[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115118496B - Identity authentication information storage method and device and identity authentication equipment - Google Patents

Identity authentication information storage method and device and identity authentication equipment Download PDF

Info

Publication number
CN115118496B
CN115118496B CN202210738239.3A CN202210738239A CN115118496B CN 115118496 B CN115118496 B CN 115118496B CN 202210738239 A CN202210738239 A CN 202210738239A CN 115118496 B CN115118496 B CN 115118496B
Authority
CN
China
Prior art keywords
authentication
probability
identity authentication
user
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210738239.3A
Other languages
Chinese (zh)
Other versions
CN115118496A (en
Inventor
张逸清
陈高
高宗
张木儒
陈彦宇
马雅奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202210738239.3A priority Critical patent/CN115118496B/en
Publication of CN115118496A publication Critical patent/CN115118496A/en
Application granted granted Critical
Publication of CN115118496B publication Critical patent/CN115118496B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides a storage method and device of identity authentication information and identity authentication equipment, wherein the method comprises the following steps: acquiring a current scene and authentication habits of a plurality of users, wherein the current scene comprises at least one influencing factor, the influencing factor is a factor influencing the authentication behavior of the users, and the authentication habits are used for representing the probability of identity authentication of the users in an environment comprising the influencing factor; according to the current scene and authentication habits, determining the probability of identity authentication of each user in the current scene as a first probability; and carrying the identity authentication information of the user corresponding to the first probability larger than a preset threshold value from the disk database to the memory space for storage. The method and the device ensure that the matching speed of the identity information is high.

Description

Identity authentication information storage method and device and identity authentication equipment
Technical Field
The present invention relates to the field of identity authentication technologies, and in particular, to a method and apparatus for storing identity authentication information, a computer readable storage medium, a processor, and an identity authentication device.
Background
The authentication technology is also called identity authentication technology, and refers to the technical means used in the process of authenticating the identity of an operator by a computer and a network system. In the current mass data application scenario, one-to-many matching authentication is a challenge with higher difficulty.
One-to-many matching authentication is usually a one-to-one comparison mode of disk database information, and when the data volume is large, for example, the personnel number is large, or the stored data volume for matching is large, or the number of mathematical model parameters for matching is large, etc., the matching speed of the data is influenced, and the visual experience brought is the experience of influencing the user authentication.
For the problem, some general solutions are to update the ordering of the disk database according to the authentication times or other features of some users, so that the correct data can be preferentially matched during authentication, and the matching times are reduced. The essence of the methods is that when data are matched, the matching difficulty is reduced by using the authentication record information of personnel. However, their processing speed has room for improvement.
The above information disclosed in the background section is only for enhancement of understanding of the background art from the technology described herein and, therefore, may contain some information that does not form the prior art that is already known in the country to a person of ordinary skill in the art.
Disclosure of Invention
The main object of the present application is to provide a method, an apparatus, a computer readable storage medium, a processor and an identity authentication device for storing identity authentication information, so as to solve the problem of slower speed of identity authentication matching under a large data volume in the prior art.
According to an aspect of the embodiment of the present invention, there is provided a storage method of identity authentication information, all identity authentication information of users being stored in a disk database, the method comprising: acquiring a current scene and a plurality of authentication habits of the user, wherein the current scene comprises at least one influencing factor, the influencing factor is a factor influencing the authentication behavior of the user, and the authentication habits are used for representing the probability of identity authentication of the user in an environment comprising the influencing factor; determining the probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit; and carrying the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value from the disk database to a memory space for storage.
Optionally, acquiring authentication habits of a plurality of users includes: acquiring a historical authentication scene corresponding to a plurality of historical authentication records of the user, and acquiring a weight value corresponding to each historical influence factor, wherein the historical authentication scene comprises at least one historical influence factor, and the historical influence factor is the influence factor corresponding to the user when performing historical identity authentication; determining the probability of each history influencing factor appearing in all the history authentication scenes as a second probability; multiplying each second probability by the corresponding weight value to obtain a preference value corresponding to the history influence factor, wherein each history influence factor and the corresponding preference value form the authentication habit of the user.
Optionally, determining the probability of each of the history influencing factors appearing in all of the history authentication scenes as the second probability includes: according toDetermining each second probability, wherein w represents the second probability, t=0 or t=1, t=0 represents that the history influencing factor does not appear in the history authentication scene, t=1 represents that the history influencing factor appears in the history authentication scene, and m 1 Representing the number of the historical authentication scenes.
Optionally, acquiring a weight value corresponding to each history influencing factor includes: obtaining a total number of the users and a number of the users related to the history influencing factor; according toObtaining the weight value, wherein x represents the weight value, m 2 Represents the total number, m n Representing the number of said users related to said history influencing factor.
Optionally, determining, according to the current scenario and the authentication habit, a probability that each user performs identity authentication in the current scenario is a first probability, including: determining the influence factors included in the current scene as target factors; determining each according to the authentication habitThe preference value corresponding to the target factor; according to y=w 1 x 1 +w 2 x 2 +...+w n x n Calculating the first probability corresponding to each user, wherein y represents the first probability, and w n x n And representing the preference value corresponding to the target factor.
Optionally, the step of transferring the authentication information of the user corresponding to the first probability greater than a preset threshold from the disk database to a memory space includes: determining whether the occupied space of the identity authentication information of the user corresponding to the first probability larger than the preset threshold is smaller than the memory space; and under the condition that the occupied space is smaller than the memory space, the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value is carried out from the disk database and stored in the memory space in a preset format.
Optionally, the predetermined format includes at least one of a hash chain table, an array, and a chain table.
Optionally, after the identity authentication information of the user corresponding to the first probability greater than the preset threshold is transferred from the disk database to the memory space, the method further includes: under the condition that an authentication request of a target user is received, determining whether identity authentication information matched with the target user exists in the memory space; under the condition that the identity authentication information matched with the target user exists in the memory space, the identity authentication is determined to be successful; and under the condition that the identity authentication information matched with the target user does not exist in the memory space, searching the identity authentication information matched with the target user from the disk database so as to perform identity authentication.
Optionally, after searching the disk database for the identity authentication information matched with the target user in the case that the identity authentication information matched with the target user does not exist in the memory space, or after determining that the identity authentication is successful in the case that the identity authentication information matched with the target user exists in the memory space, the method further includes: and constructing or updating the authentication habit of the target user according to the target user and the current scene.
Optionally, after determining whether there is identity authentication information in the memory space that matches the target user, the method further includes: acquiring the duration of identity authentication information which does not exist in the memory space and is matched with the target user; and deleting the authentication habit corresponding to at least part of the time period under the condition that the duration time is longer than the preset time.
Optionally, the method further comprises: and under the condition that the current scene changes, the identity authentication information of the user stored in the memory space is cleared.
According to another aspect of the embodiment of the present invention, there is further provided a storage device for identity authentication information, where all the identity authentication information of a user is stored in a disk database, and the device includes a first obtaining unit, a first determining unit, and a handling unit, where the first obtaining unit is configured to obtain a current scenario and a plurality of authentication habits of the user, where the current scenario includes at least one influencing factor, where the influencing factor is a factor that affects an authentication behavior of the user, and the authentication habits are used to characterize a probability that the user performs identity authentication in an environment including the influencing factor; the first determining unit is used for determining the probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit; the handling unit is used for handling the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value from the disk database to a memory space for storage.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium including a stored program, wherein the program performs any one of the methods.
According to still another aspect of the embodiment of the present invention, there is further provided a processor, where the processor is configured to execute a program, where the program executes any one of the methods.
According to yet another aspect of the embodiments of the present invention, there is also provided an identity authentication device including one or more processors, a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for performing any one of the methods.
According to the technical scheme, in the method for storing the identity authentication information, a current scene comprising at least one influencing factor and authentication habits of a plurality of users are firstly obtained, wherein the influencing factor is a factor influencing the identity authentication behavior of the users, and the authentication habits are used for representing the probability of the users for carrying out identity authentication in an environment comprising the influencing factor; then, according to the current scene and the authentication habit, determining the probability of identity authentication of each user in the current scene as a first probability; and finally, carrying the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value from the disk database to a memory space for storage. Compared with the problem that the speed of identity authentication matching is slower under a large data volume in the prior art, the method and the device predict the probability of identity authentication of each user under the current scene according to the authentication habit of the user and the current scene, move the user identity authentication information with the probability higher than the preset threshold value to the memory space, and search and match from the memory space in the follow-up process when matching because the processing speed of the memory space is higher than that of a disk database, ensure that the matching speed of the identity information is faster, and better solve the problem that the speed of identity authentication matching under the large data volume in the prior art is slower.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 shows a flow diagram of a method of storing identity authentication information according to an embodiment of the present application;
FIG. 2 shows an update flow chart of a calculation formula of a first probability according to an embodiment of the present application;
FIG. 3 illustrates a flow chart for generation and updating of authentication habits according to an embodiment of the present application;
FIG. 4 illustrates a matching flow chart of identity authentication information of a target user according to an embodiment of the present application;
FIG. 5 illustrates a flow chart of a store update of identity authentication information in accordance with a specific embodiment of the present application;
fig. 6 shows a schematic diagram of a storage device for identity authentication information according to an embodiment of the present application.
Detailed Description
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the present application described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It will be understood that when an element such as a layer, film, region, or substrate is referred to as being "on" another element, it can be directly on the other element or intervening elements may also be present. Furthermore, in the description and in the claims, when an element is described as being "connected" to another element, the element may be "directly connected" to the other element or "connected" to the other element through a third element.
As described in the background art, in order to solve the foregoing problem, in an exemplary embodiment of the present application, a method, an apparatus, a computer readable storage medium, a processor, and an authentication device for storing authentication information are provided.
According to an embodiment of the application, a method for storing identity authentication information is provided.
Fig. 1 is a flowchart of a method of storing identity authentication information according to an embodiment of the present application. As shown in fig. 1, the identity authentication information of all users is stored in a disk database, and the method comprises the following steps:
step S101, acquiring a current scene and a plurality of authentication habits of the user, wherein the current scene comprises at least one influencing factor, the influencing factor is a factor influencing the authentication behavior of the user, and the authentication habits are used for representing the probability of identity authentication of the user in an environment comprising the influencing factor;
step S102, determining the probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit;
Step S103, the identity authentication information of the user corresponding to the first probability larger than a preset threshold value is transferred from the disk database to a memory space for storage.
In the method for storing identity authentication information, a current scene including at least one influencing factor and authentication habits of a plurality of users are firstly obtained, wherein the influencing factor is a factor influencing the identity authentication behavior of the users, and the authentication habits are used for representing the probability of the users for carrying out identity authentication in an environment including the influencing factor; then, according to the current scene and the authentication habit, determining the probability of identity authentication of each user in the current scene as a first probability; and finally, carrying the identity authentication information of the user corresponding to the first probability larger than a preset threshold value from the disk database to a memory space for storage. Compared with the problem that the speed of identity authentication matching is slower under a large data volume in the prior art, the method and the device predict the probability of identity authentication of each user under the current scene according to the authentication habit of the user and the current scene, move the user identity authentication information with the probability higher than the preset threshold value to the memory space, and search and match from the memory space in the follow-up process when matching because the processing speed of the memory space is higher than that of a disk database, ensure that the matching speed of the identity information is faster, and better solve the problem that the speed of identity authentication matching under the large data volume in the prior art is slower.
According to the principle that the processing speed of the memory space of a computer is far higher than that of a magnetic disk space but the memory space is limited, a preset threshold is set, and identity authentication information of the computer can be stored from a database to the memory space when the first probability of authentication is higher than the preset threshold, and meanwhile, the data are not matched in the database under the current scene.
Specifically, the preset thresholds corresponding to different users may be different.
According to a specific embodiment of the present application, obtaining authentication habits of a plurality of the above users includes: acquiring a historical authentication scene corresponding to a plurality of historical authentication records of the user, and acquiring a weight value corresponding to each historical influence factor, wherein the historical authentication scene comprises at least one historical influence factor, and the historical influence factor is the influence factor corresponding to the user when performing historical identity authentication; determining the probability of each history influencing factor in all the history authentication scenes as a second probability; and multiplying each second probability by the corresponding weight value to obtain a preference value corresponding to the history influence factor, wherein each history influence factor and the corresponding preference value form the authentication habit of the user. Because the use habits of users are different, a plurality of users have influence factor combinations conforming to the habits of the users when the users are authenticated, and the user preference values corresponding to the history influence factors are determined by acquiring the history influence factors of the users in a history authentication scene, so that the authentication habits of the users can be accurately described, and more accurate data support is provided for the follow-up determination of the identity authentication information stored in the memory. In addition, because the description capability of different history influence factors on the authentication behavior of the user is different, the obtained preference value can be further ensured to reflect the authentication preference of the user more accurately by configuring the weight value for the different history influence factors.
The authentication of the person is closely related to the influence factors, and the authentication of the person can be predicted according to the combination of the influence factors. For example, an employee of a company often uses an attendance machine of the company to punch cards before 8 a.m. in daylight hours, and the company usually punches cards after leaving a lead at night, so that the influence factors of the employee's usage habit can be defined by the method of ' summer ', before 8 a.m. and after the lead. Then the user may be predicted not to authenticate if it falls outside of the other combinations of influencing factors. Several influencing factors are listed here: time: if the system is used as an authentication system for checking in, the time for going to work and going out from work is relatively fixed, so that the relation between the checking in of personnel and the time is dense and inseparable; personnel relationship: the interpersonal relationship of the authenticators also affects the authentication behavior of the authenticators, some authenticators can select to authenticate together in similar time, and other authenticators can select to authenticate before and after specific personnel or crowd authentication; weather: when weather becomes bad, the probability of some people authenticating becomes low, and when weather becomes good, the probability of their authentication becomes high; temperature: when the temperature is higher, the probability of some people authenticating becomes lower, and when the temperature is lower, the probability of their authentication becomes higher. Of course, the above-mentioned influencing factors are not limited to the above-mentioned time, personnel relationship, weather, temperature, etc., and those skilled in the art can flexibly set the kinds of the above-mentioned influencing factors according to actual situations.
In order to further ensure that the obtained authentication habits are accurate, according to another specific embodiment of the present application, determining the probability of occurrence of each of the history influencing factors in all of the history authentication scenes as the second probability includes: according toDetermining each of the second probabilities, wherein w represents the second probability, t=0 or t=1, t=0 represents that the history influencing factor does not appear in the history authentication scene, t=1 represents that the history influencing factor appears in the history authentication scene, and m 1 Representing the number of the history authentication scenes, and obtaining a weight value corresponding to each history influence factor comprises the following steps: acquiring the total number of the users and the number of the users related to the history influence factor; according toObtaining the weight value, wherein x represents the weight value, m 2 Represents the total number, m n Indicating the number of said users associated with said history influencing factor. Thus, different authentication habits of different users can be dynamically and more exactly reflected, further ensuring that the identity authentication information of the user who prefers to carry out scene authentication under the current scene can be more accurately carried to the memory space according to the authentication habits, further ensuring that the identity matching speed of the user is faster, and further ensuring that the matching efficiency is higher.
Different external events have different descriptive capacities for habits of users, and if the time is taken as a judging basis and is more definite than weather, the weight of the influence factor taken as the time is higher than that of the influence factor taken as the weather. It should be noted that, the weight corresponding to the above influencing factor is not a constant value, and it is changed by changing the user duty ratio related to the table.
Specifically, determining, according to the current scenario and the authentication habit, a probability that each user performs identity authentication in the current scenario as a first probability includes: determining the influence factors included in the current scene as target factors; determining the preference value corresponding to each target factor according to the authentication habit; according to y=w 1 x 1 +w 2 x 2 +...+w n x n Calculating the first probability corresponding to each user, wherein y represents the first probability, and w n x n And representing the preference value corresponding to the target factor. In this embodiment, by combining the influencing factors in the current environment and obtaining the authentication probability of each user in the current environment combining the influencing factors, it is further convenient to store the identity authentication information of the user with higher authentication probability in the current environment in the memory space, and further the problem of slower authentication speed in the process of identity authentication caused by storing all the identity authentication information in the disk database is avoided.
The calculation formula y=w of the first probability 1 x 1 +w 2 x 2 +...+w n x n The update flow of (2) is shown in figure 2. The weight value x represents the descriptive capacity of the corresponding influencing factor for the authentication behavior, the value changes along with authentication habit in the database and personnel proportion change related to the influencing factor, and the second probability w represents the possibility that the user authenticates under the influencing factor, and the value is updated along with authentication records of the user. When the user authenticates, the influence factor at the moment is recorded, and the influence factor and the authentication record of the user are written into an information table of the disk database at the same time. When the authentication records reach a certain number, the authentication habit of the user can be generated according to the influence factors recorded in the database. When the user has authentication habit and authenticates again, the authentication habit of the user is updated according to the change condition of the influencing factors in the current environment. When updating, the probability of occurrence of a certain influence factor is calculated in sequence according to the historical authentication record of the user. If an influence isThe total number of factors is large, only a plurality of pieces of data in the last period of time are taken according to time, and the past data are discarded.
In a specific embodiment, the authentication habit generation and update flow is shown in fig. 3.
In the actual application process, after the first probabilities corresponding to the users are obtained through calculation, the first probabilities and the corresponding identity authentication information thereof can be ordered according to the sequence from high probability value to low probability value, and in the process of carrying the identity authentication information of the user corresponding to the first probability larger than a preset threshold value from the disk database to the memory space, the identity authentication information of the user corresponding to the first probability is also stored in the memory space according to the sequence from high probability to low probability value, so that the subsequent identity matching can be further facilitated.
In order to further ensure that the transfer of the authentication information is safer, in another specific embodiment of the present application, the transferring the authentication information of the user corresponding to the first probability greater than a preset threshold from the disk database to the memory space includes: determining whether the occupied space of the identity authentication information of the user corresponding to the first probability larger than the preset threshold is smaller than the memory space; and under the condition that the occupied space is smaller than the memory space, the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value is carried out from the disk database and stored in the memory space in a preset format. In this embodiment, before the identity authentication information of the user corresponding to the first probability greater than the preset threshold is transferred, it is determined whether the occupied space of the user is not full of the memory space, and the transfer is performed only if the occupied space is full, so that the higher security of the transfer is further ensured.
In an actual application process, the predetermined format includes at least one of a hash chain table, an array and a chain table. Of course, the predetermined format is not limited to the above-described format, and any appropriate predetermined format may be selected by those skilled in the art as the format in which the authentication information is stored in the memory space. In a specific embodiment, the predetermined format is a hash chain table. Before the transfer, whether the size of the transferred content is safe or not is calculated, and on the premise that the memory safe space is not occupied, the identity authentication information of the users meeting the conditions is put into the memory space as much as possible according to the sequence from high to low. When the data is transferred, the data structure can be in the form of a hash chain table, so that the data structure has higher searching speed, and the efficiency of disconnecting the nodes and inserting the head of the chain table is also high.
According to another specific embodiment of the present application, after the identity authentication information of the user corresponding to the first probability greater than a preset threshold is transferred from the disk database to the memory space, the method further includes: under the condition that an authentication request of a target user is received, determining whether identity authentication information matched with the target user exists in the memory space; under the condition that the identity authentication information matched with the target user exists in the memory space, the identity authentication is determined to be successful; and searching the identity authentication information matched with the target user from the disk database under the condition that the identity authentication information matched with the target user does not exist in the memory space so as to perform identity authentication. Firstly, searching the identity authentication information of the target user from the memory space, and under the condition that the identity authentication information of the target user is in the memory space, carrying out identity authentication relatively quickly because the data processing speed of the memory space is relatively high; only when the identity authentication information of the target user is not available in the memory space, the target user continues to search from the database to complete the authentication operation.
In a specific embodiment, the matching process of the identity authentication information of the target user is shown in fig. 4.
In order to further ensure that the accuracy of authentication habit is high, and the matching degree of authentication habit and user is high, in one embodiment, when no identity authentication information matching with the target user exists in the memory space, after searching the identity authentication information matching with the target user from the disk database, or when the identity authentication information matching with the target user exists in the memory space, the method further includes, after determining that the identity authentication is successful: and constructing or updating the authentication habit of the target user according to the target user and the current scene. Therefore, the dynamic update of the user authentication habit can be further realized, and the obtained authentication habit is further ensured to be relatively attached to the authentication preference of the user.
In another specific embodiment, after determining whether there is authentication information matching the target user in the memory space, the method further includes: acquiring the duration of identity authentication information which does not exist in the memory space and is matched with the target user; and deleting the authentication habit corresponding to at least part of the time period under the condition that the duration time is longer than the preset duration time. When the identity authentication information which is difficult to match with the target user in the memory space continuously occurs in a period of time, and the data is required to be searched in the disk database, the fact that the user or the use place possibly changes greatly is indicated, the old personal habit information is invalid, the authentication habit data in the historical part period of time should be cleaned, and the authentication habit of the person is recalculated.
According to still another specific embodiment of the present application, the above method further comprises: and under the condition that the current scene changes, the identity authentication information of the user stored in the memory space is cleared. And repeating the steps of the method, and repeating the steps circularly, wherein the specific flow is shown in figure 5.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
The embodiment of the application also provides a storage device for the identity authentication information, and it should be noted that the storage device for the identity authentication information in the embodiment of the application can be used for executing the storage method for the identity authentication information provided in the embodiment of the application. The following describes a storage device for identity authentication information provided in the embodiments of the present application.
Fig. 6 is a schematic diagram of a storage device of identity authentication information according to an embodiment of the present application. As shown in fig. 6, the identity authentication information of all users is stored in a disk database, and the apparatus includes a first obtaining unit 10, a first determining unit 20, and a handling unit 30, where the first obtaining unit 10 is configured to obtain a current scenario and a plurality of authentication habits of the users, the current scenario includes at least one influencing factor, where the influencing factor is a factor affecting an authentication behavior of the users, and the authentication habits are used to characterize a probability that the users perform identity authentication in an environment including the influencing factor; the first determining unit 20 is configured to determine, according to the current scenario and the authentication habit, a probability that each user performs identity authentication in the current scenario as a first probability; the handling unit 30 is configured to handle the identity authentication information of the user corresponding to the first probability greater than a preset threshold from the disk database to a memory space for storage.
The storage device of identity authentication information acquires a current scene including at least one influencing factor and authentication habits of a plurality of users through the first acquisition unit, wherein the influencing factor is a factor influencing the identity authentication behavior of the users, and the authentication habits are used for representing the probability of the users performing identity authentication in an environment including the influencing factor; determining, by the first determining unit, a probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit; and the carrying unit carries the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value from the disk database to a memory space for storage. Compared with the problem that the speed of identity authentication matching is slower under a large data volume in the prior art, the method and the device predict the probability of identity authentication of each user under the current scene according to the authentication habit of the user and the current scene, move the user identity authentication information with the probability higher than the preset threshold value to the memory space, and search and match from the memory space in the follow-up process when matching because the processing speed of the memory space is higher than that of a disk database, ensure that the matching speed of the identity information is faster, and better solve the problem that the speed of identity authentication matching under the large data volume in the prior art is slower.
According to the principle that the processing speed of the memory space of a computer is far higher than that of a magnetic disk space but the memory space is limited, a preset threshold is set, and identity authentication information of the computer can be stored from a database to the memory space when the first probability of authentication is higher than the preset threshold, and meanwhile, the data are not matched in the database under the current scene.
Specifically, the preset thresholds corresponding to different users may be different.
According to a specific embodiment of the present application, the first obtaining unit includes an obtaining module, a first determining module, and a multiplying module, where the obtaining module is configured to obtain a historical authentication scenario corresponding to a plurality of historical authentication records of the user, and obtain a weight value corresponding to each historical influence factor, where the historical authentication scenario includes at least one historical influence factor, and the historical influence factor is the influence factor corresponding to the user when performing historical identity authentication; the first determining module is configured to determine a probability of occurrence of each of the history influencing factors in all of the history authentication scenes as a second probability; the multiplication module is configured to multiply each of the second probabilities with the corresponding weight value to obtain a preference value corresponding to the history influencing factor, where each of the history influencing factors and the corresponding preference value constitute the authentication habit of the user. Because the use habits of users are different, a plurality of users have influence factor combinations conforming to the habits of the users when the users are authenticated, and the user preference values corresponding to the history influence factors are determined by acquiring the history influence factors of the users in a history authentication scene, so that the authentication habits of the users can be accurately described, and more accurate data support is provided for the follow-up determination of the identity authentication information stored in the memory. In addition, because the description capability of different history influence factors on the authentication behavior of the user is different, the obtained preference value can be further ensured to reflect the authentication preference of the user more accurately by configuring the weight value for the different history influence factors.
