identity verification method and system
US11075942B2 (en) Identity verification and account information updating methods and apparatuses
US10986138B2 (en) System and method for adaptively determining an optimal authentication scheme
CN110348188B (en) Core body checking method and device
US12079810B2 (en) Method for determining the likelihood for someone to remember a particular transaction
CN113872952B (en) Method, device, equipment and system architecture for pushing identity verification product
US20230004972A1 (en) Dynamic Question Presentation in Computer-Based Authentication Processes
US11748507B2 (en) Concepts of providing information about a device
CN109756458A (en) Identity identifying method and system
US12417275B2 (en) Preventing unauthorized access to personal data during authentication processes
EP4367589B1 (en) Authentication question topic exclusion based on response hesitation
US11783334B2 (en) Using an always on listening device skill to relay answers to transaction-based knowledge-based authentications
CN112717417A (en) Man-machine recognition method and device
CN109344582B (en) Authentication method, device and storage medium
CN107590374A (en) Control method, intelligent terminal and the storage device of voice assistant authority
CN107517180A (en) Login method and device
CN110263530B (en) Method and device for identifying password reset requests
CN116756716B (en) Security verification method, system, equipment and storage medium based on big data
HK40049164A (en) Identity verification product pushing method, identity verification method, and systems
HK40049164B (en) Identity verification product pushing method, identity verification method, and systems
CN113450124B (en) Outbound method and device based on user behavior, electronic equipment and medium
WO2025224613A1 (en) A system for preventing deceptive manipulation of participant acquisition programs and method thereof
CN121073478A (en) Transaction verification method, device, equipment, medium and program product for digital collection
JP6412487B2 (en) Authentication factor selection device, authentication factor selection method, and program
CN120165978A (en) A multi-integrated identity authentication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40049164

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant