Disclosure of Invention
Based on this, the specification provides a core product pushing and core method and system.
According to a first aspect of embodiments of the present disclosure, there is provided a method for pushing a core product, the method including: determining the category of a nuclear product pushed to a user according to user basic information, online operation environment information and historical operation information of the user; if the category is a first category with lower security, verifying the first category according to the user basic information, the online operation environment information and the historical operation information; and if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are verification passing, pushing the first category of nuclear body products to the user.
Optionally, the method further comprises: and if any verification result obtained according to the user basic information, the online operation environment information and the historical operation information does not pass verification, pushing a second type of nuclear product with higher nuclear security to the user.
Optionally, the step of determining the category of the nuclear product pushed to the user according to the user basic information, the online operation environment information and the historical operation information includes: scoring the user basic information, the online operation environment information and the historical operation information respectively to obtain corresponding scores; determining the score of the nuclear product according to the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information; if the score of the nuclear product is smaller than or equal to a preset value, determining the category as a first category; otherwise, determining the category as a second category.
Optionally, after determining the category of the core product pushed to the user according to the user basic information, the online operation environment information and the historical operation information, the method further comprises: and if the category of the nuclear body product pushed to the user is determined to be a second category with higher safety, pushing the nuclear body product of the second category to the user.
Optionally, the step of verifying the first category according to the user basic information, the online operation environment information and the historical operation information includes: acquiring the acceptance characteristic of a user on a nuclear product according to the user basic information, inputting the acceptance characteristic into a pre-trained first classification model, and acquiring a verification result corresponding to the user basic information; wherein the acceptance characteristic is used for representing the acceptance degree of the first category of nuclear body products by a user; and/or acquiring high-risk environmental characteristics in the online operation environment information, inputting the high-risk environmental characteristics into a pre-trained second classification model, and acquiring a verification result corresponding to the online operation environment information; and/or acquiring high-risk operation characteristics in the historical operation information, inputting the high-risk operation characteristics into a pre-trained third classification model, and acquiring a verification result corresponding to the historical operation information.
Optionally, the acceptance degree feature comprises the completion degree and/or feedback result of the user on the history pushed nuclear body product; and/or the high-risk environmental features include not having reported records at common addresses and/or IP addresses; and/or the high risk operating characteristics include a large expenditure of funds and frequent performance of the same operation for a short period of time.
Optionally, the method further comprises: obtaining feedback results of the user on each process in the history pushed nuclear product; and determining the core flow in the core product pushed to the user in future time according to the feedback result.
Optionally, the first category of core products includes a short message authentication code core product and/or a mailbox authentication code core product, and the second category of core products includes a biological information core product and/or a bank card core product.
Optionally, the number of nuclear products to the user is greater than 1.
According to a second aspect of embodiments of the present specification, there is provided a method of a nuclear body, the method comprising: the user information is subjected to body checking by adopting a body checking product; the core product is obtained according to the method of any of the embodiments.
Optionally, the method further comprises: if the number of the nuclear body products pushed to the user is greater than 1, when one nuclear body product passes through the nuclear body, judging that the nuclear body passes through.
According to a third aspect of embodiments of the present specification, there is provided a nuclear product pushing device, the device comprising: the determining module is used for determining the category of the nuclear product pushed to the user according to the user basic information, the online operation environment information and the historical operation information of the user; the verification module is used for verifying the first category according to the user basic information, the online operation environment information and the historical operation information if the category is the first category with lower security; and the pushing module is used for pushing the first category of nuclear product to the user if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are all verified.
According to a fourth aspect of embodiments of the present description, there is provided a nuclear body device, the device comprising: the core body module is used for carrying out core body on the user information by adopting a core body product; the core product is obtained according to the method of any of the embodiments.
According to a fifth aspect of embodiments of the present description, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the embodiments.
According to a sixth aspect of embodiments of the present specification, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the embodiments when executing the program.