The authentication of the person is closely related to the influence factors, and the authentication of the person can be predicted according to the combination of the influence factors. For example, an employee of a company often uses an attendance machine of the company to punch cards before 8 a.m. in daylight hours, and the company usually punches cards after leaving a lead at night, so that the influence factors of the employee's usage habit can be defined by the method of ' summer ', before 8 a.m. and after the lead. Then the user may be predicted not to authenticate if it falls outside of the other combinations of influencing factors. Several influencing factors are listed here: time: if the system is used as an authentication system for checking in, the time for going to work and going out from work is relatively fixed, so that the relation between the checking in of personnel and the time is dense and inseparable; personnel relationship: the interpersonal relationship of the authenticators also affects the authentication behavior of the authenticators, some authenticators can select to authenticate together in similar time, and other authenticators can select to authenticate before and after specific personnel or crowd authentication; weather: when weather becomes bad, the probability of some people authenticating becomes low, and when weather becomes good, the probability of their authentication becomes high; temperature: when the temperature is higher, the probability of some people authenticating becomes lower, and when the temperature is lower, the probability of their authentication becomes higher. Of course, the above-mentioned influencing factors are not limited to the above-mentioned time, personnel relationship, weather, temperature, etc., and those skilled in the art can flexibly set the kinds of the above-mentioned influencing factors according to actual situations.
In order to further ensure that the authentication habit obtained is accurate, according to another specific embodiment of the present application, the first determining module includes a determining submodule, where the determining submodule is configured toDetermining each of the second probabilities, wherein w represents the second probability, t=0 or t=1, t=0 represents that the history influencing factor does not appear in the history authentication scene, t=1 represents that the history influencing factor appears in the history authentication scene, and m 1 Representing the above-mentioned history authentication scenarioThe acquisition module comprises an acquisition sub-module and an acquisition sub-module, wherein the acquisition sub-module is used for acquiring the total number of the users and the number of the users related to the history influence factors; the above obtained submodule is used for the following +.>Obtaining the weight value, wherein x represents the weight value, m 2 Represents the total number, m n Indicating the number of said users associated with said history influencing factor. Thus, different authentication habits of different users can be dynamically and more exactly reflected, further ensuring that the identity authentication information of the user who prefers to carry out scene authentication under the current scene can be more accurately carried to the memory space according to the authentication habits, further ensuring that the identity matching speed of the user is faster, and further ensuring that the matching efficiency is higher.
Different external events have different descriptive capacities for habits of users, and if the time is taken as a judging basis and is more definite than weather, the weight of the influence factor taken as the time is higher than that of the influence factor taken as the weather. It should be noted that, the weight corresponding to the above influencing factor is not a constant value, and it is changed by changing the user duty ratio related to the table.
Specifically, the first determining unit includes a second determining module, a third determining module, and a calculating module, where the second determining module is configured to determine the influencing factors included in the current scene as target factors; the third determining module is configured to determine the preference value corresponding to each target factor according to the authentication habit; the calculation module is used for calculating the value of y=w 1 x 1 +w 2 x 2 +...+w n x n Calculating the first probability corresponding to each user, wherein y represents the first probability, and w n x n And representing the preference value corresponding to the target factor. In this embodiment, the influence factors in the current environment are combined, and the recognition of each user in the current environment of the combined influence factors is obtainedThe card probability further facilitates the subsequent storage of the identity authentication information of the user with higher authentication probability in the current environment in the memory space, and further avoids the problem of slower authentication speed in the process of identity authentication caused by the fact that all the identity authentication information is stored in a disk database.
The calculation formula y=w of the first probability 1 x 1 +w 2 x 2 +...+w n x n The update flow of (2) is shown in figure 2. The weight value x represents the descriptive capacity of the corresponding influencing factor for the authentication behavior, the value changes along with authentication habit in the database and personnel proportion change related to the influencing factor, and the second probability w represents the possibility that the user authenticates under the influencing factor, and the value is updated along with authentication records of the user. When the user authenticates, the influence factor at the moment is recorded, and the influence factor and the authentication record of the user are written into an information table of the disk database at the same time. When the authentication records reach a certain number, the authentication habit of the user can be generated according to the influence factors recorded in the database. When the user has authentication habit and authenticates again, the authentication habit of the user is updated according to the change condition of the influencing factors in the current environment. When updating, the probability of occurrence of a certain influence factor is calculated in sequence according to the historical authentication record of the user. If the total number of one influencing factor is larger, only a plurality of pieces of data in the last period are taken according to time, and the past data are discarded.
In a specific embodiment, the authentication habit generation and update flow is shown in fig. 3.
In the actual application process, after the first probabilities corresponding to the users are obtained through calculation, the first probabilities and the corresponding identity authentication information thereof can be ordered according to the sequence from high probability value to low probability value, and in the process of carrying the identity authentication information of the user corresponding to the first probability larger than a preset threshold value from the disk database to the memory space, the identity authentication information of the user corresponding to the first probability is also stored in the memory space according to the sequence from high probability to low probability value, so that the subsequent identity matching can be further facilitated.
In order to further ensure that the transfer of the identity authentication information is safer, in another specific embodiment of the present application, the handling unit includes a fourth determining module and a handling module, where the fourth determining module is configured to determine whether an occupied space of the identity authentication information of the user corresponding to the first probability greater than the preset threshold is smaller than the memory space; the handling module is used for removing the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value from the disk database and storing the identity authentication information in the memory space in a preset format under the condition that the occupied space is smaller than the memory space. In this embodiment, before the identity authentication information of the user corresponding to the first probability greater than the preset threshold is transferred, it is determined whether the occupied space of the user is not full of the memory space, and the transfer is performed only if the occupied space is full, so that the higher security of the transfer is further ensured.
In an actual application process, the predetermined format includes at least one of a hash chain table, an array and a chain table. Of course, the predetermined format is not limited to the above-described format, and any appropriate predetermined format may be selected by those skilled in the art as the format in which the authentication information is stored in the memory space. In a specific embodiment, the predetermined format is a hash chain table. Before the transfer, whether the size of the transferred content is safe or not is calculated, and on the premise that the memory safe space is not occupied, the identity authentication information of the users meeting the conditions is put into the memory space as much as possible according to the sequence from high to low. When the data is transferred, the data structure can be in the form of a hash chain table, so that the data structure has higher searching speed, and the efficiency of disconnecting the nodes and inserting the head of the chain table is also high.
According to still another specific embodiment of the present application, the apparatus further includes a second determining unit, a third determining unit, and a searching unit, where the second determining unit is configured to determine, after the identity authentication information of the user corresponding to the first probability greater than a preset threshold is transferred from the disk database to a memory space, if an authentication request of a target user is received, whether there is identity authentication information matching the target user in the memory space; the third determining unit is configured to determine that identity authentication is successful when identity authentication information matched with the target user exists in the memory space; the searching unit is used for searching the identity authentication information matched with the target user from the disk database under the condition that the identity authentication information matched with the target user does not exist in the memory space, so as to perform identity authentication. Firstly, searching the identity authentication information of the target user from the memory space, and under the condition that the identity authentication information of the target user is in the memory space, carrying out identity authentication relatively quickly because the data processing speed of the memory space is relatively high; only when the identity authentication information of the target user is not available in the memory space, the target user continues to search from the database to complete the authentication operation.
In a specific embodiment, the matching process of the identity authentication information of the target user is shown in fig. 4.
In order to further ensure that the accuracy of the authentication habit is high, and the matching degree with the authentication preference of the user is high, in one embodiment, the apparatus further includes a construction unit, where the construction unit is configured to, when no identity authentication information matching the target user exists in the memory space, search the disk database for the identity authentication information matching the target user, or, when the identity authentication information matching the target user exists in the memory space, determine that the identity authentication is successful, and then construct or update the authentication habit of the target user according to the target user and the current scenario. Therefore, the dynamic update of the user authentication habit can be further realized, and the obtained authentication habit is further ensured to be relatively attached to the authentication preference of the user.
In another specific embodiment, the apparatus further includes a second obtaining unit and a deleting unit, where the second obtaining unit is configured to obtain, after determining whether the identity authentication information matched with the target user exists in the memory space, a duration in which the identity authentication information matched with the target user does not exist in the memory space; the deleting unit is configured to delete the authentication habit corresponding to at least part of the time period when the duration is longer than a preset duration. When the identity authentication information which is difficult to match with the target user in the memory space continuously occurs in a period of time, and the data is required to be searched in the disk database, the fact that the user or the use place possibly changes greatly is indicated, the old personal habit information is invalid, the authentication habit data in the historical part period of time should be cleaned, and the authentication habit of the person is recalculated.
According to still another specific embodiment of the present application, the apparatus further includes a flushing unit, where the flushing unit is configured to flush the authentication information of the user stored in the memory space in case of a change of the current scene. And repeating the above steps, and the specific flow is shown in fig. 5.
The storage device of the identity authentication information comprises a processor and a memory, wherein the first acquisition unit, the first determination unit, the carrying unit and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one kernel, and the problem of slower speed of identity authentication matching under large data volume in the prior art is solved by adjusting kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
The embodiment of the invention provides a computer readable storage medium, on which a program is stored, which when executed by a processor, implements the above-described method of storing identity authentication information.
The embodiment of the invention provides a processor, which is used for running a program, wherein the storage method of the identity authentication information is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program stored in the memory and capable of running on the processor, wherein the processor realizes at least the following steps when executing the program:
step S101, acquiring a current scene and a plurality of authentication habits of the user, wherein the current scene comprises at least one influencing factor, the influencing factor is a factor influencing the authentication behavior of the user, and the authentication habits are used for representing the probability of identity authentication of the user in an environment comprising the influencing factor;
step S102, determining the probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit;
step S103, the identity authentication information of the user corresponding to the first probability larger than a preset threshold value is transferred from the disk database to a memory space for storage.
The device herein may be a server, PC, PAD, cell phone, etc.
The present application also provides a computer program product adapted to perform a program initialized with at least the following method steps when executed on a data processing device:
step S101, acquiring a current scene and a plurality of authentication habits of the user, wherein the current scene comprises at least one influencing factor, the influencing factor is a factor influencing the authentication behavior of the user, and the authentication habits are used for representing the probability of identity authentication of the user in an environment comprising the influencing factor;
step S102, determining the probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit;
step S103, the identity authentication information of the user corresponding to the first probability larger than a preset threshold value is transferred from the disk database to a memory space for storage.
According to still another exemplary embodiment of the present application, there is also provided an identity authentication device including one or more processors, a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including means for performing any of the methods described above.
The identity authentication device is used for executing any one of the methods. Compared with the problem that the speed of identity authentication matching is slower under a large data volume in the prior art, the method predicts the probability of identity authentication of each user under the current scene according to the authentication habit of the user and the current scene, moves the user identity authentication information with the probability higher than the preset threshold value to the memory space, and can search and match from the memory space in the follow-up process when matching because the processing speed of the memory space is higher than that of a disk database, thereby ensuring the faster matching speed of the identity information, better solving the problem that the speed of identity authentication matching under the large data volume in the prior art is slower, and ensuring the higher matching efficiency of the identity authentication equipment.
Specifically, when the user is using the authentication device, only the personnel information necessary for the user to compare is entered and used as the authentication information, such as a face, an RFID (Radio Frequency Identification ) number, fingerprint information, etc., which is determined according to the capability of the authentication device. The recorded information is used as basic information for personnel comparison and is written into a disk database. After the authentication equipment is put into use, besides the authentication record of the record personnel, the external environment change is recorded in real time, namely, the influence factors under the environment are recorded, and the recorded influence factors are determined by the events which can be acquired by the identity authentication equipment.
In addition, the above influencing factors are determined according to the content available to the identity authentication device, for example, the identity authentication device supports obtaining internet time, weather information, temperature information, other user authentication information relationships and other content, which can be used as influencing factors for analysis.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology content may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units may be a logic function division, and there may be another division manner when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the above-mentioned method of the various embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
From the above description, it can be seen that the above embodiments of the present application achieve the following technical effects:
1) In the method for storing identity authentication information, a current scene including at least one influencing factor and authentication habits of a plurality of users are firstly obtained, wherein the influencing factor is a factor influencing the identity authentication behavior of the users, and the authentication habits are used for representing the probability of the users for carrying out identity authentication in an environment including the influencing factor; then, according to the current scene and the authentication habit, determining the probability of identity authentication of each user in the current scene as a first probability; and finally, carrying the identity authentication information of the user corresponding to the first probability larger than a preset threshold value from the disk database to a memory space for storage. Compared with the problem that the speed of identity authentication matching is slower under a large data volume in the prior art, the method and the device predict the probability of identity authentication of each user under the current scene according to the authentication habit of the user and the current scene, move the user identity authentication information with the probability higher than the preset threshold value to the memory space, and search and match from the memory space in the follow-up process when matching because the processing speed of the memory space is higher than that of a disk database, ensure that the matching speed of the identity information is faster, and better solve the problem that the speed of identity authentication matching under the large data volume in the prior art is slower.
2) According to the storage device of the identity authentication information, the first acquisition unit is used for acquiring a current scene comprising at least one influencing factor and authentication habits of a plurality of users, wherein the influencing factor is a factor influencing the identity authentication behavior of the users, and the authentication habits are used for representing the probability of the users performing identity authentication under the environment comprising the influencing factor; determining, by the first determining unit, a probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit; and the carrying unit carries the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value from the disk database to a memory space for storage. Compared with the problem that the speed of identity authentication matching is slower under a large data volume in the prior art, the method and the device predict the probability of identity authentication of each user under the current scene according to the authentication habit of the user and the current scene, move the user identity authentication information with the probability higher than the preset threshold value to the memory space, and search and match from the memory space in the follow-up process when matching because the processing speed of the memory space is higher than that of a disk database, ensure that the matching speed of the identity information is faster, and better solve the problem that the speed of identity authentication matching under the large data volume in the prior art is slower.
3) The identity authentication device is used for executing any one of the methods. Compared with the problem that the speed of identity authentication matching is slower under a large data volume in the prior art, the method predicts the probability of identity authentication of each user under the current scene according to the authentication habit of the user and the current scene, moves the user identity authentication information with the probability higher than the preset threshold value to the memory space, and can search and match from the memory space in the follow-up process when matching because the processing speed of the memory space is higher than that of a disk database, thereby ensuring the faster matching speed of the identity information, better solving the problem that the speed of identity authentication matching under the large data volume in the prior art is slower, and ensuring the higher matching efficiency of the identity authentication equipment.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the same, but rather, various modifications and variations may be made by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application.

Claims (11)

1. A method for storing identity authentication information, wherein all the identity authentication information of users is stored in a disk database, the method comprising:
Acquiring a current scene and a plurality of authentication habits of the user, wherein the current scene comprises at least one influencing factor, the influencing factor is a factor influencing the authentication behavior of the user, and the authentication habits are used for representing the probability of identity authentication of the user in an environment comprising the influencing factor;
determining the probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit;
the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value is carried from the disk database to a memory space for storage,
acquiring authentication habits of a plurality of users, including:
acquiring a historical authentication scene corresponding to a plurality of historical authentication records of the user, and acquiring a weight value corresponding to each historical influence factor, wherein the historical authentication scene comprises at least one historical influence factor, and the historical influence factor is the influence factor corresponding to the user when performing historical identity authentication;
determining the probability of each history influencing factor appearing in all the history authentication scenes as a second probability;
Multiplying each second probability with the corresponding weight value to obtain a preference value corresponding to the history influence factor, wherein each history influence factor and the corresponding preference value form the authentication habit of the user,
after the identity authentication information of the user corresponding to the first probability greater than a preset threshold is carried from the disk database to a memory space, the method further comprises:
under the condition that an authentication request of a target user is received, determining whether identity authentication information matched with the target user exists in the memory space;
under the condition that the identity authentication information matched with the target user exists in the memory space, the identity authentication is determined to be successful;
searching the identity authentication information matched with the target user from the disk database under the condition that the identity authentication information matched with the target user does not exist in the memory space so as to perform identity authentication,
determining the probability of each history influencing factor appearing in all the history authentication scenes as a second probability comprises the following steps:
according toDetermining each second probability, wherein w represents the second probability, t=0 or t=1, t=0 represents that the history influencing factor does not appear in the history authentication scene, t=1 represents that the history influencing factor appears in the history authentication scene, and m 1 Representing the number of said historical authentication scenarios,
according to the current scene and the authentication habit, determining the probability of identity authentication of each user in the current scene as a first probability comprises the following steps:
determining the influence factors included in the current scene as target factors;
determining the preference value corresponding to each target factor according to the authentication habit;
according to y=w 1 x 1 +w 2 x 2 +...+w n x n Calculating the first probability corresponding to each user, wherein y represents the first probability, and w n x n And representing the preference value corresponding to the target factor.
2. The method of claim 1, wherein obtaining a weight value for each historical influencing factor comprises:
obtaining a total number of the users and a number of the users related to the history influencing factor;
according toObtaining the weight value, wherein x represents the weight value, m 2 Represents the total number, m n Representing the number of said users related to said history influencing factor.
3. The method according to claim 1 or 2, wherein handling the authentication information of the user corresponding to the first probability greater than a preset threshold from the disk database to a memory space comprises:
Determining whether the occupied space of the identity authentication information of the user corresponding to the first probability larger than the preset threshold is smaller than the memory space;
and under the condition that the occupied space is smaller than the memory space, the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value is carried out from the disk database and stored in the memory space in a preset format.
4. The method of claim 3, wherein the predetermined format comprises at least one of a hash chain, an array, and a chain.
5. The method of claim 1, wherein after searching the disk database for the authentication information matching the target user in the case that the authentication information matching the target user does not exist in the memory space, or after determining that the authentication is successful in the case that the authentication information matching the target user exists in the memory space, the method further comprises:
and constructing or updating the authentication habit of the target user according to the target user and the current scene.
6. The method of claim 1, wherein after determining whether there is authentication information in the memory space that matches the target user, the method further comprises:
Acquiring the duration of identity authentication information which does not exist in the memory space and is matched with the target user;
and deleting the authentication habit corresponding to at least part of the time period under the condition that the duration time is longer than the preset time.
7. The method according to claim 1, wherein the method further comprises:
and under the condition that the current scene changes, the identity authentication information of the user stored in the memory space is cleared.
8. A storage device for identity authentication information, the identity authentication information of all users being stored in a disk database, the device comprising:
the first acquisition unit is used for acquiring a current scene and authentication habits of a plurality of users, wherein the current scene comprises at least one influencing factor, the influencing factor is a factor influencing the authentication behavior of the users, and the authentication habits are used for representing the probability of identity authentication of the users in an environment comprising the influencing factor;
the first determining unit is used for determining the probability of identity authentication of each user in the current scene as a first probability according to the current scene and the authentication habit;
A handling unit, configured to handle the identity authentication information of the user corresponding to the first probability greater than a preset threshold from the disk database to a memory space for storage,
the first acquisition unit comprises an acquisition module, a first determination module and a multiplication module, wherein the acquisition module is used for acquiring historical authentication scenes corresponding to a plurality of historical authentication records of the user and weight values corresponding to all the historical influence factors, the historical authentication scenes comprise at least one historical influence factor, and the historical influence factors are influence factors corresponding to the user in the process of carrying out historical identity authentication; the first determining module is used for determining the probability of each history influencing factor in all the history authentication scenes as a second probability; the multiplying module is configured to multiply each of the second probabilities with the corresponding weight value to obtain preference values corresponding to the history influencing factors, each of the history influencing factors and the corresponding preference values form the authentication habit of the user,
the device further comprises a second determining unit, a third determining unit and a searching unit, wherein the second determining unit is used for determining whether the identity authentication information matched with the target user exists in the memory space under the condition that the authentication request of the target user is received after the identity authentication information of the user corresponding to the first probability which is larger than a preset threshold value is conveyed from the disk database to the memory space; the third determining unit is used for determining that the identity authentication is successful under the condition that the identity authentication information matched with the target user exists in the memory space; the searching unit is configured to search, in the case that the identity authentication information matched with the target user does not exist in the memory space, for identity authentication by using the identity authentication information matched with the target user in the disk database, where the first determining module includes:
A determination sub-module for determining according toDetermining each second probability, wherein w represents the second probability, t=0 or t=1, t=0 represents that the history influencing factor does not appear in the history authentication scene, t=1 represents that the history influencing factor appears in the history authentication scene, and m 1 Representing the number of said historical authentication scenarios,
the first determination unit includes:
the second determining module is used for determining the influence factors included in the current scene as target factors;
the third determining module is used for determining the preference value corresponding to each target factor according to the authentication habit;
a calculation module for calculating the value of y=w 1 x 1 +w 2 x 2 +...+w n x n Calculating the first probability corresponding to each user, wherein y represents the first probability, and w n x n And representing the preference value corresponding to the target factor.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein the program performs the method of any one of claims 1 to 7.
10. A processor for running a program, wherein the program when run performs the method of any one of claims 1 to 7.
11. An identity authentication device, comprising:
one or more processors, memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs comprising instructions for performing the method of any of claims 1-7.
CN202210738239.3A 2022-06-27 2022-06-27 Identity authentication information storage method and device and identity authentication equipment Active CN115118496B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210738239.3A CN115118496B (en) 2022-06-27 2022-06-27 Identity authentication information storage method and device and identity authentication equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210738239.3A CN115118496B (en) 2022-06-27 2022-06-27 Identity authentication information storage method and device and identity authentication equipment

Publications (2)

Publication Number Publication Date
CN115118496A CN115118496A (en) 2022-09-27
CN115118496B true CN115118496B (en) 2024-02-27

Family

ID=83329557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210738239.3A Active CN115118496B (en) 2022-06-27 2022-06-27 Identity authentication information storage method and device and identity authentication equipment

Country Status (1)

Country Link
CN (1) CN115118496B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009140911A1 (en) * 2008-05-19 2009-11-26 Zheng Kuanyong Method for interactive authentication
CN110932858A (en) * 2018-09-19 2020-03-27 阿里巴巴集团控股有限公司 Authentication method and system
CN112036890A (en) * 2020-09-01 2020-12-04 中国银行股份有限公司 Client identity authentication method and device
KR102201088B1 (en) * 2019-10-10 2021-01-11 윤성민 Identity authentication system and method thereof
CN112580009A (en) * 2020-12-22 2021-03-30 北京八分量信息科技有限公司 Method and device for authenticating user identity in big data system and related products
CN112738043A (en) * 2020-12-22 2021-04-30 北京八分量信息科技有限公司 Method, system and related product for carrying out legality authentication on user identity in big data system
CN113204758A (en) * 2021-05-27 2021-08-03 中国建设银行股份有限公司 Security authentication method, device, storage medium and server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035649B (en) * 2009-09-29 2013-08-21 国际商业机器公司 Authentication method and device
US10986138B2 (en) * 2018-11-19 2021-04-20 SOURCE Ltd. System and method for adaptively determining an optimal authentication scheme

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009140911A1 (en) * 2008-05-19 2009-11-26 Zheng Kuanyong Method for interactive authentication
CN110932858A (en) * 2018-09-19 2020-03-27 阿里巴巴集团控股有限公司 Authentication method and system
KR102201088B1 (en) * 2019-10-10 2021-01-11 윤성민 Identity authentication system and method thereof
CN112036890A (en) * 2020-09-01 2020-12-04 中国银行股份有限公司 Client identity authentication method and device
CN112580009A (en) * 2020-12-22 2021-03-30 北京八分量信息科技有限公司 Method and device for authenticating user identity in big data system and related products
CN112738043A (en) * 2020-12-22 2021-04-30 北京八分量信息科技有限公司 Method, system and related product for carrying out legality authentication on user identity in big data system
CN113204758A (en) * 2021-05-27 2021-08-03 中国建设银行股份有限公司 Security authentication method, device, storage medium and server

Also Published As

Publication number Publication date
CN115118496A (en) 2022-09-27

Similar Documents

Publication Publication Date Title
CN108733819A (en) A kind of personnel's archives method for building up and device
CN110798709B (en) Video processing method and device, storage medium and electronic device
CN112100204B (en) Virtual resource regulation and control method, device, computer equipment and storage medium
CN110555164B (en) Method, device, computer equipment and storage medium for generating group interest labels
KR20160132370A (en) Methods of storing a set of biometric data templates and of matching biometrics, biometric matching apparatus and computer program
CN110688974A (en) Identity recognition method and device
CN110865992A (en) Retrieval library management method, retrieval device and retrieval medium
CN111090807A (en) Knowledge graph-based user identification method and device
CN110457332B (en) Information processing method and related equipment
CN113344132A (en) Identity recognition method, system, device, computer equipment and storage medium
CN113268641B (en) User data processing method based on big data and big data server
CN111309946B (en) Established file optimization method and device
CN103595747A (en) User-information recommending method and system
US20190068745A1 (en) Method and apparatus for setting mobile device identifier
CN115118496B (en) Identity authentication information storage method and device and identity authentication equipment
CN110196924B (en) Method and device for constructing characteristic information base and method and device for tracking target object
CN107590233A (en) A kind of file management method and device
CN112257111A (en) Dynamic numerical value desensitization method, device and storage medium
CN113343004B (en) Object identification method and device, storage medium and electronic device
CN110442614A (en) Searching method and device, electronic equipment, the storage medium of metadata
CN115378806A (en) Flow distribution method and device, computer equipment and storage medium
CN114781517A (en) Risk identification method and device and terminal equipment
CN110471926B (en) File establishing method and device
CN113076450A (en) Method and device for determining target recommendation list
CN112084355A (en) Face sub-library updating method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant