[go: up one dir, main page]

WO2019084922A1 - Information processing method and system, server, terminal and computer storage medium - Google Patents

Information processing method and system, server, terminal and computer storage medium Download PDF

Info

Publication number
WO2019084922A1
WO2019084922A1 PCT/CN2017/109397 CN2017109397W WO2019084922A1 WO 2019084922 A1 WO2019084922 A1 WO 2019084922A1 CN 2017109397 W CN2017109397 W CN 2017109397W WO 2019084922 A1 WO2019084922 A1 WO 2019084922A1
Authority
WO
WIPO (PCT)
Prior art keywords
application client
user
data
terminal
server
Prior art date
Application number
PCT/CN2017/109397
Other languages
French (fr)
Chinese (zh)
Inventor
陈谦
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to PCT/CN2017/109397 priority Critical patent/WO2019084922A1/en
Priority to CN201780054468.0A priority patent/CN110402570B/en
Publication of WO2019084922A1 publication Critical patent/WO2019084922A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Definitions

  • the present invention relates to information processing technologies, and in particular, to an information processing method and system, a server, a terminal, and a computer storage medium.
  • Embodiments of the present invention provide an information processing method and system, a server, a terminal, and a computer storage medium.
  • An embodiment of the present invention provides an information processing method, where the method includes: obtaining, according to an account data request of a first application client, accessing a second application client, obtaining a first terminal from a first terminal including the first application client
  • the first message includes a user identity corresponding to the account data of the first application client; obtaining user credit data associated with the user identity, and sending the user credit data to include the a second terminal of the second application client, so that the second application client of the second terminal performs corresponding service logic based on the user credit data; the user credit data is used to represent the user identity identifier The probability that the end user will violate the predetermined rule.
  • the embodiment of the present invention further provides an information processing method, the method comprising: requesting access to a second application client by using the account data of the first application client, and obtaining a user corresponding to the account data of the first application client Credit data, the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; and based on the user credit data, the corresponding service logic is executed by the second application client.
  • the embodiment of the invention further provides an information processing method, the method comprising: requesting access to the second application client by using the account data of the first application client, the server obtaining the first from the first application client a first message of the terminal; the first message includes a user identity corresponding to account data of the first application client; the server obtains user credit data associated with the user identity, and the user credit Sending data to the second terminal including the second application client; the first terminal and the second terminal are the same or different; the user credit data is used to represent that the terminal user corresponding to the user identity violates a predetermined rule Probability; based on the user credit data, the second terminal executes corresponding service logic through the second application client.
  • the embodiment of the present invention further provides a server, the server includes: a first communication unit, a first obtaining unit, and a second communication unit; the first communication unit is configured to request based on an account data of the first application client Accessing the second application client, obtaining a first message from the first terminal that includes the first application client; the first message includes a user identity corresponding to the account data of the first application client; the first acquiring unit Configuring to obtain user credit data associated with the user identity; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; the second communication unit is configured to Transmitting the user credit data obtained by the first acquiring unit to a second terminal that includes the second application client, so that the second application client of the second terminal performs a corresponding service based on the user credit data. logic.
  • the embodiment of the present invention further provides a terminal, where the terminal includes: a third communication unit and an execution unit; the third communication unit is configured to access the second application client based on the account data of the first application client, User credit data corresponding to the account data of the first application client, the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; the execution unit is configured to be based on the third The user credit data obtained by the communication unit is executed by the second application client to execute corresponding service logic.
  • the embodiment of the present invention further provides a computer storage medium, where the computer instruction is executed, and when the instruction is executed by the processor, the step of applying the information processing method applied to the server according to the embodiment of the present invention is implemented; or the instruction is The steps of the information processing method applied to the terminal according to the embodiment of the present invention are implemented when the processor executes.
  • the embodiment of the present invention further provides a server, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the application according to the embodiment of the present invention.
  • the steps of the information processing method of the server are described in detail below.
  • the embodiment of the present invention further provides a terminal, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the application according to the embodiment of the present invention.
  • a terminal including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the application according to the embodiment of the present invention.
  • the steps of the information processing method of the terminal including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the application according to the embodiment of the present invention.
  • An embodiment of the present invention further provides an information processing system, where the system includes a server and a terminal, and the server is configured to request to access the second application client based on the account data of the first application client, where the server obtains the a first message of the terminal or another terminal of the first application client; the first message includes a user identity corresponding to the account data of the first application client; and is obtained by being associated with the user identity
  • User credit data the user credit data is sent to the terminal including the second application client; the user credit data is used to represent a probability that a terminal user corresponding to the user identity violates a predetermined rule;
  • the terminal is configured to execute the corresponding service logic by the second application client based on the user credit data.
  • FIG. 1 is a schematic diagram of an interaction process for logging in to a third-party application based on a main application authorization
  • FIG. 2 is a schematic structural diagram of a system for performing information interaction according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a first process of an information processing method according to an embodiment of the present invention.
  • FIG. 4 is a second schematic flowchart of an information processing method according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a third process of an information processing method according to an embodiment of the present invention.
  • 6a and 6b are respectively schematic diagrams showing an interaction process of an information processing method according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a structure of a server according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of another composition structure of a server according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a structure of a terminal according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of hardware components of a server according to an embodiment of the present invention.
  • FIG. 11 is a schematic diagram of a combination of software and hardware of a terminal according to an embodiment of the present invention.
  • Figure 1 is a schematic diagram of an interaction process for logging in to a third-party application based on the main application authorization; as shown in Figure 1, including:
  • Step 101 The main application client sends a login request to the third-party application client, where the login request is specifically used to log in to the third-party application client by using the account request of the main application client.
  • the login request includes a user identity, and the user identity may be a user identification (UID, User Identification) uniquely corresponding to the user account of the main application client.
  • UID User Identification
  • the user uses a browser application client to open a webpage
  • the webpage is an e-commerce page, or a multimedia playpage (such as a Tencent video page); the user needs to log in to the webpage.
  • the user needs to log in to the webpage.
  • the main application client corresponding to the icon of the main application initiates a login request to the browser application client as the third-party application client.
  • Step 102 The third-party application client requests a temporary identifier from the main application server corresponding to the main application client based on the login request of the main application client, and the temporary identifier may be a Universally Unique Identifier (UUID). Only valid for this request; or the temporary UUID is valid for a preset time range (for example, five minutes).
  • the request message may include a user identity of the primary application client; and the temporary identifier generated by the primary application server corresponds to the user identity of the primary application client.
  • Step 103 The main application server returns a temporary identifier to the third-party application client.
  • Step 104 The third-party application client generates a graphic code based on the temporary identifier and the application identifier (APP ID), and displays a graphic code, where the graphic code may be a QR Code (Quick Response Code), and the third-party application client
  • the terminal generates a two-dimensional code according to the obtained temporary UUID and its own application identification code and displays it.
  • Step 105 The third-party application client polls the main application server to obtain information about whether the user confirms the authorization, and the information carries the temporary identifier.
  • the step 104 and the step 105 do not distinguish the sequence, and the step 104 may be executed first.
  • step 105 step 105 may be performed first, and then step 104 may be performed.
  • Step 104 and step 105 may be performed at the same time.
  • the execution sequence is not limited in this embodiment.
  • Step 106 The main application client scans the graphic code displayed by the third-party application client, and obtains the temporary identifier and the application identifier carried by the graphic code.
  • the main application client has a graphic code scanning and reading function. After the function is activated, as an implementation manner, an image containing a graphic code is obtained by calling a camera to further identify a temporary identifier and an application identifier carried by the graphic code in the image. .
  • the main application client starts the graphic code scanning function, and calls the camera, so that the main application client displays the display interface including a scan box; when the camera collects the image data, the captured image is acquired.
  • the main application client scans the collected graphic code based on the graphic code scanning function, and obtains the temporary identifier and the application identifier carried by the graphic code.
  • the main application client has an optical character recognition (OCR) function, that is, directly identifying a character in an image including the graphic code, and further obtaining a temporary carried by the graphic code based on the recognized character. Identification and application identification.
  • OCR optical character recognition
  • Step 107 The main application client notifies the main application server, and the notification is used to request to log in to the third-party application by using the account of the main application client.
  • the notification message carries the temporary identifier, the application identifier, and the user identifier obtained by the scan, and the application identifier is The identity of the third-party application client.
  • Step 108 The main application server returns authorization information to the third-party application client based on the notification message, and carries an access token.
  • Step 109 The main application client confirms the authorization to the third-party application client.
  • the display interface of the main application client may display, for example, an “authorized” or “unauthorized” virtual button, and the user clicks the “authorize” virtual button, that is, determines
  • the main application client confirms the authorization to the third-party application client, and the third-party application client allows the login of the account of the main application client.
  • the user clicks the "unauthorized” virtual button it is determined that the main application client does not confirm the authorization to the third-party application client, and the third-party application client does not allow the login of the account of the main application client.
  • Step 110 After confirming the authorization, the third-party application client sends an information acquisition request to the main application server, where the information acquisition request includes information such as a temporary identifier, an access token, and an application identifier, and the main application server may be based on the information acquisition request.
  • the temporary identifier determines the user identity of the corresponding primary application client, obtains corresponding user information based on the user identity, and returns the user information to the third-party application.
  • the main application client and the third-party application client are client applications installed in the terminal device, and different client applications can provide different services after being activated; the main application server is a server corresponding to the client application client. .
  • the main application client can be one of the following application types: instant messaging application client, social application client, payment platform client,
  • the instant messaging application client can be, for example, a WeChat application, a QQ application, a Facebook application, or a Weibo application.
  • the main application client and the third-party application client can run in the same terminal device or in different terminal devices.
  • FIG. 1 includes: a server 11, a server 12, and a terminal device 21-23.
  • the terminal device 21-23 passes through a wired network or a wireless network and the server 11 Or the server 12 performs information interaction, and the terminal device includes a mobile phone, a tablet computer, a desktop computer, a notebook computer, and the like.
  • at least one of the terminal devices 21-23 can run the first application client and the second application client, that is, the first application client and the second application client can run in the same terminal device at the same time.
  • one of the terminal devices 21-23 can run the first application client, and the other terminal device can run the second application client, that is, the first application client and the second application client respectively Running in different terminal devices.
  • the server 11 and the server 12 are respectively the server to which the first application client belongs and the server to which the second application client belongs, and the application running by the terminal device can provide a corresponding service through information exchange between the terminal device and the server.
  • FIG. 1 is only a system architecture example for implementing the embodiment of the present invention.
  • the embodiment of the present invention is not limited to the system structure described in FIG. 1 above, and various embodiments of the present invention may be proposed based on the system architecture.
  • FIG. 3 is a schematic diagram of a first process of an information processing method according to an embodiment of the present invention; as shown in FIG. 3, the method includes:
  • Step 301 Acquire a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client, where the first message includes the first application client The user identity corresponding to the account data of the terminal.
  • Step 302 Obtain user credit data associated with the user identity, and send the user credit data to a second terminal including the second application client, so that the second terminal
  • the second application client executes corresponding service logic based on the user credit data; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule.
  • the information processing method is applied to the server, where the server may be the server to which the first application client belongs, that is, the first application client requests to access the second application client by using the account data of the first application client.
  • the first application client sends a first message to the server by using the first terminal, where the first message includes a user identity corresponding to the account data of the first application client; the user identity identifier may be the first application client The unique UID of the account data.
  • the requesting to access the second application client by using the account data of the first application client to obtain the first message from the first terminal including the first application client includes: based on the first terminal Obtaining, by the first application client, the identifier information that is sent by the second terminal by using the second application client, to obtain a first message from the first terminal, where the first message includes the user identity identifier And a temporary identifier assigned by the server.
  • the identification information is a graphic code, such as a two-dimensional code, a barcode, or the like.
  • the first terminal is the same or different, that is, the first application client and the second application client may be installed in the first terminal and the second terminal respectively, or may be installed in the same terminal.
  • the first operation client may display the input operation request for the identifier of the first application client in the display interface of the second application client.
  • the application client's account data is used to access the second application client.
  • the identifier of the displayed first application client may be an icon or a link of the displayed first application client, and the user triggers the icon or the link to request the first application client.
  • the account data access corresponds to the second application client.
  • the second application client After receiving the request, the second application client communicates with the server (that is, the server to which the first application client belongs) to obtain a temporary identifier assigned by the server, and the temporary identifier may be a UUID.
  • the second application client may be encoded
  • the method is configured to encode the temporary identifier to generate the identifier information, and output the identifier information.
  • the first application client identifies the identifier information, and obtains the temporary identifier included in the identifier information.
  • the second application client may encode the identifier by using the two-dimensional code.
  • the temporary identifier is encoded to generate two-dimensional code information, and the two-dimensional code information is displayed by the display component of the terminal; the first application client can identify the two-dimensional code information by using an OCR method, thereby obtaining a temporary identifier carried by the two-dimensional code information.
  • the terminal sends a first message to the server by using the first application client, where the first message includes a user identity corresponding to the account data of the first application client, and may further include the temporary identifier and the application identifier.
  • the application identifier is an application identifier corresponding to the second application client, so that the server returns the authorization information to the second application client of the terminal, and obtains corresponding user credit data according to the user identity, to the second terminal.
  • the application client returns user credit data.
  • the sending the user credit data to the second terminal that includes the second application client includes: accessing the first application client by using the account data in response to the obtained characterization confirmation authorization Sending the user credit data to the second application client by using an acknowledgement message of the application client.
  • the first terminal obtains the temporary identifier by using the identifier information output by the second application client by using the first application client, and the identifier is authorized to access the second application client by using the account data of the first application client.
  • the server sends a first message carrying the user identity to the server, and in response to the first message, the server sends the obtained user credit data associated with the user identity. To the second application client.
  • the server may receive an input operation for the “confirm authorization” function button, that is, the server receives the identifier that the first terminal determines to authorize to access the second application client with the account data of the first application client, and determines to obtain The acknowledgment confirms that the authorization message of the second application client is accessed by the account data of the first application client.
  • the server receives the first message from the first terminal, based on the information carried in the first message (including the temporary identifier, the second application client identifier, and the user identifier), sending the authorization information and the access token to the second terminal including the second application client, and the second terminal includes the confirmation according to the second application client output display
  • the user can determine that the authorization to access the second application client by using the account data of the first application client by clicking the “confirm authorization” function button, and then the second application client notifies the server after receiving the confirmation authorization indication.
  • the server sends the user credit data associated with the user identity to the second terminal based on the notification message indicating that the authorization is confirmed.
  • the second application client needs the user credit data from the server. Obtain the corresponding user credit data.
  • the user credit data may include at least one of the following data types: credit score, credit rating.
  • credit score the greater the credit score, or the higher the credit rating, the lower the probability that the corresponding terminal user violates the agreed rule, correspondingly, the smaller the credit score, or the lower the credit rating, indicating that the corresponding terminal user violates The greater the probability of a convention.
  • the server has a credit data calculation function, that is, the server can calculate and obtain user credit data through the collection of behavior data, and when the server receives the first message carrying the user identity, The user credit data set based on the self-storage is searched for, and the user credit data associated with the user identity is obtained.
  • the user credit data may be obtained by the credit service platform by collecting behavior data, and after obtaining the first message, the server performs information interaction with the credit service platform, and obtains, from the credit service platform, the user identity identifier. User credit data.
  • the server when the first application client requests to access the second application client by using the account data of the first application client, the server sends the user credit corresponding to the account data to the second application client.
  • the data enables the second application client to execute the corresponding service logic based on the user credit data, and implements a corresponding service based on the probability of violating the predetermined rule, thereby reducing the probability that the user who has a high probability of not complying with the predetermined rule is in the process of acquiring the service.
  • Increased probability of occurrence of security issues such as information disclosure or attacks on the service platform Service delivery and service platform security and reliability.
  • FIG. 4 is a second schematic flowchart of an information processing method according to an embodiment of the present invention; as shown in FIG. 4, the method includes:
  • Step 401 Collect behavior data corresponding to account data, and the behavior data includes online behavior data and offline behavior data based on the Internet.
  • the account data is the account data of the first application client.
  • Step 402 Acquire a first feature variable of the account data according to the behavior data, where the first feature variable is used to represent a behavior feature of the account data.
  • Step 403 Input the first feature variable into a data analysis model to obtain user credit data, where the data analysis model is configured to output user credit data according to the first feature variable.
  • Step 404 Acquire a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client; the first message includes the first application client The user ID of the account data of the end.
  • Step 405 Obtain user credit data associated with the user identity, and send the user credit data to a second terminal that includes the second application client, so that the second application client of the second terminal Performing corresponding service logic based on the user credit data; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule.
  • the first feature variable is used to represent the behavior characteristic of the account data, and the behavior characteristic of the account data is obtained based on the behavior data of the account data based on the Internet, and then the first feature variable is input into the data analysis model to obtain the account data.
  • the probability value that the behavior does not satisfy the preset condition. Since the behavior data of the account data in the social application can widely cover the behavior of the account data, the behavior data input into the data analysis model can fully reflect the behavior of the account data, so that the behavior of the analyzed account data is not satisfied. It is more accurate to set the probability value of the condition.
  • the behavior data includes online behavior data and offline behavior data of the account data based on the Internet.
  • Internet online behavior data includes but is not limited to:
  • User's basic demographic attribute information such as name, age, gender, region, education, occupation, etc.
  • Virtual value-added service data such as virtual account role dressing, game item purchase, film and television membership service, cloud storage space value-added service, music flow package, etc.
  • Economic behavior data such as payment, wealth management, shopping, stocks, funds, P2P, finance, etc.
  • the online data can be obtained through the user's mobile phone, tablet or PC computer instant messaging application, game client, APP download platform, financial platform, shopping software, etc. to collect the information filled by the user or the application is actively reported.
  • Offline behavior data includes but is not limited to:
  • wear device data such as medical health, sports, etc.
  • LBS location based service
  • location based service geographic location data, such as navigation, check-in, special car, etc.
  • Travel data such as ticket ordering, hotel reservations, etc.
  • behavioral data includes actions in a variety of online and offline scenarios, including life.
  • the behavioral data of all aspects therefore, the probability values obtained from these behavioral data also more accurately reflect the true probability value of the account.
  • the behavior data changes, it will be immediately fed back to the server or instantly obtained by the server. Therefore, the behavior data is updated quickly, and the probability value obtained according to the behavior data of the instant update can reflect that the current behavior of the account data does not satisfy the preset.
  • the probability of the condition may be a probability of default, such as non-compliance with the contracted behavior.
  • the account chat behavior of the user A in the instant messaging application may be collected.
  • Extracting the first feature variable from the behavior data separately can obtain the first feature variable of different categories.
  • the first feature variable of the instant communication class, the first feature variable of the video class, and the first feature variable of the download class all of the first feature variables of the different classes are input into the data analysis model, and the first value is output. It is also possible to input portions of the first characteristic variables of different classes into the data analysis model.
  • the friend of the user A has a similarity with the user A, and the behavior data of the friend of the user A can also reflect the probability that the behavior of the user A does not satisfy the preset condition. Therefore, when the first feature variable is input to the data analysis model, the feature variable associated with the friend of the user A can also be input at the same time.
  • the inputting the first feature variable into the data analysis model includes: acquiring a second feature variable, wherein the second feature variable is used to represent behavior of a plurality of other account data having an association relationship with the account data. Characterizing; inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to output the first feature variable and the second feature variable User credit data.
  • the method for obtaining the second feature variable is the same as the method for obtaining the first feature variable, and is described in detail later.
  • the account data having the associated relationship and the plurality of other account data are friend relationships, and can be understood as a plurality of other account data being friends of the account data.
  • Online behavior in the above example Both the offline behavior and the offline behavior can be mapped to the behavior of an application account through a certain correspondence.
  • other account data uses the mobile phone number to register the navigation service and the instant messaging application, and when acquiring behavior data of other account data, collect behavior data of other account data in the navigation service, and behavior of other account data in the instant communication application. data.
  • Entering the first feature variable and the second feature variable into the data analysis model includes: acquiring intimacy between the plurality of other account data and the account data, wherein the intimacy is generated according to an interaction behavior of each of the other account data and the account data;
  • the third feature variable is obtained from the intimacy and the second characteristic variable using the following formula:
  • ⁇ ' f(( ⁇ 1 , ⁇ 2 ,..., ⁇ i ,..., ⁇ n ),( ⁇ 1 , ⁇ 2 ,..., ⁇ i ,..., ⁇ n )),
  • ⁇ ' represents the third characteristic variable
  • i represents the i-th other account data
  • ⁇ i is the intimacy of the i-th other account data and the account data
  • ⁇ i is the second characteristic variable of the i-th other account data
  • f is a weighted average of the second characteristic variable and the intimacy of the first n other account data in order to indicate the high to low intimacy
  • the first feature variable and the third feature variable are input to the data analysis model.
  • the second feature variable of the other account data is processed to make it more representative of the behavior characteristics of the account data. Therefore, when the second variable is acquired, each second characteristic variable is multiplied by the corresponding weight value, and then the weighted average is performed.
  • the weight value indicates the intimacy of the account data and other account data. The closer the account data is to the other account data, the greater the weight value; conversely, the smaller the weight value. Intimacy can be measured by the interaction between account data and other account data. For example, the more chats between account data and other account data, the more intimate the relationship. The higher the degree of overlap between the account data and the other account data, the more intimate the relationship between the two account data. The intimacy and coincidence can be obtained by means of a training model.
  • Interactive behaviors include interactions in the circle of friends, payment interactions (such as red envelopes), and sports interactions (such as walking 10,000 steps).
  • Intimacy can be reflected by the above information interaction, including the number of times the information is sent and received, the number of days, etc., as well as the ratio of sending and receiving information, the number of times of information interaction every day.
  • This information includes text Information, video information and voice information.
  • Intimacy can also be obtained by commenting, praising, marking a friend as a special friend, giving a gift, or pulling black.
  • the third characteristic variable That is, the intimacy is a weighted average of the second characteristic variable and the intimacy of the top 10 friends arranged in order of intimacy.
  • the general characteristics of a group can reflect the characteristics of a certain user in this group. Therefore, the probability value of the behavior that does not satisfy the preset condition can be obtained according to the characteristics of a group, and the credit degree of the user can be more accurately reflected. It should be noted that, when acquiring the second feature variable of the plurality of second accounts, first selecting the intimacy ranking top n other account data according to the intimacy of the account data and the account data, and then according to the intimacy and the first The second feature variable generates a third feature variable.
  • the abnormal data may be data that is obviously beyond a certain range. For example, the normal person's age does not exceed one hundred. If the collected data shows that the age is 100, the abnormal data is deleted. If the collected data shows that the age includes 0 and 49, 0 and 49 are in the range of 0 to 100, however, most of the other data are between 18 and 45, so 0 and 49 belong to the singular point with a large fluctuation value.
  • behavioral data is divided into multiple dimensions based on data sources and business characteristics. For example, basic information, social interaction, financial management, etc., are classified and integrated into the database.
  • basic information, social interaction, financial management, etc. are classified and integrated into the database.
  • the above basic attributes, social interaction behavior, purchase behavior, taxi behavior and friend attributes can all reflect the behavior characteristics of the account data.
  • acquiring the first feature variable of the account data according to the behavior data includes: acquiring an information gain of the feature in the behavior data, the information gain is used to represent the amount of information included in the behavior data; and determining whether the information gain is at a preset value Within the range; if the information gain is within the preset value range, the derived variable is constructed according to the behavior data, wherein the derived variable is the merged or split behavior data; if the information gain is outside the preset value range, the delete is at The feature corresponding to the information gain outside the preset numerical range is used, and then the derived variable is constructed according to the remaining features; the derived variable is taken as the first characteristic variable.
  • deleting the feature corresponding to the information gain outside the preset value range, and then constructing the derivative variable according to the remaining features includes: acquiring the remaining feature after deleting the feature corresponding to the information gain outside the preset value range The correlation coefficient; the feature whose correlation coefficient is greater than or equal to the preset coefficient is merged into one merge feature; the merged feature is taken as the derivative variable.
  • the collected behavior data including the number of text chats, the number of voice calls, the amount of payment, etc., are all characteristics in the behavior data. For example, text chat 9 times, voice call 10 times and payment amount 100, the numbers are called feature values.
  • the information gain can reflect the amount of information of a feature. If the amount of information is less than the threshold, the feature can be deleted. For example, the information gain is sorted for each type of feature, and the feature with the information gain less than the threshold is deleted. Then, the correlation of the remaining features is detected. If there are more relevant features, the features with stronger correlation are combined to obtain the first feature variable. If a feature is weakly correlated and highly significant, then this feature can be refined into multiple features. For example, split the number of chats into evening chats, daytime chats, weekend chats, and weekday chats. Conversely, you can combine night chats and day chats into chats.
  • the behavior data can be flexibly split and merged to construct the first feature variable, and when splitting and merging, the same or different methods can be used for multiple features (for example, some features adopt the principal component)
  • the analysis method and other features using clustering methods, etc.) increase the flexibility of constructing the first feature variable.
  • the method before inputting the first feature variable and the second feature variable to the data analysis model, the method further includes: dividing the behavior data into a plurality of categories; respectively establishing one sub-category for each of the plurality of categories a model, wherein each sub-model is configured to output a first sub-value according to the first feature variable and/or the second feature variable, wherein the first sub-value is used to indicate that the account data does not behave under the category corresponding to the sub-model A probability value that satisfies a preset condition; a plurality of sub-models corresponding to the plurality of categories are constructed as a data analysis model.
  • each of the categories may be classified according to the classification of the behavior data.
  • the category corresponds to generate a sub-model, each sub-model can output a first sub-value, and the first sub-values are processed to obtain the first value output by the data analysis model.
  • the sub-model may be trained according to the sample data of each category, and each category may be further divided, and a low-level model is established for the divided data, and multiple low-level models are constructed. Sub-model, and then sub-models constitute data points Analysis of the model.
  • respectively establishing a sub-model for each of the plurality of categories includes: respectively establishing a sub-model for each category by using the same or different training models; or using the same or different training models for each
  • the subcategories under the categories establish a low-level model, and the low-level models corresponding to the multiple subcategories under each category are constructed as sub-models.
  • the training models used to build sub-models in each category can be the same or different. For example, among the 10 categories, 5 categories use the decision tree training model, and the other 5 use the neural network training sub-model.
  • constructing the plurality of sub-models corresponding to the plurality of categories into the data analysis model comprises: constructing the plurality of sub-models into the data analysis model in the following manner:
  • P is the first value
  • i is the i-th sub-model of the plurality of sub-models
  • n is the number of the plurality of sub-models
  • P i ' is the first sub-value output of the i-th sub-model
  • P 0 is a constant feature
  • the dividing the behavior data into multiple categories includes: dividing the behavior data into multiple categories according to the service type included in the behavior data; or dividing the data including the target object in the behavior data into one category, and not including the behavior data.
  • the data of the target object is divided into another category.
  • the three division methods may use any one of them to separately construct the sub-model, or may construct the sub-model by any two or three combinations. For example, first establish a sub-model according to whether or not the target object is divided, and then divide the sub-model below the sub-model according to the business type.
  • the sub-services mainly refer to the previous data categories, such as basic information, value-added services, social interactions, economic behaviors, etc.; grouping is mainly based on business characteristics. For example, in economic activities, there are credit cards and users without credit cards in payment, shopping, wealth management, etc. Behavioral performance varies widely, so The model is divided into two groups to build the model separately; the layering is mainly at the level of the entire model architecture. For example, the sub-model layer can also be divided into multiple dimension layers. The machine learning algorithm used in each layer can be completely different. .
  • the foregoing steps 404 to 405 respectively correspond to the steps 301 to 302 in the foregoing embodiment. Therefore, those skilled in the art can understand the above steps 404 to 405 by referring to the foregoing embodiments, so as to save The length is not repeated here.
  • the user credit data is accurately obtained; on the other hand, when the first application client requests to access the second application client by using the account data of the first application client, Transmitting, by the server, the user credit data corresponding to the account data to the second application client, so that the second application client can execute the corresponding service logic based on the user credit data, thereby implementing the corresponding service based on the probability of violating the predetermined rule, thereby reducing the service.
  • the probability of occurrence of security problems such as information leakage or attacks on the service platform caused by users who do not follow the predetermined rules in the process of obtaining services improves the security and reliability of the service provision and service platform.
  • FIG. 5 is a schematic diagram of a third process of an information processing method according to an embodiment of the present invention; as shown in FIG. 5, the method includes:
  • Step 501 The user is requested to access the second application client by using the account data of the first application client, where the terminal obtains user credit data corresponding to the account data of the first application client, where the user credit data is used to represent the user identity identifier. The probability that the corresponding end user violates the predetermined rule.
  • Step 502 Based on the user credit data, the terminal executes corresponding service logic by using the second application client.
  • the information processing method is applied to the terminal, and the terminal may be a terminal device running the second application client, or a terminal device capable of running the first application client and the second application client.
  • the user accesses the second application client based on the account data of the first application client, and the terminal obtains the user credit data corresponding to the account data of the first application client, including: based on the terminal or The other terminal requests to access the second application client by using the account data of the first application client, and the terminal requests and obtains the temporary identifier from the server through the second application client, and outputs the identifier information including the temporary identifier.
  • the server is a server corresponding to the first application client; and the identifier is read by the first application client based on the terminal or the another terminal, and based on the terminal or the another terminal Requesting, by the server, accessing the second application client by using the account data of the first application client, where the terminal obtains user credit data corresponding to the account data from the server by using the second application client .
  • the identification information is a graphic code, such as a two-dimensional code, a barcode, or the like.
  • the terminal can run the first application client and the second application client.
  • the display interface of the second application client can detect the first application client.
  • the input operation request of the identifier accesses the second application client by using the account data of the first application client, that is, the terminal sends the login request message to the second application client through the interface between the first application client and the second application client.
  • the second application client After receiving the login request message, the second application client communicates with the server (that is, the server to which the first application client belongs) to obtain a temporary identifier, which may be a UUID; as an implementation manner, the second application client may
  • the temporary identifier is encoded by the encoding method to generate the identification information, and the identification information is displayed by the display component of the terminal.
  • the first application client identifies the identifier information, and obtains the temporary identifier included in the identifier information.
  • the second application client may The temporary identifier is encoded by the two-dimensional code encoding to generate the two-dimensional code information, and the terminal can display the two-dimensional code information by using the display component; the first application client can identify the two-dimensional code information by using an OCR method, thereby obtaining the second The temporary identifier carried by the dimension code information.
  • the terminal sends a first message to the server by using the first application to the client, where the first message includes a user identity corresponding to the account data of the first application client, and may further include the temporary identifier and the application identifier (the application identifier) An application identifier corresponding to the second application client, so that the server returns the authorization information to the second application client of the terminal, and obtains corresponding user credit data according to the user identity, to the second application client of the second terminal. The user returns the user credit data.
  • the terminal obtains user credit data corresponding to the account data of the first application client from a server (specifically, the server to which the first application client belongs), and the user credit data is used to represent the user corresponding to the account data.
  • the user credit data may include at least one of the following data types: credit score, credit rating.
  • the violation of the predetermined rules here includes two categories: the first category, requesting the user to actively perform a violation operation as a breach of contract, for example, clicking on a movie without copyright in an application; and second, the user does not perform the predetermined rule definition. Obligations, for example, the user’s overdue payment, etc., is not a breach of contract.
  • the credit score may be a comprehensive score of various data according to historical behavior data of the user using the service, or may be an initial score based on the personal attribute, or may be based on the current application scenario sent when the service request is sent. Single credit score.
  • the terminal or another terminal sends a notification message to the server when the first application client confirms the authorization to access the second application client by using the account data of the first application client. And, based on the notification message, the terminal obtains user credit data returned by the server and associated with the account data by using the second application client.
  • the terminal or another terminal accesses the second application client by using the account data of the first application client by using the first application client confirmation request, that is, the terminal or another terminal passes the first application client.
  • the terminal sends a notification message to the server, and based on the notification message, the terminal obtains user credit data associated with the account data from the server through the second application client.
  • the terminal executes corresponding service logic based on the user credit data by the second application client, where the service logic is an operation and/or an operation sequence performed in response to the access request.
  • the service logic is an operation and/or an operation sequence performed in response to the access request.
  • user A has a low credit score and is a high-probability default user.
  • the terminal can perform masking logic through the second application client. When the masking logic is executed, the second application client does not respond to the user's access request. And further it is possible to output notification information characterizing that no service is provided.
  • user B has a high credit score and is a low-probability user who violates the predetermined rule.
  • the second application client directly responds to the user B's access request based on the account data of the first application client, and provides user B with the required request. Service.
  • the method further includes: obtaining, according to the user credit data and the label distribution logic, a user label of the account data, wherein the user label is used to represent the account data to obtain a service range;
  • the user tag includes at least a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the first range.
  • the user of the second type is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range, wherein the first range is different from the second range; And executing, by the user credit data, corresponding service logic of the second application client corresponding to the requested access, including at least one of: performing service logic corresponding to the first type of user label, shielding And corresponding to the second application client access request or partial response access request; performing corresponding to the second type of user tag Service logic, some or all of the response to the access request for the second client application.
  • the terminal through the second application client, will give the user label of the current access request according to the user credit data and the label distribution logic.
  • the tag distribution logic is a decision rule for assigning a user tag to a user based on user credit data.
  • the label distribution logic may include a mapping table, where the mapping table includes a correspondence between user credit data and a corresponding user label, and the terminal may obtain, by using the second application client, the user credit data according to the correspondence relationship.
  • Corresponding user tag may include a plurality of types, for example, the user tags may be: a promised user and a non-observant user.
  • each of the types of user tags can also be divided into a plurality of sub-category user tags.
  • the user tags that can be generated may include: "yellow cattle", “first class ordinary users” and "second class ordinary users”.
  • yellow cattle (yellow cattle refer to the purchase of materials or ticketing vouchers sold at a high price to some people of Tuli)" has the lowest credit score and the highest probability of violating the predetermined rules.
  • the "first class of ordinary users” correspond to low credit scores, and there are defaults such as refunds.
  • the second type of ordinary users has the highest credit score and never has a refund.
  • the "yellow cattle" and the “first type of ordinary users” may be sub-category user tags of the first type of user tags; the "second class of ordinary users” are the second class of users. The subclass user tag of the tag.
  • the user tag may further include: a guarantor user; the guarantor user may be a user who has paid a security deposit in advance, and if the user defaults, the user's credit is provided by a prepaid security guarantee. May be very high, then another subclass of the second type of user tag.
  • the user label includes at least a first type of user label and a second type of user label, wherein the first type of user label is used to indicate that the probability that the requesting user violates the predetermined rule is located in the first range.
  • the second type of user tag is used to indicate that the probability that the requesting user violates the predetermined rule is located in a second range of users, wherein the first range is different from the second range.
  • the user label includes at least a first type of user label. Sign and the second type of user tag.
  • the first type of user tag herein can be a user who has a very high probability of not complying with the predetermined rules.
  • the second type of user is a user who complies with the predetermined rule.
  • the user is divided into two categories, and in the specific implementation process, it may not be limited to two categories.
  • the terminal After the user tag is determined in this embodiment, the terminal performs the service logic corresponding to the user tag through the second application client.
  • a service can be provided normally for a compliance user, and a service or only a partial service may be provided for a non-compliant user.
  • the terminal performs service logic corresponding to the first type of user label through the second application client, and blocks the service request or partially responds to the service request. If the user tag of the current requesting user is the first type of user tag, the service request of the user may be blocked, and the second application client of the terminal does not provide the service to the requesting user, and the user obtains the service range of zero at this time.
  • the user tag is a user of the first type of user tag, requesting to query information of other users, and the information requested to be queried includes sensitive information and non-sensitive
  • the information, the partial response to the service request herein may include: a query request that only responds to the non-sensitive information, and the query request for the sensitive information is masked.
  • the terminal performs, by the second application client, service logic corresponding to the second type of user tag, and partially or completely responds to the service request.
  • the server when the second application client is requested to access the second application client by using the account data of the first application client, the server sends the user credit data corresponding to the account data to the second application client of the terminal, so that The second application client of the terminal may perform corresponding service logic based on the user credit data, so that the terminal may provide a corresponding service based on the probability of violating the predetermined rule, thereby reducing the probability that the user with high probability of not complying with the predetermined rule acquires the service.
  • the probability of occurrence of security problems such as information leakage or attacks on the service platform increases the security and reliability of the service delivery and service platform.
  • the embodiment of the invention also provides an information processing method.
  • the method includes:
  • Step 1 based on requesting access to the second application client by using the account data of the first application client, the server obtains a first message from the first terminal including the first application client; the first message includes a corresponding message The user identity of the account data of the first application client.
  • Step 2 The server obtains user credit data associated with the user identity, and sends the user credit data to a second terminal including the second application client; the user credit data is used to represent the The probability that the end user corresponding to the user identity violates the predetermined rule.
  • Step 3 Based on the user credit data, the second terminal executes corresponding service logic by using the second application client.
  • FIG. 6 is a schematic diagram of an interaction process of an information processing method according to an embodiment of the present invention. As shown in FIG. 6a, the method includes:
  • Step 601 The main application client sends a login request to the third-party application client, where the login request is specifically used to log in to the third-party application client by using the account request of the main application client.
  • the login request includes a user identity, and the user identity may be a UID uniquely corresponding to an account of the main application client.
  • the user uses a browser application client to open a webpage
  • the webpage is an e-commerce page, or a multimedia playpage (such as a Tencent video page); the user needs to log in to the webpage.
  • the user needs to input more information content to register and enter the user name and password to log in, configure one or more icons of the main application in the login area of the page, such as QQ application icon, WeChat application icon, etc. So that users can log in to the webpage using the account of the existing main application.
  • the main application client corresponding to the icon of the main application is used as a third-party application client.
  • the browser application client of the end initiates a login request.
  • Step 602 The third-party application client requests a temporary identifier from the main application server corresponding to the main application client according to the login request of the main application client, where the temporary identifier may be a temporary UUID, and the temporary UUID is valid only for the request; or a temporary UUID Valid for a preset time range (for example, five minutes).
  • the request message may include a user identity of the primary application client; and the temporary identifier generated by the primary application server corresponds to the user identity of the primary application client.
  • Step 603 The main application server returns a temporary identifier to the third-party application client.
  • Step 604 The third-party application client generates a graphic code based on the temporary identifier and the application identifier (APP ID), and displays a graphic code, where the graphic code may specifically be a two-dimensional code, and the third-party application client according to the obtained temporary UUID and itself
  • the application identification code generates a QR code and displays it.
  • Step 605 The third-party application client polls the main application server to obtain information about whether the user confirms the login, and the information carries the temporary identifier.
  • the step 604 and the step 605 do not distinguish the sequence, and the step 604 is performed first.
  • step 605 may be performed first, and then step 604 may be performed.
  • Step 604 and step 605 may be performed at the same time.
  • the execution sequence is not limited in this embodiment.
  • Step 606 to step 607 The main application client scans the graphic code displayed by the third-party application client, and obtains the temporary identifier and the application identifier carried by the graphic code.
  • the main application client has a graphic code scanning and reading function. After the function is activated, as an implementation manner, an image containing the identification information is obtained by calling the camera to further identify the temporary identifier and the application identifier carried by the graphic code in the image. .
  • the main application client starts the graphic code scanning function, and calls the camera, so that the main application client displays the display interface including a scan box; when the camera collects the image data so that the collected graphic code is in the scan frame, the main application client The terminal scans the collected graphic code based on the graphic code scanning function, and obtains the temporary identifier and the application identifier carried by the graphic code.
  • the main application client has an OCR function, that is, directly identifying a character in an image including a graphic code, and further obtaining a temporary identifier carried by the graphic code based on the recognized character. And application identification.
  • Step 608 The main application client notifies the main application server, and the notification is used to request to log in to the third-party application by using the account of the main application client, where the notification message carries the temporary identifier, the user identity, and the application identifier obtained by the scan, and the application identifier is The identity of the third-party application client.
  • Step 609 The main application server returns authorization information to the third-party application client based on the notification message, and carries an access token.
  • Step 610 The third-party application client requests confirmation authorization from the main application client.
  • the display interface based on the main application client may display, for example, an “authorized” or “unauthorized” virtual button, so that the user confirms the authorization by clicking the “authorize” virtual button, or the user confirms by clicking the “unauthorized” virtual button.
  • Authorization may display, for example, an “authorized” or “unauthorized” virtual button, so that the user confirms the authorization by clicking the “authorize” virtual button, or the user confirms by clicking the “unauthorized” virtual button.
  • Step 611 The main application client confirms the authorization to the third-party application client, that is, the user clicks the “authorize” virtual button, and determines that the main application client confirms the authorization to the third-party application client, and the third-party application client allows the use of the main application client. Account login.
  • Step 612 After confirming the authorization, the third-party application client requests the main application server to obtain the user information, where the request includes the temporary identifier, the access token, the application identifier, and the like, and the main application server may determine the corresponding identifier based on the temporary identifier in the request.
  • the user identity of the main application client obtains the user information corresponding to the user identity based on the user identity, and returns the user information to the third-party application client.
  • Step 613 The main application client logs in to the third-party application client by using the account of the main application client.
  • Step 614 The third-party application client requests user credit data from the main application server, and the request may include information such as a temporary identifier, an access token, and an application identifier.
  • Step 615 The primary application server determines a user identity of the corresponding primary application client based on the temporary identifier in the request, and obtains corresponding user credit data based on the user identity, such as user credit rating and/or user credit score. . Further, the main application service The device may further perform a recognition judgment based on the user credit data, and determine whether the user credit data indicates that the terminal user corresponding to the user identity identifier has a higher probability of violating the predetermined rule, for example, the terminal user corresponding to the lower-ranking or lower-level user credit data violates The probability of the predetermined rule is high; when it is determined that the user credit data represents a higher probability that the terminal user corresponding to the user identity violates the predetermined rule, the main application server may generate prompt information, and the prompt information indicates that the terminal user has a higher probability of violating the predetermined rule. Providing services has certain risks.
  • Step 616 The main application server sends the user credit data to the third-party application client, so that the third-party application client executes the corresponding logic based on the user credit data; or the main application server sends the prompt information to the third-party application client.
  • the prompt information indicates that the terminal user has a high probability of violating the predetermined rule, and providing the service has a certain risk.
  • Step 617 The third-party application client executes corresponding service logic based on the user credit data, for example, all responding or partially responding to the access request, or blocking the access request. Alternatively, the third party application client blocks the access request based on the received prompt information, or partially responds to the access request.
  • step 601 to step 608 may refer to the related description in FIG. 6a, and details are not described herein again.
  • the method further includes:
  • Step 609 ′ The main application server determines the user identity of the corresponding main application client based on the temporary identifier carried in the notification request in step 608, and obtains corresponding user credit data based on the user identity, such as user credit level and / or user credit points. Further, the main application server may further perform identification determination based on the user credit data, and determine whether the user credit data indicates that the terminal user corresponding to the user identity identifier has a higher probability of violating the predetermined rule, such as user credit data with lower score or lower rank.
  • the probability that the corresponding terminal user violates the predetermined rule is high; when it is determined that the user credit data represents that the terminal user corresponding to the user identity identifier has a high probability of violating the predetermined rule, the main application server may generate prompt information, and the prompt information indicates that the terminal user violates the predetermined schedule.
  • the probability of a rule is high, and providing a service has certain risks.
  • Step 610' the main application server returns to the third-party application client based on the notification message.
  • Step 611' The third-party application client requests confirmation authorization from the main application client.
  • the display interface based on the main application client may display, for example, an “authorized” or “unauthorized” virtual button, so that the user confirms the authorization by clicking the “authorize” virtual button, or the user confirms by clicking the “unauthorized” virtual button.
  • Authorization may display, for example, an “authorized” or “unauthorized” virtual button, so that the user confirms the authorization by clicking the “authorize” virtual button, or the user confirms by clicking the “unauthorized” virtual button.
  • Step 612 ′ The main application client confirms the authorization to the third-party application client, that is, the user clicks the “authorize” virtual button to determine that the main application client confirms the authorization to the third-party application client, and the third-party application client allows the main application client to be used.
  • the account number of the end is logged in.
  • Step 613 ′ After confirming the authorization, the third-party application client requests the main application server to obtain the user information, where the request includes the temporary identifier, the access token, the application identifier, and the like, and the main application server may determine the corresponding identifier based on the temporary identifier in the request.
  • the user identity of the primary application client based on the user identity, obtains the user information corresponding to the user identity, and returns the user information to the third-party application client.
  • Step 614' The main application client logs in to the third-party application client with the account of the main application client.
  • Step 615' The third party application client executes the corresponding service logic based on the user credit data, for example, all responding or partially responding to the access request, or masking the access request. Alternatively, the third party application client blocks the access request based on the received prompt information, or partially responds to the access request.
  • FIG. 7 is a schematic structural diagram of a server according to an embodiment of the present invention.
  • the server includes: a first communication unit 71, a first obtaining unit 72, and a second communication unit 73;
  • the unit 71 is configured to obtain a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client, where the first message includes the first application client a user identity corresponding to the account data of the terminal;
  • the first obtaining unit 72 is configured to obtain User credit data associated with the user identity; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule;
  • the second communication unit 73 is configured to The user credit data obtained by the obtaining unit 72 is sent to the second terminal including the second application client, so that the second application client of the second terminal executes the corresponding service logic based on the user credit data.
  • the second communication unit 73 is configured to send the user credit data in response to the obtained characterization confirmation that the account information of the first application client accesses the confirmation message of the second application client. To the second application client.
  • the first communication unit 71 is configured to: according to the first terminal, read, by the first application client, identifier information that is output by the second terminal through the second application client. Obtaining a first message from the first terminal, the first message including the user identity and the assigned temporary identity.
  • FIG. 8 is a schematic structural diagram of another configuration of a server according to an embodiment of the present invention.
  • the server further includes an acquiring unit 74 and a second acquiring unit 75.
  • the method is configured to collect behavior data corresponding to the account data, where the behavior data includes online behavior data and offline behavior data based on the Internet; and the second obtaining unit 75 is configured to collect according to the collection unit 74.
  • the second acquiring unit 75 is configured to acquire a second feature variable, where the second feature variable is used to indicate behavior characteristics of a plurality of other account data that are associated with the account data; Inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to output the user according to the first feature variable and the second feature variable Credit data.
  • the second obtaining unit 75 is configured to divide the behavior data into a plurality of categories; and respectively establish a sub-model for each of the plurality of categories, wherein each sub-model is used for Outputting a first sub-value according to the first feature variable and/or the second feature variable, wherein the first sub-value is used to indicate behavior of the account data under a category corresponding to the sub-model A probability value that does not satisfy the preset condition; and a plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model.
  • the first obtaining unit 72, the collecting unit 74, and the second obtaining unit 75 in the server may be used by a central processing unit (CPU) in the server and a digital number in the actual application.
  • a DSP Digital Signal Processor
  • MCU Microcontroller Unit
  • FPGA Field-Programmable Gate Array
  • the unit 73 can be implemented in a practical application by a communication module (including: a basic communication suite, an operating system, a communication module, a standardized interface, a protocol, etc.) and a transceiver antenna.
  • server provided by the foregoing embodiment performs information processing
  • only the division of each of the foregoing program modules is illustrated.
  • the foregoing processing may be performed by different program modules, that is, the server.
  • the internal structure is divided into different program modules to perform all or part of the processing described above.
  • the server and the information processing method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • FIG. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the terminal includes: a third communication unit 81 and an execution unit 82.
  • the third communication unit 81 is configured to be based on The account data of the application client accesses the second application client, and obtains user credit data corresponding to the account data of the first application client, where the user credit data is used to represent that the terminal user corresponding to the user identity violates a predetermined rule. Probability; the execution unit 82 is configured to obtain based on the third communication unit 81 The user credit data is executed by the second application client to execute corresponding service logic.
  • the executing unit 82 is further configured to obtain a user label of the account data according to the user credit data and the label distribution logic, wherein the user label is used to represent the account data to obtain a service range.
  • the user tag includes at least a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate that the terminal user corresponding to the account data violates the predetermined rule.
  • the user identifier of the second type is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range, wherein the first range is different from the first a second scope; configured to execute a corresponding service logic based on the user credit data, including at least one of: performing service logic corresponding to the first type of user tag, masking an access request or partially responding to the access request; performing and The service logic corresponding to the second type of user tag partially or completely responds to the access request.
  • the terminal further includes an output unit
  • the third communication unit 81 is configured to request to access the second application client by using the account data of the first application client, based on the terminal or another terminal. Requesting, by the second application client, a temporary identifier to the server; the server is a server corresponding to the first application client; the output unit is configured to output identifier information including the temporary identifier;
  • the communication unit 81 is further configured to: according to the terminal or the another terminal, read and identify the identification information by using the first application client, and request the server to be based on the terminal or the another terminal.
  • the account data of the first application client accesses the second application client, and the user credit data corresponding to the account data from the server is obtained by the second application client.
  • the execution unit 82 in the terminal may be implemented by a CPU, a DSP, an MCU or an FPGA in the terminal in an actual application; the third communication unit 81 in the terminal may be used in an actual application.
  • a communication module including: basic communication suite, operating system, communication module, standardized interface and protocol, etc.
  • a transceiver antenna Through a communication module (including: basic communication suite, operating system, communication module, standardized interface and protocol, etc.) and a transceiver antenna; the output unit in the terminal is In practical applications, it can be realized by the display component of the terminal.
  • the terminal provided by the foregoing embodiment only exemplifies the division of each of the foregoing program modules.
  • the processing may be allocated by different program modules as needed, that is, the terminal is
  • the internal structure is divided into different program modules to perform all or part of the processing described above.
  • the terminal and the information processing method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • FIG. 10 is a schematic structural diagram of hardware components of a server according to an embodiment of the present invention; as shown in FIG. 10, the device includes a memory 92, a processor 91, and is stored in the memory 92 and can be in the processor.
  • the computer program running on 91 also includes a power component and a communication component 93, each component being coupled together by a bus system 94.
  • bus system 94 is used to implement connection communication between these components.
  • the bus system 94 includes, in addition to the data bus, a power bus, a control bus, and a status signal bus. However, for clarity of description, various buses are labeled as bus system 94 in FIG.
  • memory 92 can be either volatile memory or non-volatile memory, and can include both volatile and nonvolatile memory.
  • the non-volatile memory may be a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), or an Erasable Programmable Read (EPROM). Only Memory), Electrically Erasable Programmable Read-Only Memory (EEPROM), Ferromagnetic Random Access Memory (FRAM), Flash Memory, Magnetic Surface Memory , CD-ROM, or Compact Disc Read-Only Memory (CD-ROM); the magnetic surface memory can be a disk storage or a tape storage.
  • the volatile memory can be a random access memory (RAM) that acts as an external cache.
  • RAM Random Access Memory
  • SRAM Static Random Access Memory
  • SSRAM Synchronous Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • DRAM Synchronous Dynamic Random Access Memory
  • SDRAM Synchronous Dynamic Random Access Memory
  • DDRS Double Data Rate Synchronous Dynamic Random Access Memory
  • ESDRAM Enhanced Synchronous Dynamic Random Access Memory
  • SLDRAM Synchronous Connection Random Access Memory
  • DRRAM Direct Memory Bus Random Access Memory
  • the memory 92 described in the embodiments of the present invention is intended to include, but is not limited to, these and any other suitable types of memory.
  • the processor 91 may be an integrated circuit chip with signal processing capability. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 91 or an instruction in a form of software.
  • the processor 91 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like.
  • the processor 91 can implement or perform the various methods, steps, and logic blocks disclosed in the embodiments of the present invention.
  • a general purpose processor can be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiment of the present invention may be directly implemented as a hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can reside in a storage medium located in memory 92, and processor 91 reads the information in memory 92 in conjunction with its hardware to perform the steps of the foregoing method.
  • the method is: accessing the second application client by using the account data of the first application client, and obtaining the first message from the first terminal including the first application client.
  • the first message includes a user identity corresponding to the account data of the first application client; obtaining user credit data associated with the user identity, Transmitting the user credit data to a second terminal including the second application client, so that the second application client of the second terminal executes corresponding service logic based on the user credit data; the user credit data A probability of characterizing that the end user corresponding to the user identity violates a predetermined rule.
  • the user credit is obtained by accessing the confirmation message of the second application client by using the account data of the first application client in response to the obtained characterization authorization. Data is sent to the second application client.
  • the first terminal is configured to read, by the first application client, that the second terminal is output by using the second application client. Identifying information, obtaining a first message from the first terminal, the first message including the user identity and the assigned temporary identity.
  • the method further includes: collecting behavior data corresponding to the account data, where the behavior data includes online behavior data and offline behavior data based on the Internet; Determining, by the behavior data, a first feature variable of the account data, wherein the first feature variable is used to represent a behavior characteristic of the account data; and the first feature variable is input into a data analysis model to obtain user credit data;
  • the data analysis model is configured to output user credit data according to the first feature variable.
  • the method further includes: acquiring a second feature variable, where the second feature variable is used to represent a plurality of other account data that are associated with the account data. a behavior characteristic; inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to use the first feature variable and the second feature variable
  • the user credit data is output.
  • the method further includes: dividing the behavior data into a plurality of categories; and respectively establishing a sub-model for each of the plurality of categories, where each a sub-model for using the first characteristic variable and/or the second characteristic variable Outputting a first sub-value, wherein the first sub-value is used to indicate a probability value that the behavior of the account data does not satisfy the preset condition under a category corresponding to the sub-model; A plurality of sub-models corresponding to the categories are constructed as the data analysis model.
  • FIG. 11 is a schematic diagram of a combination of software and hardware of a terminal according to an embodiment of the present invention.
  • the system includes a memory 802, a processor 801, and is stored in the memory 802 and can be in the processor.
  • the computer program running on 801 also includes at least one network interface 804 and a user interface 803, each of which is coupled together by a bus system 805.
  • the bus system 805 is used to implement connection communication between these components.
  • the bus system 805 includes a power bus, a control bus, and a status signal bus in addition to the data bus. However, for clarity of description, various buses are labeled as bus system 805 in FIG.
  • the memory 802 in this embodiment is also used to store various types of data to support the operation of the terminal.
  • Examples of such data include any computer program for operation on a terminal, such as operating system 8021 and application 8022, contact data, phone book data, messages, pictures, videos, and the like.
  • the operating system 8021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks.
  • the application 8022 can include various applications, such as a Media Player, a Browser, etc., for implementing various application services.
  • a program implementing the method of the embodiment of the present invention may be included in the application 8022.
  • the method is: requesting access to the second application client by using the account data of the first application client, and obtaining user credit data corresponding to the account data of the first application client,
  • the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; and based on the user credit data, the corresponding service logic is executed by the second application client.
  • the user identifier of the account data is obtained according to the user credit data and the label distribution logic, where
  • the user tag is used to represent the account data to obtain a service range;
  • the user tag includes at least: a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate the account a user whose data is in violation of the predetermined rule by the terminal user is located in the first range;
  • the second type of user tag is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range.
  • a user wherein the first range is different from the second range; and executing, according to the user credit data, corresponding service logic of the second application client corresponding to the requested access, including at least one of the following a: performing service logic corresponding to the first type of user tag, shielding the second application client access request or partial response access request; performing service logic corresponding to the second type of user tag, part or all Responding to an access request for the second application client.
  • the second application client is accessed by using the account data of the first application client based on the terminal or another terminal, and the terminal passes the The second application client requests and obtains a temporary identifier from the server, and outputs identifier information including the temporary identifier;
  • the server is a server corresponding to the first application client; and the first terminal or the another terminal passes the first
  • An application client reads the identification information, and requests the server to access the second application client by using the account data of the first application client based on the terminal or the another terminal, the terminal User credit data corresponding to the account data from the server is obtained by the second application client.
  • an embodiment of the present invention further provides a computer storage medium, such as a memory 92 including the computer program shown in FIG. 10, which may be executed by a processor 91 of the server to perform the foregoing method. step.
  • the computer storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories.
  • the computer storage medium provided by the embodiment of the present invention has a computer instruction, where the instruction is executed by the processor: accessing the second application client based on the account data of the first application client, obtaining the first application from the first application a first message of the first terminal of the client; the first message includes a user identity corresponding to the account data of the first application client; obtaining user credit data associated with the user identity, and sending the user credit data To a second terminal including the second application client, such that the second application client of the second terminal executes corresponding service logic based on the user credit data; the user credit data is used to characterize the user identity Identifies the probability that the corresponding end user violates the predetermined rule.
  • the user credit data is sent to the acknowledgment message of the first application client by using the account data of the first application client in response to the obtained characterization authorization.
  • the second application client when the instruction is executed by the processor, the user credit data is sent to the acknowledgment message of the first application client by using the account data of the first application client in response to the obtained characterization authorization.
  • the first terminal when the instruction is executed by the processor, the first terminal is configured to read, by using the first application client, identification information that is output by the second terminal by using the second application client, Obtaining a first message from the first terminal, the first message including the user identity and the assigned temporary identity.
  • the method when the instruction is executed by the processor, the method further includes: collecting behavior data corresponding to the account data, where the behavior data includes online behavior data and offline behavior data based on the Internet; Obtaining a first feature variable of the account data, wherein the first feature variable is used to represent a behavior feature of the account data; and the first feature variable is input into a data analysis model to obtain user credit data; The data analysis model is configured to output user credit data according to the first feature variable.
  • the method further includes: acquiring a second feature variable, wherein the second feature variable is used to represent behavior characteristics of a plurality of other account data having an association relationship with the account data.
  • the data analysis model is further configured to be based on the first feature The levy variable and the second characteristic variable output the user credit data.
  • the method when the instruction is executed by the processor, the method further includes: dividing the behavior data into a plurality of categories; respectively establishing a sub-model for each of the plurality of categories, wherein each sub-model is used Outputting a first sub-value according to the first characteristic variable and/or the second characteristic variable, wherein the first sub-value is used to indicate that the account data is under a category corresponding to the sub-model
  • the behavior does not satisfy the probability value of the preset condition; and the plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model.
  • the embodiment of the present invention further provides a computer storage medium, such as a memory 802 including the computer program shown in FIG. 11, which can be executed by the processor 801 of the terminal to perform the steps described in the foregoing method.
  • the computer storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories, such as a mobile phone. , computers, tablet devices, personal digital assistants, etc.
  • the computer storage medium provided by the embodiment of the present invention has a computer instruction, where the instruction is executed by the processor: requesting access to the second application client by using the account data of the first application client, and obtaining the first application client User credit data corresponding to the account data of the terminal, the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; and based on the user credit data, perform corresponding corresponding by the second application client Service logic.
  • the user identifier of the account data is obtained according to the user credit data and the label distribution logic, where the user label is used to represent the account data.
  • the user label at least includes: a first type of user label and a second type of user label, wherein the first type of user label is used to indicate that the terminal user corresponding to the account data violates the predetermined rule a user whose probability is located in the first range; the second type of user tag is used to indicate that the terminal user corresponding to the account data violates the The probability that the predetermined rule is located in the second range, wherein the first range is different from the second range; and the second application client corresponding to the requested access is executed based on the user credit data
  • Corresponding service logic of the terminal comprising at least one of: performing service logic corresponding to the first type of user tag, shielding the second application client access request or partial response access request; performing the second class The service logic corresponding to the user tag partially or completely responds to the access request
  • the second application client when the instruction is executed by the processor, the second application client is accessed by using the account data of the first application client, and the terminal passes the second
  • the application client requests and obtains a temporary identifier from the server, and outputs identifier information including the temporary identifier;
  • the server is a server corresponding to the first application client; and the first application is adopted based on the terminal or the another terminal
  • the client reads and identifies the identification information, and requests the server to access the second application client by using the account data of the first application client based on the terminal or the another terminal, where the terminal passes the
  • the second application client obtains user credit data corresponding to the account data from the server.
  • An embodiment of the present invention further provides an information processing system, where the system includes a server and a terminal, and the server is configured to request to access the second application client based on the account data of the first application client, where the server obtains the a first message of the terminal or another terminal of the first application client; the first message includes a user identity corresponding to the account data of the first application client; and is obtained by being associated with the user identity
  • User credit data the user credit data is sent to the terminal including the second application client; the user credit data is used to represent a probability that a terminal user corresponding to the user identity violates a predetermined rule;
  • the terminal is configured to execute the corresponding service logic by the second application client based on the user credit data.
  • the server is configured to, in response to the obtained characterization authorization, access the confirmation message of the second application client by using the account data of the first application client, The household credit data is sent to the second application client.
  • the server is configured to: according to the first terminal, read, by the first application client, identifier information that is output by the second terminal by using the second application client, and obtain the source information from the first application client.
  • the first message of the first terminal where the first message includes the user identity and the temporary identity assigned by the server.
  • the server is further configured to collect behavior data corresponding to the account data, the behavior data includes online behavior data and offline behavior data based on the Internet; and acquiring the a first feature variable of the account data, wherein the first feature variable is used to represent a behavior characteristic of the account data; the first feature variable is input into a data analysis model to obtain user credit data; wherein the data analysis The model is for outputting user credit data according to the first feature variable.
  • the server is configured to acquire a second feature variable, wherein the second feature variable is used to represent behavior characteristics of a plurality of other account data having an association relationship with the account data;
  • the first feature variable and the second feature variable are input to the data analysis model, wherein the data analysis model is further configured to output the user credit data according to the first feature variable and the second feature variable.
  • the server is configured to divide the behavior data into a plurality of categories before inputting the first feature variable and the second feature variable to the data analysis model; respectively
  • Each of the plurality of categories establishes a sub-model, wherein each sub-model is configured to output a first sub-value according to the first characteristic variable and/or the second characteristic variable, wherein the first sub- The value is used to indicate that the behavior of the account data does not satisfy the probability value of the preset condition under a category corresponding to the sub-model; and the plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model .
  • the terminal is further configured to obtain a user label of the account data according to the user credit data and label distribution logic, where the user label is used to represent the location
  • the account data can be obtained by the account data;
  • the user tag at least includes: a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate that the end user corresponding to the account data violates the a user whose probability of the predetermined rule is located in the first range;
  • the second type of user tag is used to indicate that the terminal user corresponding to the account data violates the predetermined rule, and the probability is that the user is located in the second range, wherein the first a range different from the second range;
  • the executing, according to the user credit data, corresponding service logic of the second application client corresponding to the request access including at least one of: performing and a service logic corresponding to a type of user tag, shielding for the second application client access request or partial response access request; performing service logic corresponding to the second type of user tag, partially or completely
  • the terminal is further configured to, according to the terminal or another terminal, request to access the second application client by using the account data of the first application client, where the terminal passes the second application client.
  • the server is a server corresponding to the first application client; and reading by the first application client based on the terminal or the another terminal Retrieving the identification information, and requesting, by the terminal or the another terminal, the server to access the second application client by using the account data of the first application client, where the terminal passes the second
  • the application client obtains user credit data corresponding to the account data from the server.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a removable storage device, a ROM, a RAM, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Disclosed are an information processing method and system, a server, a terminal and a computer storage medium. The method comprises: based on a request to access a second application client by means of account data of a first application client, obtaining a first message from a first terminal comprising the first application client, wherein the first message comprises a user identity identifier corresponding to the account data of the first application client; and obtaining user credit data associated with the user identity identifier, and sending the user credit data to a second terminal comprising the second application client, such that the second application client executes a corresponding service logic based on the user credit data, wherein the first terminal is the same as or is different from the second terminal; and the user credit data is used for characterizing the probability of a terminal user corresponding to the user identity identifier breaking a pre-determined rule.

Description

信息处理方法和系统、服务器、终端、计算机存储介质Information processing method and system, server, terminal, computer storage medium 技术领域Technical field

本发明涉及信息处理技术,具体涉及一种信息处理方法和系统、服务器、终端、计算机存储介质。The present invention relates to information processing technologies, and in particular, to an information processing method and system, a server, a terminal, and a computer storage medium.

背景技术Background technique

随着互联网技术的飞速发展,互联网在人们的生活中起的作用越来越大,人们可使用互联网处理各种事务。但通常情况下,在使用互联网业务之前,通常需要账户注册等操作。为了避免过多的账户注册给用户带来的困扰,出现了一种使用一个已有的应用的账号授权登录另一应用的技术方案,即用户可基于一个已注册的应用的账号通过账号授权的方式使用第三方应用提供的服务,这样无需用户在多个应用下重复注册账户。With the rapid development of Internet technology, the Internet plays a more and more important role in people's lives, and people can use the Internet to handle various affairs. However, in general, before the use of Internet services, operations such as account registration are usually required. In order to avoid the trouble of excessive account registration to the user, there is a technical solution for authorizing login to another application by using an account of an existing application, that is, the user can authorize the account based on the account of a registered application. The way to use the services provided by third-party applications, so that users do not need to repeatedly register accounts under multiple applications.

发明内容Summary of the invention

本发明实施例提供一种信息处理方法和系统、服务器、终端、计算机存储介质。Embodiments of the present invention provide an information processing method and system, a server, a terminal, and a computer storage medium.

为达到上述目的,本发明实施例的技术方案是这样实现的:To achieve the above objective, the technical solution of the embodiment of the present invention is implemented as follows:

本发明实施例提供了一种信息处理方法,所述方法包括:基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据对应的用户身份标识;获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑;所述用户信用数据用于表征所述用户身份标识对应 的终端用户违反预定规则的概率。An embodiment of the present invention provides an information processing method, where the method includes: obtaining, according to an account data request of a first application client, accessing a second application client, obtaining a first terminal from a first terminal including the first application client The first message includes a user identity corresponding to the account data of the first application client; obtaining user credit data associated with the user identity, and sending the user credit data to include the a second terminal of the second application client, so that the second application client of the second terminal performs corresponding service logic based on the user credit data; the user credit data is used to represent the user identity identifier The probability that the end user will violate the predetermined rule.

本发明实施例还提供了一种信息处理方法,所述方法包括:基于以所述第一应用客户端的账号数据请求访问第二应用客户端,获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;基于所述用户信用数据,通过所述第二应用客户端执行相应的服务逻辑。The embodiment of the present invention further provides an information processing method, the method comprising: requesting access to a second application client by using the account data of the first application client, and obtaining a user corresponding to the account data of the first application client Credit data, the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; and based on the user credit data, the corresponding service logic is executed by the second application client.

本发明实施例还提供了一种信息处理方法,所述方法包括:基于以所述第一应用客户端的账号数据请求访问第二应用客户端,服务器获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识;所述服务器获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端;所述第一终端和所述第二终端相同或不同;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;基于所述用户信用数据,所述第二终端通过所述第二应用客户端执行相应的服务逻辑。The embodiment of the invention further provides an information processing method, the method comprising: requesting access to the second application client by using the account data of the first application client, the server obtaining the first from the first application client a first message of the terminal; the first message includes a user identity corresponding to account data of the first application client; the server obtains user credit data associated with the user identity, and the user credit Sending data to the second terminal including the second application client; the first terminal and the second terminal are the same or different; the user credit data is used to represent that the terminal user corresponding to the user identity violates a predetermined rule Probability; based on the user credit data, the second terminal executes corresponding service logic through the second application client.

本发明实施例还提供了一种服务器,所述服务器包括:第一通讯单元、第一获取单元和第二通讯单元;所述第一通讯单元,配置为基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括第一应用客户端的账号数据对应的用户身份标识;所述第一获取单元,配置为获得与所述用户身份标识相关联的用户信用数据;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;所述第二通讯单元,配置为将所述第一获取单元获得的所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑。 The embodiment of the present invention further provides a server, the server includes: a first communication unit, a first obtaining unit, and a second communication unit; the first communication unit is configured to request based on an account data of the first application client Accessing the second application client, obtaining a first message from the first terminal that includes the first application client; the first message includes a user identity corresponding to the account data of the first application client; the first acquiring unit Configuring to obtain user credit data associated with the user identity; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; the second communication unit is configured to Transmitting the user credit data obtained by the first acquiring unit to a second terminal that includes the second application client, so that the second application client of the second terminal performs a corresponding service based on the user credit data. logic.

本发明实施例还提供了一种终端,所述终端包括:第三通讯单元和执行单元;所述第三通讯单元,配置为基于以第一应用客户端的账号数据访问第二应用客户端,获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;所述执行单元,配置为基于所述第三通讯单元获得的所述用户信用数据,通过所述第二应用客户端执行相应的服务逻辑。The embodiment of the present invention further provides a terminal, where the terminal includes: a third communication unit and an execution unit; the third communication unit is configured to access the second application client based on the account data of the first application client, User credit data corresponding to the account data of the first application client, the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; the execution unit is configured to be based on the third The user credit data obtained by the communication unit is executed by the second application client to execute corresponding service logic.

本发明实施例还提供了一种计算机存储介质,其上存储有计算机指令,该指令被处理器执行时实现本发明实施例所述的应用于服务器的信息处理方法的步骤;或者,该指令被处理器执行时实现本发明实施例所述的应用于终端的信息处理方法的步骤。The embodiment of the present invention further provides a computer storage medium, where the computer instruction is executed, and when the instruction is executed by the processor, the step of applying the information processing method applied to the server according to the embodiment of the present invention is implemented; or the instruction is The steps of the information processing method applied to the terminal according to the embodiment of the present invention are implemented when the processor executes.

本发明实施例还提供了一种服务器,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现本发明实施例所述的应用于服务器的信息处理方法的步骤。The embodiment of the present invention further provides a server, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the application according to the embodiment of the present invention. The steps of the information processing method of the server.

本发明实施例还提供了一种终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现本发明实施例所述的应用于终端的信息处理方法的步骤。The embodiment of the present invention further provides a terminal, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the application according to the embodiment of the present invention. The steps of the information processing method of the terminal.

本发明实施例还提供了一种信息处理系统,所述系统包括服务器和终端;所述服务器,配置为基于以所述第一应用客户端的账号数据请求访问第二应用客户端,服务器获得来自包括所述第一应用客户端的所述终端或另一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识;获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的所述终端;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;所述终端,配置为基于所述用户信用数据,通过所述第二应用客户端执行相应服务逻辑。 An embodiment of the present invention further provides an information processing system, where the system includes a server and a terminal, and the server is configured to request to access the second application client based on the account data of the first application client, where the server obtains the a first message of the terminal or another terminal of the first application client; the first message includes a user identity corresponding to the account data of the first application client; and is obtained by being associated with the user identity User credit data, the user credit data is sent to the terminal including the second application client; the user credit data is used to represent a probability that a terminal user corresponding to the user identity violates a predetermined rule; The terminal is configured to execute the corresponding service logic by the second application client based on the user credit data.

附图说明DRAWINGS

图1为基于主应用授权登录第三方应用的一种交互流程示意图;FIG. 1 is a schematic diagram of an interaction process for logging in to a third-party application based on a main application authorization;

图2为本发明实施例进行信息交互的一种系统架构示意图;2 is a schematic structural diagram of a system for performing information interaction according to an embodiment of the present invention;

图3为本发明实施例的信息处理方法的第一种流程示意图;3 is a schematic diagram of a first process of an information processing method according to an embodiment of the present invention;

图4为本发明实施例的信息处理方法的第二种流程示意图;4 is a second schematic flowchart of an information processing method according to an embodiment of the present invention;

图5为本发明实施例的信息处理方法的第三种流程示意图;FIG. 5 is a schematic diagram of a third process of an information processing method according to an embodiment of the present invention; FIG.

图6a和图6b分别为本发明实施例的信息处理方法的交互流程示意图;6a and 6b are respectively schematic diagrams showing an interaction process of an information processing method according to an embodiment of the present invention;

图7为本发明实施例的服务器的一种组成结构示意图;FIG. 7 is a schematic structural diagram of a structure of a server according to an embodiment of the present invention; FIG.

图8为本发明实施例的服务器的另一种组成结构示意图;FIG. 8 is a schematic diagram of another composition structure of a server according to an embodiment of the present invention; FIG.

图9为本发明实施例的终端的一种组成结构示意图;FIG. 9 is a schematic structural diagram of a structure of a terminal according to an embodiment of the present invention;

图10为本发明实施例的服务器的硬件组成结构示意图;FIG. 10 is a schematic structural diagram of hardware components of a server according to an embodiment of the present invention; FIG.

图11为本发明实施例的终端的软硬件结合示意图。FIG. 11 is a schematic diagram of a combination of software and hardware of a terminal according to an embodiment of the present invention.

具体实施方式Detailed ways

在对本发明实施例的信息处理方法进行详细说明之前,首先对基于主应用授权登录第三方应用的处理过程进行说明。图1为基于主应用授权登录第三方应用的一种交互流程示意图;如图1所示,包括:Before the detailed description of the information processing method of the embodiment of the present invention, the process of logging in to the third-party application based on the main application authorization is first described. Figure 1 is a schematic diagram of an interaction process for logging in to a third-party application based on the main application authorization; as shown in Figure 1, including:

步骤101:主应用客户端向第三方应用客户端发送登录请求,该登录请求具体用于以主应用客户端的账号请求登录第三方应用客户端。其中,该登录请求中包括用户身份标识,该用户身份标识可以是与主应用客户端的用户账号唯一对应的用户身份标识(UID,User Identification)。Step 101: The main application client sends a login request to the third-party application client, where the login request is specifically used to log in to the third-party application client by using the account request of the main application client. The login request includes a user identity, and the user identity may be a user identification (UID, User Identification) uniquely corresponding to the user account of the main application client.

实际应用中,作为一种示例,用户使用浏览器应用客户端打开一网页页面,例如该网页为一电子商务页面,或者多媒体播放页面(例如腾讯视频页面);用户需要登录该网页。为了避免用户需要输入较多的信息内容才能注册以及输入用户名密码才能登录,在页面的登录区域配置一个或多个主应用的图标,该主应用的图标例如QQ应用图标、微信应用图标等等, 以便用户可使用已有的主应用的账号登录该网页。当用户点击任一主应用的图标时,作为主应用的图标对应的主应用客户端向作为第三方应用客户端的浏览器应用客户端发起登录请求。In an actual application, as an example, the user uses a browser application client to open a webpage, for example, the webpage is an e-commerce page, or a multimedia playpage (such as a Tencent video page); the user needs to log in to the webpage. In order to avoid the user need to input more information content to register and enter the user name and password to log in, configure one or more icons of the main application in the login area of the page, such as QQ application icon, WeChat application icon, etc. , So that the user can log in to the webpage using the account of the existing main application. When the user clicks on the icon of any of the main applications, the main application client corresponding to the icon of the main application initiates a login request to the browser application client as the third-party application client.

步骤102:第三方应用客户端基于主应用客户端的登录请求向主应用客户端对应的主应用服务器请求临时标识,该临时标识可以是临时通用唯一识别码(UUID,Universally Unique Identifier),该临时UUID仅针对该次请求有效;或者临时UUID在预设时间范围(例如五分钟)内有效。其中,请求消息中可包括主应用客户端的用户身份标识;则主应用服务器生成的临时标识与主应用客户端的用户身份标识对应。Step 102: The third-party application client requests a temporary identifier from the main application server corresponding to the main application client based on the login request of the main application client, and the temporary identifier may be a Universally Unique Identifier (UUID). Only valid for this request; or the temporary UUID is valid for a preset time range (for example, five minutes). The request message may include a user identity of the primary application client; and the temporary identifier generated by the primary application server corresponds to the user identity of the primary application client.

步骤103:主应用服务器向第三方应用客户端返回临时标识。Step 103: The main application server returns a temporary identifier to the third-party application client.

步骤104:第三方应用客户端基于该临时标识和应用标识(APP ID)生成图形码,展示图形码,该图形码具体可以是二维码(QR Code,Quick Response Code),则第三方应用客户端根据获得的临时UUID和自身的应用标识编码生成二维码并展示。Step 104: The third-party application client generates a graphic code based on the temporary identifier and the application identifier (APP ID), and displays a graphic code, where the graphic code may be a QR Code (Quick Response Code), and the third-party application client The terminal generates a two-dimensional code according to the obtained temporary UUID and its own application identification code and displays it.

步骤105:第三方应用客户端轮询主应用服务器,获得用户是否确认授权的信息,该信息中携带有临时标识;其中,步骤104与步骤105不区分先后顺序,可以是先执行步骤104再执行步骤105,也可以是先执行步骤105再执行步骤104,也可以是同时执行步骤104和步骤105,本实施例中不对执行顺序进行限定。Step 105: The third-party application client polls the main application server to obtain information about whether the user confirms the authorization, and the information carries the temporary identifier. The step 104 and the step 105 do not distinguish the sequence, and the step 104 may be executed first. In step 105, step 105 may be performed first, and then step 104 may be performed. Step 104 and step 105 may be performed at the same time. The execution sequence is not limited in this embodiment.

步骤106:主应用客户端扫描第三方应用客户端展示的图形码,获得图形码携带的临时标识和应用标识。其中,主应用客户端具有图形码扫描读取功能,激活该功能后,作为一种实施方式,通过调用摄像头获得包含有图形码的图像,进一步识别图像中的图形码携带的临时标识和应用标识。例如,主应用客户端启动图形码扫描功能,调用摄像头,使得主应用客户端显示包括一扫描框的显示界面;当摄像头采集图像数据使得采集到的图 形码在该扫描框中时,主应用客户端基于图形码扫描功能对采集的图形码进行扫描,获得该图形码携带的临时标识和应用标识。作为另一种实施方式,主应用客户端具有光学字符识别(OCR,Optical Character Recognition)功能,即直接识别包含有图形码的图像中的字符,进一步基于识别出的字符获得该图形码携带的临时标识和应用标识。Step 106: The main application client scans the graphic code displayed by the third-party application client, and obtains the temporary identifier and the application identifier carried by the graphic code. The main application client has a graphic code scanning and reading function. After the function is activated, as an implementation manner, an image containing a graphic code is obtained by calling a camera to further identify a temporary identifier and an application identifier carried by the graphic code in the image. . For example, the main application client starts the graphic code scanning function, and calls the camera, so that the main application client displays the display interface including a scan box; when the camera collects the image data, the captured image is acquired. When the shape code is in the scan box, the main application client scans the collected graphic code based on the graphic code scanning function, and obtains the temporary identifier and the application identifier carried by the graphic code. As another implementation manner, the main application client has an optical character recognition (OCR) function, that is, directly identifying a character in an image including the graphic code, and further obtaining a temporary carried by the graphic code based on the recognized character. Identification and application identification.

步骤107:主应用客户端通知主应用服务器,该通知用于请求以主应用客户端的账号登录第三方应用,通知消息中携带有扫描获得的临时标识、应用标识和用户身份标识,该应用标识为第三方应用客户端的标识。Step 107: The main application client notifies the main application server, and the notification is used to request to log in to the third-party application by using the account of the main application client. The notification message carries the temporary identifier, the application identifier, and the user identifier obtained by the scan, and the application identifier is The identity of the third-party application client.

步骤108:主应用服务器基于该通知消息向第三方应用客户端返回授权信息,以及携带访问令牌(access token)。Step 108: The main application server returns authorization information to the third-party application client based on the notification message, and carries an access token.

步骤109:主应用客户端向第三方应用客户端确认授权,实际应用中,主应用客户端的显示界面可显示例如“授权”、“不授权”虚拟按键,用户点击“授权”虚拟按键,即确定主应用客户端向第三方应用客户端确认授权,第三方应用客户端允许使用主应用客户端的账号登录。相应的,若用户点击“不授权”虚拟按键,即确定主应用客户端不向第三方应用客户端确认授权,第三方应用客户端不允许使用主应用客户端的账号登录。Step 109: The main application client confirms the authorization to the third-party application client. In the actual application, the display interface of the main application client may display, for example, an “authorized” or “unauthorized” virtual button, and the user clicks the “authorize” virtual button, that is, determines The main application client confirms the authorization to the third-party application client, and the third-party application client allows the login of the account of the main application client. Correspondingly, if the user clicks the "unauthorized" virtual button, it is determined that the main application client does not confirm the authorization to the third-party application client, and the third-party application client does not allow the login of the account of the main application client.

步骤110:确认授权后,第三方应用客户端向主应用服务器发送信息获取请求,所述信息获取请求中包括临时标识、访问令牌、应用标识等信息,主应用服务器可基于信息获取请求中的临时标识确定对应的主应用客户端的用户身份标识,基于该用户身份标识获得对应的用户信息,将用户信息返回给第三方应用。Step 110: After confirming the authorization, the third-party application client sends an information acquisition request to the main application server, where the information acquisition request includes information such as a temporary identifier, an access token, and an application identifier, and the main application server may be based on the information acquisition request. The temporary identifier determines the user identity of the corresponding primary application client, obtains corresponding user information based on the user identity, and returns the user information to the third-party application.

其中,主应用客户端和第三方应用客户端均为终端设备中已安装的客户端应用程序,不同的客户端应用程序激活后可提供不同的服务;主应用服务器为主应用客户端对应的服务器。主应用客户端可以是以下应用类型的其中之一:即时通信应用客户端、社交应用客户端、支付平台客户端, 即时通信应用客户端例如可以是微信(WeChat)应用、QQ应用、Facebook应用、微博(Weibo)应用。主应用客户端和第三方应用客户端可运行于同一终端设备中,也可运行于不同终端设备中。The main application client and the third-party application client are client applications installed in the terminal device, and different client applications can provide different services after being activated; the main application server is a server corresponding to the client application client. . The main application client can be one of the following application types: instant messaging application client, social application client, payment platform client, The instant messaging application client can be, for example, a WeChat application, a QQ application, a Facebook application, or a Weibo application. The main application client and the third-party application client can run in the same terminal device or in different terminal devices.

下面结合附图及具体实施例对本发明作进一步详细的说明。The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

图2为本发明实施例中进行信息交互的各方硬件实体的示意图,图1中包括:服务器11、服务器12和终端设备21-23,终端设备21-23通过有线网络或者无线网络与服务器11或服务器12进行信息交互,终端设备包括手机、平板电脑、台式电脑、笔记本电脑等类型。一个示例中,终端设备21-23中的至少一个终端设备可运行第一应用客户端和第二应用客户端,即第一应用客户端和第二应用客户端可同时在同一个终端设备中运行;另一个示例中,终端设备21-23中的一个终端设备可运行第一应用客户端,另一个终端设备可运行第二应用客户端,即第一应用客户端和第二应用客户端分别在不同的终端设备中运行。服务器11和服务器12分别为第一应用客户端所属服务器和第二应用客户端所属服务器,通过终端设备与服务器之间的信息交互,终端设备运行的应用可提供相应的服务。2 is a schematic diagram of hardware entities of each party performing information interaction in the embodiment of the present invention. FIG. 1 includes: a server 11, a server 12, and a terminal device 21-23. The terminal device 21-23 passes through a wired network or a wireless network and the server 11 Or the server 12 performs information interaction, and the terminal device includes a mobile phone, a tablet computer, a desktop computer, a notebook computer, and the like. In one example, at least one of the terminal devices 21-23 can run the first application client and the second application client, that is, the first application client and the second application client can run in the same terminal device at the same time. In another example, one of the terminal devices 21-23 can run the first application client, and the other terminal device can run the second application client, that is, the first application client and the second application client respectively Running in different terminal devices. The server 11 and the server 12 are respectively the server to which the first application client belongs and the server to which the second application client belongs, and the application running by the terminal device can provide a corresponding service through information exchange between the terminal device and the server.

上述图1的例子只是实现本发明实施例的一个系统架构实例,本发明实施例并不限于上述图1所述的系统结构,可基于该系统架构,提出本发明各个实施例。The above-mentioned example of FIG. 1 is only a system architecture example for implementing the embodiment of the present invention. The embodiment of the present invention is not limited to the system structure described in FIG. 1 above, and various embodiments of the present invention may be proposed based on the system architecture.

本发明实施例提供了一种信息处理方法。图3为本发明实施例的信息处理方法的第一种流程示意图;如图3所示,所述方法包括:The embodiment of the invention provides an information processing method. FIG. 3 is a schematic diagram of a first process of an information processing method according to an embodiment of the present invention; as shown in FIG. 3, the method includes:

步骤301:基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括所述第一应用客户端的账号数据对应的用户身份标识。Step 301: Acquire a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client, where the first message includes the first application client The user identity corresponding to the account data of the terminal.

步骤302:获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终 端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率。Step 302: Obtain user credit data associated with the user identity, and send the user credit data to a second terminal including the second application client, so that the second terminal The second application client executes corresponding service logic based on the user credit data; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule.

本实施例中,信息处理方法应用于服务器中,该服务器具体可以是第一应用客户端所属服务器,即第一应用客户端请求以所述第一应用客户端的账号数据访问第二应用客户端,第一应用客户端通过第一终端向服务器发送第一消息,所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识;该用户身份标识可以是与第一应用客户端的账号数据唯一对应的UID。In this embodiment, the information processing method is applied to the server, where the server may be the server to which the first application client belongs, that is, the first application client requests to access the second application client by using the account data of the first application client. The first application client sends a first message to the server by using the first terminal, where the first message includes a user identity corresponding to the account data of the first application client; the user identity identifier may be the first application client The unique UID of the account data.

本实施例中,所述基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息,包括:基于所述第一终端通过所述第一应用客户端读取识别所述第二终端通过第二应用客户端输出的标识信息,获得来自所述第一终端的第一消息,所述第一消息包括所述用户身份标识和所述服务器分配的临时标识。其中,所述标识信息为图形码,例如二维码、条形码等。In this embodiment, the requesting to access the second application client by using the account data of the first application client to obtain the first message from the first terminal including the first application client includes: based on the first terminal Obtaining, by the first application client, the identifier information that is sent by the second terminal by using the second application client, to obtain a first message from the first terminal, where the first message includes the user identity identifier And a temporary identifier assigned by the server. The identification information is a graphic code, such as a two-dimensional code, a barcode, or the like.

实际应用中,所述第一终端相同或不同,即第一应用客户端和第二应用客户端可分别安装于第一终端和第二终端内,或者也可以安装于同一终端内。以第一终端和第二终端相同为例,终端激活第二应用客户端后,在第二应用客户端的显示界面中可通过检测到针对第一应用客户端的标识的输入操作请求以所述第一应用客户端的账号数据访问第二应用客户端;其中,显示的第一应用客户端的标识具体可以是显示的第一应用客户端的图标或者链接,用户触发该图标或链接以请求以第一应用客户端的账号数据访问对应的第二应用客户端。第二应用客户端接收到该请求后,与服务器(即第一应用客户端所属服务器)通信,获得服务器分配的临时标识,该临时标识可以是UUID。作为一种实施方式,第二应用客户端可通过编码的 方式对临时标识进行编码生成标识信息,输出展示该标识信息;第一应用客户端识别该标识信息,获得标识信息包括的临时标识;其中,第二应用客户端可通过二维码编码的方式对临时标识进行编码生成二维码信息,通过终端的显示组件显示该二维码信息;第一应用客户端可通过OCR方式识别该二维码信息,从而获得该二维码信息携带的临时标识。此时,终端通过第一应用客户端向服务器发送第一消息,所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识,还可以包括该临时标识和应用标识(该应用标识为第二应用客户端对应的应用标识),以便于服务器向所述终端的第二应用客户端返回授权信息,以及根据用户身份标识获得对应的用户信用数据,向第二终端的第二应用客户端返回用户信用数据。In an actual application, the first terminal is the same or different, that is, the first application client and the second application client may be installed in the first terminal and the second terminal respectively, or may be installed in the same terminal. Taking the same as the first terminal and the second terminal, after the terminal activates the second application client, the first operation client may display the input operation request for the identifier of the first application client in the display interface of the second application client. The application client's account data is used to access the second application client. The identifier of the displayed first application client may be an icon or a link of the displayed first application client, and the user triggers the icon or the link to request the first application client. The account data access corresponds to the second application client. After receiving the request, the second application client communicates with the server (that is, the server to which the first application client belongs) to obtain a temporary identifier assigned by the server, and the temporary identifier may be a UUID. As an implementation manner, the second application client may be encoded The method is configured to encode the temporary identifier to generate the identifier information, and output the identifier information. The first application client identifies the identifier information, and obtains the temporary identifier included in the identifier information. The second application client may encode the identifier by using the two-dimensional code. The temporary identifier is encoded to generate two-dimensional code information, and the two-dimensional code information is displayed by the display component of the terminal; the first application client can identify the two-dimensional code information by using an OCR method, thereby obtaining a temporary identifier carried by the two-dimensional code information. At this time, the terminal sends a first message to the server by using the first application client, where the first message includes a user identity corresponding to the account data of the first application client, and may further include the temporary identifier and the application identifier. The application identifier is an application identifier corresponding to the second application client, so that the server returns the authorization information to the second application client of the terminal, and obtains corresponding user credit data according to the user identity, to the second terminal. The application client returns user credit data.

本实施例中,所述将所述用户信用数据发送至包括所述第二应用客户端的第二终端,包括:响应于获得的表征确认授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息,将所述用户信用数据发送至所述第二应用客户端。In this embodiment, the sending the user credit data to the second terminal that includes the second application client includes: accessing the first application client by using the account data in response to the obtained characterization confirmation authorization Sending the user credit data to the second application client by using an acknowledgement message of the application client.

作为一种实施方式,第一终端通过第一应用客户端读取第二应用客户端输出的标识信息获得临时标识,表征授权以所述第一应用客户端的账号数据访问所述第二应用客户端,即第一终端的第一应用客户端获得临时标识后,向服务器发送携带有用户身份标识的第一消息,响应该第一消息,服务器将获取到的与用户身份标识关联的用户信用数据发送至所述第二应用客户端。As an implementation manner, the first terminal obtains the temporary identifier by using the identifier information output by the second application client by using the first application client, and the identifier is authorized to access the second application client by using the account data of the first application client. After the first application client of the first terminal obtains the temporary identifier, the server sends a first message carrying the user identity to the server, and in response to the first message, the server sends the obtained user credit data associated with the user identity. To the second application client.

作为另一种实施方式,服务器可通过接收到针对“确认授权”功能按键的输入操作,即服务器接收到表征第一终端确定授权以第一应用客户端的账号数据访问第二应用客户端,确定获得表征确认授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息。实际应用中,在服务器接收到来自第一终端的第一消息后,基于该第一消息中携带的信息 (包括临时标识、第二应用客户端标识和用户身份标识),向包括第二应用客户端的第二终端发送授权信息和访问令牌,第二终端基于第二应用客户端输出展示包含有“确认授权”功能按键的界面,用户可通过点击“确认授权”功能按键,确定授权以第一应用客户端的账号数据访问第二应用客户端,则第二应用客户端接收到确认授权指示后,通知服务器,服务器基于表征确认授权的通知消息将与用户身份标识关联的用户信用数据发送至所述第二终端,可以理解为,本实施方式中,第二应用客户端在需要用户信用数据时,从服务器获得相应的用户信用数据。As another implementation manner, the server may receive an input operation for the “confirm authorization” function button, that is, the server receives the identifier that the first terminal determines to authorize to access the second application client with the account data of the first application client, and determines to obtain The acknowledgment confirms that the authorization message of the second application client is accessed by the account data of the first application client. In an actual application, after the server receives the first message from the first terminal, based on the information carried in the first message (including the temporary identifier, the second application client identifier, and the user identifier), sending the authorization information and the access token to the second terminal including the second application client, and the second terminal includes the confirmation according to the second application client output display Authorizing the interface of the function button, the user can determine that the authorization to access the second application client by using the account data of the first application client by clicking the “confirm authorization” function button, and then the second application client notifies the server after receiving the confirmation authorization indication. The server sends the user credit data associated with the user identity to the second terminal based on the notification message indicating that the authorization is confirmed. In this embodiment, the second application client needs the user credit data from the server. Obtain the corresponding user credit data.

本实施例中,用户信用数据可包括以下数据类型的至少之一:信用分、信用等级。作为一种实施方式,信用分越大,或者信用等级越高,表明相应的终端用户违反约定规则的概率越低,相应的,信用分越小,或者信用等级越低,表明相应的终端用户违反约定规则的概率越大。In this embodiment, the user credit data may include at least one of the following data types: credit score, credit rating. As an implementation manner, the greater the credit score, or the higher the credit rating, the lower the probability that the corresponding terminal user violates the agreed rule, correspondingly, the smaller the credit score, or the lower the credit rating, indicating that the corresponding terminal user violates The greater the probability of a convention.

本实施例中,作为一种实施方式,服务器中具有信用数据计算功能,即服务器可通过行为数据的采集从而计算获得用户信用数据,则服务器接收到携带有用户身份标识的第一消息时,可基于自身存储的用户信用数据集合进行查找,获得与用户身份标识相关联的用户信用数据。作为另一种实施方式,用户信用数据可由信用服务平台通过采集行为数据计算获得,则服务器在获得第一消息后,与信用服务平台进行信息交互,从信用服务平台获得与所述用户身份标识相关联的用户信用数据。In this embodiment, as an implementation manner, the server has a credit data calculation function, that is, the server can calculate and obtain user credit data through the collection of behavior data, and when the server receives the first message carrying the user identity, The user credit data set based on the self-storage is searched for, and the user credit data associated with the user identity is obtained. As another implementation manner, the user credit data may be obtained by the credit service platform by collecting behavior data, and after obtaining the first message, the server performs information interaction with the credit service platform, and obtains, from the credit service platform, the user identity identifier. User credit data.

采用本发明实施例的技术方案,在第一应用客户端请求以所述第一应用客户端的账号数据访问第二应用客户端情况下,通过服务器向第二应用客户端发送账号数据对应的用户信用数据,使得第二应用客户端可基于用户信用数据执行相应的服务逻辑,实现了基于违反预定规则的概率情况提供相应的服务,从而减少不遵守预定规则的概率高的用户在获取服务的过程中导致的信息泄露或对服务平台的攻击等安全问题的出现概率,提升了 服务提供及服务平台的安全性及可靠性。According to the technical solution of the embodiment of the present invention, when the first application client requests to access the second application client by using the account data of the first application client, the server sends the user credit corresponding to the account data to the second application client. The data enables the second application client to execute the corresponding service logic based on the user credit data, and implements a corresponding service based on the probability of violating the predetermined rule, thereby reducing the probability that the user who has a high probability of not complying with the predetermined rule is in the process of acquiring the service. Increased probability of occurrence of security issues such as information disclosure or attacks on the service platform Service delivery and service platform security and reliability.

本发明实施例还提供了一种信息处理方法,应用于服务器中,该服务器具体可以是第一应用客户端所属服务器。图4为本发明实施例的信息处理方法的第二种流程示意图;如图4所示,所述方法包括:The embodiment of the present invention further provides an information processing method, which is applied to a server, where the server may be a server to which the first application client belongs. FIG. 4 is a second schematic flowchart of an information processing method according to an embodiment of the present invention; as shown in FIG. 4, the method includes:

步骤401:采集对应于账号数据的行为数据,所述行为数据包括基于互联网的线上行为数据和线下行为数据。其中,该账号数据为第一应用客户端的账号数据。Step 401: Collect behavior data corresponding to account data, and the behavior data includes online behavior data and offline behavior data based on the Internet. The account data is the account data of the first application client.

步骤402:根据所述行为数据获取所述账号数据的第一特征变量,其中,所述第一特征变量用于表示所述账号数据的行为特征。Step 402: Acquire a first feature variable of the account data according to the behavior data, where the first feature variable is used to represent a behavior feature of the account data.

步骤403:将所述第一特征变量输入数据分析模型,获得用户信用数据;其中,所述数据分析模型用于根据所述第一特征变量输出用户信用数据。Step 403: Input the first feature variable into a data analysis model to obtain user credit data, where the data analysis model is configured to output user credit data according to the first feature variable.

步骤404:基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括所述第一应用客户端的账号数据的用户身份标识。Step 404: Acquire a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client; the first message includes the first application client The user ID of the account data of the end.

步骤405:获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率。Step 405: Obtain user credit data associated with the user identity, and send the user credit data to a second terminal that includes the second application client, so that the second application client of the second terminal Performing corresponding service logic based on the user credit data; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule.

本实施例中,采用第一特征变量表征账号数据的行为特征,账号数据的行为特征是基于账号数据基于互联网的行为数据获得,再将第一特征变量输入到数据分析模型后,得到账号数据的行为不满足预设条件的概率值。由于账号数据在社交应用中的行为数据能够比较广的覆盖账号数据的行为,输入至数据分析模型中的行为数据能够全面的体现账号数据的行为,从而使得分析出来的账号数据的行为不满足预设条件的概率值更加准确。 In this embodiment, the first feature variable is used to represent the behavior characteristic of the account data, and the behavior characteristic of the account data is obtained based on the behavior data of the account data based on the Internet, and then the first feature variable is input into the data analysis model to obtain the account data. The probability value that the behavior does not satisfy the preset condition. Since the behavior data of the account data in the social application can widely cover the behavior of the account data, the behavior data input into the data analysis model can fully reflect the behavior of the account data, so that the behavior of the analyzed account data is not satisfied. It is more accurate to set the probability value of the condition.

具体的,行为数据包括账号数据基于互联网的线上行为数据和线下行为数据。Specifically, the behavior data includes online behavior data and offline behavior data of the account data based on the Internet.

互联网线上行为数据包括但不限于:Internet online behavior data includes but is not limited to:

1)用户的基础人口属性信息,如姓名、年龄、性别、地区、学历、职业等;1) User's basic demographic attribute information, such as name, age, gender, region, education, occupation, etc.;

2)虚拟增值服务数据,如虚拟账号角色装扮,游戏道具购买,影视会员服务,云存储空间增值服务,音乐流量包等;2) Virtual value-added service data, such as virtual account role dressing, game item purchase, film and television membership service, cloud storage space value-added service, music flow package, etc.;

3)社交互动行为数据,如聊天,电子邮件,语音通话,微博空间发表,豆瓣评论点评,知乎问答,公众号文章阅读等;3) Social interaction behavior data, such as chat, email, voice call, microblog space release, Douban review, knowledge and answer, public article reading, etc.;

4)经济行为数据,如支付,理财,购物,股票、基金、P2P、金融等;4) Economic behavior data, such as payment, wealth management, shopping, stocks, funds, P2P, finance, etc.;

5)娱乐休闲行为数据,如视频点播,音乐播放,K歌,新闻阅读等;5) Entertainment and leisure behavior data, such as video on demand, music playback, K song, news reading, etc.;

6)教育行为数据,如线上读书,公开课学习,职业考试练习,技能培训,翻译软件使用等;6) Educational behavior data, such as online reading, open class study, vocational test practice, skill training, translation software use, etc.;

7)其他互联网移动应用行为数据,如APP下载,搜索等。7) Other Internet mobile application behavior data, such as APP download, search, etc.

线上数据可以通过用户手机,平板或者PC电脑上即时通信应用程序、游戏客户端、APP下载平台、理财平台、购物软件等采集用户填写的资料或者应用程序主动上报获得。The online data can be obtained through the user's mobile phone, tablet or PC computer instant messaging application, game client, APP download platform, financial platform, shopping software, etc. to collect the information filled by the user or the application is actively reported.

线下行为数据包括但不限于:Offline behavior data includes but is not limited to:

1)线上到线下(O2O,Online to Offline)生活服务信息,如家政服务,城市服务,美容保健等;1) Online to offline (O2O, Online to Offline) life service information, such as housekeeping services, urban services, beauty care, etc.;

2)穿戴设备数据,如医疗健康,运动等;2) wear device data, such as medical health, sports, etc.;

3)基于位置的服务器(LBS,Location Based Service)地理位置数据,如导航,签到,专车等;3) location based service (LBS, location based service) geographic location data, such as navigation, check-in, special car, etc.;

4)旅游出行数据,如票务订购,酒店预定等。4) Travel data, such as ticket ordering, hotel reservations, etc.

可见,行为数据包括多种线上和线下场景中的动作,几乎囊括了生活 各个方面的行为数据,因此,根据这些行为数据获得的概率值也更加准确的反应了账号的真实概率值。另外,当行为数据由变化时会即时反馈给服务器或者即时被服务器获取,因此,行为数据的更新速度快,根据这些即时更新的行为数据获得的概率值可以反映账号数据当下的行为不满足预设条件的概率。不满足预设条件的概率值可以是违约概率,如不遵守合同规定的行为等。It can be seen that behavioral data includes actions in a variety of online and offline scenarios, including life. The behavioral data of all aspects, therefore, the probability values obtained from these behavioral data also more accurately reflect the true probability value of the account. In addition, when the behavior data changes, it will be immediately fed back to the server or instantly obtained by the server. Therefore, the behavior data is updated quickly, and the probability value obtained according to the behavior data of the instant update can reflect that the current behavior of the account data does not satisfy the preset. The probability of the condition. The probability value that does not satisfy the preset condition may be a probability of default, such as non-compliance with the contracted behavior.

例如,根据用户A的行为数据来获取该用户A的信用度时,可以采集用户A在即时通信应用中的账号聊天行为、在视频应用中观看视频的行为、下载应用的行为等。从这些行为数据中分别提取中第一特征变量,可以得到不同类别的第一特征变量。如即时通信类的第一特征变量,视频类的第一特征变量和下载类的第一特征变量,将这些不同类别的第一特征变量的全部都输入到数据分析模型中,输出第一数值。也可以采用将不同类别的第一特征变量中的部分输入到数据分析模型中。For example, when the credit level of the user A is obtained according to the behavior data of the user A, the account chat behavior of the user A in the instant messaging application, the behavior of watching the video in the video application, the behavior of downloading the application, and the like may be collected. Extracting the first feature variable from the behavior data separately can obtain the first feature variable of different categories. For example, the first feature variable of the instant communication class, the first feature variable of the video class, and the first feature variable of the download class, all of the first feature variables of the different classes are input into the data analysis model, and the first value is output. It is also possible to input portions of the first characteristic variables of different classes into the data analysis model.

通常情况下,用户A的好友与用户A具有相似点,用户A的好友的行为数据也能反映用户A的行为不满足预设条件的概率。因此,在向数据分析模型输入第一特征变量时,还可以同时输入与用户A的好友相关联的特征变量。Generally, the friend of the user A has a similarity with the user A, and the behavior data of the friend of the user A can also reflect the probability that the behavior of the user A does not satisfy the preset condition. Therefore, when the first feature variable is input to the data analysis model, the feature variable associated with the friend of the user A can also be input at the same time.

即所述将所述第一特征变量输入数据分析模型,包括:获取第二特征变量,其中,所述第二特征变量用于表示与所述账号数据具有关联关系的多个其他账号数据的行为特征;将所述第一特征变量和所述第二特征变量输入至所述数据分析模型,其中,所述数据分析模型还用于根据所述第一特征变量和所述第二特征变量输出所述用户信用数据。That is, the inputting the first feature variable into the data analysis model includes: acquiring a second feature variable, wherein the second feature variable is used to represent behavior of a plurality of other account data having an association relationship with the account data. Characterizing; inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to output the first feature variable and the second feature variable User credit data.

其中,获取第二特征变量的方法与获取第一特征变量的方法相同,在后文详述。具有关联关系的账号数据和多个其他账号数据为好友关系,可以理解为多个其他账号数据是账号数据的好友。在上述例子中的线上行为 和线下行为都可以通过一定的对应关系映射为某个应用账号的行为。例如,其他账号数据利用手机号码注册了导航服务和即时通信应用,在获取其他账号数据的行为数据时,采集其他账号数据在导航服务中的行为数据,以及其他账号数据在即时通信应用中的行为数据。The method for obtaining the second feature variable is the same as the method for obtaining the first feature variable, and is described in detail later. The account data having the associated relationship and the plurality of other account data are friend relationships, and can be understood as a plurality of other account data being friends of the account data. Online behavior in the above example Both the offline behavior and the offline behavior can be mapped to the behavior of an application account through a certain correspondence. For example, other account data uses the mobile phone number to register the navigation service and the instant messaging application, and when acquiring behavior data of other account data, collect behavior data of other account data in the navigation service, and behavior of other account data in the instant communication application. data.

将第一特征变量和第二特征变量输入至数据分析模型包括:获取多个其他账号数据与账号数据之间的亲密度,其中,亲密度根据每个其他账号数据与账号数据的互动行为生成;采用以下公式根据亲密度和第二特征变量获取第三特征变量:Entering the first feature variable and the second feature variable into the data analysis model includes: acquiring intimacy between the plurality of other account data and the account data, wherein the intimacy is generated according to an interaction behavior of each of the other account data and the account data; The third feature variable is obtained from the intimacy and the second characteristic variable using the following formula:

υ'=f((α12,...,αi,...,αn),(υ12,...,υi,...,υn)),υ'=f((α 12 ,...,α i ,...,α n ),(υ 12 ,...,υ i ,...,υ n )),

其中,υ'表示第三特征变量,i表示第i个其他账号数据,αi为第i个其他账号数据与账号数据的亲密度,υi是第i个其他账号数据的第二特征变量,f为用于表示亲密度由高到低的排序中,前n个其他账号数据的第二特征变量与亲密度的加权平均值;将第一特征变量和第三特征变量输入至数据分析模型。Where υ' represents the third characteristic variable, i represents the i-th other account data, α i is the intimacy of the i-th other account data and the account data, and υ i is the second characteristic variable of the i-th other account data, f is a weighted average of the second characteristic variable and the intimacy of the first n other account data in order to indicate the high to low intimacy; the first feature variable and the third feature variable are input to the data analysis model.

在本实施例中,对其他账号数据的第二特征变量进行数据处理,使其更能体现账号数据的行为特征。因此,在获取第二变量时,用每个第二特征变量乘以相应的权重值,再进行加权平均。该权重值表示账号数据与其他账号数据的亲密度。账号数据与其他账号数据越亲密,权重值越大;反之,权重值越小。亲密度可以通过账号数据和其他账号数据之间的互动来衡量,比如账号数据和其他账号数据之间聊天越多,关系越亲密。账号数据与其他账号数据的社区重合度越高,这两个账号数据的关系越亲密。亲密度和重合度可以采用训练模型的方式来获取。互动行为包括朋友圈互动、支付互动(如发红包)、运动互动(如步行1万步点赞)等。亲密度可以通过上述的信息互动来体现,包括发送和接收信息的次数、天数等,还包括发送和接收信息的比例,每天进行信息互动的次数等。这些信息包括文字 信息、视频信息和语音信息等。亲密度还可以通过评论、点赞,标记好友为特别好友、送礼物或者拉黑等行为来获得。In this embodiment, the second feature variable of the other account data is processed to make it more representative of the behavior characteristics of the account data. Therefore, when the second variable is acquired, each second characteristic variable is multiplied by the corresponding weight value, and then the weighted average is performed. The weight value indicates the intimacy of the account data and other account data. The closer the account data is to the other account data, the greater the weight value; conversely, the smaller the weight value. Intimacy can be measured by the interaction between account data and other account data. For example, the more chats between account data and other account data, the more intimate the relationship. The higher the degree of overlap between the account data and the other account data, the more intimate the relationship between the two account data. The intimacy and coincidence can be obtained by means of a training model. Interactive behaviors include interactions in the circle of friends, payment interactions (such as red envelopes), and sports interactions (such as walking 10,000 steps). Intimacy can be reflected by the above information interaction, including the number of times the information is sent and received, the number of days, etc., as well as the ratio of sending and receiving information, the number of times of information interaction every day. This information includes text Information, video information and voice information. Intimacy can also be obtained by commenting, praising, marking a friend as a special friend, giving a gift, or pulling black.

例如,第三特征变量

Figure PCTCN2017109397-appb-000001
即亲密度为按照由亲到疏的顺序排列的前10个好友的第二特征变量与亲密度的加权平均值。For example, the third characteristic variable
Figure PCTCN2017109397-appb-000001
That is, the intimacy is a weighted average of the second characteristic variable and the intimacy of the top 10 friends arranged in order of intimacy.

一个群体的普遍特征可以反映这个群体中某个用户的特征,因此,可以根据一个群体的特征来获得行为不满足预设条件的概率值,可以更加准确的体现用户的信用度。需要说明的是,在获取多个第二账户的第二特征变量时,先根据账号数据的好友中与账号数据的亲密度,选择亲密度排名前n个其他账号数据,再根据亲密度和第二特征变量生成第三特征变量。The general characteristics of a group can reflect the characteristics of a certain user in this group. Therefore, the probability value of the behavior that does not satisfy the preset condition can be obtained according to the characteristics of a group, and the credit degree of the user can be more accurately reflected. It should be noted that, when acquiring the second feature variable of the plurality of second accounts, first selecting the intimacy ranking top n other account data according to the intimacy of the account data and the account data, and then according to the intimacy and the first The second feature variable generates a third feature variable.

由于采集的行为数据范围比较广,获得的数据格式也不相同。因此,在得到行为数据之后,先删除异常数据,去除重复数据,过滤掉波动值较大的数据以及补全缺失的数据。其中,异常数据可以是明显超出一定范围的数据,例如,通常人的年龄不会超过一百,如果采集的数据显示年龄为100,则删除该异常数据。如果采集到的数据显示年龄包括0和49,0和49处于0至100的范围内,然而,其他数据多数都在18至45之间,因此,0和49属于波动值较大的奇异点。Due to the wide range of behavioral data collected, the data formats obtained are also different. Therefore, after obtaining the behavior data, the abnormal data is deleted, the duplicate data is removed, the data with larger fluctuation values is filtered out, and the missing data is completed. The abnormal data may be data that is obviously beyond a certain range. For example, the normal person's age does not exceed one hundred. If the collected data shows that the age is 100, the abnormal data is deleted. If the collected data shows that the age includes 0 and 49, 0 and 49 are in the range of 0 to 100, however, most of the other data are between 18 and 45, so 0 and 49 belong to the singular point with a large fluctuation value.

在对行为数据进行基本的处理之后,根据数据来源和业务特点将行为数据划分为多个维度。比如,基本信息、社交互动、金融理财等,归类整合写入数据库。在写入数据库时,可以先约定好数据类型及数据结构。例如,数值的类型为int,地区名称的类型为字符串。其他形式也可,不再一一举例。After basic processing of behavioral data, behavioral data is divided into multiple dimensions based on data sources and business characteristics. For example, basic information, social interaction, financial management, etc., are classified and integrated into the database. When writing to the database, you can agree on the data type and data structure. For example, the type of the value is int and the type of the region name is a string. Other forms are also available, no longer one by one.

由于这些存储的行为数据数量庞大,且很多数据之间具有相关性,因此,需要对这些数据进行筛选,得到显著性较强的特征来输入到数据分析模型。Because of the large amount of behavioral data stored in these stores, and the correlation between many data, it is necessary to filter these data and obtain more significant features to input into the data analysis model.

a)基础属性中公务员人群工作较稳定,经济来源可靠,可以反映用户的 经济能力和还款意愿;a) The civil servants in the basic attributes work more stable and have reliable economic sources, which can reflect the users' Economic ability and willingness to repay;

b)社交互动中经常不及时回复消息的用户可能比较懒散,反映用户在性格上比较拖延;b) Users who often do not respond to messages in a timely manner in social interactions may be lazy, reflecting the user's delay in personality;

c)经常购买增值服务、网上购物的用户可以反映用户的经济能力;c) Users who frequently purchase value-added services and shop online can reflect the user's financial ability;

d)经济行为中股票、基金、P2P购买可以反映用户的风险承受能力和经济能力;d) Stocks, funds, and P2P purchases in economic behavior can reflect the user's risk tolerance and economic ability;

e)打了专车但又经常取消订单或者评星较低可以反映用户的信誉;e) hit the car but often cancel the order or the lower rating can reflect the user's reputation;

f)用户经常来往的朋友如果都是高素质,守约定,经济能力较强的人群,一定程度上可以反馈用户自身。f) If the users who are frequented by the users are all high-quality, adherent to the agreement, the people with strong economic ability can feedback the users themselves to a certain extent.

上述基础属性、社交互动行为、购买行为、打车行为和朋友属性都能体现账号数据的行为特征。The above basic attributes, social interaction behavior, purchase behavior, taxi behavior and friend attributes can all reflect the behavior characteristics of the account data.

即,作为一种实施方式,根据行为数据获取账号数据的第一特征变量包括:获取行为数据中特征的信息增益,信息增益用于表示行为数据包含的信息量;判断信息增益是否处于预设数值范围之内;若信息增益处于预设数值范围之内,则根据行为数据构造衍生变量,其中,衍生变量为合并或者拆分后的行为数据;若信息增益处于预设数值范围以外,则删除处于预设数值范围以外的信息增益对应的特征,再根据剩余的特征构造衍生变量;将衍生变量作为第一特征变量。That is, as an implementation manner, acquiring the first feature variable of the account data according to the behavior data includes: acquiring an information gain of the feature in the behavior data, the information gain is used to represent the amount of information included in the behavior data; and determining whether the information gain is at a preset value Within the range; if the information gain is within the preset value range, the derived variable is constructed according to the behavior data, wherein the derived variable is the merged or split behavior data; if the information gain is outside the preset value range, the delete is at The feature corresponding to the information gain outside the preset numerical range is used, and then the derived variable is constructed according to the remaining features; the derived variable is taken as the first characteristic variable.

作为一种实施方式,删除处于预设数值范围以外的信息增益对应的特征,再根据剩余的特征构造衍生变量包括:在删除处于预设数值范围以外的信息增益对应的特征之后,获取剩余的特征的相关系数;将相关系数大于等于预设系数的特征合并为一个合并特征;将合并特征作为衍生变量。As an implementation manner, deleting the feature corresponding to the information gain outside the preset value range, and then constructing the derivative variable according to the remaining features includes: acquiring the remaining feature after deleting the feature corresponding to the information gain outside the preset value range The correlation coefficient; the feature whose correlation coefficient is greater than or equal to the preset coefficient is merged into one merge feature; the merged feature is taken as the derivative variable.

特征和特征值构成了行为数据。例如采集到的行为数据包括文本聊天次数、语音通话次数、支付金额等,都是行为数据中的特征。而例如,文本聊天9次,语音通话10次和支付金额100,其中的数字都叫做特征值。 信息增益可以体现一个特征的信息量。如果信息量小于阈值,可以删除该特征。例如,对每一类特征进行信息增益的排序,将信息增益小于阈值的特征删除。然后再检测剩余的特征的相关性,如果有相关性较强的特征,则将这些相关性较强的特征合并,得到第一特征变量。如果某个特征的相关性较弱,显著性很强,则可以把这一个特征细化为多个特征。例如,将聊天次数拆分为晚上聊天次数、白天聊天次数、周末聊天次数和工作日聊天次数等。相反的,也可以把晚上聊天次数和白天聊天次数合并为聊天次数。Features and eigenvalues constitute behavioral data. For example, the collected behavior data including the number of text chats, the number of voice calls, the amount of payment, etc., are all characteristics in the behavior data. For example, text chat 9 times, voice call 10 times and payment amount 100, the numbers are called feature values. The information gain can reflect the amount of information of a feature. If the amount of information is less than the threshold, the feature can be deleted. For example, the information gain is sorted for each type of feature, and the feature with the information gain less than the threshold is deleted. Then, the correlation of the remaining features is detected. If there are more relevant features, the features with stronger correlation are combined to obtain the first feature variable. If a feature is weakly correlated and highly significant, then this feature can be refined into multiple features. For example, split the number of chats into evening chats, daytime chats, weekend chats, and weekday chats. Conversely, you can combine night chats and day chats into chats.

在本实施例,可以灵活的对行为数据进行拆分和合并来构造第一特征变量,且拆分和合并时,可以对多个特征采用相同或者不同的方法,(比如,部分特征采用主成分分析法和其它特征采用聚类法等),增加了构造第一特征变量的灵活性。In this embodiment, the behavior data can be flexibly split and merged to construct the first feature variable, and when splitting and merging, the same or different methods can be used for multiple features (for example, some features adopt the principal component) The analysis method and other features using clustering methods, etc.) increase the flexibility of constructing the first feature variable.

作为一种实施方式,在将第一特征变量和第二特征变量输入至数据分析模型之前,方法还包括:将行为数据划分为多个类别;分别对多个类别中的每个类别建立一个子模型,其中,每个子模型用于根据第一特征变量和/或第二特征变量输出第一子值,其中,第一子值用于表示在与子模型对应的类别下,账号数据的行为不满足预设条件的概率值;将多个类别对应的多个子模型构建为数据分析模型。As an implementation manner, before inputting the first feature variable and the second feature variable to the data analysis model, the method further includes: dividing the behavior data into a plurality of categories; respectively establishing one sub-category for each of the plurality of categories a model, wherein each sub-model is configured to output a first sub-value according to the first feature variable and/or the second feature variable, wherein the first sub-value is used to indicate that the account data does not behave under the category corresponding to the sub-model A probability value that satisfies a preset condition; a plurality of sub-models corresponding to the plurality of categories are constructed as a data analysis model.

具体的,在建立数据分析模型时,也即在将所述第一特征变量和所述第二特征变量输入至所述数据分析模型之前,可以按照采集行为数据时所划分的类别,将每个类别对应生成一个子模型,每个子模型都能输出一个第一子值,将这些第一子值进行处理,就得到了数据分析模型输出的第一数值。进一步地,在建立子模型时,可以根据每个类别的样本数据进行训练,得到子模型,也可以继续对每个类别进一步划分,对划分后的数据建立低级别模型,多个低级别模型构成子模型,然后再由子模型构成数据分 析模型。Specifically, when the data analysis model is established, that is, before the first feature variable and the second feature variable are input to the data analysis model, each of the categories may be classified according to the classification of the behavior data. The category corresponds to generate a sub-model, each sub-model can output a first sub-value, and the first sub-values are processed to obtain the first value output by the data analysis model. Further, when the sub-model is established, the sub-model may be trained according to the sample data of each category, and each category may be further divided, and a low-level model is established for the divided data, and multiple low-level models are constructed. Sub-model, and then sub-models constitute data points Analysis of the model.

作为一种实施方式,分别对多个类别中的每个类别建立一个子模型包括:采用相同或者不同的训练模型分别对每个类别建立一个子模型;或者采用相同或者不同的训练模型分别对每个类别下的子类别建立低级别模型,将每个类别下的多个子类别对应的低级别模型构建为子模型。As an implementation manner, respectively establishing a sub-model for each of the plurality of categories includes: respectively establishing a sub-model for each category by using the same or different training models; or using the same or different training models for each The subcategories under the categories establish a low-level model, and the low-level models corresponding to the multiple subcategories under each category are constructed as sub-models.

每个类别建立子模型所采用的训练模型可以相同或者不同,比如,10个类别中,5个类别采用决策树训练模型,另外5个采用神经网络训练子模型。The training models used to build sub-models in each category can be the same or different. For example, among the 10 categories, 5 categories use the decision tree training model, and the other 5 use the neural network training sub-model.

可选地,将多个类别对应的多个子模型构建为数据分析模型包括:采用以下方式将多个子模型构建为数据分析模型:Optionally, constructing the plurality of sub-models corresponding to the plurality of categories into the data analysis model comprises: constructing the plurality of sub-models into the data analysis model in the following manner:

Figure PCTCN2017109397-appb-000002
Figure PCTCN2017109397-appb-000002

其中,P表示第一数值,i为多个子模型中的第i个子模型,n为多个子模型的个数,

Figure PCTCN2017109397-appb-000003
为第i个子模型的系数,Pi'为第i个子模型输出的第一子值,P0为常数特征。Where P always represents the first value, i is the i-th sub-model of the plurality of sub-models, and n is the number of the plurality of sub-models,
Figure PCTCN2017109397-appb-000003
For the coefficient of the i-th sub-model, P i ' is the first sub-value output of the i-th sub-model, and P 0 is a constant feature.

其中,将行为数据划分为多个类别包括:按照行为数据所包括的业务类型将行为数据划分为多个类别;或者将行为数据中包括目标对象的数据划分为一类,将行为数据中不包括目标对象的数据划分为另外一类。The dividing the behavior data into multiple categories includes: dividing the behavior data into multiple categories according to the service type included in the behavior data; or dividing the data including the target object in the behavior data into one category, and not including the behavior data. The data of the target object is divided into another category.

按照层级划分、按照业务类型划分和按照是否包含目标对象的划分,这三种划分方法可以采用其中任意一种单独构建子模型,也可以任意两种或者三种的组合构建子模型。例如,先按照是否包含目标对象的划分建立子模型,然后再按照业务类型划分子模型以下的低级别子模型等等。According to the hierarchical division, the division according to the business type, and the division according to whether or not the target object is included, the three division methods may use any one of them to separately construct the sub-model, or may construct the sub-model by any two or three combinations. For example, first establish a sub-model according to whether or not the target object is divided, and then divide the sub-model below the sub-model according to the business type.

分业务主要参考前面数据类别划分,如基础信息、增值业务、社交互动、经济行为等;分群主要根据业务特点来划分,如经济行为中,有信用卡与没有信用卡的用户在支付、购物、理财等行为表现差异较大,因此可 以划分为两个人群,分别构建模型;分层主要表现在整个模型架构的层次上,如子模型层,子模型也可以划分为多个维度层,每层采用的机器学习算法可以完全不一样。The sub-services mainly refer to the previous data categories, such as basic information, value-added services, social interactions, economic behaviors, etc.; grouping is mainly based on business characteristics. For example, in economic activities, there are credit cards and users without credit cards in payment, shopping, wealth management, etc. Behavioral performance varies widely, so The model is divided into two groups to build the model separately; the layering is mainly at the level of the entire model architecture. For example, the sub-model layer can also be divided into multiple dimension layers. The machine learning algorithm used in each layer can be completely different. .

本实施例中,上述的步骤404至步骤405分别对应于前述实施例中的步骤301至步骤302,因此,本领域的技术人员可以参阅前述实施例而理解上述的步骤404至步骤405,为节约篇幅,这里不再赘述。In this embodiment, the foregoing steps 404 to 405 respectively correspond to the steps 301 to 302 in the foregoing embodiment. Therefore, those skilled in the art can understand the above steps 404 to 405 by referring to the foregoing embodiments, so as to save The length is not repeated here.

采用本发明实施例的技术方案,一方面,实现了准确获取用户信用数据;另一方面,在第一应用客户端请求以所述第一应用客户端的账号数据访问第二应用客户端情况下,通过服务器向第二应用客户端发送账号数据对应的用户信用数据,使得第二应用客户端可基于用户信用数据执行相应的服务逻辑,实现了基于违反预定规则的概率情况提供相应的服务,从而减少不遵守预定规则的概率高的用户在获取服务的过程中导致的信息泄露或对服务平台的攻击等安全问题的出现概率,提升了服务提供及服务平台的安全性及可靠性。According to the technical solution of the embodiment of the present invention, on the one hand, the user credit data is accurately obtained; on the other hand, when the first application client requests to access the second application client by using the account data of the first application client, Transmitting, by the server, the user credit data corresponding to the account data to the second application client, so that the second application client can execute the corresponding service logic based on the user credit data, thereby implementing the corresponding service based on the probability of violating the predetermined rule, thereby reducing the service. The probability of occurrence of security problems such as information leakage or attacks on the service platform caused by users who do not follow the predetermined rules in the process of obtaining services improves the security and reliability of the service provision and service platform.

本发明实施例还提供了一种信息处理方法。图5为本发明实施例的信息处理方法的第三种流程示意图;如图5所示,所述方法包括:The embodiment of the invention also provides an information processing method. FIG. 5 is a schematic diagram of a third process of an information processing method according to an embodiment of the present invention; as shown in FIG. 5, the method includes:

步骤501:基于以第一应用客户端的账号数据请求访问第二应用客户端,终端获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率。Step 501: The user is requested to access the second application client by using the account data of the first application client, where the terminal obtains user credit data corresponding to the account data of the first application client, where the user credit data is used to represent the user identity identifier. The probability that the corresponding end user violates the predetermined rule.

步骤502:基于所述用户信用数据,所述终端通过所述第二应用客户端执行相应的服务逻辑。Step 502: Based on the user credit data, the terminal executes corresponding service logic by using the second application client.

本实施例中,信息处理方法应用于终端中,该终端具体可以是运行第二应用客户端的终端设备,也可以是能运行第一应用客户端和第二应用客户端的终端设备。 In this embodiment, the information processing method is applied to the terminal, and the terminal may be a terminal device running the second application client, or a terminal device capable of running the first application client and the second application client.

本发明实施例中,所述基于以第一应用客户端的账号数据访问第二应用客户端,所述终端获得所述第一应用客户端的账号数据对应的用户信用数据,包括:基于所述终端或另一终端请求以所述第一应用客户端的账号数据访问第二应用客户端,所述终端通过所述第二应用客户端向服务器请求并获得临时标识,输出包括所述临时标识的标识信息;所述服务器为第一应用客户端对应的服务器;基于所述终端或所述另一终端通过所述第一应用客户端读取识别所述标识信息、以及基于所述终端或所述另一终端向所述服务器请求以所述第一应用客户端的账号数据访问所述第二应用客户端,所述终端通过所述第二应用客户端获得来自所述服务器的所述账号数据对应的用户信用数据。其中,所述标识信息为图形码,例如二维码、条形码等。In the embodiment of the present invention, the user accesses the second application client based on the account data of the first application client, and the terminal obtains the user credit data corresponding to the account data of the first application client, including: based on the terminal or The other terminal requests to access the second application client by using the account data of the first application client, and the terminal requests and obtains the temporary identifier from the server through the second application client, and outputs the identifier information including the temporary identifier. The server is a server corresponding to the first application client; and the identifier is read by the first application client based on the terminal or the another terminal, and based on the terminal or the another terminal Requesting, by the server, accessing the second application client by using the account data of the first application client, where the terminal obtains user credit data corresponding to the account data from the server by using the second application client . The identification information is a graphic code, such as a two-dimensional code, a barcode, or the like.

实际应用中,以终端能运行第一应用客户端和第二应用客户端为例,终端激活第二应用客户端后,在第二应用客户端的显示界面中可通过检测到针对第一应用客户端的标识的输入操作请求以所述第一应用客户端的账号数据访问第二应用客户端,即终端通过第一应用客户端与第二应用客户端之间的接口向第二应用客户端发送登录请求消息,并且是以所述第一应用客户端的账号数据访问第二应用客户端的登录请求;其中,显示的第一应用客户端的标识具体可以是显示的第一应用客户端的图标或者链接,用户触发该图标或链接以请求以第一应用客户端的账号数据访问对应的第二应用客户端。In an actual application, the terminal can run the first application client and the second application client. After the terminal activates the second application client, the display interface of the second application client can detect the first application client. The input operation request of the identifier accesses the second application client by using the account data of the first application client, that is, the terminal sends the login request message to the second application client through the interface between the first application client and the second application client. And accessing the login request of the second application client by using the account data of the first application client; wherein the identifier of the displayed first application client may be an icon or a link of the displayed first application client, and the user triggers the icon Or link to request access to the corresponding second application client by using the account data of the first application client.

第二应用客户端接收到该登录请求消息后,与服务器(即第一应用客户端所属服务器)通信,获得临时标识,该临时标识可以是UUID;作为一种实施方式,第二应用客户端可通过编码的方式对临时标识进行编码生成标识信息,通过终端的显示组件输出展示该标识信息;第一应用客户端识别该标识信息,获得标识信息包括的临时标识;其中,第二应用客户端可 通过二维码编码的方式对临时标识进行编码生成二维码信息,终端可通过显示组件显示该二维码信息;第一应用客户端可通过OCR方式识别该二维码信息,从而获得该二维码信息携带的临时标识。终端通过第一应用给客户端向服务器发送第一消息,所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识,还可以包括该临时标识和应用标识(该应用标识为第二应用客户端对应的应用标识),以便于服务器向所述终端的第二应用客户端返回授权信息,以及根据用户身份标识获得对应的用户信用数据,向第二终端的第二应用客户端返回用户信用数据。After receiving the login request message, the second application client communicates with the server (that is, the server to which the first application client belongs) to obtain a temporary identifier, which may be a UUID; as an implementation manner, the second application client may The temporary identifier is encoded by the encoding method to generate the identification information, and the identification information is displayed by the display component of the terminal. The first application client identifies the identifier information, and obtains the temporary identifier included in the identifier information. The second application client may The temporary identifier is encoded by the two-dimensional code encoding to generate the two-dimensional code information, and the terminal can display the two-dimensional code information by using the display component; the first application client can identify the two-dimensional code information by using an OCR method, thereby obtaining the second The temporary identifier carried by the dimension code information. The terminal sends a first message to the server by using the first application to the client, where the first message includes a user identity corresponding to the account data of the first application client, and may further include the temporary identifier and the application identifier (the application identifier) An application identifier corresponding to the second application client, so that the server returns the authorization information to the second application client of the terminal, and obtains corresponding user credit data according to the user identity, to the second application client of the second terminal. The user returns the user credit data.

本实施例中,终端从服务器(具体是第一应用客户端所属服务器)获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述账号数据对应的用户身份标识对应的终端用户违反预定规则的概率。其中,用户信用数据可包括以下数据类型的至少之一:信用分、信用等级。作为一种实施方式,信用分越大,或者信用等级越高,表明相应的终端用户违反约定规则的概率越低,相应的,信用分越小,或者信用等级越低,表明相应的终端用户违反约定规则的概率越大。这里违反预定规则包括两大类:第一类,请求用户主动执行了某一个违反操作等作为违约,例如,在一个应用内点击了没有版权的电影;第二类,用户没有执行预定规则限定的义务,例如,用户超期未交费等不作为违约。In this embodiment, the terminal obtains user credit data corresponding to the account data of the first application client from a server (specifically, the server to which the first application client belongs), and the user credit data is used to represent the user corresponding to the account data. The probability that the end user corresponding to the identity identity violates the predetermined rule. Wherein, the user credit data may include at least one of the following data types: credit score, credit rating. As an implementation manner, the greater the credit score, or the higher the credit rating, the lower the probability that the corresponding terminal user violates the agreed rule, correspondingly, the smaller the credit score, or the lower the credit rating, indicating that the corresponding terminal user violates The greater the probability of a convention. The violation of the predetermined rules here includes two categories: the first category, requesting the user to actively perform a violation operation as a breach of contract, for example, clicking on a movie without copyright in an application; and second, the user does not perform the predetermined rule definition. Obligations, for example, the user’s overdue payment, etc., is not a breach of contract.

本实施例中,信用分可为根据用户使用服务的历史行为数据等各种数据的综合评分,也可以是基于个人属性给出的初次评分,也可以是根据当服务请求发送的当前应用场景的单次信用评分。In this embodiment, the credit score may be a comprehensive score of various data according to historical behavior data of the user using the service, or may be an initial score based on the personal attribute, or may be based on the current application scenario sent when the service request is sent. Single credit score.

本实施例中,作为一种实施方式,所述终端或另一终端通过所述第一应用客户端确认授权以第一应用客户端的账号数据访问第二应用客户端时,向服务器发送一通知消息,基于该通知消息,所述终端通过第二应用客户端获得服务器返回的与所述账号数据相关联的用户信用数据。作为另 一种实施方式,所述终端或另一终端通过第一应用客户端确认请求以所述第一应用客户端的账号数据访问第二应用客户端,即所述终端或另一终端通过第一应用客户端获得临时标识后向服务器发送通知消息,基于该通知消息,所述终端通过第二应用客户端获得来自服务器的与所述账号数据相关联的用户信用数据。In this embodiment, as an implementation manner, the terminal or another terminal sends a notification message to the server when the first application client confirms the authorization to access the second application client by using the account data of the first application client. And, based on the notification message, the terminal obtains user credit data returned by the server and associated with the account data by using the second application client. As another In one embodiment, the terminal or another terminal accesses the second application client by using the account data of the first application client by using the first application client confirmation request, that is, the terminal or another terminal passes the first application client. After obtaining the temporary identifier, the terminal sends a notification message to the server, and based on the notification message, the terminal obtains user credit data associated with the account data from the server through the second application client.

本实施例中,终端通过第二应用客户端基于所述用户信用数据执行相应服务逻辑,所述服务逻辑为响应访问请求执行的操作和/或操作时序。例如,用户A的信用分很低,是一个高概率的违约用户,则终端通过第二应用客户端可执行屏蔽逻辑,当执行屏蔽逻辑时,则第二应用客户端不会响应用户的访问请求,且进一步可能输出表征不提供服务的告知信息。例如,用户B的信用分很高,是一个违反预定规则的低概率用户,则第二应用客户端直接响应该用户B基于第一应用客户端的账号数据的访问请求,给用户B提供其所需的服务。In this embodiment, the terminal executes corresponding service logic based on the user credit data by the second application client, where the service logic is an operation and/or an operation sequence performed in response to the access request. For example, user A has a low credit score and is a high-probability default user. The terminal can perform masking logic through the second application client. When the masking logic is executed, the second application client does not respond to the user's access request. And further it is possible to output notification information characterizing that no service is provided. For example, user B has a high credit score and is a low-probability user who violates the predetermined rule. The second application client directly responds to the user B's access request based on the account data of the first application client, and provides user B with the required request. Service.

作为一种实施方式,所述方法还包括:根据所述用户信用数据及标签分发逻辑,获得账号数据的用户标签,其中,所述用户标签用于表征所述账号数据可获得服务范围;所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围;所述基于所述用户信用数据执行对应于所述请求访问的、所述第二应用客户端的相应服务逻辑,包括以下至少其中之一:执行与所述第一类用户标签对应的服务逻辑,屏蔽针对所述第二应用客户端访问请求或部分响应访问请求;执行与所述第二类用户标签对应的服务逻辑,部分或全部响应针对所述第二应用客户端的访问请求。 As an embodiment, the method further includes: obtaining, according to the user credit data and the label distribution logic, a user label of the account data, wherein the user label is used to represent the account data to obtain a service range; The user tag includes at least a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the first range. The user of the second type is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range, wherein the first range is different from the second range; And executing, by the user credit data, corresponding service logic of the second application client corresponding to the requested access, including at least one of: performing service logic corresponding to the first type of user label, shielding And corresponding to the second application client access request or partial response access request; performing corresponding to the second type of user tag Service logic, some or all of the response to the access request for the second client application.

本实施方式中,终端通过第二应用客户端将根据所述用户信用数据及标签分发逻辑,给出当前访问请求的用户标签。所述标签分发逻辑为基于用户信用数据为用户分配用户标签的判断规则。例如,所述标签分发逻辑可包括映射表,所述映射表包括用户信用数据与对应的用户标签的对应关系,则终端通过第二应用客户端可根据所述对应关系,基于用户信用数据,获得对应的用户标签。所述用户标签可包括多种,例如,该用户标签可为:守约用户和非守约用户。所述守约用户将可分配给遵守预定规则的概率大于预定阈值的用户,所述非守约用户可分配给不遵守预定规则不大于预定阈值的用户。在一些实施例中每一类所述用户标签还可以分为多种子类用户标签。例如,以购票为例,根据信用分,可生成的用户标签可包括:“黄牛”、“第一类普通用户”及“第二类普通用户”。“黄牛(黄牛指的是采购的物资或票务凭证高价卖出以图利的一部分人)”对应的信用分最低,违反预定规则的概率最高。“第一类普通用户”对应的信用分次低,有过退票等违约行为。“第二类普通用户”,对应的信用分最高,从未产生过退票行为。在本实施例中所述“黄牛”及“第一类普通用户”都可为所述第一类用户标签的子类用户标签;所述“第二类普通用户”为所述第二类用户标签的子类用户标签。在一些实施例中所述用户标签还可包括:担保用户;所述担保用户可为预付了担保金等用户,若该类用户违约则会由预付的担保金提供担保,该类用户的信用分可能很高,则为所述第二类用户标签的另一个子类。In this embodiment, the terminal, through the second application client, will give the user label of the current access request according to the user credit data and the label distribution logic. The tag distribution logic is a decision rule for assigning a user tag to a user based on user credit data. For example, the label distribution logic may include a mapping table, where the mapping table includes a correspondence between user credit data and a corresponding user label, and the terminal may obtain, by using the second application client, the user credit data according to the correspondence relationship. Corresponding user tag. The user tags may include a plurality of types, for example, the user tags may be: a promised user and a non-observant user. The compliance user will be assignable to a user whose probability of complying with a predetermined rule is greater than a predetermined threshold, and the non-compliant user may be assigned to a user who does not comply with a predetermined rule that is not greater than a predetermined threshold. In some embodiments each of the types of user tags can also be divided into a plurality of sub-category user tags. For example, in the case of ticket purchase, according to the credit score, the user tags that can be generated may include: "yellow cattle", "first class ordinary users" and "second class ordinary users". "Yellow cattle (yellow cattle refer to the purchase of materials or ticketing vouchers sold at a high price to some people of Tuli)" has the lowest credit score and the highest probability of violating the predetermined rules. The "first class of ordinary users" correspond to low credit scores, and there are defaults such as refunds. "The second type of ordinary users" has the highest credit score and never has a refund. In the embodiment, the "yellow cattle" and the "first type of ordinary users" may be sub-category user tags of the first type of user tags; the "second class of ordinary users" are the second class of users. The subclass user tag of the tag. In some embodiments, the user tag may further include: a guarantor user; the guarantor user may be a user who has paid a security deposit in advance, and if the user defaults, the user's credit is provided by a prepaid security guarantee. May be very high, then another subclass of the second type of user tag.

其中,所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述请求用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签,用于指示所述请求用户违反所述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围。在本实施例中所述用户标签,至少包括第一类用户标 签和第二类用户标签。这里的第一类用户标签可为有非常大概率不遵守所述预定规则的用户。所述第二类用户为遵守所述预定该规则的用户。在本实施例中将用户划分了两大类,在具体的实施过程中,可以不局限于两大类。The user label includes at least a first type of user label and a second type of user label, wherein the first type of user label is used to indicate that the probability that the requesting user violates the predetermined rule is located in the first range. The second type of user tag is used to indicate that the probability that the requesting user violates the predetermined rule is located in a second range of users, wherein the first range is different from the second range. In the embodiment, the user label includes at least a first type of user label. Sign and the second type of user tag. The first type of user tag herein can be a user who has a very high probability of not complying with the predetermined rules. The second type of user is a user who complies with the predetermined rule. In this embodiment, the user is divided into two categories, and in the specific implementation process, it may not be limited to two categories.

在本实施例中一旦确定出了用户标签之后,终端通过第二应用客户端会执行用户标签对应的服务逻辑。例如,对于守约用户可以正常提供服务,而对于非守约用户可以不提供服务或仅提供部分服务。After the user tag is determined in this embodiment, the terminal performs the service logic corresponding to the user tag through the second application client. For example, a service can be provided normally for a compliance user, and a service or only a partial service may be provided for a non-compliant user.