By applying the scheme of the embodiment of the specification, the category of the nuclear body product pushed to the user is comprehensively determined through the basic information of the user, the on-line operation environment information and the historical operation information, the nuclear body product with different safety can be selected for the user according to the actual situation of the user, and the flexibility of the nuclear body is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present description as detailed in the accompanying claims.
The terminology used in the description presented herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this specification to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" depending on the context.
As shown in fig. 1, a schematic diagram of a core scene of an embodiment is shown. The nuclear body refers to checking identity. The core product can comprise a face recognition core product, a short message verification code core product and the like. Under some active scenarios (e.g., modifying a password kernel, changing a bound phone number kernel), a user may trigger the kernel flow through a client, e.g., by sending an account information (password, bound phone number, etc.) change request to a server. The server may return one or more core products to the client under the trigger. The user returns identity verification information such as short message verification codes, face images, fingerprint information and the like required by the nuclear product through the client, and the server verifies the information returned by the user and returns the nuclear result to the client. If the verification is successful, allowing the account information to be changed; otherwise, the account information is not allowed to be changed. By the method, the identity of the operator can be verified, the condition that the account is stolen is reduced, and the account safety of the user is ensured.
Based on this, the embodiment of the present disclosure provides a method for pushing a core product, as shown in fig. 2, the method may include:
Step 202: determining the category of a nuclear product pushed to a user according to user basic information, online operation environment information and historical operation information of the user;
Step 204: if the category is a first category with lower security, verifying the first category according to the user basic information, the online operation environment information and the historical operation information;
Step 206: and if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are verification passing, pushing the first category of nuclear body products to the user.
In step 202, the user basic information, the online operation environment information and the historical operation information may be used together as a basis for determining the category of the core product pushed to the user. The user basic information may include user personal information such as the user's academic, age, registration time, whether to authenticate the user, and the like. The user basic information can be acquired when the user registers, or the user can be requested to provide the user basic information after the user's body checking flow is triggered. Before the user basic information is acquired, the user authorization can be requested first, and the user basic information is acquired only after the authorization is successful. The user basic information can be used as a basis for judging the acceptance degree of the user to the nuclear products with different nuclear difficulties. The online operation environment information may be used to characterize security of a network operation environment currently used by a user, and may specifically include information such as a network type (public network, home network, etc.), a number of times a historical report of a network IP address is made, whether the network IP address where the user is currently located is a common address, and the like. The historical operation information may be used to characterize whether there is a risk in the operation performed on the account by the user during the historical period of time, and may specifically include information such as capital expenditure information, time interval information for performing the operation (i.e., whether the same operation is frequently performed in a short period of time), and the like.
The category of the nuclear product is related to the safety and the operation complexity of the nuclear product. Generally, the categories of the core product can be divided into a first category and a second category, wherein the first category is a category with lower core security, and the core product of the category generally comprises a plurality of core processes with lower complexity. The second category is a category with higher security of the core, and the core product of this category usually includes several core flows with higher complexity. The first category of core products may be referred to as weak cores and the second category of core products may be referred to as strong cores. Generally, the security of the strong kernel body to the account is higher than that of the weak kernel body; meanwhile, compared with the weak nuclear body, the nuclear body strengthening mode is also easier to cause high operation cost, so that part of users cannot pass verification, and the final account is abandoned.
By taking the user basic information, the online operation environment information and the historical operation information together as the basis for determining the category of the nuclear product pushed to the user, the experience of the user on the nuclear product and the potential nuclear threat can be comprehensively considered, and certain safety is ensured while the user experience is improved.
In one embodiment, the user basic information, the online operation environment information and the historical operation information may be scored respectively to obtain corresponding scores; determining the score of the nuclear product according to the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information; if the score of the nuclear product is smaller than or equal to a preset value, determining the category as a first category; otherwise, determining the category as a second category.
The score corresponding to the user basic information can be used for representing the degree of the user accepting the strengthening body, and the higher the score is, the higher the degree of the user accepting the strengthening body is. For example, the longer the user registration time, the higher the score corresponding to the user base information, and the higher the degree to which the user accepts strengthening the body can be considered. The score corresponding to the online operation environment information can be used for representing the risk of the current online operation environment of the user, and the higher the score is, the higher the risk is, so that the higher the demand of adopting the body building is. The score corresponding to the historical operation information can be used for representing whether the user has risk on the operation of the account, and the higher the score is, the higher the risk is, so that the higher the demand of building the body is. The score of the core product is determined according to the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information, which may be obtained by weighted average of the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information, or may be obtained by solving the score corresponding to the user basic information, the score corresponding to the online operation environment information and the score corresponding to the historical operation information according to a preset algorithm or model. The higher the score of the core product, the higher the tendency to push the core product of the second category to the user; conversely, the higher the tendency to push the first category of core products to the user is indicated.
The present step can comprehensively evaluate the current situation of the user, for example, not only the environment information such as basic network can be evaluated under the current operation, but also a comprehensive score can be obtained as a threshold value for primarily distinguishing the strong and weak bodies according to the basic information, the operation behavior change, the recent incoming messages and other consultation information of the user.
In step 204, if the category determined in step 202 is the first category with low security, the determination result may be verified again to determine the reliability of the first category. Thus, the reliability of the nuclear product can be further improved.
This step may be performed three times of verification, respectively: the authentication is performed according to user basic information, the authentication is performed according to online operation environment information, and the authentication is performed according to historical operation information. Specifically, the three verifications can be performed by the following means, respectively:
When verification is carried out according to user basic information, the acceptability characteristic of a user on a nuclear product can be obtained according to the user basic information, the acceptability characteristic is input into a first pre-trained classification model, and a verification result corresponding to the user basic information is obtained; wherein the acceptance characteristic is used for representing the acceptance degree of the first category of nuclear body products by the user.
The first classification model of this step may be implemented using a somatosensory evaluation model, which may be a classifier that evaluates the mental acceptability of the current user, mainly focusing on the user's safety experience, use appeal, and acceptability. The acceptance characteristic may include the completion degree of the core product pushed by the user on the history and/or feedback result. For example, the user's degree of completion of the core product pushed in the last month may be obtained. The completion may be calculated by the proportion of the completed core flow to the total core flow. If the completion is greater than a preset completion threshold, the core product can be used as one of the candidate core products pushed to the user, and at least one of the candidate core products is pushed to the user when the pushing is required. If the completion is less than the completion threshold, not pushing the core product to the user. The feedback result may be a feedback result of the user on the whole nuclear product, for example, the feedback result of the nuclear product is received by the user 'yes' or 'no' obtained by a questionnaire survey or the like; the feedback result of the user to a certain process in the core product can also be obtained, for example, the core product comprises three processes of acquiring a short message verification code, carrying out face recognition and inputting a bound bank card number, and the user can exit the core process when needing to carry out face recognition in the core process each time, so that the feedback information can be obtained through the background.
The receptivity feature is input to a first classification model trained in advance, so that the category to which the user belongs, that is, the category which tends to accept a strong nuclear body or the category which tends to accept a weak nuclear body, can be acquired. If the verification result shows that the user is in a category which is prone to accept the strengthening body, the verification is failed; if the verification result shows that the user is in a category which is prone to accept weak nuclear bodies, the verification is successful.
When the on-line operation environment information is verified, the high-risk environment characteristics in the on-line operation environment information can be obtained, the high-risk environment characteristics are input into a pre-trained second classification model, and a verification result corresponding to the on-line operation environment information is obtained.
The second classification model of this step may be implemented using an environmental assessment model that may be used to assess whether the current operating environment is at risk. The high-risk environmental features may include features such as not having reported records at common addresses and/or IP addresses. The high-risk environmental features are input into a pre-trained second classification model, so that the category of the current operating environment, namely the category with risk or the category without risk, can be acquired. If the verification result shows that the current operation environment is the category with risk, the verification is failed; and if the verification result shows that the current operation environment is of a category without risk, the verification is successful.
When verification is performed according to the historical operation information, high-risk operation features in the historical operation information can be obtained, the high-risk operation features are input into a pre-trained third classification model, and a verification result corresponding to the historical operation information is obtained.
The third classification model of the step can be implemented by adopting a behavior evaluation model, and the behavior evaluation model can be used for evaluating the operation process of the user and evaluating the high risk of the user operation or the situation of high risk. The high-risk operation features can comprise large capital expenditure, frequent operation in a short time and the like. The high-risk operation characteristics are input into a pre-trained third classification model, so that the category of the current operation behavior, namely the category with risk or the category without risk, can be obtained. If the verification result shows that the current operation behavior is a category with risk, the verification is failed; and if the verification result shows that the current operation behavior is of a category without risk, the verification is successful.
In one embodiment, if the category of the core product pushed to the user is determined to be a second category with higher security, the core product of the second category may be directly pushed to the user without verification.
In step 206, if any verification result obtained according to the user basic information, the online operation environment information and the historical operation information does not pass the verification, it indicates that the currently adopted first category of core product may not be in line with the actual situation, for example, the user is more prone to adopting the second category of core product with higher security, or the current operation environment or the user operation behavior has risk, and a safer core mode needs to be adopted, so that the core product with the second category of core product with higher security can be pushed to the user.
In one embodiment, feedback results of the user on each process in the history pushed core product can also be obtained; and determining the core flow in the core product pushed to the user in future time according to the feedback result. For example, the core product of which the history is pushed to the user includes the processes a, B and C, and the feedback result indicates that the user has a low acceptance degree for the process B, so that the process B can be removed from the core product pushed to the user in the future. The process B may also be replaced by a process D, where the process D may be a process pre-stored in a database. Therefore, the nuclear body products pushed to the user each time possibly comprise different nuclear body processes, so that the requirements of practical application are met better on one hand, and the difficulty of risk countermeasure of lawbreakers is improved on the other hand.
In one embodiment, the first category of core products may be core products that include a number of processes with a lower difficulty factor, and the second category of core products may be core products that include a number of processes with a higher difficulty factor. The difficulty coefficient of each flow can be preset. For example, the second category of nuclear products includes bioinformatic nuclear products and/or bank card nuclear products; the first category of core products comprises short message verification code core products and/or mailbox verification code core products.
In one embodiment, the number of nuclear products to the user is greater than 1. That is, if it is determined to push the first category of core products to the user, a plurality of first categories of core products may be pushed to the user at a time. Similarly, if it is determined to push the second category of core products to the user, a plurality of second categories of core products may be pushed to the user at a time. When the user performs the nuclear body, the user can select one nuclear body product by himself, and only if the nuclear body verification of one nuclear body product is passed, the nuclear body of the user is indicated to pass. By providing multiple selection schemes for the active selection of the user, the autonomous selectivity, the nuclear activity and the passing rate of the user can be improved, and the user experience is further improved.
The solution of the embodiment of the present disclosure may be implemented by the core product pushing system shown in fig. 3 (a) executing the flow shown in fig. 3 (b). The system may include a data layer, an assessment layer, and a core layer. The data layer can collect user basic information, operation environment information and historical operation information. The evaluation layer may include a user comprehensive scoring module, and a somatosensory evaluation model, an environmental evaluation model, and a behavioral evaluation model, wherein the somatosensory evaluation model, the environmental evaluation model, and the behavioral evaluation model may be implemented using one classifier, respectively. The core layer may include a strong check decision module, a weak check decision module, and a core verification module. The user comprehensive scoring module can comprehensively score the basic information, the operation environment information and the historical operation information of the user, and if the obtained score is larger than a preset value, a strong check decision is adopted; if the obtained score is smaller than or equal to a preset value, further verifying through a somatosensory evaluation model, an environment evaluation model and a behavior evaluation model, and determining to adopt a strong nuclear body verification decision or a weak nuclear body verification decision according to a verification result. If any one of the somatosensory evaluation model, the environment evaluation model and the behavior evaluation model is judged to be adopting strong verification, adopting strong verification; if all three are judged to be weak verification, weak verification is adopted. If the evaluation result of the evaluation layer is the strong check, executing the function of the strong check decision module; and if the evaluation result of the evaluation layer is weak core verification, executing the function of the weak verification decision module. The strong/weak verification decision module can determine a nuclear product pushed to a user, and the nuclear verification module can carry out nuclear verification by adopting the nuclear product.
The scheme of the embodiment of the specification provides a set of safe and friendly verification of the nuclear body in consideration of user behaviors, safety feeling and self-appeal while identifying the use environment. The core body mode is based on comprehensive scores of core body feeling, online environment and historical operation of a user, and simultaneously considers the characteristics, operation rationality and environment risk of the user, so that a set of core body verification is formed for different user groups and different groups according to different complaints and different experiences of the user. The system can carry out the nuclear body in a more acceptable mode according to the self demand and feel of the user on the premise of ensuring the environmental safety, effectively improves the nuclear body enthusiasm and success rate of the user, and has flexible configuration.
As shown in fig. 4, the embodiment of the present disclosure further provides a method for a core, which may include step 402: the user information is subjected to body checking by adopting a body checking product; wherein the core product is obtained according to the method of any of the embodiments.
Further, if the number of the nuclear products pushed to the user is greater than 1, when one of the nuclear products passes through the nuclear, the nuclear is judged to pass through.
The various technical features in the above embodiments may be arbitrarily combined as long as there is no conflict or contradiction between the combinations of the features, but are not described in detail, so that the arbitrary combination of the various technical features in the above embodiments also falls within the scope of the disclosure of the present specification.
Corresponding to the above method, the embodiment of the present disclosure further provides a core product pushing device, as shown in fig. 5, where the device may include:
The determining module 502 is configured to determine a category of a core product pushed to a user according to user basic information, online operation environment information and historical operation information of the user;
The verification module 504 is configured to verify the first category according to the user basic information, the online operation environment information, and the historical operation information, if the category is the first category with lower security;
And the pushing module 506 is configured to push the first category of core product to the user if the verification results obtained according to the user basic information, the online operation environment information and the historical operation information are all verified.
As shown in fig. 6, the embodiment of the present disclosure further provides a core body device, which may include: the core module 602 is configured to core the user information by using a core product; the core product is obtained according to the method of any of the embodiments.
Specific details of the implementation process of the functions and roles of each module in the device are shown in the implementation process of the corresponding steps in the method, and are not repeated here.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The apparatus embodiments described above are merely illustrative, wherein the modules illustrated as separate components may or may not be physically separate, and the components shown as modules may or may not be physical, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purposes of the present description. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The embodiments of the apparatus of this specification may be applied to a computer device, such as a server or a terminal device. The apparatus embodiments may be implemented by software, or may be implemented by hardware or a combination of hardware and software. Taking software implementation as an example, the device in a logic sense is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory through a processor of the file processing where the device is located. In the hardware level, as shown in fig. 7, a hardware structure diagram of a computer device where the apparatus of the present disclosure is located is shown in fig. 7, and in addition to the processor 702, the memory 704, the network interface 706, and the nonvolatile memory 708 shown in fig. 7, a server or an electronic device where the apparatus is located in an embodiment may generally include other hardware according to an actual function of the computer device, which will not be described herein again.
Accordingly, the present description also provides a computer storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the embodiments.
Accordingly, the present disclosure also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of the embodiments when executing the program.
The present application may take the form of a computer program product embodied on one or more storage media (including, but not limited to, magnetic disk storage, CD-ROM, optical storage, etc.) having program code embodied therein. Computer-usable storage media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to: phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by the computing device.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
The foregoing description of the preferred embodiments of the present disclosure is not intended to limit the disclosure, but rather to cover all modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present disclosure.