[go: up one dir, main page]

TWI751422B - Core product push and core method and system - Google Patents

Core product push and core method and system Download PDF

Info

Publication number
TWI751422B
TWI751422B TW108120846A TW108120846A TWI751422B TW I751422 B TWI751422 B TW I751422B TW 108120846 A TW108120846 A TW 108120846A TW 108120846 A TW108120846 A TW 108120846A TW I751422 B TWI751422 B TW I751422B
Authority
TW
Taiwan
Prior art keywords
user
information
category
core body
core
Prior art date
Application number
TW108120846A
Other languages
Chinese (zh)
Other versions
TW202009834A (en
Inventor
李颺
陳新
梅珏
Original Assignee
開曼群島商創新先進技術有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 開曼群島商創新先進技術有限公司 filed Critical 開曼群島商創新先進技術有限公司
Publication of TW202009834A publication Critical patent/TW202009834A/en
Application granted granted Critical
Publication of TWI751422B publication Critical patent/TWI751422B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本說明書實施例提供一種核身產品推送及核身方法和系統,通過用戶基礎資訊、線上操作環境資訊以及歷史操作資訊綜合確定向用戶推送的核身產品的類別,能夠根據用戶實際情況為用戶選擇具有不同安全性的核身產品,提高了核身靈活性。The embodiments of this specification provide a core product push and core body method and system, which comprehensively determine the type of core body product pushed to the user through the user's basic information, online operating environment information and historical operation information, and can select the core body product for the user according to the user's actual situation. Nuclei products with different safety features increase the flexibility of the nuclei.

Description

核身產品推送及核身方法和系統Core body product push and core body method and system

本說明書涉及資料處理技術領域,尤其涉及核身產品推送及核身方法和系統。 This specification relates to the technical field of data processing, and in particular, to core body product push and core body methods and systems.

核身系統是風險控制的重要環節,是輸出風險管控動作的重要依據。通過核身,能夠實現對帳戶是本人持有的核驗,防範非本人的操作導致帳號被盜。因此,有必要對核身方式進行改進。 The core body system is an important part of risk control and an important basis for outputting risk management and control actions. Through verification, it is possible to verify that the account is held by oneself, and prevent the account from being stolen due to non-personal operations. Therefore, it is necessary to improve the way of nuclear body.

基於此,本說明書提供了核身產品推送及核身方法和系統。 Based on this, this specification provides a core body product push and core body methods and systems.

根據本說明書實施例的第一態樣,提供一種核身產品推送方法,所述方法包括:根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證;若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗 證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 According to a first aspect of the embodiments of the present specification, there is provided a method for pushing a core body product, the method comprising: determining the core body product pushed to the user according to user basic information, online operating environment information and historical operation information of the user. category; if the category is the first category with low core security, the first category is verified according to the basic user information, online operating environment information and historical operation information; , online operating environment information and experience obtained from historical operating information The verification results are all verified, and the core body product of the first category is pushed to the user.

可選地,所述方法還包括:若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的任一驗證結果未通過驗證,向所述用戶推送核身安全性較高的第二類別的核身產品。 Optionally, the method further includes: if any verification result obtained according to the user basic information, online operating environment information and historical operation information fails the verification, pushing a second one with higher core security to the user. category of core products.

可選地,根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向用戶推送的核身產品的類別的步驟包括:分別對所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊進行評分,得到對應的分數;根據所述用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數確定所述核身產品的分數;若所述核身產品的分數小於或等於預設值,確定所述類別為第一類別;否則,確定所述類別為第二類別。 Optionally, the step of determining the category of the core product to be pushed to the user according to the user basic information, online operating environment information, and historical operation information includes: performing the steps on the user basic information, online operating environment information, and historical operation information respectively. Score to obtain the corresponding score; determine the score of the core body product according to the score corresponding to the basic user information, the score corresponding to the online operating environment information, and the score corresponding to the historical operation information; if the score of the core body product is less than or If it is equal to the preset value, it is determined that the category is the first category; otherwise, the category is determined to be the second category.

可選地,在根據用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向用戶推送的核身產品的類別之後,所述方法還包括:若確定向用戶推送的核身產品的類別為安全性較高的第二類別,向所述用戶推送所述第二類別的核身產品。 Optionally, after determining the category of the core body product pushed to the user according to the user's basic information, online operating environment information and historical operation information, the method further includes: if it is determined that the category of the core body product pushed to the user is security. A higher second category, pushing the core body products of the second category to the user.

可選地,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證的步驟包括:根據所述用戶基礎資訊獲取用戶對核身產品的接受度特徵,將所述接受度特徵輸入到預先訓練的第一分類模型,獲取所述用戶基礎資訊對應的驗證結果;其中,所述 接受度特徵用於表徵用戶對所述第一類別的核身產品的接受程度;和/或獲取所述線上操作環境資訊中的高危環境特徵,將所述高危環境特徵輸入到預先訓練的第二分類模型,獲取所述線上操作環境資訊對應的驗證結果;和/或獲取所述歷史操作資訊中的高危操作特徵,將所述高危操作特徵輸入到預先訓練的第三分類模型,獲取所述歷史操作資訊對應的驗證結果。 Optionally, the step of verifying the first category according to the user basic information, online operating environment information and historical operation information respectively includes: obtaining the user's acceptance feature of the core product according to the user basic information; The acceptance feature is input into the pre-trained first classification model, and the verification result corresponding to the basic user information is obtained; wherein, the The acceptance feature is used to characterize the user's acceptance of the first category of nuclear body products; and/or obtain the high-risk environment feature in the online operating environment information, and input the high-risk environment feature into the pre-trained second A classification model to obtain the verification results corresponding to the online operating environment information; and/or to obtain high-risk operation features in the historical operation information, and to input the high-risk operation features into a pre-trained third classification model to obtain the historical The verification result corresponding to the operation information.

可選地,所述接受度特徵包括用戶對歷史推送的核身產品的完成度和/或反饋結果;和/或所述高危環境特徵包括不在常用位址和/或IP位址存在被舉報記錄;和/或所述高危操作特徵包括資金大額支出、短時間內頻繁進行同一操作。 Optionally, the acceptance feature includes the user's degree of completion and/or the feedback result of the historically pushed core product; and/or the high-risk environment feature includes not having a reported record at a commonly used address and/or an IP address. ; and/or the characteristics of the high-risk operation include large expenditure of funds and frequent execution of the same operation in a short period of time.

可選地,所述方法還包括:獲取用戶對歷史推送的核身產品中各個流程的反饋結果;根據所述反饋結果確定未來時間內向所述用戶推送的核身產品中的核身流程。 Optionally, the method further includes: obtaining feedback results of the user on each process in the core body product pushed historically; determining the core body process in the core body product pushed to the user in the future according to the feedback result.

可選地,所述第二類別的核身產品包括生物資訊核身產品和/或金融卡核身產品;和/或所述第一類別的核身產品包括簡訊驗證碼核身產品和/或電子郵箱驗證碼核身產品。 Optionally, the verification products of the second category include bio-information verification products and/or financial card verification products; and/or the verification products of the first category include SMS verification code verification products and/or E-mail verification code verification products.

可選地,向所述用戶推送的核身產品的數量大於1。 Optionally, the number of core body products pushed to the user is greater than 1.

根據本說明書實施例的第二態樣,提供一種核身方法,所述方法包括:採用核身產品對用戶資訊進行核身;所述核身產品根據任一實施例所述的方法獲取。 According to a second aspect of the embodiments of this specification, there is provided a verification method, the method comprising: using a verification product to verify user information; the verification product is obtained according to the method described in any one of the embodiments.

可選地,所述方法還包括:若向用戶推送的核身產品 的數量大於1,當其中一種核身產品核身通過時,判定核身通過。 Optionally, the method further includes: if the core body product pushed to the user The number of is greater than 1, when one of the core body products passes through the core body, it is determined that the core body passes.

根據本說明書實施例的第三態樣,提供一種核身產品推送裝置,所述裝置包括:確定模組,用於根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;驗證模組,用於若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證;推送模組,用於若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 According to a third aspect of the embodiments of the present specification, there is provided a device for pushing a core product, the device comprising: a determination module for determining the user to send to the user according to the user's basic user information, online operating environment information and historical operation information. The category of the pushed core product; the verification module is used for, if the category is the first category with low core security, respectively, according to the user basic information, online operating environment information and historical operation information One category is used for verification; the push module is used to push the core products of the first category to the user if the verification results obtained according to the basic user information, online operating environment information and historical operation information are all verified. .

根據本說明書實施例的第四態樣,提供一種核身裝置,所述裝置包括:核身模組,用於採用核身產品對用戶資訊進行核身;所述核身產品根據任一實施例所述的方法獲取。 According to a fourth aspect of the embodiments of the present specification, there is provided a nucleation device, the device comprising: a nucleation module for nudging user information by using a nucleation product; the nucleation product according to any one of the embodiments obtained by the method described.

根據本說明書實施例的第五態樣,提供一種電腦可讀儲存媒體,其上儲存有電腦程式,所述程式被處理器執行時實現任一實施例所述的方法。 According to a fifth aspect of the embodiments of the present specification, there is provided a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the method described in any one of the embodiments is implemented.

根據本說明書實施例的第六態樣,提供一種電腦設備,包括儲存器、處理器及儲存在儲存器上並可在處理器上運行的電腦程式,所述處理器執行所述程式時實現任一實施例所述的方法。 According to a sixth aspect of the embodiments of the present specification, a computer device is provided, including a storage, a processor, and a computer program stored on the storage and executable on the processor, the processor executing the program to achieve any The method of an embodiment.

應用本說明書實施例方案,通過用戶基礎資訊、線上操作環境資訊以及歷史操作資訊綜合確定向用戶推送的核身產品的類別,能夠根據用戶實際情況為用戶選擇具有不同安全性的核身產品,提高了核身靈活性。 應當理解的是,以上的一般描述和後文的細節描述僅是範例性和解釋性的,並不能限制本說明書。By applying the solutions of the embodiments of this specification, the types of core products to be pushed to users can be comprehensively determined through the user's basic information, online operating environment information and historical operation information. nuclear flexibility. It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the specification.

這裡將詳細地對範例性實施例進行說明,其範例表示在圖式中。下面的描述涉及圖式時,除非另有表示,不同圖式中的相同數字表示相同或相似的要素。以下範例性實施例中所描述的實施方式並不代表與本說明書相一致的所有實施方式。相反,它們僅是與如所附申請專利範圍中所詳述的、本說明書的一些態樣相一致的裝置和方法的例子。 在本說明書使用的術語是僅僅出於描述特定實施例的目的,而非意於限制本說明書。在本說明書和所附申請專利範圍中所使用的單數形式的“一種”、“所述”和“該”也意於包括多數形式,除非上下文清楚地表示其他含義。還應當理解,本文中使用的術語“和/或”是指並包含一個或多個相關聯的列出項目的任何或所有可能組合。 應當理解,儘管在本說明書可能採用術語第一、第二、第三等來描述各種資訊,但這些資訊不應限於這些術語。這些術語僅用來將同一類型的資訊彼此區分開。例如,在不脫離本說明書範圍的情況下,第一資訊也可以被稱為第二資訊,類似地,第二資訊也可以被稱為第一資訊。取決於語境,如在此所使用的詞語“如果”可以被解釋成為“在……時”或“當……時”或“響應於確定”。 如圖1所示,是一個實施例的核身場景示意圖。核身是指核驗身份。核身產品可包括人臉識別核身產品、簡訊驗證碼核身產品等。在一些主動場景(例如修改密碼核身、更換綁定手機號核身)下,用戶可以通過用戶端觸發核身流程,例如,可以通過向伺服器發送帳戶資訊(密碼、綁定的手機號等)更改請求來觸發核身流程。伺服器在該觸發下可以向用戶端傳回一種或多種核身產品。用戶通過用戶端傳回核身產品所需的身份驗證資訊,例如,簡訊驗證碼、人臉圖像、指紋資訊等,伺服器對用戶傳回的資訊進行驗證,並將核身結果傳回給用戶端。如果驗證成功,允許更改帳戶資訊;否則,不允許更改帳戶資訊。通過這種方式,能夠對操作者的身份進行核實,減少帳戶被盜用的情況,保障用戶的帳戶安全。 基於此,本說明書實施例提供一種核身產品推送方法,如圖2所示,所述方法可包括: 步驟202:根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別; 步驟204:若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證; 步驟206:若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 在步驟202中,可以將用戶基礎資訊、線上操作環境資訊以及歷史操作資訊共同作為確定向所述用戶推送的核身產品類別的依據。其中,用戶基礎資訊可包括用戶的學歷、年齡、註冊時間、是否認證用戶等用戶個人資訊。可以在用戶註冊時獲取用戶基礎資訊,也可以在觸發核身流程之後請求用戶提供用戶基礎資訊。獲取用戶基礎資訊之前,還可以先請求用戶授權,只有在授權成功之後,才獲取用戶基礎資訊。用戶基礎資訊可以作為判斷用戶對不同核身難度的核身產品的接受程度的依據。線上操作環境資訊可用於表徵用戶當前使用的網路操作環境的安全性,具體可包括網路類型(公共網路、家庭網路等)、網路IP位址的歷史被舉報次數、當前所處的網路IP位址是否為常用位址等資訊。歷史操作資訊可用於表徵用戶在歷史時間段內對帳戶執行的操作是否存在風險,具體可包括資金支出資訊、執行操作的時間間隔資訊(即,是否在短時間內頻繁進行同一操作)等資訊。 核身產品的類別與核身產品的安全性及操作複雜度相關。一般來說,核身產品的類別可分為第一類別和第二類別,其中,第一類別為核身安全性較低的類別,這種類別的核身產品通常包括若干個複雜度較低的核身流程。第二類別為核身安全性較高的類別,這種類別的核身產品通常包括若干個複雜度較高的核身流程。第一類別的核身產品可稱為弱核身,第二類別的核身產品可稱為強核身。一般來說,強核身對帳戶的安全保障高於弱核身;與此同時,強核身方式相對於弱核身也更加容易造成操作成本高,導致部分用戶無法通過核驗,最終帳戶被棄用。 通過將用戶基礎資訊、線上操作環境資訊以及歷史操作資訊共同作為確定向所述用戶推送的核身產品類別的依據,能夠綜合考慮用戶對核身產品的體驗感,以及潛在的核身威脅,在提高用戶體驗的同時保障一定的安全性。 在一個實施例中,可以分別對所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊進行評分,得到對應的分數;根據所述用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數確定所述核身產品的分數;若所述核身產品的分數小於或等於預設值,確定所述類別為第一類別;否則,確定所述類別為第二類別。 用戶基礎資訊對應的分數可用於表徵用戶接受強核身的程度,分數越高,用戶接受強核身的程度越高。例如,用戶註冊時間越長,用戶基礎資訊對應的分數越高,可認為用戶接受強核身的程度越高。線上操作環境資訊對應的分數可用於表徵用戶當前的線上操作環境的危險性,分數越高,危險性越高,從而採用強核身的需求越大。歷史操作資訊對應的分數可用於表徵用戶對帳戶的操作是否存在風險,分數越高,風險越高,從而採用強核身的需求越大。根據所述用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數確定所述核身產品的分數,可以是對用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數進行加權平均,也可以是根據預設的演算法或者模型來求解用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數,以得到核身產品的分數。核身產品的分數越高,表示向用戶推送第二類別的核身產品的傾向性越高;反之,表示向用戶推送第一類別的核身產品的傾向性越高。 本步驟會綜合評估用戶當前的情況,例如當前操作下不僅會評估基礎的網路等環境資訊,還會根據用戶的基礎資訊、操作行為變化、近期來電留言等諮詢資訊得出一個綜合評分作為初步區分強弱核身的臨界值。 在步驟204中,若步驟202中判定出的類別為核身安全性較低的第一類別,則可以對該判定結果進行再次驗證,以確定採用第一類別的核身產品的可靠程度。這樣,可以進一步提高核身產品的可靠性。 本步驟可執行三次驗證,分別是:根據用戶基礎資訊進行驗證、根據線上操作環境資訊進行驗證,以及根據歷史操作資訊進行驗證。具體來說,三次驗證可分別通過以下方式進行: 在根據用戶基礎資訊進行驗證時,可以根據所述用戶基礎資訊獲取用戶對核身產品的接受度特徵,將所述接受度特徵輸入到預先訓練的第一分類模型,獲取所述用戶基礎資訊對應的驗證結果;其中,所述接受度特徵用於表徵用戶對所述第一類別的核身產品的接受程度。 本步驟的第一分類模型可以採用一個體感評估模型來實現,體感評估模型可以是一個評估當前用戶使用過程心裡接受度的二分類器,主要關注於用戶的安全感受、使用訴求和接受程度。其中,所述接受度特徵可以包括用戶對歷史推送的核身產品的完成度和/或反饋結果。例如,可以獲取用戶對最近一個月內推送的核身產品的完成度。完成度可以通過已完成的核身流程占全部核身流程的比例來計算。如果完成度大於預設的完成度臨界值,可以將該核身產品作為向該用戶推送的備選核身產品之一,並在需要推送時,將備選核身產品中的至少一者推送給用戶。如果完成度小於完成度臨界值,則不向該用戶推送所述核身產品。反饋結果可以是用戶對整個核身產品的反饋結果,例如,通過問卷調查等方式獲取的用戶“是”或者“否”接受該核身產品的反饋結果;也可以是用戶對核身產品中某個流程的反饋結果,例如,核身產品包括獲取簡訊驗證碼、進行人臉識別以及輸入綁定的金融卡號三個流程,而用戶每次在核身過程中需要進行人臉識別時即退出核身流程,則可以通過後臺獲取該反饋資訊。 Exemplary embodiments will be described in detail herein, examples of which are illustrated in the drawings. When the following description refers to the drawings, the same numerals in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples are not intended to represent all implementations consistent with this specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of this specification as detailed in the appended claims. The terms used in this specification are for the purpose of describing particular embodiments only and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a," "the," and "the" are intended to include plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and/or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items. It should be understood that although the terms first, second, third, etc. may be used in this specification to describe various information, such information should not be limited by these terms. These terms are only used to distinguish information of the same type from one another. For example, the first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information without departing from the scope of the present specification. Depending on the context, the word "if" as used herein can be interpreted as "at the time of" or "when" or "in response to determining." As shown in FIG. 1 , it is a schematic diagram of a nuclear body scene of an embodiment. Verification refers to verification of identity. Nucleation products may include facial recognition nucleation products, SMS verification code nucleation products, etc. In some active scenarios (such as changing the password verification, changing the binding mobile phone number verification), the user can trigger the verification process through the client, for example, by sending account information (password, bound mobile phone number, etc.) to the server ) change request to trigger the core body process. Under the trigger, the server can return one or more core products to the client. The user returns the identity verification information required by the verification product through the client, such as SMS verification code, face image, fingerprint information, etc. The server verifies the information returned by the user and sends the verification result back to user terminal. If verification is successful, changes to account information are allowed; otherwise, changes to account information are not allowed. In this way, the identity of the operator can be verified, the situation of account being stolen can be reduced, and the security of the user's account can be guaranteed. Based on this, an embodiment of this specification provides a method for pushing a core body product, as shown in FIG. 2 , the method may include: Step 202: Determine the category of the core product to be pushed to the user according to the user's basic information, online operating environment information and historical operation information; Step 204: If the category is the first category with low core security, verify the first category according to the user basic information, online operating environment information and historical operation information respectively; Step 206: If the verification results obtained according to the user basic information, online operating environment information, and historical operation information are all verified, push the first category of core body products to the user. In step 202, the basic information of the user, the online operating environment information and the historical operation information may be used together as the basis for determining the category of the core product to be pushed to the user. The basic user information may include the user's personal information such as the user's educational background, age, registration time, and whether the user is authenticated. User basic information can be obtained when the user registers, or the user can be requested to provide basic user information after the avatar process is triggered. Before obtaining the basic information of the user, you can also request the user's authorization first, and only after the authorization is successful, can the basic information of the user be obtained. User basic information can be used as a basis for judging the user's acceptance of nudity products with different nudity difficulties. Online operating environment information can be used to characterize the security of the network operating environment currently used by the user, including the type of network (public network, home network, etc.) Whether the IP address of the network is a commonly used address and other information. The historical operation information can be used to represent whether there is a risk in the operation performed by the user on the account during the historical time period, and may specifically include information such as capital expenditure information, time interval information of the operation execution (ie, whether the same operation is frequently performed in a short period of time). The categories of core products are related to the safety and operational complexity of core products. Generally speaking, the categories of core body products can be divided into the first category and the second category, wherein the first category is the category with lower core body security, and the core body products of this category usually include several low-complexity products. nucleation process. The second category is the category with higher security of the core body, and the core body product of this category usually includes several core body processes with high complexity. The first category of core products may be referred to as weak cores, and the second category of core products may be referred to as strong cores. Generally speaking, the security guarantee of a strong core body is higher than that of a weak core body; at the same time, the strong core body method is more likely to cause higher operating costs than a weak core body, resulting in some users failing to pass the verification and the final account being abandoned. use. By using the user's basic information, online operating environment information, and historical operation information as the basis for determining the type of core products to be pushed to the user, it is possible to comprehensively consider the user's experience of core products and potential core threats. Improve user experience while ensuring a certain degree of security. In one embodiment, the user basic information, online operating environment information, and historical operation information may be scored respectively to obtain corresponding scores; according to the scores corresponding to the user basic information, the scores corresponding to the online operating environment information, and the history The score corresponding to the operation information determines the score of the core product; if the score of the core product is less than or equal to a preset value, the category is determined as the first category; otherwise, the category is determined as the second category. The score corresponding to the user's basic information can be used to represent the degree to which the user accepts the strong core body. The higher the score, the higher the user's acceptance of the strong core body. For example, the longer the user's registration time, the higher the score corresponding to the user's basic information, and the higher the degree of the user's acceptance of a strong core. The score corresponding to the online operating environment information can be used to represent the risk of the user's current online operating environment. The higher the score, the higher the risk, and the greater the need for a strong core. The score corresponding to the historical operation information can be used to indicate whether the user's operation on the account is risky. The higher the score, the higher the risk, and the greater the demand for strong core. The score of the core body product is determined according to the score corresponding to the basic user information, the score corresponding to the online operating environment information, and the score corresponding to the historical operation information, which may be the score corresponding to the basic user information and the score corresponding to the online operating environment information. And the scores corresponding to the historical operation information are weighted and averaged, or the score corresponding to the user's basic information, the score corresponding to the online operating environment information, and the score corresponding to the historical operation information can be obtained according to a preset algorithm or model, so as to obtain the core identity. Product score. The higher the score of the core product, the higher the tendency to push the core product of the second category to the user; on the contrary, the higher the tendency to push the core product of the first type to the user. This step will comprehensively evaluate the current situation of the user. For example, the current operation will not only evaluate the basic network and other environmental information, but also obtain a comprehensive score based on the user's basic information, changes in operating behavior, recent calls and messages and other consulting information as a preliminary The critical value for distinguishing between strong and weak cores. In step 204, if the category determined in step 202 is the first category with low core body security, the determination result may be re-verified to determine the reliability of the core body product using the first category. In this way, the reliability of the core body product can be further improved. Three verifications can be performed in this step, namely: verification based on basic user information, verification based on online operating environment information, and verification based on historical operation information. Specifically, the three verifications can be performed in the following ways: When the verification is performed according to the basic user information, the user's acceptability characteristics of the nucleation product can be obtained according to the user basic information, and the acceptability characteristics can be input into the pre-trained first classification model, and the corresponding user basic information can be obtained. The verification result; wherein, the acceptance feature is used to represent the user's acceptance of the first category of core body products. The first classification model in this step can be implemented by a somatosensory evaluation model. The somatosensory evaluation model can be a binary classifier that evaluates the psychological acceptance of the current user's use process, mainly focusing on the user's security feeling, use demands and acceptance degree . Wherein, the acceptance feature may include the user's degree of completion and/or feedback results of the historically pushed nuclear body product. For example, it is possible to obtain the user's degree of completion of the core body products pushed in the last month. The degree of completion can be calculated by the ratio of completed core body processes to all core body processes. If the completion degree is greater than the preset completion degree threshold, the core body product can be used as one of the candidate core body products to be pushed to the user, and when it needs to be pushed, at least one of the candidate core body products can be pushed to users. If the completion degree is less than the completion degree threshold, the core body product is not pushed to the user. The feedback result can be the user's feedback result for the whole body product, for example, the user's "yes" or "no" to accept the body product through questionnaires and other methods; it can also be the user's feedback on a certain body product. Feedback results of each process. For example, the verification product includes three processes: obtaining SMS verification code, performing face recognition, and entering the bound financial card number, and the user exits the verification every time he needs to perform face recognition in the verification process. You can obtain the feedback information through the background.

將所述接受度特徵輸入到預先訓練的第一分類模型,從而可以獲取用戶所屬的類別,即,傾向於接受強核身的類別,或者傾向於接受弱核身的類別。若驗證結果表明用戶為傾向於接受強核身的類別,則表示驗證失敗;若驗證結果表明用戶為傾向於接受弱核身的類別,則表示驗證成功。 The acceptance degree feature is input into the pre-trained first classification model, so that the category to which the user belongs can be obtained, that is, the category that tends to accept a strong core body, or a category that tends to accept a weak core body. If the verification result shows that the user is in a category that tends to accept strong nuclei, it means that the verification fails; if the verification result shows that the user is in a category that tends to accept weak nuclei, it means that the verification is successful.

在根據線上操作環境資訊進行驗證時,可以獲取所述線上操作環境資訊中的高危環境特徵,將所述高危環境特徵輸入到預先訓練的第二分類模型,獲取所述線上操作環境資訊對應的驗證結果。 When verifying according to the online operating environment information, the high-risk environment features in the online operating environment information can be obtained, the high-risk environment features can be input into the pre-trained second classification model, and the verification corresponding to the online operating environment information can be obtained. result.

本步驟的第二分類模型可以採用一個環境評估模型來實現,環境評估模型可以用於評估當前操作環境是否處於風險之中。其中,所述高危環境特徵可包括不在常用位址和/或IP位址存在被舉報記錄等特徵。將所述高危環境特徵輸入到預先訓練的第二分類模型,從而可以獲取當前操作環境的類別,即,存在風險的類別,或者不存在風險的類別。若驗證結果表明當前操作環境為存在風險的類別,則表示校驗失敗;若驗證結果表明當前操作環境為不存在風險的類別,則表示驗證成功。 The second classification model of this step can be implemented by using an environmental assessment model, and the environmental assessment model can be used to assess whether the current operating environment is at risk. Wherein, the high-risk environment features may include features such as not having a reported record at a commonly used address and/or an IP address. The high-risk environment feature is input into the pre-trained second classification model, so that the category of the current operating environment, that is, the category with risk or the category without risk can be obtained. If the verification result indicates that the current operating environment is in a category with risks, it indicates that the verification fails; if the verification result indicates that the current operating environment is in a category without risks, it indicates that the verification is successful.

在根據歷史操作資訊進行驗證時,可以獲取所述歷史操作資訊中的高危操作特徵,將所述高危操作特徵輸入到預先訓練的第三分類模型,獲取所述歷史操作資訊對應的驗證結果。 When verifying according to historical operation information, high-risk operation features in the historical operation information can be obtained, and the high-risk operation features can be input into a pre-trained third classification model to obtain a verification result corresponding to the historical operation information.

本步驟的第三分類模型可以採用一個行為評估模型來實現,行為評估模型可用於對用戶的操作過程進行評估,評測用戶操作高危或者會造成高危情形。其中,所述高危操作特徵可包括資金大額支出、短時間內頻繁進行同一操作等特徵。將所述高危操作特徵輸入到預先訓練的第三分類模型,從而可以獲取當前操作行為的類別,即,存在風險的類別,或者不存在風險的類別。若驗證結果表明當前操作行為為存在風險的類別,則表示校驗失敗;若驗證結果表明當前操作行為為不存在風險的類別,則表示驗證成功。 The third classification model in this step can be implemented by using a behavior evaluation model, which can be used to evaluate the user's operation process, and evaluate the high-risk or high-risk situation of the user's operation. The high-risk operation characteristics may include characteristics such as large expenditure of funds, frequent execution of the same operation in a short period of time, and the like. The high-risk operation feature is input into the pre-trained third classification model, so that the category of the current operation behavior, that is, the category with risk or the category without risk can be obtained. If the verification result indicates that the current operation behavior is in the category with risk, it means that the verification fails; if the verification result indicates that the current operation behavior is in the category without risk, it indicates that the verification is successful.

在一個實施例中,若確定向用戶推送的核身產品的類 別為安全性較高的第二類別,則可以直接向所述用戶推送所述第二類別的核身產品,無需進行驗證。 In one embodiment, if it is determined that the category of the core product pushed to the user is If it is the second category with higher security, the core body product of the second category can be directly pushed to the user without verification.

在步驟206中,若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的任一驗證結果未通過驗證,則表示當前採用第一類別的核身產品與實際情況可能不符合,例如,用戶更加傾向於採用安全性更高的第二類別的核身產品,或者當前操作環境或者用戶操作行為存在風險,需要採用更加安全的核身方式,因此,可以向所述用戶推送核身安全性較高的第二類別的核身產品。 In step 206, if any verification result obtained according to the user basic information, online operating environment information and historical operation information fails the verification, it means that the current use of the first type of core body product may not conform to the actual situation, for example , the user is more inclined to use the second category of core body products with higher security, or the current operating environment or user operation behavior is at risk, and a more secure core body method needs to be adopted. Therefore, the core body security can be pushed to the user. The more sexual second category of core products.

在一個實施例中,還可以獲取用戶對歷史推送的核身產品中各個流程的反饋結果;根據所述反饋結果確定未來時間內向所述用戶推送的核身產品中的核身流程。例如,歷史推送給用戶的核身產品中包括流程A,B和C,且反饋結果表明用戶對流程B的接受程度較低,則可在未來推送給用戶的核身產品中去除掉流程B。還可以將流程B替換為流程D,其中,流程D可以是資料庫中預存的流程。這樣,每次推送給用戶的核身產品中可能包括不同的核身流程,一態樣更加符合實際應用的需求,另一態樣也提高了不法分子進行風險對抗的難度。 In one embodiment, the user's feedback results of each process in the core body product pushed historically can also be obtained; the core body process in the core body product pushed to the user in the future is determined according to the feedback result. For example, processes A, B and C are included in the core body products pushed to users in the past, and the feedback result shows that the user has a low degree of acceptance of process B, then process B can be removed from core body products pushed to users in the future. The process B can also be replaced with a process D, where the process D can be a pre-stored process in the database. In this way, the core body products pushed to users each time may include different core body processes. One aspect is more in line with the needs of practical applications, and the other aspect also increases the difficulty of criminals in risk confrontation.