作为一种实施方式,终端通过第二应用客户端执行与所述第一类用户标签对应的服务逻辑,屏蔽服务请求或部分响应所述服务请求。若当前的请求用户的用户标签为第一类用户标签,可屏蔽该用户的服务请求,终端的第二应用客户端不向该请求用户提供服务,则此时该用户获得服务范围为零。部分响应所述服务请求,为不完全响应所述服务请求所需的服务,例如,用户标签为第一类用户标签的用户,请求查询其他用户的信息,请求查询的信息包括敏感信息和非敏感信息,这里的部分响应所述服务请求可包括:仅响应非敏感信息的查询请求,而对敏感信息的查询请求则屏蔽掉。As an implementation manner, the terminal performs service logic corresponding to the first type of user label through the second application client, and blocks the service request or partially responds to the service request. If the user tag of the current requesting user is the first type of user tag, the service request of the user may be blocked, and the second application client of the terminal does not provide the service to the requesting user, and the user obtains the service range of zero at this time. Partially responding to the service request, in order to incompletely respond to the service required by the service request, for example, the user tag is a user of the first type of user tag, requesting to query information of other users, and the information requested to be queried includes sensitive information and non-sensitive The information, the partial response to the service request herein may include: a query request that only responds to the non-sensitive information, and the query request for the sensitive information is masked.

作为另一种实施方式,终端通过第二应用客户端执行与所述第二类用户标签对应的服务逻辑,部分或全部响应所述服务请求。As another implementation manner, the terminal performs, by the second application client, service logic corresponding to the second type of user tag, and partially or completely responds to the service request.

采用本发明实施例的技术方案,在以所述第一应用客户端的账号数据请求访问第二应用客户端情况下,通过服务器向终端的第二应用客户端发送账号数据对应的用户信用数据,使得终端的第二应用客户端可基于用户信用数据执行相应的服务逻辑,实现了终端可基于违反预定规则的概率情况提供相应的服务,从而减少不遵守预定规则的概率高的用户在获取服务的过程中导致的信息泄露或对服务平台的攻击等安全问题的出现概率,提升了服务提供及服务平台的安全性及可靠性。 According to the technical solution of the embodiment of the present invention, when the second application client is requested to access the second application client by using the account data of the first application client, the server sends the user credit data corresponding to the account data to the second application client of the terminal, so that The second application client of the terminal may perform corresponding service logic based on the user credit data, so that the terminal may provide a corresponding service based on the probability of violating the predetermined rule, thereby reducing the probability that the user with high probability of not complying with the predetermined rule acquires the service. The probability of occurrence of security problems such as information leakage or attacks on the service platform increases the security and reliability of the service delivery and service platform.

本发明实施例还提供了一种信息处理方法。所述方法包括:The embodiment of the invention also provides an information processing method. The method includes:

步骤1:基于以所述第一应用客户端的账号数据请求访问第二应用客户端,服务器获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识。Step 1: based on requesting access to the second application client by using the account data of the first application client, the server obtains a first message from the first terminal including the first application client; the first message includes a corresponding message The user identity of the account data of the first application client.

步骤2:所述服务器获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率。Step 2: The server obtains user credit data associated with the user identity, and sends the user credit data to a second terminal including the second application client; the user credit data is used to represent the The probability that the end user corresponding to the user identity violates the predetermined rule.

步骤3:基于所述用户信用数据,所述第二终端通过所述第二应用客户端执行相应服务逻辑。Step 3: Based on the user credit data, the second terminal executes corresponding service logic by using the second application client.

本实施例的上述步骤可参照前述实施例中的描述,这里不再赘述。For the above steps of the embodiment, reference may be made to the description in the foregoing embodiments, and details are not described herein again.

下面结合具体的应用场景对本发明实施例的信息处理方法进行说明。图6a和图6b分别为本发明实施例的信息处理方法的交互流程示意图;作为第一种交互方式,如图6a所示,所述方法包括:The information processing method of the embodiment of the present invention is described below in conjunction with a specific application scenario. FIG. 6 is a schematic diagram of an interaction process of an information processing method according to an embodiment of the present invention; as shown in FIG. 6a, the method includes:

步骤601:主应用客户端向第三方应用客户端发送登录请求,该登录请求具体用于以主应用客户端的账号请求登录第三方应用客户端。其中,该登录请求中包括用户身份标识,该用户身份标识可以是与主应用客户端的账号唯一对应的UID。Step 601: The main application client sends a login request to the third-party application client, where the login request is specifically used to log in to the third-party application client by using the account request of the main application client. The login request includes a user identity, and the user identity may be a UID uniquely corresponding to an account of the main application client.

实际应用中,作为一种示例,用户使用浏览器应用客户端打开一网页页面,例如该网页为一电子商务页面,或者多媒体播放页面(例如腾讯视频页面);用户需要登录该网页。为了避免用户需要输入较多的信息内容才能注册以及输入用户名密码才能登录,在页面的登录区域配置一个或多个主应用的图标,该主应用的图标例如QQ应用图标、微信应用图标等等,以便用户可使用已有的主应用的账号登录该网页。当用户点击任一主应用的图标时,作为主应用的图标对应的主应用客户端向作为第三方应用客户 端的浏览器应用客户端发起登录请求。In an actual application, as an example, the user uses a browser application client to open a webpage, for example, the webpage is an e-commerce page, or a multimedia playpage (such as a Tencent video page); the user needs to log in to the webpage. In order to avoid the user need to input more information content to register and enter the user name and password to log in, configure one or more icons of the main application in the login area of the page, such as QQ application icon, WeChat application icon, etc. So that users can log in to the webpage using the account of the existing main application. When the user clicks on the icon of any of the main applications, the main application client corresponding to the icon of the main application is used as a third-party application client. The browser application client of the end initiates a login request.

步骤602:第三方应用客户端基于主应用客户端的登录请求向主应用客户端对应的主应用服务器请求临时标识,该临时标识可以是临时UUID,该临时UUID仅针对该次请求有效;或者临时UUID在预设时间范围(例如五分钟)内有效。其中,请求消息中可包括主应用客户端的用户身份标识;则主应用服务器生成的临时标识与主应用客户端的用户身份标识对应。Step 602: The third-party application client requests a temporary identifier from the main application server corresponding to the main application client according to the login request of the main application client, where the temporary identifier may be a temporary UUID, and the temporary UUID is valid only for the request; or a temporary UUID Valid for a preset time range (for example, five minutes). The request message may include a user identity of the primary application client; and the temporary identifier generated by the primary application server corresponds to the user identity of the primary application client.

步骤603:主应用服务器向第三方应用客户端返回临时标识。Step 603: The main application server returns a temporary identifier to the third-party application client.

步骤604:第三方应用客户端基于该临时标识和应用标识(APP ID)生成图形码,展示图形码,该图形码具体可以是二维码,则第三方应用客户端根据获得的临时UUID和自身的应用标识编码生成二维码并展示。Step 604: The third-party application client generates a graphic code based on the temporary identifier and the application identifier (APP ID), and displays a graphic code, where the graphic code may specifically be a two-dimensional code, and the third-party application client according to the obtained temporary UUID and itself The application identification code generates a QR code and displays it.

步骤605:第三方应用客户端轮询主应用服务器,获得用户是否确认登录的信息,该信息中携带有临时标识;其中,步骤604与步骤605不区分先后顺序,可以是先执行步骤604再执行步骤605,也可以是先执行步骤605再执行步骤604,也可以是同时执行步骤604和步骤605,本实施例中不对执行顺序进行限定。Step 605: The third-party application client polls the main application server to obtain information about whether the user confirms the login, and the information carries the temporary identifier. The step 604 and the step 605 do not distinguish the sequence, and the step 604 is performed first. In step 605, step 605 may be performed first, and then step 604 may be performed. Step 604 and step 605 may be performed at the same time. The execution sequence is not limited in this embodiment.

步骤606至步骤607:主应用客户端扫描第三方应用客户端展示的图形码,获得图形码携带的临时标识和应用标识。其中,主应用客户端具有图形码扫描读取功能,激活该功能后,作为一种实施方式,通过调用摄像头获得包含有标识信息的图像,进一步识别图像中的图形码携带的临时标识和应用标识。例如,主应用客户端启动图形码扫描功能,调用摄像头,使得主应用客户端显示包括一扫描框的显示界面;当摄像头采集图像数据使得采集到的图形码在该扫描框中时,主应用客户端基于图形码扫描功能对采集的图形码进行扫描,获得该图形码携带的临时标识和应用标识。作为另一种实施方式,主应用客户端具有OCR功能,即直接识别包含有图形码的图像中的字符,进一步基于识别出的字符获得该图形码携带的临时标识 和应用标识。Step 606 to step 607: The main application client scans the graphic code displayed by the third-party application client, and obtains the temporary identifier and the application identifier carried by the graphic code. The main application client has a graphic code scanning and reading function. After the function is activated, as an implementation manner, an image containing the identification information is obtained by calling the camera to further identify the temporary identifier and the application identifier carried by the graphic code in the image. . For example, the main application client starts the graphic code scanning function, and calls the camera, so that the main application client displays the display interface including a scan box; when the camera collects the image data so that the collected graphic code is in the scan frame, the main application client The terminal scans the collected graphic code based on the graphic code scanning function, and obtains the temporary identifier and the application identifier carried by the graphic code. As another implementation manner, the main application client has an OCR function, that is, directly identifying a character in an image including a graphic code, and further obtaining a temporary identifier carried by the graphic code based on the recognized character. And application identification.

步骤608:主应用客户端通知主应用服务器,该通知用于请求以主应用客户端的账号登录第三方应用,通知消息中携带有扫描获得的临时标识、用户身份标识以及应用标识,该应用标识为第三方应用客户端的标识。Step 608: The main application client notifies the main application server, and the notification is used to request to log in to the third-party application by using the account of the main application client, where the notification message carries the temporary identifier, the user identity, and the application identifier obtained by the scan, and the application identifier is The identity of the third-party application client.

步骤609:主应用服务器基于该通知消息向第三方应用客户端返回授权信息,以及携带访问令牌(access token)。Step 609: The main application server returns authorization information to the third-party application client based on the notification message, and carries an access token.

步骤610:第三方应用客户端向主应用客户端请求确认授权。实际应用中,基于主应用客户端的显示界面可显示例如“授权”、“不授权”虚拟按键,以使用户通过点击“授权”虚拟按键确认授权,或者用户通过点击“不授权”虚拟按键确认不授权。Step 610: The third-party application client requests confirmation authorization from the main application client. In an actual application, the display interface based on the main application client may display, for example, an “authorized” or “unauthorized” virtual button, so that the user confirms the authorization by clicking the “authorize” virtual button, or the user confirms by clicking the “unauthorized” virtual button. Authorization.

步骤611:主应用客户端向第三方应用客户端确认授权,即用户点击“授权”虚拟按键,确定主应用客户端向第三方应用客户端确认授权,第三方应用客户端允许使用主应用客户端的账号登录。Step 611: The main application client confirms the authorization to the third-party application client, that is, the user clicks the “authorize” virtual button, and determines that the main application client confirms the authorization to the third-party application client, and the third-party application client allows the use of the main application client. Account login.

步骤612:确认授权后,第三方应用客户端向主应用服务器请求获得用户信息,该请求中包括临时标识、访问令牌、应用标识等信息,主应用服务器可基于请求中的临时标识确定对应的主应用客户端的用户身份标识,基于该用户身份标识获得用户身份标识对应的用户信息,将用户信息返回给第三方应用客户端。Step 612: After confirming the authorization, the third-party application client requests the main application server to obtain the user information, where the request includes the temporary identifier, the access token, the application identifier, and the like, and the main application server may determine the corresponding identifier based on the temporary identifier in the request. The user identity of the main application client obtains the user information corresponding to the user identity based on the user identity, and returns the user information to the third-party application client.

步骤613:主应用客户端以主应用客户端的账号登录第三方应用客户端。Step 613: The main application client logs in to the third-party application client by using the account of the main application client.

步骤614:第三方应用客户端向主应用服务器请求用户信用数据,该请求中可包括临时标识、访问令牌、应用标识等信息。Step 614: The third-party application client requests user credit data from the main application server, and the request may include information such as a temporary identifier, an access token, and an application identifier.

步骤615:主应用服务器基于该请求中的临时标识确定对应的主应用客户端的用户身份标识,基于该用户身份标识获得对应的用户信用数据,该用户信用数据例如用户信用等级和/或用户信用分。进一步地,主应用服务 器还可基于用户信用数据进行识别判断,判断该用户信用数据是否表征对应用户身份标识的终端用户违反预定规则的概率较高,例如分数较低或者等级较低的用户信用数据对应的终端用户违反预定规则的概率较高;当判定该用户信用数据表征对应用户身份标识的终端用户违反预定规则的概率较高,主应用服务器可生成提示信息,该提示信息表征终端用户违反预定规则的概率较高,提供服务具有一定的风险。Step 615: The primary application server determines a user identity of the corresponding primary application client based on the temporary identifier in the request, and obtains corresponding user credit data based on the user identity, such as user credit rating and/or user credit score. . Further, the main application service The device may further perform a recognition judgment based on the user credit data, and determine whether the user credit data indicates that the terminal user corresponding to the user identity identifier has a higher probability of violating the predetermined rule, for example, the terminal user corresponding to the lower-ranking or lower-level user credit data violates The probability of the predetermined rule is high; when it is determined that the user credit data represents a higher probability that the terminal user corresponding to the user identity violates the predetermined rule, the main application server may generate prompt information, and the prompt information indicates that the terminal user has a higher probability of violating the predetermined rule. Providing services has certain risks.

步骤616:主应用服务器将用户信用数据发送至第三方应用客户端,以使第三方应用客户端基于该用户信用数据执行相应的逻辑;或者,主应用服务器发送提示信息至第三方应用客户端,该提示信息表征终端用户违反预定规则的概率较高,提供服务具有一定的风险。Step 616: The main application server sends the user credit data to the third-party application client, so that the third-party application client executes the corresponding logic based on the user credit data; or the main application server sends the prompt information to the third-party application client. The prompt information indicates that the terminal user has a high probability of violating the predetermined rule, and providing the service has a certain risk.

步骤617:第三方应用客户端基于用户信用数据执行相应的服务逻辑,例如,全部响应或部分响应访问请求,或者屏蔽访问请求。或者,第三方应用客户端基于接收到的提示信息屏蔽访问请求,或者部分响应访问请求。Step 617: The third-party application client executes corresponding service logic based on the user credit data, for example, all responding or partially responding to the access request, or blocking the access request. Alternatively, the third party application client blocks the access request based on the received prompt information, or partially responds to the access request.

作为另一种交互方式,如图6b所示,步骤601至步骤608可参照图6a中的相关描述,这里不再赘述,在步骤608之后,还包括:As another interaction mode, as shown in FIG. 6b, step 601 to step 608 may refer to the related description in FIG. 6a, and details are not described herein again. After step 608, the method further includes:

步骤609’:主应用服务器基于步骤608的通知请求中携带的临时标识确定对应的主应用客户端的用户身份标识,基于该用户身份标识获得对应的用户信用数据,该用户信用数据例如用户信用等级和/或用户信用分。进一步地,主应用服务器还可基于用户信用数据进行识别判断,判断该用户信用数据是否表征对应用户身份标识的终端用户违反预定规则的概率较高,例如分数较低或者等级较低的用户信用数据对应的终端用户违反预定规则的概率较高;当判定该用户信用数据表征对应用户身份标识的终端用户违反预定规则的概率较高,主应用服务器可生成提示信息,该提示信息表征终端用户违反预定规则的概率较高,提供服务具有一定的风险。Step 609 ′: The main application server determines the user identity of the corresponding main application client based on the temporary identifier carried in the notification request in step 608, and obtains corresponding user credit data based on the user identity, such as user credit level and / or user credit points. Further, the main application server may further perform identification determination based on the user credit data, and determine whether the user credit data indicates that the terminal user corresponding to the user identity identifier has a higher probability of violating the predetermined rule, such as user credit data with lower score or lower rank. The probability that the corresponding terminal user violates the predetermined rule is high; when it is determined that the user credit data represents that the terminal user corresponding to the user identity identifier has a high probability of violating the predetermined rule, the main application server may generate prompt information, and the prompt information indicates that the terminal user violates the predetermined schedule. The probability of a rule is high, and providing a service has certain risks.

步骤610’:主应用服务器基于该通知消息向第三方应用客户端返回授 权信息和访问令牌(access token),以及携带用户信用数据或者表征信用较低的提示信息。Step 610': the main application server returns to the third-party application client based on the notification message. Rights information and access tokens, as well as prompt information carrying user credit data or characterizing lower credits.

步骤611’:第三方应用客户端向主应用客户端请求确认授权。实际应用中,基于主应用客户端的显示界面可显示例如“授权”、“不授权”虚拟按键,以使用户通过点击“授权”虚拟按键确认授权,或者用户通过点击“不授权”虚拟按键确认不授权。Step 611': The third-party application client requests confirmation authorization from the main application client. In an actual application, the display interface based on the main application client may display, for example, an “authorized” or “unauthorized” virtual button, so that the user confirms the authorization by clicking the “authorize” virtual button, or the user confirms by clicking the “unauthorized” virtual button. Authorization.

步骤612’:主应用客户端向第三方应用客户端确认授权,即用户点击“授权”虚拟按键,确定主应用客户端向第三方应用客户端确认授权,第三方应用客户端允许使用主应用客户端的账号登录。Step 612 ′: The main application client confirms the authorization to the third-party application client, that is, the user clicks the “authorize” virtual button to determine that the main application client confirms the authorization to the third-party application client, and the third-party application client allows the main application client to be used. The account number of the end is logged in.

步骤613’:确认授权后,第三方应用客户端向主应用服务器请求获得用户信息,该请求中包括临时标识、访问令牌、应用标识等信息,主应用服务器可基于请求中的临时标识确定对应的主应用客户端的用户身份标识,基于该用户身份标识获得用户身份标识对应的用户信息,将用户信息返回给第三方应用客户端。Step 613 ′: After confirming the authorization, the third-party application client requests the main application server to obtain the user information, where the request includes the temporary identifier, the access token, the application identifier, and the like, and the main application server may determine the corresponding identifier based on the temporary identifier in the request. The user identity of the primary application client, based on the user identity, obtains the user information corresponding to the user identity, and returns the user information to the third-party application client.

步骤614’:主应用客户端以主应用客户端的账号登录第三方应用客户端。Step 614': The main application client logs in to the third-party application client with the account of the main application client.

步骤615’:第三方应用客户端基于用户信用数据执行相应的服务逻辑,例如,全部响应或部分响应访问请求,或者屏蔽访问请求。或者,第三方应用客户端基于接收到的提示信息屏蔽访问请求,或者部分响应访问请求。Step 615': The third party application client executes the corresponding service logic based on the user credit data, for example, all responding or partially responding to the access request, or masking the access request. Alternatively, the third party application client blocks the access request based on the received prompt information, or partially responds to the access request.

本发明实施例还提供了一种服务器。图7为本发明实施例的服务器的一种组成结构示意图,如图7所示,所述服务器包括:第一通讯单元71、第一获取单元72和第二通讯单元73;所述第一通讯单元71,配置为基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括第一应用客户端的账号数据对应的用户身份标识;所述第一获取单元72,配置为获得 与所述用户身份标识相关联的用户信用数据;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;所述第二通讯单元73,配置为将所述第一获取单元72获得的所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑。An embodiment of the present invention further provides a server. FIG. 7 is a schematic structural diagram of a server according to an embodiment of the present invention. As shown in FIG. 7, the server includes: a first communication unit 71, a first obtaining unit 72, and a second communication unit 73; The unit 71 is configured to obtain a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client, where the first message includes the first application client a user identity corresponding to the account data of the terminal; the first obtaining unit 72 is configured to obtain User credit data associated with the user identity; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; the second communication unit 73 is configured to The user credit data obtained by the obtaining unit 72 is sent to the second terminal including the second application client, so that the second application client of the second terminal executes the corresponding service logic based on the user credit data.

在一实施例中,所述第二通讯单元73,配置为响应于获得的表征授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息,将所述用户信用数据发送至所述第二应用客户端。In an embodiment, the second communication unit 73 is configured to send the user credit data in response to the obtained characterization confirmation that the account information of the first application client accesses the confirmation message of the second application client. To the second application client.

在一实施例中,所述第一通讯单元71,配置为基于所述第一终端通过所述第一应用客户端读取识别所述第二终端通过所述第二应用客户端输出的标识信息,获得来自所述第一终端的第一消息,所述第一消息包括所述用户身份标识和分配的临时标识。In an embodiment, the first communication unit 71 is configured to: according to the first terminal, read, by the first application client, identifier information that is output by the second terminal through the second application client. Obtaining a first message from the first terminal, the first message including the user identity and the assigned temporary identity.

作为一种实施方式,图8为本发明实施例的服务器的另一种组成结构示意图,如图8所示,所述服务器还包括采集单元74和第二获取单元75;其中,所述采集单元74,配置为采集对应于所述账号数据的行为数据,所述行为数据包括基于互联网的线上行为数据和线下行为数据;所述第二获取单元75,配置为根据所述采集单元74采集的所述行为数据获取所述账号数据的第一特征变量,其中,所述第一特征变量用于表示所述账号数据的行为特征;将所述第一特征变量输入数据分析模型,获得用户信用数据;其中,所述数据分析模型用于根据所述第一特征变量输出用户信用数据。FIG. 8 is a schematic structural diagram of another configuration of a server according to an embodiment of the present invention. As shown in FIG. 8, the server further includes an acquiring unit 74 and a second acquiring unit 75. 74. The method is configured to collect behavior data corresponding to the account data, where the behavior data includes online behavior data and offline behavior data based on the Internet; and the second obtaining unit 75 is configured to collect according to the collection unit 74. Obtaining, by the behavior data, a first feature variable of the account data, wherein the first feature variable is used to represent a behavior characteristic of the account data; and the first feature variable is input into a data analysis model to obtain a user credit Data; wherein the data analysis model is configured to output user credit data according to the first feature variable.

本实施方式中,所述第二获取单元75,配置为获取第二特征变量,其中,所述第二特征变量用于表示与所述账号数据具有关联关系的多个其他账号数据的行为特征;将所述第一特征变量和所述第二特征变量输入至所述数据分析模型,其中,所述数据分析模型还用于根据所述第一特征变量和所述第二特征变量输出所述用户信用数据。 In this embodiment, the second acquiring unit 75 is configured to acquire a second feature variable, where the second feature variable is used to indicate behavior characteristics of a plurality of other account data that are associated with the account data; Inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to output the user according to the first feature variable and the second feature variable Credit data.

本实施方式中,所述第二获取单元75,配置为将所述行为数据划分为多个类别;分别对所述多个类别中的每个类别建立一个子模型,其中,每个子模型用于根据所述第一特征变量和/或所述第二特征变量输出第一子值,其中,所述第一子值用于表示在与所述子模型对应的类别下,所述账号数据的行为不满足所述预设条件的概率值;将所述多个类别对应的多个子模型构建为所述数据分析模型。In this embodiment, the second obtaining unit 75 is configured to divide the behavior data into a plurality of categories; and respectively establish a sub-model for each of the plurality of categories, wherein each sub-model is used for Outputting a first sub-value according to the first feature variable and/or the second feature variable, wherein the first sub-value is used to indicate behavior of the account data under a category corresponding to the sub-model A probability value that does not satisfy the preset condition; and a plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model.

本发明实施例中,所述服务器中的第一获取单元72、采集单元74和第二获取单元75,在实际应用中均可由所述服务器中的中央处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Signal Processor)、微控制单元(MCU,Microcontroller Unit)或可编程门阵列(FPGA,Field-Programmable Gate Array)实现;所述服务器中的第一通讯单元71和第二通讯单元73,在实际应用中可通过通信模组(包含:基础通信套件、操作系统、通信模块、标准化接口和协议等)及收发天线实现。In the embodiment of the present invention, the first obtaining unit 72, the collecting unit 74, and the second obtaining unit 75 in the server may be used by a central processing unit (CPU) in the server and a digital number in the actual application. a DSP (Digital Signal Processor), a Microcontroller Unit (MCU), or a Field-Programmable Gate Array (FPGA); the first communication unit 71 and the second communication in the server The unit 73 can be implemented in a practical application by a communication module (including: a basic communication suite, an operating system, a communication module, a standardized interface, a protocol, etc.) and a transceiver antenna.

需要说明的是:上述实施例提供的服务器在进行信息处理时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将服务器的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的服务器与信息处理方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that, when the server provided by the foregoing embodiment performs information processing, only the division of each of the foregoing program modules is illustrated. In an actual application, the foregoing processing may be performed by different program modules, that is, the server. The internal structure is divided into different program modules to perform all or part of the processing described above. In addition, the server and the information processing method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.

本发明实施例还提供了一种终端。图9为本发明实施例的终端的一种组成结构示意图,如图9所示,所述终端包括:第三通讯单元81和执行单元82;所述第三通讯单元81,配置为基于以第一应用客户端的账号数据访问第二应用客户端,获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;所述执行单元82,配置为基于所述第三通讯单元81获得 的所述用户信用数据,通过所述第二应用客户端执行相应的服务逻辑。The embodiment of the invention further provides a terminal. FIG. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in FIG. 9, the terminal includes: a third communication unit 81 and an execution unit 82. The third communication unit 81 is configured to be based on The account data of the application client accesses the second application client, and obtains user credit data corresponding to the account data of the first application client, where the user credit data is used to represent that the terminal user corresponding to the user identity violates a predetermined rule. Probability; the execution unit 82 is configured to obtain based on the third communication unit 81 The user credit data is executed by the second application client to execute corresponding service logic.

在一实施例中,所述执行单元82,还配置为根据所述用户信用数据及标签分发逻辑,获得账号数据的用户标签,其中,所述用户标签用于表征所述账号数据可获得服务范围;所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围;还配置为基于所述用户信用数据执行相应的服务逻辑,包括以下至少其中之一:执行与所述第一类用户标签对应的服务逻辑,屏蔽访问请求或部分响应访问请求;执行与所述第二类用户标签对应的服务逻辑,部分或全部响应访问请求。In an embodiment, the executing unit 82 is further configured to obtain a user label of the account data according to the user credit data and the label distribution logic, wherein the user label is used to represent the account data to obtain a service range. The user tag includes at least a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate that the terminal user corresponding to the account data violates the predetermined rule. a user in a range; the user identifier of the second type is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range, wherein the first range is different from the first a second scope; configured to execute a corresponding service logic based on the user credit data, including at least one of: performing service logic corresponding to the first type of user tag, masking an access request or partially responding to the access request; performing and The service logic corresponding to the second type of user tag partially or completely responds to the access request.

在一实施例中,所述终端还包括输出单元;所述第三通讯单元81,配置为基于所述终端或另一终端请求以所述第一应用客户端的账号数据访问第二应用客户端,通过所述第二应用客户端向服务器请求并获得临时标识;所述服务器为第一应用客户端对应的服务器;所述输出单元,配置为输出包括所述临时标识的标识信息;所述第三通讯单元81,还配置为基于所述终端或所述另一终端通过所述第一应用客户端读取识别所述标识信息、以及基于所述终端或所述另一终端向所述服务器请求以所述第一应用客户端的账号数据访问所述第二应用客户端,通过所述第二应用客户端获得来自所述服务器的所述账号数据对应的用户信用数据。In an embodiment, the terminal further includes an output unit, and the third communication unit 81 is configured to request to access the second application client by using the account data of the first application client, based on the terminal or another terminal. Requesting, by the second application client, a temporary identifier to the server; the server is a server corresponding to the first application client; the output unit is configured to output identifier information including the temporary identifier; The communication unit 81 is further configured to: according to the terminal or the another terminal, read and identify the identification information by using the first application client, and request the server to be based on the terminal or the another terminal The account data of the first application client accesses the second application client, and the user credit data corresponding to the account data from the server is obtained by the second application client.

本发明实施例中,所述终端中的执行单元82,在实际应用中可由所述终端中的CPU、DSP、MCU或FPGA实现;所述终端中的第三通讯单元81,在实际应用中可通过通信模组(包含:基础通信套件、操作系统、通信模块、标准化接口和协议等)及收发天线实现;所述终端中的输出单元,在 实际应用中可通过终端的显示组件实现。In the embodiment of the present invention, the execution unit 82 in the terminal may be implemented by a CPU, a DSP, an MCU or an FPGA in the terminal in an actual application; the third communication unit 81 in the terminal may be used in an actual application. Through a communication module (including: basic communication suite, operating system, communication module, standardized interface and protocol, etc.) and a transceiver antenna; the output unit in the terminal is In practical applications, it can be realized by the display component of the terminal.

需要说明的是:上述实施例提供的终端在进行信息处理时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将终端的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的终端与信息处理方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that, when performing the information processing, the terminal provided by the foregoing embodiment only exemplifies the division of each of the foregoing program modules. In an actual application, the processing may be allocated by different program modules as needed, that is, the terminal is The internal structure is divided into different program modules to perform all or part of the processing described above. In addition, the terminal and the information processing method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.

本发明实施例还提供了一种服务器,图10为本发明实施例的服务器的硬件组成结构示意图;如图10所示,包括存储器92、处理器91及存储在存储器92上并可在处理器91上运行的计算机程序,还包括电源组件以及通信组件93,各个组件通过总线系统94耦合在一起。可理解,总线系统94用于实现这些组件之间的连接通信。总线系统94除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图10中将各种总线都标为总线系统94。The embodiment of the present invention further provides a server. FIG. 10 is a schematic structural diagram of hardware components of a server according to an embodiment of the present invention; as shown in FIG. 10, the device includes a memory 92, a processor 91, and is stored in the memory 92 and can be in the processor. The computer program running on 91 also includes a power component and a communication component 93, each component being coupled together by a bus system 94. As can be appreciated, bus system 94 is used to implement connection communication between these components. The bus system 94 includes, in addition to the data bus, a power bus, a control bus, and a status signal bus. However, for clarity of description, various buses are labeled as bus system 94 in FIG.

可以理解,存储器92可以是易失性存储器或非易失性存储器,也可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(ROM,Read Only Memory)、可编程只读存储器(PROM,Programmable Read-Only Memory)、可擦除可编程只读存储器(EPROM,Erasable Programmable Read-Only Memory)、电可擦除可编程只读存储器(EEPROM,Electrically Erasable Programmable Read-Only Memory)、磁性随机存取存储器(FRAM,ferromagnetic random access memory)、快闪存储器(Flash Memory)、磁表面存储器、光盘、或只读光盘(CD-ROM,Compact Disc Read-Only Memory);磁表面存储器可以是磁盘存储器或磁带存储器。易失性存储器可以是随机存取存储器(RAM,Random Access Memory),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例 如静态随机存取存储器(SRAM,Static Random Access Memory)、同步静态随机存取存储器(SSRAM,Synchronous Static Random Access Memory)、动态随机存取存储器(DRAM,Dynamic Random Access Memory)、同步动态随机存取存储器(SDRAM,Synchronous Dynamic Random Access Memory)、双倍数据速率同步动态随机存取存储器(DDRSDRAM,Double Data Rate Synchronous Dynamic Random Access Memory)、增强型同步动态随机存取存储器(ESDRAM,Enhanced Synchronous Dynamic Random Access Memory)、同步连接动态随机存取存储器(SLDRAM,SyncLink Dynamic Random Access Memory)、直接内存总线随机存取存储器(DRRAM,Direct Rambus Random Access Memory)。本发明实施例描述的存储器92旨在包括但不限于这些和任意其它适合类型的存储器。It will be appreciated that memory 92 can be either volatile memory or non-volatile memory, and can include both volatile and nonvolatile memory. The non-volatile memory may be a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), or an Erasable Programmable Read (EPROM). Only Memory), Electrically Erasable Programmable Read-Only Memory (EEPROM), Ferromagnetic Random Access Memory (FRAM), Flash Memory, Magnetic Surface Memory , CD-ROM, or Compact Disc Read-Only Memory (CD-ROM); the magnetic surface memory can be a disk storage or a tape storage. The volatile memory can be a random access memory (RAM) that acts as an external cache. By way of illustration and not limitation, many forms of RAM are available, for example Such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access (DRAM) SDRAM (Synchronous Dynamic Random Access Memory), Double Data Rate Synchronous Dynamic Random Access Memory (DDRS), Enhanced Synchronous Dynamic Random Access (ESDRAM) Memory), Synchronous Connection Random Random Access Memory (SLDRAM), Direct Memory Bus Random Access Memory (DRRAM). The memory 92 described in the embodiments of the present invention is intended to include, but is not limited to, these and any other suitable types of memory.

其中,处理器91可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器91中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器91可以是通用处理器、DSP,或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。处理器91可以实现或者执行本发明实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本发明实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于存储器92,处理器91读取存储器92中的信息,结合其硬件完成前述方法的步骤。Among them, the processor 91 may be an integrated circuit chip with signal processing capability. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 91 or an instruction in a form of software. The processor 91 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like. The processor 91 can implement or perform the various methods, steps, and logic blocks disclosed in the embodiments of the present invention. A general purpose processor can be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiment of the present invention may be directly implemented as a hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor. The software module can reside in a storage medium located in memory 92, and processor 91 reads the information in memory 92 in conjunction with its hardware to perform the steps of the foregoing method.

本实施例中,所述处理器91执行所述程序时实现:基于以第一应用客户端的账号数据访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括所述第一应用客户端的账号数据对应的用户身份标识;获得与所述用户身份标识相关联的用户信用数据, 将所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率。In this embodiment, when the processor 91 executes the program, the method is: accessing the second application client by using the account data of the first application client, and obtaining the first message from the first terminal including the first application client. The first message includes a user identity corresponding to the account data of the first application client; obtaining user credit data associated with the user identity, Transmitting the user credit data to a second terminal including the second application client, so that the second application client of the second terminal executes corresponding service logic based on the user credit data; the user credit data A probability of characterizing that the end user corresponding to the user identity violates a predetermined rule.

作为一种实施方式,所述处理器91执行所述程序时实现:响应于获得的表征授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息,将所述用户信用数据发送至所述第二应用客户端。As an implementation manner, when the processor 91 executes the program, the user credit is obtained by accessing the confirmation message of the second application client by using the account data of the first application client in response to the obtained characterization authorization. Data is sent to the second application client.

作为一种实施方式,所述处理器91执行所述程序时实现:基于所述第一终端通过所述第一应用客户端读取识别所述第二终端通过所述第二应用客户端输出的标识信息,获得来自所述第一终端的第一消息,所述第一消息包括所述用户身份标识和分配的临时标识。As an implementation manner, when the processor 91 executes the program, the first terminal is configured to read, by the first application client, that the second terminal is output by using the second application client. Identifying information, obtaining a first message from the first terminal, the first message including the user identity and the assigned temporary identity.

作为一种实施方式,所述处理器91执行所述程序时还实现:采集对应于所述账号数据的行为数据,所述行为数据包括基于互联网的线上行为数据和线下行为数据;根据所述行为数据获取所述账号数据的第一特征变量,其中,所述第一特征变量用于表示所述账号数据的行为特征;将所述第一特征变量输入数据分析模型,获得用户信用数据;其中,所述数据分析模型用于根据所述第一特征变量输出用户信用数据。As an implementation manner, when the processor 91 executes the program, the method further includes: collecting behavior data corresponding to the account data, where the behavior data includes online behavior data and offline behavior data based on the Internet; Determining, by the behavior data, a first feature variable of the account data, wherein the first feature variable is used to represent a behavior characteristic of the account data; and the first feature variable is input into a data analysis model to obtain user credit data; The data analysis model is configured to output user credit data according to the first feature variable.

作为一种实施方式,所述处理器91执行所述程序时还实现:获取第二特征变量,其中,所述第二特征变量用于表示与所述账号数据具有关联关系的多个其他账号数据的行为特征;将所述第一特征变量和所述第二特征变量输入至所述数据分析模型,其中,所述数据分析模型还用于根据所述第一特征变量和所述第二特征变量输出所述用户信用数据。As an implementation manner, when the processor 91 executes the program, the method further includes: acquiring a second feature variable, where the second feature variable is used to represent a plurality of other account data that are associated with the account data. a behavior characteristic; inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to use the first feature variable and the second feature variable The user credit data is output.

作为一种实施方式,所述处理器91执行所述程序时还实现:将所述行为数据划分为多个类别;分别对所述多个类别中的每个类别建立一个子模型,其中,每个子模型用于根据所述第一特征变量和/或所述第二特征变量 输出第一子值,其中,所述第一子值用于表示在与所述子模型对应的类别下,所述账号数据的行为不满足所述预设条件的概率值;将所述多个类别对应的多个子模型构建为所述数据分析模型。As an implementation manner, when the processor 91 executes the program, the method further includes: dividing the behavior data into a plurality of categories; and respectively establishing a sub-model for each of the plurality of categories, where each a sub-model for using the first characteristic variable and/or the second characteristic variable Outputting a first sub-value, wherein the first sub-value is used to indicate a probability value that the behavior of the account data does not satisfy the preset condition under a category corresponding to the sub-model; A plurality of sub-models corresponding to the categories are constructed as the data analysis model.

本发明实施例还提供了一种终端,图11为本发明实施例的终端的软硬件结合示意图,如图11所示,包括存储器802、处理器801及存储在存储器802上并可在处理器801上运行的计算机程序,还包括至少一个网络接口804和用户接口803,各个组件通过总线系统805耦合在一起。可理解,总线系统805用于实现这些组件之间的连接通信。总线系统805除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图11中将各种总线都标为总线系统805。The embodiment of the present invention further provides a terminal. FIG. 11 is a schematic diagram of a combination of software and hardware of a terminal according to an embodiment of the present invention. As shown in FIG. 11, the system includes a memory 802, a processor 801, and is stored in the memory 802 and can be in the processor. The computer program running on 801 also includes at least one network interface 804 and a user interface 803, each of which is coupled together by a bus system 805. It will be appreciated that the bus system 805 is used to implement connection communication between these components. The bus system 805 includes a power bus, a control bus, and a status signal bus in addition to the data bus. However, for clarity of description, various buses are labeled as bus system 805 in FIG.

与前述图10所示的服务器不同的是,本实施例中的存储器802还用于存储各种类型的数据以支持终端的操作。这些数据的示例包括:用于终端上操作的任何计算机程序,如操作系统8021和应用程序8022、联系人数据、电话簿数据、消息、图片、视频等。其中,操作系统8021包含各种系统程序,例如框架层、核心库层、驱动层等,用于实现各种基础业务以及处理基于硬件的任务。应用程序8022可以包含各种应用程序,例如媒体播放器(Media Player)、浏览器(Browser)等,用于实现各种应用业务。实现本发明实施例方法的程序可以包含在应用程序8022中。Different from the foregoing server shown in FIG. 10, the memory 802 in this embodiment is also used to store various types of data to support the operation of the terminal. Examples of such data include any computer program for operation on a terminal, such as operating system 8021 and application 8022, contact data, phone book data, messages, pictures, videos, and the like. The operating system 8021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 8022 can include various applications, such as a Media Player, a Browser, etc., for implementing various application services. A program implementing the method of the embodiment of the present invention may be included in the application 8022.

本实施例中,所述处理器801执行所述程序时实现:基于以第一应用客户端的账号数据请求访问第二应用客户端,获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;基于所述用户信用数据,通过所述第二应用客户端执行相应的服务逻辑。In this embodiment, when the processor 801 executes the program, the method is: requesting access to the second application client by using the account data of the first application client, and obtaining user credit data corresponding to the account data of the first application client, The user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; and based on the user credit data, the corresponding service logic is executed by the second application client.

作为一种实施方式,所述处理器801执行所述程序时实现:根据所述用户信用数据及标签分发逻辑,获得所述账号数据的用户标签,其中,所 述用户标签用于表征所述账号数据可获得服务范围;所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围;以及,基于所述用户信用数据执行对应于所述请求访问的、所述第二应用客户端的相应服务逻辑,包括以下至少其中之一:执行与所述第一类用户标签对应的服务逻辑,屏蔽针对所述第二应用客户端访问请求或部分响应访问请求;执行与所述第二类用户标签对应的服务逻辑,部分或全部响应针对所述第二应用客户端的访问请求。As an implementation manner, when the processor 801 executes the program, the user identifier of the account data is obtained according to the user credit data and the label distribution logic, where The user tag is used to represent the account data to obtain a service range; the user tag includes at least: a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate the account a user whose data is in violation of the predetermined rule by the terminal user is located in the first range; the second type of user tag is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range. a user, wherein the first range is different from the second range; and executing, according to the user credit data, corresponding service logic of the second application client corresponding to the requested access, including at least one of the following a: performing service logic corresponding to the first type of user tag, shielding the second application client access request or partial response access request; performing service logic corresponding to the second type of user tag, part or all Responding to an access request for the second application client.

作为一种实施方式,所述处理器801执行所述程序时实现:基于所述终端或另一终端请求以所述第一应用客户端的账号数据访问第二应用客户端,所述终端通过所述第二应用客户端向服务器请求并获得临时标识,输出包括所述临时标识的标识信息;所述服务器为第一应用客户端对应的服务器;基于所述终端或所述另一终端通过所述第一应用客户端读取识别所述标识信息、以及基于所述终端或所述另一终端向所述服务器请求以所述第一应用客户端的账号数据访问所述第二应用客户端,所述终端通过所述第二应用客户端获得来自所述服务器的所述账号数据对应的用户信用数据。As an implementation, when the processor 801 executes the program, the second application client is accessed by using the account data of the first application client based on the terminal or another terminal, and the terminal passes the The second application client requests and obtains a temporary identifier from the server, and outputs identifier information including the temporary identifier; the server is a server corresponding to the first application client; and the first terminal or the another terminal passes the first An application client reads the identification information, and requests the server to access the second application client by using the account data of the first application client based on the terminal or the another terminal, the terminal User credit data corresponding to the account data from the server is obtained by the second application client.

在示例性实施例中,本发明实施例还提供了一种计算机存储介质,例如包括图10所示的计算机程序的存储器92,上述计算机程序可由服务器的处理器91执行,以完成前述方法所述步骤。计算机存储介质可以是FRAM、ROM、PROM、EPROM、EEPROM、Flash Memory、磁表面存储器、光盘、或CD-ROM等存储器;也可以是包括上述存储器之一或任意组合的各种设备。 In an exemplary embodiment, an embodiment of the present invention further provides a computer storage medium, such as a memory 92 including the computer program shown in FIG. 10, which may be executed by a processor 91 of the server to perform the foregoing method. step. The computer storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories.

本发明实施例提供的计算机存储介质,其上存储有计算机指令,该指令被处理器执行时实现:基于以第一应用客户端的账号数据访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括第一应用客户端的账号数据对应的用户身份标识;获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率。The computer storage medium provided by the embodiment of the present invention has a computer instruction, where the instruction is executed by the processor: accessing the second application client based on the account data of the first application client, obtaining the first application from the first application a first message of the first terminal of the client; the first message includes a user identity corresponding to the account data of the first application client; obtaining user credit data associated with the user identity, and sending the user credit data To a second terminal including the second application client, such that the second application client of the second terminal executes corresponding service logic based on the user credit data; the user credit data is used to characterize the user identity Identifies the probability that the corresponding end user violates the predetermined rule.

作为一种实施方式,该指令被处理器执行时实现:响应于获得的表征授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息,将所述用户信用数据发送至所述第二应用客户端。As an embodiment, when the instruction is executed by the processor, the user credit data is sent to the acknowledgment message of the first application client by using the account data of the first application client in response to the obtained characterization authorization. The second application client.

作为一种实施方式,该指令被处理器执行时实现:基于所述第一终端通过所述第一应用客户端读取识别所述第二终端通过所述第二应用客户端输出的标识信息,获得来自所述第一终端的第一消息,所述第一消息包括所述用户身份标识和分配的临时标识。As an implementation manner, when the instruction is executed by the processor, the first terminal is configured to read, by using the first application client, identification information that is output by the second terminal by using the second application client, Obtaining a first message from the first terminal, the first message including the user identity and the assigned temporary identity.

作为一种实施方式,该指令被处理器执行时还实现:采集对应于所述账号数据的行为数据,所述行为数据包括基于互联网的线上行为数据和线下行为数据;根据所述行为数据获取所述账号数据的第一特征变量,其中,所述第一特征变量用于表示所述账号数据的行为特征;将所述第一特征变量输入数据分析模型,获得用户信用数据;其中,所述数据分析模型用于根据所述第一特征变量输出用户信用数据。As an implementation manner, when the instruction is executed by the processor, the method further includes: collecting behavior data corresponding to the account data, where the behavior data includes online behavior data and offline behavior data based on the Internet; Obtaining a first feature variable of the account data, wherein the first feature variable is used to represent a behavior feature of the account data; and the first feature variable is input into a data analysis model to obtain user credit data; The data analysis model is configured to output user credit data according to the first feature variable.

作为一种实施方式,该指令被处理器执行时还实现:获取第二特征变量,其中,所述第二特征变量用于表示与所述账号数据具有关联关系的多个其他账号数据的行为特征;将所述第一特征变量和所述第二特征变量输入至所述数据分析模型,其中,所述数据分析模型还用于根据所述第一特 征变量和所述第二特征变量输出所述用户信用数据。As an implementation manner, when the instruction is executed by the processor, the method further includes: acquiring a second feature variable, wherein the second feature variable is used to represent behavior characteristics of a plurality of other account data having an association relationship with the account data. Inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to be based on the first feature The levy variable and the second characteristic variable output the user credit data.

作为一种实施方式,该指令被处理器执行时还实现:将所述行为数据划分为多个类别;分别对所述多个类别中的每个类别建立一个子模型,其中,每个子模型用于根据所述第一特征变量和/或所述第二特征变量输出第一子值,其中,所述第一子值用于表示在与所述子模型对应的类别下,所述账号数据的行为不满足所述预设条件的概率值;将所述多个类别对应的多个子模型构建为所述数据分析模型。As an implementation manner, when the instruction is executed by the processor, the method further includes: dividing the behavior data into a plurality of categories; respectively establishing a sub-model for each of the plurality of categories, wherein each sub-model is used Outputting a first sub-value according to the first characteristic variable and/or the second characteristic variable, wherein the first sub-value is used to indicate that the account data is under a category corresponding to the sub-model The behavior does not satisfy the probability value of the preset condition; and the plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model.

本发明实施例还提供了一种计算机存储介质,例如包括图11所示的计算机程序的存储器802,上述计算机程序可由终端的处理器801执行,以完成前述方法所述步骤。计算机存储介质可以是FRAM、ROM、PROM、EPROM、EEPROM、Flash Memory、磁表面存储器、光盘、或CD-ROM等存储器;也可以是包括上述存储器之一或任意组合的各种设备,如移动电话、计算机、平板设备、个人数字助理等。The embodiment of the present invention further provides a computer storage medium, such as a memory 802 including the computer program shown in FIG. 11, which can be executed by the processor 801 of the terminal to perform the steps described in the foregoing method. The computer storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories, such as a mobile phone. , computers, tablet devices, personal digital assistants, etc.

本发明实施例提供的计算机存储介质,其上存储有计算机指令,该指令被处理器执行时实现:基于以第一应用客户端的账号数据请求访问第二应用客户端,获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;基于所述用户信用数据,通过所述第二应用客户端执行相应的服务逻辑。The computer storage medium provided by the embodiment of the present invention has a computer instruction, where the instruction is executed by the processor: requesting access to the second application client by using the account data of the first application client, and obtaining the first application client User credit data corresponding to the account data of the terminal, the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; and based on the user credit data, perform corresponding corresponding by the second application client Service logic.

作为一种实施方式,该指令被处理器执行时还实现:根据所述用户信用数据及标签分发逻辑,获得所述账号数据的用户标签,其中,所述用户标签用于表征所述账号数据可获得服务范围;所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签用于指示所述账号数据对应的终端用户违反所 述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围;以及,基于所述用户信用数据执行对应于所述请求访问的、所述第二应用客户端的相应服务逻辑,包括以下至少其中之一:执行与所述第一类用户标签对应的服务逻辑,屏蔽针对所述第二应用客户端访问请求或部分响应访问请求;执行与所述第二类用户标签对应的服务逻辑,部分或全部响应针对所述第二应用客户端的访问请求。As an implementation manner, when the instruction is executed by the processor, the user identifier of the account data is obtained according to the user credit data and the label distribution logic, where the user label is used to represent the account data. Obtaining a service scope; the user label at least includes: a first type of user label and a second type of user label, wherein the first type of user label is used to indicate that the terminal user corresponding to the account data violates the predetermined rule a user whose probability is located in the first range; the second type of user tag is used to indicate that the terminal user corresponding to the account data violates the The probability that the predetermined rule is located in the second range, wherein the first range is different from the second range; and the second application client corresponding to the requested access is executed based on the user credit data Corresponding service logic of the terminal, comprising at least one of: performing service logic corresponding to the first type of user tag, shielding the second application client access request or partial response access request; performing the second class The service logic corresponding to the user tag partially or completely responds to the access request for the second application client.

作为一种实施方式,该指令被处理器执行时还实现:基于所述终端或另一终端请求以所述第一应用客户端的账号数据访问第二应用客户端,所述终端通过所述第二应用客户端向服务器请求并获得临时标识,输出包括所述临时标识的标识信息;所述服务器为第一应用客户端对应的服务器;基于所述终端或所述另一终端通过所述第一应用客户端读取识别所述标识信息、以及基于所述终端或所述另一终端向所述服务器请求以所述第一应用客户端的账号数据访问所述第二应用客户端,所述终端通过所述第二应用客户端获得来自所述服务器的所述账号数据对应的用户信用数据。As an implementation manner, when the instruction is executed by the processor, the second application client is accessed by using the account data of the first application client, and the terminal passes the second The application client requests and obtains a temporary identifier from the server, and outputs identifier information including the temporary identifier; the server is a server corresponding to the first application client; and the first application is adopted based on the terminal or the another terminal The client reads and identifies the identification information, and requests the server to access the second application client by using the account data of the first application client based on the terminal or the another terminal, where the terminal passes the The second application client obtains user credit data corresponding to the account data from the server.

本发明实施例还提供了一种信息处理系统,所述系统包括服务器和终端;所述服务器,配置为基于以所述第一应用客户端的账号数据请求访问第二应用客户端,服务器获得来自包括所述第一应用客户端的所述终端或另一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识;获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的所述终端;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;所述终端,配置为基于所述用户信用数据,通过所述第二应用客户端执行相应服务逻辑。An embodiment of the present invention further provides an information processing system, where the system includes a server and a terminal, and the server is configured to request to access the second application client based on the account data of the first application client, where the server obtains the a first message of the terminal or another terminal of the first application client; the first message includes a user identity corresponding to the account data of the first application client; and is obtained by being associated with the user identity User credit data, the user credit data is sent to the terminal including the second application client; the user credit data is used to represent a probability that a terminal user corresponding to the user identity violates a predetermined rule; The terminal is configured to execute the corresponding service logic by the second application client based on the user credit data.

在一实施例中,所述服务器,配置为响应于获得的表征授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息,将所述用 户信用数据发送至所述第二应用客户端。In an embodiment, the server is configured to, in response to the obtained characterization authorization, access the confirmation message of the second application client by using the account data of the first application client, The household credit data is sent to the second application client.

在一实施例中,所述服务器,配置为基于所述第一终端通过所述第一应用客户端读取识别所述第二终端通过所述第二应用客户端输出的标识信息,获得来自所述第一终端的第一消息,所述第一消息包括所述用户身份标识和所述服务器分配的临时标识。In an embodiment, the server is configured to: according to the first terminal, read, by the first application client, identifier information that is output by the second terminal by using the second application client, and obtain the source information from the first application client. The first message of the first terminal, where the first message includes the user identity and the temporary identity assigned by the server.

在一实施例中,所述服务器,还配置为采集对应于所述账号数据的行为数据,所述行为数据包括基于互联网的线上行为数据和线下行为数据;根据所述行为数据获取所述账号数据的第一特征变量,其中,所述第一特征变量用于表示所述账号数据的行为特征;将所述第一特征变量输入数据分析模型,获得用户信用数据;其中,所述数据分析模型用于根据所述第一特征变量输出用户信用数据。In an embodiment, the server is further configured to collect behavior data corresponding to the account data, the behavior data includes online behavior data and offline behavior data based on the Internet; and acquiring the a first feature variable of the account data, wherein the first feature variable is used to represent a behavior characteristic of the account data; the first feature variable is input into a data analysis model to obtain user credit data; wherein the data analysis The model is for outputting user credit data according to the first feature variable.

在一实施例中,所述服务器,配置为获取第二特征变量,其中,所述第二特征变量用于表示与所述账号数据具有关联关系的多个其他账号数据的行为特征;将所述第一特征变量和所述第二特征变量输入至所述数据分析模型,其中,所述数据分析模型还用于根据所述第一特征变量和所述第二特征变量输出所述用户信用数据。In an embodiment, the server is configured to acquire a second feature variable, wherein the second feature variable is used to represent behavior characteristics of a plurality of other account data having an association relationship with the account data; The first feature variable and the second feature variable are input to the data analysis model, wherein the data analysis model is further configured to output the user credit data according to the first feature variable and the second feature variable.

在一实施例中,所述服务器,配置为在将所述第一特征变量和所述第二特征变量输入至所述数据分析模型之前,将所述行为数据划分为多个类别;分别对所述多个类别中的每个类别建立一个子模型,其中,每个子模型用于根据所述第一特征变量和/或所述第二特征变量输出第一子值,其中,所述第一子值用于表示在与所述子模型对应的类别下,所述账号数据的行为不满足所述预设条件的概率值;将所述多个类别对应的多个子模型构建为所述数据分析模型。In an embodiment, the server is configured to divide the behavior data into a plurality of categories before inputting the first feature variable and the second feature variable to the data analysis model; respectively Each of the plurality of categories establishes a sub-model, wherein each sub-model is configured to output a first sub-value according to the first characteristic variable and/or the second characteristic variable, wherein the first sub- The value is used to indicate that the behavior of the account data does not satisfy the probability value of the preset condition under a category corresponding to the sub-model; and the plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model .

在一实施例中,所述终端,还配置为根据所述用户信用数据及标签分发逻辑,获得所述账号数据的用户标签,其中,所述用户标签用于表征所 述账号数据可获得服务范围;所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围;所述基于所述用户信用数据执行对应于所述请求访问的、所述第二应用客户端的相应服务逻辑,包括以下至少其中之一:执行与所述第一类用户标签对应的服务逻辑,屏蔽针对所述第二应用客户端访问请求或部分响应访问请求;执行与所述第二类用户标签对应的服务逻辑,部分或全部响应针对所述第二应用客户端的访问请求。In an embodiment, the terminal is further configured to obtain a user label of the account data according to the user credit data and label distribution logic, where the user label is used to represent the location The account data can be obtained by the account data; the user tag at least includes: a first type of user tag and a second type of user tag, wherein the first type of user tag is used to indicate that the end user corresponding to the account data violates the a user whose probability of the predetermined rule is located in the first range; the second type of user tag is used to indicate that the terminal user corresponding to the account data violates the predetermined rule, and the probability is that the user is located in the second range, wherein the first a range different from the second range; the executing, according to the user credit data, corresponding service logic of the second application client corresponding to the request access, including at least one of: performing and a service logic corresponding to a type of user tag, shielding for the second application client access request or partial response access request; performing service logic corresponding to the second type of user tag, partially or completely responding to the second application Client access request.

在一实施例中,所述终端,还配置为基于所述终端或另一终端请求以所述第一应用客户端的账号数据访问第二应用客户端,所述终端通过所述第二应用客户端向服务器请求并获得临时标识,输出包括所述临时标识的标识信息;所述服务器为第一应用客户端对应的服务器;基于所述终端或所述另一终端通过所述第一应用客户端读取识别所述标识信息、以及基于所述终端或所述另一终端向所述服务器请求以所述第一应用客户端的账号数据访问所述第二应用客户端,所述终端通过所述第二应用客户端获得来自所述服务器的所述账号数据对应的用户信用数据。In an embodiment, the terminal is further configured to, according to the terminal or another terminal, request to access the second application client by using the account data of the first application client, where the terminal passes the second application client. Requesting and obtaining a temporary identifier from the server, outputting the identifier information including the temporary identifier; the server is a server corresponding to the first application client; and reading by the first application client based on the terminal or the another terminal Retrieving the identification information, and requesting, by the terminal or the another terminal, the server to access the second application client by using the account data of the first application client, where the terminal passes the second The application client obtains user credit data corresponding to the account data from the server.

在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。 In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed. In addition, the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.

上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。The units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.

另外,在本发明各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; The unit can be implemented in the form of hardware or in the form of hardware plus software functional units.

本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。A person skilled in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by using hardware related to the program instructions. The foregoing program may be stored in a computer readable storage medium, and the program is executed when executed. The foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a removable storage device, a ROM, a RAM, a magnetic disk, or an optical disk, and the like, which can store program codes.

或者,本发明上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Alternatively, the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product. Based on such understanding, the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions. A computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention. The foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a RAM, a magnetic disk, or an optical disk.

以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。 The above is only a specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope of the present invention. It should be covered by the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the appended claims.

Claims (23)

一种信息处理方法,所述方法包括:An information processing method, the method comprising: 基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据对应的用户身份标识;Receiving, by requesting access to the second application client by using the account data of the first application client, obtaining a first message from the first terminal including the first application client; the first message includes a first message corresponding to the first application client User identity corresponding to the account data; 获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑;Obtaining user credit data associated with the user identity, and transmitting the user credit data to a second terminal including the second application client, so that the second application client of the second terminal is based on the User credit data executes corresponding service logic; 所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率。The user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule. 根据权利要求1所述的方法,其中,所述将所述用户信用数据发送至包括所述第二应用客户端的第二终端,包括:The method of claim 1, wherein the transmitting the user credit data to the second terminal including the second application client comprises: 响应于获得的表征授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息,将所述用户信用数据发送至所述第二应用客户端。And sending the user credit data to the second application client in response to the obtained characterization authorization to access the confirmation message of the second application client by using the account data of the first application client. 根据权利要求1所述的方法,其中,所述基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息,包括:The method of claim 1, wherein the requesting to access the second application client based on the account data of the first application client to obtain the first message from the first terminal including the first application client comprises: 基于所述第一终端通过所述第一应用客户端读取识别所述第二终端通过所述第二应用客户端输出的标识信息,获得来自所述第一终端的第一消息,所述第一消息包括所述用户身份标识和所述服务器分配的临时标识。Obtaining, by the first terminal, the identifier information that is output by the second terminal by using the second application client, by using the first application client, to obtain a first message from the first terminal, where the A message includes the user identity and a temporary identity assigned by the server. 根据权利要求1所述的方法,其中,所述方法包括:The method of claim 1 wherein said method comprises: 采集对应于所述账号数据的行为数据,所述行为数据包括基于互联网的线上行为数据和线下行为数据;Collecting behavior data corresponding to the account data, the behavior data including online behavior data and offline behavior data based on the Internet; 根据所述行为数据获取所述账号数据的第一特征变量,其中,所述第 一特征变量用于表示所述账号数据的行为特征;Acquiring, according to the behavior data, a first characteristic variable of the account data, wherein the first A feature variable is used to represent behavior characteristics of the account data; 将所述第一特征变量输入数据分析模型,获得用户信用数据;其中,所述数据分析模型用于根据所述第一特征变量输出用户信用数据。And inputting the first feature variable into the data analysis model to obtain user credit data; wherein the data analysis model is configured to output user credit data according to the first feature variable. 根据权利要求4所述的方法,其中,所述将所述第一特征变量输入数据分析模型,包括:The method of claim 4, wherein the inputting the first feature variable into a data analysis model comprises: 获取第二特征变量,其中,所述第二特征变量用于表示与所述账号数据具有关联关系的多个其他账号数据的行为特征;Obtaining a second feature variable, wherein the second feature variable is used to represent behavior characteristics of a plurality of other account data having an association relationship with the account data; 将所述第一特征变量和所述第二特征变量输入至所述数据分析模型,其中,所述数据分析模型还用于根据所述第一特征变量和所述第二特征变量输出所述用户信用数据。Inputting the first feature variable and the second feature variable to the data analysis model, wherein the data analysis model is further configured to output the user according to the first feature variable and the second feature variable Credit data. 根据权利要求5所述的方法,其中,在将所述第一特征变量和所述第二特征变量输入至所述数据分析模型之前,所述方法还包括:The method of claim 5, wherein before the inputting the first feature variable and the second feature variable to the data analysis model, the method further comprises: 将所述行为数据划分为多个类别;Dividing the behavior data into a plurality of categories; 分别对所述多个类别中的每个类别建立一个子模型,其中,每个子模型用于根据所述第一特征变量和/或所述第二特征变量输出第一子值,其中,所述第一子值用于表示在与所述子模型对应的类别下,所述账号数据的行为不满足所述预设条件的概率值;Establishing a sub-model for each of the plurality of categories, wherein each sub-model is configured to output a first sub-value according to the first characteristic variable and/or the second characteristic variable, wherein The first sub-value is used to indicate that the behavior of the account data does not satisfy the probability value of the preset condition under a category corresponding to the sub-model; 将所述多个类别对应的多个子模型构建为所述数据分析模型。A plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model. 一种信息处理方法,所述方法包括:An information processing method, the method comprising: 基于以第一应用客户端的账号数据请求访问第二应用客户端,获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;The user credit data corresponding to the account data of the first application client is obtained, and the user credit data is used to represent the terminal user corresponding to the user identity identifier, based on the account data requesting the first application client to access the second application client. The probability of violating a predetermined rule; 基于所述用户信用数据,通过所述第二应用客户端执行相应的服务逻辑。Based on the user credit data, corresponding service logic is executed by the second application client. 根据权利要求7所述的方法,其中,所述方法还包括:根据所述用 户信用数据及标签分发逻辑,获得所述账号数据的用户标签,其中,所述用户标签用于表征所述账号数据可获得服务范围;所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围;The method of claim 7 wherein said method further comprises: utilizing said The user credit data and the label distribution logic, the user label of the account data is obtained, wherein the user label is used to represent the account data to obtain a service scope; the user label includes at least: a first type of user label and a second a class user tag, wherein the first type of user tag is used to indicate that the terminal user corresponding to the account data violates the predetermined rule and the probability is within a first range; the second type of user tag is used to indicate The probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range, wherein the first range is different from the second range; 所述基于所述用户信用数据执行对应于所述请求访问的、所述第二应用客户端的相应服务逻辑,包括以下至少其中之一:And executing, according to the user credit data, corresponding service logic of the second application client corresponding to the request access, including at least one of the following: 执行与所述第一类用户标签对应的服务逻辑,屏蔽针对所述第二应用客户端访问请求或部分响应访问请求;Performing service logic corresponding to the first type of user tag, shielding the second application client access request or partial response access request; 执行与所述第二类用户标签对应的服务逻辑,部分或全部响应针对所述第二应用客户端的访问请求。Executing service logic corresponding to the second type of user tag, partially or fully responding to an access request for the second application client. 根据权利要求7所述的方法,其特征在于,所述基于以第一应用客户端的账号数据访问第二应用客户端,所述终端获得所述第一应用客户端的账号数据对应的用户信用数据,包括:The method according to claim 7, wherein the accessing the second application client based on the account data of the first application client, the terminal obtaining the user credit data corresponding to the account data of the first application client, include: 基于所述终端或另一终端请求以所述第一应用客户端的账号数据访问第二应用客户端,所述终端通过所述第二应用客户端向服务器请求并获得临时标识,输出包括所述临时标识的标识信息;所述服务器为第一应用客户端对应的服务器;Receiving, by the terminal or another terminal, the second application client by using the account data of the first application client, the terminal requests and obtains a temporary identifier from the server by using the second application client, and the output includes the temporary Identification information of the identifier; the server is a server corresponding to the first application client; 基于所述终端或所述另一终端通过所述第一应用客户端读取识别所述标识信息、以及基于所述终端或所述另一终端向所述服务器请求以所述第一应用客户端的账号数据访问所述第二应用客户端,所述终端通过所述第二应用客户端获得来自所述服务器的所述账号数据对应的用户信用数据。Identifying the identification information by the first application client based on the terminal or the another terminal, and requesting the first application client from the server based on the terminal or the another terminal The account data accesses the second application client, and the terminal obtains user credit data corresponding to the account data from the server by using the second application client. 一种信息处理方法,所述方法包括: An information processing method, the method comprising: 基于以所述第一应用客户端的账号数据请求访问第二应用客户端,服务器获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识;The server obtains a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client; the first message includes a first message corresponding to the first User identity of the account data of the application client; 所述服务器获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的第二终端;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;The server obtains user credit data associated with the user identity, and sends the user credit data to a second terminal including the second application client; the user credit data is used to represent the user identity The probability that the corresponding end user violates the predetermined rule; 基于所述用户信用数据,所述第二终端通过所述第二应用客户端执行相应服务逻辑。Based on the user credit data, the second terminal executes corresponding service logic through the second application client. 一种服务器,所述服务器包括:第一通讯单元、第一获取单元和第二通讯单元;A server, the server comprising: a first communication unit, a first acquisition unit, and a second communication unit; 所述第一通讯单元,配置为基于以第一应用客户端的账号数据请求访问第二应用客户端,获得来自包括所述第一应用客户端的第一终端的第一消息;所述第一消息包括第一应用客户端的账号数据对应的用户身份标识;The first communication unit is configured to obtain a first message from the first terminal including the first application client, based on requesting access to the second application client by using the account data of the first application client; the first message includes a user identity corresponding to the account data of the first application client; 所述第一获取单元,配置为获得与所述用户身份标识相关联的用户信用数据;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;The first obtaining unit is configured to obtain user credit data associated with the user identity; the user credit data is used to represent a probability that the terminal user corresponding to the user identity violates a predetermined rule; 所述第二通讯单元,配置为将所述第一获取单元获得的所述用户信用数据发送至包括所述第二应用客户端的第二终端,以使所述第二终端的第二应用客户端基于所述用户信用数据执行相应的服务逻辑。The second communication unit is configured to send the user credit data obtained by the first acquiring unit to a second terminal that includes the second application client, so that the second application client of the second terminal A corresponding service logic is executed based on the user credit data. 根据权利要求11所述的服务器,其中,所述第二通讯单元,配置为响应于获得的表征授权以所述第一应用客户端的账号数据访问所述第二应用客户端的确认消息,将所述用户信用数据发送至所述第二应用客户端。The server according to claim 11, wherein the second communication unit is configured to, in response to the obtained characterization authorization, access the confirmation message of the second application client by using the account data of the first application client, User credit data is sent to the second application client. 根据权利要求11所述的服务器,其中,所述第一通讯单元,配置为基于所述第一终端通过所述第一应用客户端读取识别所述第二终端通过所述第二应用客户端输出的标识信息,获得来自所述第一终端的第一消息, 所述第一消息包括所述用户身份标识和分配的临时标识。The server according to claim 11, wherein the first communication unit is configured to identify, by the first terminal, that the second terminal passes the second application client by using the first application client The output identification information obtains the first message from the first terminal, The first message includes the user identity and the assigned temporary identity. 根据权利要求11所述的服务器,其中,所述服务器还包括采集单元和第二获取单元;其中,The server according to claim 11, wherein the server further comprises an acquisition unit and a second acquisition unit; wherein 所述采集单元,配置为采集对应于所述账号数据的行为数据,所述行为数据包括基于互联网的线上行为数据和线下行为数据;The collecting unit is configured to collect behavior data corresponding to the account data, where the behavior data includes online behavior data and offline behavior data based on the Internet; 所述第二获取单元,配置为根据所述采集单元采集的所述行为数据获取所述账号数据的第一特征变量,其中,所述第一特征变量用于表示所述账号数据的行为特征;将所述第一特征变量输入数据分析模型,获得用户信用数据;其中,所述数据分析模型用于根据所述第一特征变量输出用户信用数据。The second acquiring unit is configured to acquire a first feature variable of the account data according to the behavior data collected by the collecting unit, where the first feature variable is used to represent a behavior characteristic of the account data; And inputting the first feature variable into the data analysis model to obtain user credit data; wherein the data analysis model is configured to output user credit data according to the first feature variable. 根据权利要求14所述的服务器,其中,所述第二获取单元,配置为获取第二特征变量,其中,所述第二特征变量用于表示与所述账号数据具有关联关系的多个其他账号数据的行为特征;将所述第一特征变量和所述第二特征变量输入至所述数据分析模型,其中,所述数据分析模型还用于根据所述第一特征变量和所述第二特征变量输出所述用户信用数据。The server according to claim 14, wherein the second obtaining unit is configured to acquire a second feature variable, wherein the second feature variable is used to represent a plurality of other accounts having an association relationship with the account data. a behavioral characteristic of the data; the first feature variable and the second feature variable are input to the data analysis model, wherein the data analysis model is further configured to use the first feature variable and the second feature The variable outputs the user credit data. 根据权利要求15所述的服务器,其中,所述第二获取单元,配置为将所述行为数据划分为多个类别;分别对所述多个类别中的每个类别建立一个子模型,其中,每个子模型用于根据所述第一特征变量和/或所述第二特征变量输出第一子值,其中,所述第一子值用于表示在与所述子模型对应的类别下,所述账号数据的行为不满足所述预设条件的概率值;将所述多个类别对应的多个子模型构建为所述数据分析模型。The server according to claim 15, wherein the second obtaining unit is configured to divide the behavior data into a plurality of categories; and respectively establish a sub-model for each of the plurality of categories, wherein Each sub-model is configured to output a first sub-value according to the first characteristic variable and/or the second characteristic variable, wherein the first sub-value is used to represent a category corresponding to the sub-model, The behavior of the account data does not satisfy the probability value of the preset condition; and the plurality of sub-models corresponding to the plurality of categories are constructed as the data analysis model. 一种终端,所述终端包括:第三通讯单元和执行单元;A terminal, the terminal comprising: a third communication unit and an execution unit; 所述第三通讯单元,配置为基于以第一应用客户端的账号数据访问第二应用客户端,获得所述第一应用客户端的账号数据对应的用户信用数据,所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规 则的概率;The third communication unit is configured to access the second application client by using the account data of the first application client, and obtain user credit data corresponding to the account data of the first application client, where the user credit data is used to represent the location The end user corresponding to the user identity violates the predetermined rules Probability 所述执行单元,配置为基于所述第三通讯单元获得的所述用户信用数据,通过所述第二应用客户端执行相应的服务逻辑。The executing unit is configured to execute a corresponding service logic by using the second application client based on the user credit data obtained by the third communication unit. 根据权利要求17所述的终端,其中,The terminal according to claim 17, wherein 所述执行单元,还配置为根据所述用户信用数据及标签分发逻辑,获得账号数据的用户标签,其中,所述用户标签用于表征所述账号数据可获得服务范围;所述用户标签至少包括:第一类用户标签和第二类用户标签,其中,所述第一类用户标签,用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第一范围内的用户;所述第二类用户标签用于指示所述账号数据对应的终端用户违反所述预定规则的概率位于第二范围内用户,其中,所述第一范围不同于所述第二范围;The execution unit is further configured to obtain a user label of the account data according to the user credit data and the label distribution logic, where the user label is used to represent the account data to obtain a service scope; the user label includes at least a first type of user label and a second type of user label, wherein the first type of user label is used to indicate that the terminal user corresponding to the account data violates the predetermined rule and the probability is within a first range; The second type of user label is used to indicate that the probability that the terminal user corresponding to the account data violates the predetermined rule is located in the second range, wherein the first range is different from the second range; 还配置为基于所述用户信用数据执行相应的服务逻辑,包括以下至少其中之一:Also configured to perform corresponding service logic based on the user credit data, including at least one of the following: 执行与所述第一类用户标签对应的服务逻辑,屏蔽访问请求或部分响应访问请求;Performing service logic corresponding to the first type of user tag, shielding the access request or partially responding to the access request; 执行与所述第二类用户标签对应的服务逻辑,部分或全部响应访问请求。Executing service logic corresponding to the second type of user tag, partially or completely responding to the access request. 根据权利要求17所述的终端,其中,所述终端还包括输出单元;The terminal of claim 17, wherein the terminal further comprises an output unit; 所述第三通讯单元,配置为基于所述终端或另一终端请求以所述第一应用客户端的账号数据访问第二应用客户端,通过所述第二应用客户端向服务器请求并获得临时标识;所述服务器为第一应用客户端对应的服务器;The third communication unit is configured to, according to the terminal or another terminal, request to access the second application client by using the account data of the first application client, and request and obtain the temporary identifier from the server by using the second application client. The server is a server corresponding to the first application client; 所述输出单元,配置为输出包括所述临时标识的标识信息;The output unit is configured to output identification information including the temporary identifier; 所述第三通讯单元,还配置为基于所述终端或所述另一终端通过所述第一应用客户端读取识别所述标识信息、以及基于所述终端或所述另一终端向所述服务器请求以所述第一应用客户端的账号数据访问所述第二应用 客户端,通过所述第二应用客户端获得来自所述服务器的所述账号数据对应的用户信用数据。The third communication unit is further configured to: according to the terminal or the another terminal, read and identify the identification information by using the first application client, and to the said terminal or the another terminal according to the terminal The server requests to access the second application by using the account data of the first application client. The client obtains user credit data corresponding to the account data from the server by using the second application client. 一种计算机存储介质,其上存储有计算机指令,该指令被处理器执行时实现权利要求1至6任一项所述的信息处理方法的步骤;A computer storage medium having stored thereon computer instructions for performing the steps of the information processing method according to any one of claims 1 to 6 when executed by a processor; 或者,该指令被处理器执行时实现权利要求7至9任一项所述的信息处理方法的步骤。Alternatively, the step of implementing the information processing method according to any one of claims 7 to 9 when the instruction is executed by the processor. 一种服务器,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现权利要求1至6任一项所述的信息处理方法的步骤。A server comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, the processor executing the program to implement the information processing method according to any one of claims 1 to 6. step. 一种终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现权利要求7至9任一项所述的信息处理方法的步骤。A terminal comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, the processor executing the program to implement the information processing method according to any one of claims 7 to 9. step. 一种信息处理系统,所述系统包括服务器和终端;An information processing system, the system comprising a server and a terminal; 所述服务器,配置为基于以所述第一应用客户端的账号数据请求访问第二应用客户端,服务器获得来自包括所述第一应用客户端的所述终端或另一终端的第一消息;所述第一消息包括对应于所述第一应用客户端的账号数据的用户身份标识;获得与所述用户身份标识相关联的用户信用数据,将所述用户信用数据发送至包括所述第二应用客户端的所述终端;所述用户信用数据用于表征所述用户身份标识对应的终端用户违反预定规则的概率;The server is configured to request to access a second application client by using the account data of the first application client, where the server obtains a first message from the terminal or another terminal that includes the first application client; The first message includes a user identity corresponding to the account data of the first application client; obtaining user credit data associated with the user identity, and transmitting the user credit data to the second application client The user credit data is used to represent a probability that a terminal user corresponding to the user identity identifier violates a predetermined rule; 所述终端,配置为基于所述用户信用数据,通过所述第二应用客户端执行相应服务逻辑。 The terminal is configured to execute corresponding service logic by using the second application client based on the user credit data.
PCT/CN2017/109397 2017-11-03 2017-11-03 Information processing method and system, server, terminal and computer storage medium WO2019084922A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/109397 WO2019084922A1 (en) 2017-11-03 2017-11-03 Information processing method and system, server, terminal and computer storage medium
CN201780054468.0A CN110402570B (en) 2017-11-03 2017-11-03 Information processing method and system, server, terminal, computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/109397 WO2019084922A1 (en) 2017-11-03 2017-11-03 Information processing method and system, server, terminal and computer storage medium

Publications (1)

Publication Number Publication Date
WO2019084922A1 true WO2019084922A1 (en) 2019-05-09

Family

ID=66332772

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/109397 WO2019084922A1 (en) 2017-11-03 2017-11-03 Information processing method and system, server, terminal and computer storage medium

Country Status (2)

Country Link
CN (1) CN110402570B (en)
WO (1) WO2019084922A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193718A (en) * 2019-12-13 2020-05-22 航天信息股份有限公司 Safe login method and system based on third party authorization
CN111224955A (en) * 2019-12-25 2020-06-02 中国平安人寿保险股份有限公司 Service response method and system
CN112035548A (en) * 2020-08-31 2020-12-04 北京嘀嘀无限科技发展有限公司 Recognition model acquisition method, recognition method, device, equipment and medium
CN112561272A (en) * 2020-12-07 2021-03-26 深圳市思为软件技术有限公司 Data processing method for electronic sign-in and related product
CN113377345A (en) * 2021-05-31 2021-09-10 五八到家有限公司 Method and system for processing housekeeping service task, electronic device and readable medium
CN113448589A (en) * 2021-07-09 2021-09-28 北京沃东天骏信息技术有限公司 Request processing method and device, electronic equipment and storage medium
CN114221776A (en) * 2020-10-26 2022-03-22 广州融至益教育科技有限公司 Account number binding method and device applied to intelligent electronic money saving scene
CN114448924A (en) * 2020-10-30 2022-05-06 腾讯科技(深圳)有限公司 User group upgrading method, device, equipment and storage medium
CN114640712A (en) * 2022-03-17 2022-06-17 广州博冠信息科技有限公司 Information generation method and device and electronic equipment
CN114721841A (en) * 2021-01-04 2022-07-08 腾讯科技(深圳)有限公司 A data processing method, device, electronic device and storage medium
CN114817756A (en) * 2021-01-28 2022-07-29 腾讯科技(深圳)有限公司 Question and answer interaction processing method, device, electronic device and storage medium
WO2025167599A1 (en) * 2024-02-09 2025-08-14 华为技术有限公司 Communication method and apparatus

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111079165B (en) * 2019-12-18 2022-05-17 深圳我家云网络科技有限公司 Data processing method, data processing device, equipment and storage medium
CN111617487B (en) 2020-05-22 2021-03-16 腾讯科技(深圳)有限公司 Account access method and device in game application, storage medium and electronic equipment
CN114339729B (en) * 2020-09-30 2024-09-17 阿里巴巴集团控股有限公司 Device identifier generation method and device, electronic device and storage medium
CN114554251B (en) * 2022-02-10 2024-01-23 青岛海尔科技有限公司 Multimedia data requesting method and device, storage medium and electronic device
CN115460015B (en) * 2022-09-29 2024-08-23 山东亿云信息技术有限公司 TOTP-based identity authentication method and system for Web application

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080183628A1 (en) * 1997-03-07 2008-07-31 Oliver David M System for management of alternatively priced transactions on network
CN102821104A (en) * 2012-08-09 2012-12-12 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system
CN103634316A (en) * 2013-11-26 2014-03-12 乐视网信息技术(北京)股份有限公司 Account login method and electronic equipment
CN104243433A (en) * 2013-06-20 2014-12-24 腾讯科技(深圳)有限公司 Logging-in method, device and system based on browser client-side account
CN105592109A (en) * 2014-10-20 2016-05-18 中国移动通信集团天津有限公司 Registration method, device and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8250635B2 (en) * 2008-07-13 2012-08-21 International Business Machines Corporation Enabling authentication of openID user when requested identity provider is unavailable
CN102821085B (en) * 2011-11-23 2015-12-02 腾讯科技(深圳)有限公司 Third party authorizes login method, open platform and system
CN104113534B (en) * 2014-07-02 2018-01-09 百度在线网络技术(北京)有限公司 The login system and method for application APP
CN105991614B (en) * 2015-03-03 2019-07-23 阿里巴巴集团控股有限公司 It is a kind of it is open authorization, resource access method and device, server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080183628A1 (en) * 1997-03-07 2008-07-31 Oliver David M System for management of alternatively priced transactions on network
CN102821104A (en) * 2012-08-09 2012-12-12 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system
CN104243433A (en) * 2013-06-20 2014-12-24 腾讯科技(深圳)有限公司 Logging-in method, device and system based on browser client-side account
CN103634316A (en) * 2013-11-26 2014-03-12 乐视网信息技术(北京)股份有限公司 Account login method and electronic equipment
CN105592109A (en) * 2014-10-20 2016-05-18 中国移动通信集团天津有限公司 Registration method, device and system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193718A (en) * 2019-12-13 2020-05-22 航天信息股份有限公司 Safe login method and system based on third party authorization
CN111224955A (en) * 2019-12-25 2020-06-02 中国平安人寿保险股份有限公司 Service response method and system
CN111224955B (en) * 2019-12-25 2023-02-03 中国平安人寿保险股份有限公司 Service response method and system
CN112035548A (en) * 2020-08-31 2020-12-04 北京嘀嘀无限科技发展有限公司 Recognition model acquisition method, recognition method, device, equipment and medium
CN114221776A (en) * 2020-10-26 2022-03-22 广州融至益教育科技有限公司 Account number binding method and device applied to intelligent electronic money saving scene
CN114448924A (en) * 2020-10-30 2022-05-06 腾讯科技(深圳)有限公司 User group upgrading method, device, equipment and storage medium
CN112561272A (en) * 2020-12-07 2021-03-26 深圳市思为软件技术有限公司 Data processing method for electronic sign-in and related product
CN114721841A (en) * 2021-01-04 2022-07-08 腾讯科技(深圳)有限公司 A data processing method, device, electronic device and storage medium
CN114817756A (en) * 2021-01-28 2022-07-29 腾讯科技(深圳)有限公司 Question and answer interaction processing method, device, electronic device and storage medium
CN113377345A (en) * 2021-05-31 2021-09-10 五八到家有限公司 Method and system for processing housekeeping service task, electronic device and readable medium
CN113448589A (en) * 2021-07-09 2021-09-28 北京沃东天骏信息技术有限公司 Request processing method and device, electronic equipment and storage medium
CN114640712A (en) * 2022-03-17 2022-06-17 广州博冠信息科技有限公司 Information generation method and device and electronic equipment
CN114640712B (en) * 2022-03-17 2024-01-30 广州博冠信息科技有限公司 Information generation method, device, electronic equipment and storage medium
WO2025167599A1 (en) * 2024-02-09 2025-08-14 华为技术有限公司 Communication method and apparatus

Also Published As

Publication number Publication date
CN110402570A (en) 2019-11-01
CN110402570B (en) 2020-08-11

Similar Documents

Publication Publication Date Title
CN110402570B (en) Information processing method and system, server, terminal, computer storage medium
US9619661B1 (en) Personal information data manager
KR101761226B1 (en) Selective sharing of user information based on contextual relationship information, such as to crowd-source gifts of interest to a recipient
CN105229485B (en) Multifactor position verification method
US9064021B2 (en) Data source attribution system
US20180077146A1 (en) Online Identity Reputation
US9070110B2 (en) Identification of unknown social media assets
US12141212B2 (en) Intelligent interface accelerating
CN105302845B (en) Data information method of commerce and system
KR102141245B1 (en) Online contents funding system and method based upon matching with contents creator and investor
WO2017202006A1 (en) Data processing method and device, and computer storage medium
US20160321723A1 (en) Systems and methods for presenting vendor data
US20180284971A1 (en) Intelligent visual object management system
US20180033027A1 (en) Interactive user-interface based analytics engine for creating a comprehensive profile of a user
WO2012031019A2 (en) User control of user-related data
CN111476469A (en) Guest expansion method, terminal equipment and storage medium
CN114240339B (en) Background investigation method, device, storage medium and electronic device
US11373057B2 (en) Artificial intelligence driven image retrieval
US11430077B2 (en) System and method for searching and monitoring assets available for acquisition
CN115618120B (en) Public number information pushing method, system, terminal equipment and storage medium
US20230162278A1 (en) Generation and delivery of funding opportunities using artificial intelligence (ai) based techniques
US20230120348A1 (en) Systems and methods of personally identifiable information (pii) tracking in a network
US20140188657A1 (en) Establishing Customer Attributes
CN109829593B (en) Credit determining method and device for target object, storage medium and electronic device
US10970792B1 (en) Life event bank ledger

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17930836

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17930836

Country of ref document: EP

Kind code of ref document: A1