Disclosure of Invention
The embodiment of the application provides a construction method, a construction system, a storage medium and electronic equipment of authentication data information, and aims to at least solve the problems of safety and applicability of the existing authentication data information.
The invention provides a construction method of identification data information, which comprises the following steps:
data information acquisition: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
a data information processing step: and merging and encrypting the use data information to obtain the authentication data information.
The above construction method, wherein the data information acquisition step includes:
a data information collection step: collecting the data information;
data information grouping step: grouping the data information according to the data information usage;
a usage data information obtaining step: and splicing the data information of each group to obtain the use data information corresponding to the group.
The above construction method, wherein the data information processing step includes:
merging the use data information: merging the at least two groups of corresponding use data information to obtain merged data information;
and a step of processing merged data information: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
The above construction method, wherein the data information uses: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
The invention also provides a recommendation method, which comprises the construction method of any one of the above, and the recommendation method further comprises the following steps:
a distinguishing step: the authentication data information constructed by the construction method of any one of the above distinguishes different recommendation requests of the user.
The invention also provides a construction system of the authentication data information, wherein the authentication data information is used for distinguishing different recommendation requests, and the construction system comprises:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
The above construction system, wherein the data information collecting module comprises:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
The above construction system, wherein the data information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
The above construction system, wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
The invention also provides a recommendation device, which comprises the construction system of any one of the above, and the recommendation device further comprises:
a distinguishing module: the authentication data information constructed by the construction system of any one of the above distinguishes different recommendation requests of users.
The present invention further includes an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for constructing the authentication data information according to any one of the above methods when executing the computer program.
The present invention also includes a storage medium having a computer program stored thereon, wherein the program, when executed by a processor, implements any of the above-described authentication data information construction methods.
The invention belongs to the technical field of recommendation. The invention has the beneficial effects that:
1. the encryption processing in the combined data information processing step can ensure the safe transmission of the user request and prevent the attack of a third party.
2. The combined data information processing step processes the data information through the Hash algorithm, so that the transmission data volume can be reduced, and the quick and efficient transmission can be realized.
3. The information attached in the identification data information of the invention has enough information to distinguish different recommendation requests.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The present invention is described in detail with reference to the embodiments shown in the drawings, but it should be understood that these embodiments are not intended to limit the present invention, and those skilled in the art should understand that functional, methodological, or structural equivalents or substitutions made by these embodiments are within the scope of the present invention.
Before describing in detail the various embodiments of the present invention, the core inventive concepts of the present invention are summarized and described in detail by the following several embodiments.
The first embodiment is as follows:
referring to fig. 1, fig. 1 is a flowchart of a method for constructing authentication data information. As shown in fig. 1, the method for constructing authentication data information of the present invention includes:
data information acquisition step S1: and collecting data information in a recommendation request applied by a user, and grouping the data information according to the data information application to obtain application data information.
Specifically, information of a user applying for a recommendation request, such as a user id, a device type, and the like, is collected and is processed in groups according to different purposes.
Data information processing step S2: and merging and encrypting the use data information to obtain the authentication data information.
Specifically, the invention can ensure safe transmission of user request, small data volume and convenient transmission by additionally constructing authentication data information in session of http interaction, and simultaneously, enough information can distinguish different requests.
It can be known from the above that, to construct the authentication data information, information sufficient to distinguish different requests of users is collected first, then the information is stored in groups and spliced respectively, and finally the information is selectively encrypted for transmission.
Referring to fig. 2, fig. 2 is a flowchart illustrating a sub-step of step S1 in fig. 1. As shown in fig. 2, the data information collecting step S1 includes:
data information collection step S11: collecting the data information;
data information grouping step S12: grouping the data information according to the data information usage;
usage data information obtaining step S13: and splicing the data information of each group to obtain the use data information corresponding to the group.
Referring to fig. 3, fig. 3 is a flowchart illustrating a sub-step of step S2 in fig. 1. As shown in fig. 3, the data information processing step S2 includes:
usage data information merging step S21: and merging the at least two groups of corresponding use data information to obtain merged data information.
Specifically, as shown in fig. 4, for the demand use data information (corresponding to the demand data in fig. 4) that can indicate the demand target of the recommendation request, such as the device type, the request tag, and the like, only the code data is needed, and these data are uniformly spliced together; for the preference use data information (corresponding to the preference data in fig. 4) indicating the user preference item of the recommendation request, accurate data is needed, such as clicking, collection and the like, and the data are uniformly spliced or spliced after characteristics are extracted; for recommendation progress usage data information (corresponding to the recommendation progress data in fig. 4) indicating the degree of progress of the current recommendation, such as the number of items, the watched data, and the like, relatively broad statistical data may be used. In this embodiment, the demand-use data information and the preference-use data information are combined to obtain the combined data information, but the invention is not limited thereto.
Merged data information processing step S22: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step S23: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
Specifically, the data are merged and then processed by a hash algorithm, and then encrypted, so that the transmission security is increased, and the recommended schedule use data information is spliced to obtain the proposed authentication data information data, wherein the authentication data information data is transmitted in a request.
Wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
Example two:
referring to fig. 5, fig. 5 is a schematic structural diagram of a system for constructing authentication data information according to the present invention. Fig. 5 shows a system for constructing authentication data information according to the present invention, which includes:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
Wherein, the data information acquisition module includes:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
Wherein, the data information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
Wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
Example three:
referring to fig. 6, this embodiment discloses a specific implementation of an electronic device. The electronic device may include a processor 81 and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 82 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 82 may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 82 may include removable or non-removable (or fixed) media, where appropriate. The memory 82 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 82 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 82 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 realizes any one of the authentication data information construction methods in the above embodiments by reading and executing the computer program instructions stored in the memory 82.
In some of these embodiments, the electronic device may also include a communication interface 83 and a bus 80. As shown in fig. 6, the processor 81, the memory 82, and the communication interface 83 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
The bus 80 includes hardware, software, or both to couple the components of the electronic device to one another. Bus 80 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 80 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 80 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may implement the methods described in connection with fig. 1-3 based on the construction of the authentication data information.
In addition, in combination with the method for constructing the authentication data information in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any one of the above described embodiments of the method of construction of authentication data information.
Referring to fig. 7, fig. 7 is a flowchart of a recommendation method. As shown in fig. 7, the present invention further provides a recommendation method, including:
data information acquisition step S1: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
data information processing step S2: merging and encrypting the use data information to obtain the authentication data information;
distinguishing step S3: and distinguishing different recommendation requests of the user through the authentication data information.
Wherein the authentication data information is obtained by the construction method according to any one of the above.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a recommendation device. As shown in fig. 8, the present invention also provides a recommendation apparatus, including:
a construction system, comprising:
the data information acquisition module: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
the data information processing module: merging and encrypting the use data information to obtain the authentication data information;
and the distinguishing module is used for receiving and distinguishing different recommendation requests of the user according to the identification data information.
Wherein the authentication data information is obtained by the construction system according to any one of the above.
Therefore, the problems that the existing recommendation system needs more users to be served and has more cache contents are solved through the authentication data information constructed by the invention.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
In summary, the method has the advantages that the encryption processing in the step of processing the merged data information can ensure the safe transmission of the user request and prevent the attack of a third party; the combined data information processing step processes the data through the Hash algorithm, so that the data transmission quantity can be reduced, and the method is quick and efficient; the information attached to the data use information of the invention has enough information to distinguish different requests.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.