在一個實施例中,第一類別的核身產品可以是包括若干個難度係數較低的流程的核身產品,第二類別的核身產品可以是包括若干個難度係數較高的流程的核身產品。每個流程的難度係數可以預先設定。例如,所述第二類別的核身產品包括生物資訊核身產品和/或金融卡核身產品; 所述第一類別的核身產品包括簡訊驗證碼核身產品和/或電子郵箱驗證碼核身產品。 In one embodiment, the core product of the first category may be a core product including several processes with a relatively low degree of difficulty, and the core product of the second category may be a core product including a number of processes with a relatively high degree of difficulty product. The difficulty factor of each process can be preset. For example, the second category of verification products includes biometric verification products and/or financial card verification products; The first category of verification products includes SMS verification code verification products and/or email verification code verification products.

在一個實施例中,向所述用戶推送的核身產品的數量大於1。也就是說,如果確定向所述用戶推送所述第一類別的核身產品,每次可以向用戶推送多種第一類別的核身產品。同理,如果確定向所述用戶推送所述第二類別的核身產品,每次可以向用戶推送多種第二類別的核身產品。用戶在進行核身時,可以自行選擇其中一種核身產品,只要其中一種核身產品核身驗證通過,即表示用戶核身通過。通過提供多種選擇方案供用戶主動選擇,能夠提高用戶的自主選擇性,核身積極性和通過率,進一步提高了用戶體驗。 In one embodiment, the number of core products pushed to the user is greater than one. That is, if it is determined to push the first category of nudity products to the user, multiple nucleated body products of the first category may be pushed to the user each time. Similarly, if it is determined to push the second category of nudity products to the user, multiple nucleated body products of the second category may be pushed to the user each time. When a user performs a nudging, he can choose one of the nudging products by himself. As long as one of the nudging products passes the nudging verification, it means that the user has passed the nudging. By providing a variety of options for users to actively choose, it can improve the user's independent selectivity, core enthusiasm and pass rate, and further improve the user experience.

本說明書實施例的方案可通過圖3(a)所示的核身產品推送系統執行圖3(b)所示的流程來實現。該系統可包括資料層、評估層和核身層。其中,資料層可以採集用戶基礎資訊、操作環境資訊和歷史操作資訊。評估層可包括用戶綜合評分模組以及體感評估模型、環境評估模型和行為評估模型,其中體感評估模型、環境評估模型和行為評估模型可分別採用一個二分類器來實現。核身層可包括強校驗決策模組、弱校驗決策模組和核身驗證模組。用戶綜合評分模組可以對用戶基礎資訊、操作環境資訊和歷史操作資訊進行綜合評分,如果得到的分數大於預設值,則採用強核身校驗決策;如果得到的分數小於或等於預設值,則通過體感評估模型、環境評估模型和行為評估模型進一步進行驗證,根據驗證結果確定採用強核身校驗決策或者弱核身校驗決策。如果體感評估模型、環境評估模型和行為評估模型中的任意一者判定為採用強校驗,則採用強校驗;如果三者均判定為採用弱校驗,則採用弱校驗。若評估層的評估結果為強核身校驗,則執行強校驗決策模組的功能;若評估層的評估結果為弱核身校驗,則執行弱校驗決策模組的功能。強/弱校驗決策模組可確定推送給用戶的核身產品,核身驗證模組可採用該核身產品進行核身驗證。 本說明書實施例的方案在識別使用環境的同時,更考慮到用戶行為、安全感受和自身訴求,提供了一套安全友好的核身校驗。該核身方式基於用戶核身體感、線上環境和歷史操作的綜合評分,同時考慮用戶特點、操作合理性及環境風險性,形成一套根據用戶的不同訴求和不同感受,對不同用戶群體以及對各群組差異化核身校驗。該系統能在確保環境安全的前提下,根據用戶的自身需求和感受,以用戶更可能接受的方式進行核身,有效提高了用戶的核身積極性和成功率,核身系統配置靈活。 如圖4所示,本說明書實施例還提供一種核身方法,所述方法可包括步驟402:採用核身產品對用戶資訊進行核身;其中,所述核身產品根據任一實施例所述的方法獲取。 進一步地,若向用戶推送的核身產品的數量大於1,當其中一種核身產品核身通過時,判定核身通過。 以上實施例中的各種技術特徵可以任意進行組合,只要特徵之間的組合不存在衝突或矛盾,但是限於篇幅,未進行一一描述,因此上述實施方式中的各種技術特徵的任意進行組合也屬本說明書公開的範圍。 與上述方法相對應,本說明書實施例還提供一種核身產品推送裝置,如圖5所示,所述裝置可包括: 確定模組502,用於根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別; 驗證模組504,用於若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證; 推送模組506,用於若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 如圖6所示,本說明書實施例還提供一種核身裝置,所述裝置可包括:核身模組602,用於採用核身產品對用戶資訊進行核身;所述核身產品根據任一實施例所述的方法獲取。 上述裝置中各個模組的功能和作用的實現過程具體詳情見上述方法中對應步驟的實現過程,在此不再贅述。 對於裝置實施例而言,由於其基本對應於方法實施例,所以相關之處參見方法實施例的部分說明即可。以上所描述的裝置實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是實體上分開的,作為模組顯示的部件可以是或者也可以不是實體模組,即可以位於一個地方,或者也可以分佈到多個網路模組上。可以根據實際的需要選擇其中的部分或者全部模組來實現本說明書方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。 本說明書裝置的實施例可以應用在電腦設備上,例如伺服器或終端設備。裝置實施例可以通過軟體實現,也可以通過硬體或者軟硬體結合的方式實現。以軟體實現為例,作為一個邏輯意義上的裝置,是通過其所在檔案處理的處理器將非揮發性儲存器中對應的電腦程式指令讀取到記憶體中運行形成的。從硬體層面而言,如圖7所示,為本說明書裝置所在電腦設備的一種硬體結構圖,除了圖7所示的處理器702、記憶體704、網路介面706、以及非揮發性儲存器708之外,實施例中裝置所在的伺服器或電子設備,通常根據該電腦設備的實際功能,還可以包括其他硬體,對此不再贅述。 相應的地,本說明書實施例還提供一種電腦儲存媒體,其上儲存有電腦程式,所述程式被處理器執行時實現任一實施例所述的方法。 相應的地,本說明書實施例還提供一種電腦設備,包括儲存器、處理器及儲存在儲存器上並可在處理器上運行的電腦程式,所述處理器執行所述程式時實現任一實施例所述的方法。 本發明可採用在一個或多個其中包含有程式代碼的儲存媒體(包括但不限於磁碟儲存器、CD-ROM、光學儲存器等)上實施的電腦程式產品的形式。電腦可用儲存媒體包括永久性和非永久性、可移動和非可移動媒體,可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括但不限於:相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。 本領域技術人員在考慮說明書及實踐這裡公開的說明書後,將容易想到本公開的其它實施方案。本公開意於涵蓋本公開的任何變型、用途或者適應性變化,這些變型、用途或者適應性變化遵循本公開的一般性原理並包括本公開未公開的本技術領域中的眾所皆知常識或慣用技術手段。說明書和實施例僅被視為範例性的,本公開的真正範圍和精神由下面的申請專利範圍指出。 應當理解的是,本公開並不局限於上面已經描述並在圖式中顯示的精確結構,並且可以在不脫離其範圍進行各種修改和改變。本公開的範圍僅由所附的申請專利範圍來限制。 以上所述僅為本公開的較佳實施例而已,並不用以限制本公開,凡在本公開的精神和原則之內,所做的任何修改、等同替換、改進等,均應包含在本公開保護的範圍之內。The solution of the embodiment of this specification can be implemented by executing the process shown in FIG. 3(b) by the core body product push system shown in FIG. 3(a). The system may include a data layer, an evaluation layer, and a core body layer. Among them, the data layer can collect basic user information, operating environment information and historical operation information. The evaluation layer may include a user comprehensive scoring module, a somatosensory evaluation model, an environmental evaluation model and a behavioral evaluation model, wherein the somatosensory evaluation model, the environmental evaluation model and the behavioral evaluation model may be implemented by using a binary classifier respectively. The core body layer may include a strong verification decision module, a weak verification decision module and a core body verification module. The user comprehensive scoring module can comprehensively score the user's basic information, operating environment information and historical operation information. If the obtained score is greater than the preset value, a strong verification decision will be adopted; if the obtained score is less than or equal to the preset value , then further verification is carried out through the somatosensory evaluation model, the environmental evaluation model and the behavioral evaluation model, and according to the verification results, it is determined to adopt a strong core body verification decision or a weak core body verification decision. If any one of the somatosensory evaluation model, the environmental evaluation model, and the behavioral evaluation model is determined to use strong verification, the strong verification is adopted; if all three are determined to be weak verification, the weak verification is adopted. If the evaluation result of the evaluation layer is strong verification, the function of the strong verification decision module is executed; if the evaluation result of the evaluation layer is the weak verification, the function of the weak verification decision module is executed. The strong/weak verification decision module can determine the core body product to be pushed to the user, and the core body verification module can use the core body product for core body verification. The solutions of the embodiments of this specification provide a set of safe and friendly verification of identity while taking into account the user's behavior, security feeling and their own demands while recognizing the use environment. The core body method is based on the comprehensive score of the user's core body feeling, online environment and historical operations, and considers the user's characteristics, operation rationality and environmental risk. Differentiated core verification of each group. Under the premise of ensuring the safety of the environment, the system can perform the core body in a way that the user is more likely to accept according to the user's own needs and feelings, effectively improving the user's core body enthusiasm and success rate, and the core body system configuration is flexible. As shown in FIG. 4 , an embodiment of the present specification further provides a method for authentication, and the method may include step 402 : use an authentication product to authenticate user information; wherein the authentication product is according to any one of the embodiments. method to obtain. Further, if the number of core products pushed to the user is greater than 1, when one of the core products has passed the core, it is determined that the core has passed. Various technical features in the above embodiments can be arbitrarily combined, as long as there is no conflict or contradiction between the combinations of features, but due to space limitations, they are not described one by one. Therefore, any combination of various technical features in the above-mentioned embodiments also belongs to The scope of the disclosure of this specification. Corresponding to the above method, an embodiment of the present specification further provides a device for pushing a core body product, as shown in FIG. 5 , the device may include: A determination module 502, configured to determine the category of the core body product pushed to the user according to the user's basic information, online operating environment information and historical operation information; a verification module 504, configured to verify the first category according to the basic user information, online operating environment information and historical operation information if the category is a first category with relatively low core security; The push module 506 is configured to push the core body product of the first category to the user if the verification results obtained according to the user basic information, online operating environment information and historical operation information are all verified. As shown in FIG. 6 , an embodiment of the present specification further provides a core body device, the device may include: a core body module 602, which is used for core body products to core body user information; the core body products are based on any of the core body products. obtained by the methods described in the examples. For the specific details of the implementation process of the functions and functions of each module in the above device, see the implementation process of the corresponding steps in the above method, which will not be repeated here. For the apparatus embodiments, since they basically correspond to the method embodiments, reference may be made to the partial descriptions of the method embodiments for related parts. The device embodiments described above are only schematic, wherein the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, That is, it can be located in one place, or it can be distributed to multiple network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement it without creative effort. The embodiments of the apparatus in this specification can be applied to computer equipment, such as servers or terminal equipment. The apparatus embodiment may be implemented by software, or may be implemented by hardware or a combination of software and hardware. Taking software implementation as an example, as a logical device, it is formed by reading the corresponding computer program instructions in the non-volatile storage into the memory through the processor for processing the file in which it is located. From the perspective of hardware, as shown in FIG. 7 , it is a hardware structure diagram of the computer equipment where the device of this specification is located, except for the processor 702 , the memory 704 , the network interface 706 , and the non-volatile memory shown in FIG. 7 . In addition to the storage 708, the server or electronic device where the device is located in the embodiment may also include other hardware according to the actual function of the computer device, which will not be repeated here. Correspondingly, the embodiments of the present specification further provide a computer storage medium on which a computer program is stored, and when the program is executed by a processor, the method described in any one of the embodiments is implemented. Correspondingly, the embodiments of this specification also provide a computer device, including a storage, a processor, and a computer program stored on the storage and running on the processor, and the processor implements any implementation when executing the program. method described in the example. The present invention may take the form of a computer program product implemented on one or more storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having program code contained therein. Computer-usable storage media includes permanent and non-permanent, removable and non-removable media, and information storage can be accomplished by any method or technology. Information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to: phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM) , Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash Memory or Other Memory Technologies, CD-ROM Read-Only Memory (CD-ROM), Digital Versatile A compact disc (DVD) or other optical storage, magnetic tape cassette, magnetic tape, magnetic disk storage or other magnetic storage device or any other non-transmission medium may be used to store information that can be accessed by a computing device. Other embodiments of the present disclosure will readily occur to those skilled in the art upon consideration of the specification and practice of the specification disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of this disclosure that follow the general principles of this disclosure and include common general knowledge or conventional technical means. The specification and examples are to be regarded as exemplary only, the true scope and spirit of the disclosure being indicated by the following claims. It is to be understood that the present disclosure is not limited to the precise structures described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the scope of the appended claims. The above descriptions are only preferred embodiments of the present disclosure, and are not intended to limit the present disclosure. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present disclosure shall be included in the present disclosure. within the scope of protection.

202〜206‧‧‧步驟 402‧‧‧步驟 502‧‧‧確定模組 504‧‧‧驗證模組 506‧‧‧推送模組 602‧‧‧核身模組 702‧‧‧處理器 704‧‧‧記憶體 706‧‧‧網路介面 708‧‧‧非揮發性儲存器202~206‧‧‧Steps 402‧‧‧Steps 502‧‧‧Determine the module 504‧‧‧Authentication Module 506‧‧‧Push Module 602‧‧‧Core Module 702‧‧‧Processor 704‧‧‧Memory 706‧‧‧Internet Interface 708‧‧‧Non-volatile storage

此處的圖式被併入說明書中並構成本說明書的一部分,顯示了符合本說明書的實施例,並與說明書一起用於解釋本說明書的原理。 圖1是一個實施例的核身場景示意圖。 圖2是本說明書一個實施例的核身產品推送方法流程圖。 圖3(a)是本說明書一個實施例的核身產品推送系統的總體架構圖。 圖3(b)是本說明書一個實施例的核身產品推送方法的總體流程圖。 圖4是本說明書一個實施例的核身方法流程圖。 圖5是本說明書一個實施例的核身產品推送裝置的方塊圖。 圖6是本說明書一個實施例的核身裝置的方塊圖。 圖7是本說明書一個實施例的用於實施本說明書實施例方法的電腦設備的示意圖。The drawings incorporated herein into and constitute a part of this specification illustrate embodiments consistent with this specification, and together with the description serve to explain the principles of this specification. FIG. 1 is a schematic diagram of a core body scene according to an embodiment. FIG. 2 is a flowchart of a method for pushing a core body product according to an embodiment of the present specification. Fig. 3(a) is an overall architecture diagram of a core body product push system according to an embodiment of the present specification. Fig. 3(b) is an overall flow chart of a method for pushing a core body product according to an embodiment of the present specification. FIG. 4 is a flowchart of a core body method according to an embodiment of the present specification. FIG. 5 is a block diagram of a core body product pushing device according to an embodiment of the present specification. FIG. 6 is a block diagram of a core device according to an embodiment of the present specification. FIG. 7 is a schematic diagram of a computer device for implementing the method of the embodiment of the present specification according to an embodiment of the present specification.

Claims (14)

一種核身產品推送方法,應用於伺服器,所述方法包括:響應於用戶對核身流程的觸發,根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;若所述類別為核身安全性較低的第一類別,根據所述用戶基礎資訊獲取用戶對核身產品的接受度特徵,將所述接受度特徵輸入到預先訓練的第一分類模型,獲取所述用戶基礎資訊對應的驗證結果;其中,所述接受度特徵用於表徵用戶對所述第一類別的核身產品的接受程度;和獲取所述線上操作環境資訊中的高危環境特徵,將所述高危環境特徵輸入到預先訓練的第二分類模型,獲取所述線上操作環境資訊對應的驗證結果;和獲取所述歷史操作資訊中的高危操作特徵,將所述高危操作特徵輸入到預先訓練的第三分類模型,獲取所述歷史操作資訊對應的驗證結果;若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 A core body product push method, applied to a server, the method includes: in response to a user triggering a core body process, determining a core body to push to the user according to the user's basic user information, online operating environment information and historical operation information The category of the body product; if the category is the first category with low security of the body, the user's acceptance feature of the body product is obtained according to the basic information of the user, and the acceptance feature is input into the pre-trained No. 1 product. a classification model to obtain the verification result corresponding to the basic user information; wherein, the acceptance feature is used to represent the user's acceptance of the first category of nuclei products; and to obtain the online operating environment information. High-risk environment features, inputting the high-risk environment features into a pre-trained second classification model, and obtaining the verification results corresponding to the online operating environment information; The feature is input into the pre-trained third classification model, and the verification result corresponding to the historical operation information is obtained; if the verification results obtained according to the user basic information, online operation environment information and historical operation information are all verified, the The user pushes the core body products of the first category. 根據申請專利範圍第1項所述的方法,所述方法還包括:若根據所述用戶基礎資訊、線上操作環境資訊以及歷 史操作資訊獲得的任一驗證結果未通過驗證,向所述用戶推送核身安全性較高的第二類別的核身產品。 According to the method described in item 1 of the patent application scope, the method further includes: if according to the user basic information, the online operating environment information and the history If any verification result obtained by the history operation information fails the verification, push a second category of nuclear body products with higher nuclear body security to the user. 根據申請專利範圍第2項所述的方法,根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向用戶推送的核身產品的類別的步驟包括:分別對所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊進行評分,得到對應的分數;根據所述用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數確定所述核身產品的分數;若所述核身產品的分數小於或等於預設值,確定所述類別為第一類別;否則,確定所述類別為第二類別。 According to the method described in item 2 of the scope of the application, the step of determining the type of the core product pushed to the user according to the user basic information, online operating environment information and historical operation information includes: Score the operating environment information and historical operating information to obtain the corresponding score; determine the score of the core body product according to the score corresponding to the basic user information, the score corresponding to the online operating environment information, and the score corresponding to the historical operating information; If the score of the nuclear body product is less than or equal to a preset value, the category is determined to be the first category; otherwise, the category is determined to be the second category. 根據申請專利範圍第1項所述的方法,在根據用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向用戶推送的核身產品的類別之後,所述方法還包括:若確定向用戶推送的核身產品的類別為安全性較高的第二類別,向所述用戶推送所述第二類別的核身產品。 According to the method described in item 1 of the scope of the patent application, after determining the category of the core product to be pushed to the user according to the user's basic information, online operating environment information and historical operation information, the method further includes: The category of the core body product is a second category with higher security, and the core body product of the second category is pushed to the user. 根據申請專利範圍第1項所述的方法,所述接受度特徵包括用戶對歷史推送的核身產品的完成度和/或反饋結果;和/或所述高危環境特徵包括不在常用位址和/或IP位址存 在被舉報記錄;和/或所述高危操作特徵包括資金大額支出、短時間內頻繁進行同一操作。 According to the method described in item 1 of the scope of the patent application, the acceptance feature includes the user's degree of completion and/or feedback result of the historically pushed nuclear body product; and/or the high-risk environment feature includes not being in a common address and/or or IP address In the reported record; and/or the high-risk operation features include large expenditure of funds and frequent execution of the same operation in a short period of time. 根據申請專利範圍第1項所述的方法,所述方法還包括:獲取用戶對歷史推送的核身產品中各個流程的反饋結果;根據所述反饋結果確定未來時間內向所述用戶推送的核身產品中的核身流程。 According to the method described in item 1 of the scope of the application, the method further includes: obtaining the user's feedback results of each process in the historically pushed core product; determining the core body to be pushed to the user in the future according to the feedback results; The core body process in the product. 根據申請專利範圍第2或3項所述的方法,所述第二類別的核身產品包括生物資訊核身產品和/或金融卡核身產品;和/或所述第一類別的核身產品包括簡訊驗證碼核身產品和/或電子郵箱驗證碼核身產品。 According to the method described in item 2 or 3 of the claimed scope of application, the second category of nucleation products includes bio-information nucleation products and/or financial card nucleation products; and/or the first category of nucleation products Including SMS verification code verification products and/or email verification code verification products. 根據申請專利範圍第1至6項中任意一項所述的方法,向所述用戶推送的核身產品的數量大於1。 According to the method described in any one of items 1 to 6 of the scope of the application, the number of core body products pushed to the user is greater than 1. 一種核身方法,所述方法包括:採用核身產品對用戶資訊進行核身;所述核身產品根據申請專利範圍第1至8項中任意一項所述的方法推送。 A verification method, the method comprises: using a verification product to verify user information; the verification product is pushed according to the method described in any one of items 1 to 8 in the scope of the patent application. 根據申請專利範圍第9項所述的方法,所述方法還包括:若向用戶推送的核身產品的數量大於1,當其中一種核身產品核身通過時,判定核身通過。 According to the method described in item 9 of the patent application scope, the method further includes: if the number of core products pushed to the user is greater than 1, when one of the core products has passed the core, determining that the core has passed. 一種核身產品推送裝置,所述裝置包括:確定模組,用於響應於用戶對核身流程的觸發,根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;驗證模組,用於若所述類別為核身安全性較低的第一類別,根據所述用戶基礎資訊獲取用戶對核身產品的接受度特徵,將所述接受度特徵輸入到預先訓練的第一分類模型,獲取所述用戶基礎資訊對應的驗證結果;其中,所述接受度特徵用於表徵用戶對所述第一類別的核身產品的接受程度;和獲取所述線上操作環境資訊中的高危環境特徵,將所述高危環境特徵輸入到預先訓練的第二分類模型,獲取所述線上操作環境資訊對應的驗證結果;和獲取所述歷史操作資訊中的高危操作特徵,將所述高危操作特徵輸入到預先訓練的第三分類模型,獲取所述歷史操作資訊對應的驗證結果;推送模組,用於若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 A device for pushing a core body product, the device comprising: a determination module, configured to respond to a user triggering a core body process, according to the user's user basic information, online operating environment information and historical operation information to determine the push to the user. The category of the core product; the verification module is used to obtain the user's acceptance feature of the core product according to the basic user information if the category is the first category with low core security, and use the acceptance level The feature is input into the pre-trained first classification model, and the verification result corresponding to the basic information of the user is obtained; wherein, the acceptance feature is used to represent the user's acceptance of the first category of the body product; and obtain all the high-risk environment features in the online operating environment information, input the high-risk environment features into the pre-trained second classification model, and obtain the verification results corresponding to the online operating environment information; and obtain the high-risk operations in the historical operation information feature, the high-risk operation feature is input into the pre-trained third classification model, and the verification result corresponding to the historical operation information is obtained; the push module is used for if according to the user basic information, online operating environment information and historical operation information The verification results obtained from the information are all verified, and the core body product of the first category is pushed to the user. 一種核身裝置,所述裝置包括:核身模組,用於採用核身產品對用戶資訊進行核身;所述核身產品根據申請專利範圍第1至8項中任意一項所述的方法推送。 A core body device, the device includes: a core body module, used for core body products to core body user information; the core body products are based on the method described in any one of items 1 to 8 in the scope of the patent application. push. 一種電腦可讀儲存媒體,其上儲存有電腦程式,所述程式被處理器執行時實現申請專利範圍第1至10項中任意一項所述的方法。 A computer-readable storage medium on which a computer program is stored, when the program is executed by a processor, implements the method described in any one of items 1 to 10 of the scope of the patent application. 一種電腦設備,包括儲存器、處理器及儲存在儲存器上並可在處理器上運行的電腦程式,所述處理器執行所述程式時實現申請專利範圍第1至10項中任意一項所述的方法。 A computer device, comprising a storage, a processor, and a computer program stored on the storage and running on the processor, when the processor executes the program, the processor implements any one of items 1 to 10 in the scope of the patent application. method described.
TW108120846A 2018-08-15 2019-06-17 Core product push and core method and system TWI751422B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810931250.5 2018-08-15
CN201810931250.5A CN109359972B (en) 2018-08-15 2018-08-15 Core body product push and core body method and system

Publications (2)

Publication Number Publication Date
TW202009834A TW202009834A (en) 2020-03-01
TWI751422B true TWI751422B (en) 2022-01-01

Family

ID=65350025

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108120846A TWI751422B (en) 2018-08-15 2019-06-17 Core product push and core method and system

Country Status (3)

Country Link
CN (2) CN112508568B (en)
TW (1) TWI751422B (en)
WO (1) WO2020034761A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112508568B (en) * 2018-08-15 2024-08-30 创新先进技术有限公司 Identity verification product push and identity verification method and system
CN110071915B (en) * 2019-04-10 2021-08-06 创新先进技术有限公司 An identity verification product push method, device, device and system architecture
CN110659466B (en) * 2019-09-26 2021-11-23 支付宝(杭州)信息技术有限公司 Method and device for processing encryption behavior
CN110795707A (en) * 2019-10-25 2020-02-14 支付宝(杭州)信息技术有限公司 Core body strategy recommendation method and device and electronic equipment
CN110879865B (en) * 2019-10-31 2022-08-12 支付宝(杭州)信息技术有限公司 Recommended method and apparatus for core body products
CN112084486A (en) * 2020-09-08 2020-12-15 中国平安财产保险股份有限公司 User information verification method, device, electronic device and storage medium
CN112966243B (en) * 2021-03-30 2022-09-09 支付宝(杭州)信息技术有限公司 Privacy-protected verification processing method and device
CN115767537B (en) * 2022-11-15 2023-10-17 南京鼎山信息科技有限公司 Permission processing method and device for short message verification code and computer equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200642408A (en) * 2004-12-07 2006-12-01 Farsheed Atef System and method for identity verification and management
US20090178144A1 (en) * 2000-11-13 2009-07-09 Redlich Ron M Data Security System and with territorial, geographic and triggering event protocol
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
US8572391B2 (en) * 2003-09-12 2013-10-29 Emc Corporation System and method for risk based authentication
CN105678544A (en) * 2015-12-31 2016-06-15 深圳前海微众银行股份有限公司 Risk monitoring method of remote account opening and server
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
TW201804397A (en) * 2016-07-22 2018-02-01 阿里巴巴集團服務有限公司 Risk control method and device for business operation

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8474018B2 (en) * 2010-09-03 2013-06-25 Ebay Inc. Role-based attribute based access control (RABAC)
CN103888255B (en) * 2012-12-21 2017-12-22 中国移动通信集团公司 A kind of identity identifying method, apparatus and system
KR101436404B1 (en) * 2013-02-15 2014-09-01 주식회사 안랩 User authenticating method and apparatus
CN104349313B (en) * 2013-07-23 2018-12-07 阿里巴巴集团控股有限公司 Service authorization method, device and system
US9331994B2 (en) * 2014-02-07 2016-05-03 Bank Of America Corporation User authentication based on historical transaction data
US9185101B2 (en) * 2014-02-07 2015-11-10 Bank Of America Corporation User authentication based on historical user behavior
CN104063150A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 Mobile terminal capable of entering corresponding scene modes by means of face recognition and implementation method thereof
WO2016049898A1 (en) * 2014-09-30 2016-04-07 华为技术有限公司 Method and apparatus for identity authentication and user equipment
US9684775B2 (en) * 2014-10-15 2017-06-20 Qualcomm Incorporated Methods and systems for using behavioral analysis towards efficient continuous authentication
CN104301117B (en) * 2014-10-22 2017-11-28 中国联合网络通信集团有限公司 Identity verify method and device
CN106295349B (en) * 2015-05-29 2020-06-05 阿里巴巴集团控股有限公司 Account stolen risk identification method, identification device and prevention and control system
CN106713241B (en) * 2015-11-16 2019-09-27 腾讯科技(深圳)有限公司 A kind of auth method, device and system
CN105704155B (en) * 2016-03-31 2018-11-09 广州华多网络科技有限公司 Information-pushing method and device
CN105933328B (en) * 2016-06-12 2017-07-18 北京三快在线科技有限公司 A kind for the treatment of method and apparatus of user access activity
CN106251214A (en) * 2016-08-02 2016-12-21 东软集团股份有限公司 account monitoring method and device
CN106899567B (en) * 2016-08-24 2019-12-13 阿里巴巴集团控股有限公司 User authentication method, device and system
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment
CN108076018A (en) * 2016-11-16 2018-05-25 阿里巴巴集团控股有限公司 Identity authentication system, method, device and account authentication method
CN107104973A (en) * 2017-05-09 2017-08-29 北京潘达互娱科技有限公司 The method of calibration and device of user behavior
CN107124420A (en) * 2017-05-10 2017-09-01 北京潘达互娱科技有限公司 Auth method and device
CN112508568B (en) * 2018-08-15 2024-08-30 创新先进技术有限公司 Identity verification product push and identity verification method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090178144A1 (en) * 2000-11-13 2009-07-09 Redlich Ron M Data Security System and with territorial, geographic and triggering event protocol
US8572391B2 (en) * 2003-09-12 2013-10-29 Emc Corporation System and method for risk based authentication
TW200642408A (en) * 2004-12-07 2006-12-01 Farsheed Atef System and method for identity verification and management
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN105678544A (en) * 2015-12-31 2016-06-15 深圳前海微众银行股份有限公司 Risk monitoring method of remote account opening and server
TW201804397A (en) * 2016-07-22 2018-02-01 阿里巴巴集團服務有限公司 Risk control method and device for business operation
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform

Also Published As

Publication number Publication date
WO2020034761A1 (en) 2020-02-20
CN112508568A (en) 2021-03-16
CN109359972B (en) 2020-10-30
CN112508568B (en) 2024-08-30
TW202009834A (en) 2020-03-01
CN109359972A (en) 2019-02-19

Similar Documents

Publication Publication Date Title
TWI751422B (en) Core product push and core method and system
US12010513B2 (en) Method for automatic possession-factor authentication
US11075942B2 (en) Identity verification and account information updating methods and apparatuses
US10868672B1 (en) Establishing and verifying identity using biometrics while protecting user privacy
EP3719678B1 (en) Identity verification method and apparatus
US10771471B2 (en) Method and system for user authentication
US12341771B2 (en) Context-based authentication of a user
CN107645482A (en) A kind of risk control method and device for business operation
US12079810B2 (en) Method for determining the likelihood for someone to remember a particular transaction
US11321449B2 (en) System for security analysis and authentication across downstream applications
CN109784031B (en) A kind of account identity verification processing method and device
US11575670B2 (en) Adaptive user authentication
CN110276178B (en) A risk control method, device and equipment based on identity verification
CN108876386B (en) Object authentication method and device, and transaction method and device based on object authentication
US12236430B2 (en) Biometrics-infused dynamic knowledge-based authentication tool
HK40049164B (en) Identity verification product pushing method, identity verification method, and systems
HK40049164A (en) Identity verification product pushing method, identity verification method, and systems
EP4075364A1 (en) Method for determining the likelihood for someone to remember a particular transaction
WO2023203543A1 (en) Method and system for determining at least one right associated with at least one given computing node
CN121304170A (en) Glasses payment method, device, glasses, equipment, storage medium and program product
Lai Intelligent online risk-based authentication using Bayesian network model
CN114444039A (en) A data model-based authentication method and terminal
CN119648227A (en) Transfer processing method, device, equipment, storage medium and program product

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees