Data processing method, apparatus, server, and computer readable storage medium
A data processing device and data processing technology are applied in the field of information security to achieve the effect of detection
Pending Publication Date: 2019-01-29
ADVANCED NEW TECH CO LTD
3 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
However, while the Internet brings convenience, it also has certain risks. Criminals seek illegitimate inter...
Abstract
The invention discloses a data processing method, device, server and computer storage medium, In the data processing method, the first position and the second position where the target account is located are acquired at different times, and the shortest time consumed from the first position to the second position is determined. The state of the target account is determined by comparing the shortest time with the actual time consumed, thereby effectively realizing the detection of the security of the target account.
Application Domain
Digital data authentication
Technology Topic
Data processingComputer engineering +1
Image
Examples
- Experimental program(1)
Example Embodiment
[0024] In order to better understand the above technical solutions, the technical solutions of the embodiments of this specification are described in detail below through the drawings and specific embodiments. It should be understood that the embodiments of this specification and the specific features in the embodiments are of the technical solutions of the embodiments of this specification. The detailed description is not a limitation on the technical solution of this specification. The embodiments of this specification and the technical features in the embodiments can be combined with each other if there is no conflict.
[0025] In the first aspect, a data processing method provided by an embodiment of this specification, such as figure 1 As shown, the schematic diagram of the application scenario of the data processing method provided by the embodiment of this specification. figure 1 Here, the terminal device 11 may be an electronic device used by the user, such as a mobile phone, a laptop computer, etc. The user can use the terminal device 11 to log in to his account, and the terminal device 11 may also send its own location information to the server 12. The server 12 can communicate with the terminal device 11. The server 12 can receive the location information sent by the terminal device 11, and perform operations such as path determination and time-consuming calculations based on the location information.
[0026] Such as figure 2 As shown, the flow chart of a data processing method provided in the embodiment of this specification includes the following steps:
[0027] Step S21: Obtain the first position of the target account at the first moment;
[0028] Step S22: Acquire the second location of the target account at the second moment;
[0029] In the embodiments of this specification, the target account can be set according to actual needs. For example, the target account may be the account marked by the user, or it may be automatically determined according to the risk level of the account being stolen. In one embodiment, the user can manage the account through the terminal device, mark more important accounts and upload them to the server. In another embodiment, the server can automatically determine the target account according to the risk level of the user’s account being misappropriated. The risk level of misappropriation can be set according to historical account misappropriation information, which will have a higher risk level of misappropriation. As the target account.
[0030] The target account can be logged in on the terminal device, and the terminal device can include a positioning module, which can obtain the location information of the terminal device. In the embodiment of this specification, the first location and the second location can be determined by acquiring the device location of the terminal device with the target account logged in. For example, at the first moment, the target account logs in on a certain terminal device, then the location of the terminal device is taken as the first location.
[0031] The first time and the second time can be set according to actual needs. In one embodiment, the first time and the second time can be two adjacent time in the timed task, for example, the timed task is every ten minutes Obtain the location information of the target account once, if the first moment is nine o'clock, then the second moment is nine ten ten. In another embodiment, the first moment and the second moment can be determined by the login operation of the target account. For example, when it is detected that the target account is logged in on a certain terminal, the login time is the first moment. And when it is detected that the target account is logged in again, the login time is the second moment.
[0032] Step S23: Determine the shortest time spent moving from the first position to the second position according to N paths existing between the first position and the second position, where N is a positive integer;
[0033] In the embodiment of this specification, if the target account is always logged in the same terminal device, then the shortest time spent moving from the first location to the second location is the shortest time for the terminal device to move from the first location to the second location.
[0034] Since there may be N paths between the first position and the second position, and the distance and road conditions of each path are different, the time taken to move along each path may also be different. The shortest duration can be the duration that consumes the least time under real road conditions, or the shortest duration consumed by the shortest path under the assumption that the road conditions are smooth, which is not limited here.
[0035] Step S24: Determine the state of the target account according to the shortest time period, the first moment, and the second moment, wherein the state of the target account is a normal state or an abnormal state. .
[0036] In the embodiment of this specification, by calculating the time difference between the first moment and the second moment, the actual time spent moving from the first position to the second position can be obtained. The actual spent time is compared with the above-mentioned shortest time. The duration is shorter than the shortest duration, indicating that it is difficult to do in the real world, that is, a terminal device cannot move from the first position to the second position within the actual consumed time period, and the target account is at risk of being stolen. When the target account is considered abnormal, if the actual time consumed is greater than the shortest duration, the target account can be considered normal.
[0037] Optionally, the determining the shortest time spent moving from the first position to the second position according to the N paths existing between the first position and the second position includes: determining the path along the For the first time length consumed by each path of the N paths, a total of N first time lengths are obtained; the minimum of the N first time lengths is determined to be the shortest time length.
[0038] In the embodiments of this specification, the server may store map data of each region, and mark the first location and the second location as the starting point and the end point in the corresponding map data, and planning to move from the first location to the second location It should be noted that the premise that the first position is the starting point and the second position is the end point is that the first time is earlier than the second time. If the first time is later than the second time, the second position As the starting point, the first location is the end point, and the path from the second location to the first location is planned. The N paths may include driving paths, cycling paths, walking paths, and so on.
[0039] Calculating the first duration of movement along each path can be implemented in multiple ways. In the embodiment of this specification, the following two implementation ways are used for description.
[0040] The first method is to determine the first time length of each path by assuming that N paths are ideal road conditions with smooth traffic. In one embodiment, the first location and the second location are two locations in the same city, and the distance between the first location and the second location is relatively long, and you can choose to move by car. Since each path is a smooth traffic condition, the vehicle can be regarded as driving at the same speed when driving on each path. You only need to determine the length of each path and divide the length of each path by the At the same speed, the first time consumed by each path can be obtained.
[0041] The second method: Use real road condition information to determine the first length of time to move along each path. Such as image 3 As shown, the processing flowchart of the second method provided by the embodiment of this specification, the flow includes the following steps.
[0042] Step S31: Obtain road condition information of each path;
[0043] Step S32: According to the road condition information, determine the first time length consumed by moving along each path.
[0044] It should be understood that the road condition information includes road congestion. The server can store historical road condition data. These historical road condition data can be directly read. The server can restore the history of each road on the map at each historical moment based on the historical road condition data. Road conditions. In one embodiment, if the first time is earlier than the second time, then N paths with the first location as the starting point and the second location as the ending point are obtained, and reconstructed according to the historical road condition data at the first time and after the first time For the real-time road conditions of the above N paths, for each path, simulate the movement process of moving from the first position to the second position from the first time under the reconstructed road conditions, and obtain the first time length corresponding to the path.
[0045] Optionally, the determining the first length of time consumed to move along the each path according to the road condition information includes: determining K types of movement modes to move along the each path, where K is a positive integer; According to the road condition information, obtain the second time length consumed by each of the K movement modes to move along the each path, and obtain a total of K second time lengths; reduce the minimum of the K second time lengths Value as the first duration.
[0046] It should be understood that for each path, there may be one or more modes of movement. For example, a path can be completed by driving the whole journey, or by walking or taking a bus, or by Ride the whole journey to complete.
[0047] The K movement modes are for each path, and the number of movement modes corresponding to each of the N paths may also be different. In one embodiment, there are three movement modes for the first path among the N paths, and there is only one movement mode for the second path among the N paths.
[0048] In the embodiment of the present specification, when calculating the first time duration corresponding to each path, each movement mode is used to move under the reconstructed road condition, and the second time duration for completing the movement with this movement mode is obtained. Due to different road conditions, driving is not necessarily faster than cycling or walking for the same route. Therefore, calculating the time spent using each mode of movement can make the shortest time obtained more accurate. In this way, for each path, one or more second durations can be obtained, corresponding to one or more movement modes, respectively, and the second duration with the shortest time is used as the first duration of movement along the path.
[0049] It should be noted that the method for obtaining the first duration in the embodiment of this specification includes but is not limited to the above two methods. After obtaining the N first durations corresponding to the N paths, the minimum of the N first durations is selected as the shortest duration consumed by moving from the first position to the second position.
[0050] Optionally, the determining the status of the target account according to the shortest time length, the first time, and the second time includes: determining the time between the first time and the second time Difference; when the difference between the time difference and the shortest duration is less than or equal to a threshold, it is determined that the state of the target account is the abnormal state; when the time difference and the shortest duration When the difference between the two is greater than the threshold, it is determined that the state of the target account is the normal state.
[0051] In the embodiments of this specification, considering the error in calculating the shortest duration, a threshold can be set, that is, if the result of the time difference minus the shortest duration is less than or equal to a threshold, it indicates that it is impossible to achieve this time in the real world. Moving from the first position to the second position within the difference, the target account is abnormal, otherwise, the status of the target account is considered normal.
[0052] Optionally, the determining that the state of the target account is the normal state when the difference between the time difference value and the shortest duration is greater than the threshold value includes: When the difference between the shortest durations is greater than the threshold, the first device information of the first device operating on the target account at the first time is acquired, and the information on the target account is acquired at the second time. Second device information of the second device performing the operation; when the first device information is the same as the second device information, it is determined that the state of the target account is the normal state.
[0053] In the embodiment of this specification, when the result obtained by subtracting the shortest duration from the time difference is greater than the threshold, it indicates that the actual time for moving from the first position to the second position is longer than the shortest duration obtained by calculation. This situation can be achieved in the following two ways. In the first way, the target account remains logged in on the same device, and the device moves from the first location to the second location. In the second way, at the first moment, the target account logs in on the device A located in the first location, then logs out on the device A and logs in on the device B, and the device B is located in the second location at the second moment.
[0054] For the first method, since the target account is always logged in on the same device, the security of the target account can be guaranteed. For the second method, since the target account has changed the login device, this may be operated by the holder of the target account, or it may be caused by the stolen login after the target account is stolen. Therefore, in the embodiment of this specification, when the first device information is different from the second device information, reminding information is sent to the target device bound to the target account to remind the user of the target account that the target account is Other devices log in.
[0055] Generally speaking, the target account can be bound to a certain terminal device of the user. For example, the target account is an Alipay account, the Alipay account can be bound to the user's mobile phone, and the mobile phone is the target device. The target device, the first device, and the second device may be the same device, and of course, the three may also be different devices. When it is detected that the first device information is different from the second device information, a reminder message is sent to the target device to inform the user that the target account is logged in on another device. If the account is not operated by himself, the account may be at risk, and the user can be advised to change the account And passwords, etc.
[0056] In the second aspect, based on the same inventive concept, the embodiments of this specification provide a data processing device, please refer to Figure 4 ,include:
[0057] The first obtaining module 41 is configured to obtain the first location of the target account at the first moment;
[0058] The second obtaining module 42 is configured to obtain the second location of the target account at the second moment;
[0059] The first duration determining module 43 is configured to determine the shortest duration consumed by moving from the first location to the second location according to N paths existing between the first location and the second location;
[0060] The status determination module 44 is configured to determine the status of the target account according to the shortest time period, the first moment, and the second moment, where the status of the target account is a normal state or an abnormal state.
[0061] In an optional implementation manner, the first duration determining module 43 includes:
[0062] The second duration determining module 431 is configured to determine the first duration consumed by moving along each of the N paths, and obtain a total of N first durations;
[0063] The first determining module 432 is configured to determine that the minimum value of the N first durations is the shortest duration.
[0064] In an optional implementation manner, the second duration determining module 431 includes:
[0065] Road condition acquiring module 4311, configured to acquire road condition information of each path;
[0066] The third duration determining module 4312 is configured to determine the first duration consumed for moving along each path according to the road condition information.
[0067] In an optional implementation manner, the third duration determining module 4312 includes:
[0068] The movement mode determining module is used to determine K movement modes along each path, where K is a positive integer;
[0069] A fourth duration determining module, configured to obtain, according to the road condition information, the second duration consumed by each of the K movement modes to move along the each path, and obtain K second durations in total;
[0070] The second determining module is configured to use the minimum value of the K second durations as the first duration.
[0071] In an optional implementation manner, the state determining module 44 includes:
[0072] A first processing module, configured to determine the time difference between the first moment and the second moment;
[0073] A third determining module, configured to determine that the state of the target account is the abnormal state when the difference between the time difference and the shortest duration is less than or equal to a threshold;
[0074] The fourth determining module is configured to determine that the state of the target account is the normal state when the difference between the time difference and the shortest duration is greater than the threshold.
[0075] In an optional implementation manner, the fourth determining module includes:
[0076] A device information acquiring module, configured to acquire the first device of the first device operating the target account at the first moment when the difference between the time difference value and the shortest duration is greater than the threshold value Information, and acquiring second device information of the second device operating on the target account at the second time;
[0077] The fifth determining module is configured to determine that the state of the target account is the normal state when the first device information is the same as the second device information.
[0078] In an optional implementation manner, the device further includes:
[0079] The sending module is configured to send reminder information to the target device bound to the target account when the first device information is different from the second device information, so as to remind the user of the target account of the target account Log in on other devices.
[0080] Regarding the above device, the specific functions of each module therein have been described in detail in the embodiment of the data processing method provided in the embodiment of the present invention, and detailed description will not be given here.
[0081] In the third aspect, based on the same inventive concept as the data processing method in the foregoing embodiment, the present invention also provides a data processing device, such as Figure 5 As shown, it includes a memory 504, a processor 502, and a computer program stored on the memory 504 and running on the processor 502. When the processor 502 executes the program, any method of the data processing method described above is implemented step.
[0082] Among them, in Figure 5 In the bus architecture (represented by the bus 500), the bus 500 can include any number of interconnected buses and bridges. The bus 500 will include one or more processors represented by the processor 502 and various memories represented by the memory 504. The circuits are linked together. The bus 500 may also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, no further description will be given herein. The bus interface 506 provides an interface between the bus 500 and the receiver 501 and transmitter 1103. The receiver 501 and the transmitter 503 may be the same element, that is, a transceiver, which provides a unit for communicating with various other devices on the transmission medium. The processor 502 is responsible for managing the bus 500 and general processing, and the memory 504 may be used to store data used by the processor 502 when performing operations.
[0083] In the fourth aspect, based on the inventive concept based on the data processing method in the foregoing embodiment, the present invention also provides a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the data-based Steps of any method of processing method.
[0084] This specification is described with reference to flowcharts and/or block diagrams of methods, devices (systems), and computer program products according to the embodiments of this specification. It should be understood that each process and/or block in the flowchart and/or block diagram, and the combination of processes and/or blocks in the flowchart and/or block diagram can be implemented by computer program instructions. These computer program instructions can be provided to the processor of a general-purpose computer, a special-purpose computer, an embedded processor, or other programmable data processing equipment to generate a machine, so that the instructions executed by the processor of the computer or other programmable data processing equipment are generated In the process Figure one Process or multiple processes and/or boxes Figure one A device with functions specified in a box or multiple boxes.
[0085] These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device. The equipment is implemented in the process Figure one Process or multiple processes and/or boxes Figure one Functions specified in a box or multiple boxes.
[0086] These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment. Instructions are provided to implement the process Figure one Process or multiple processes and/or boxes Figure one Steps of functions specified in a box or multiple boxes.
[0087] Although the preferred embodiments of the present invention have been described, those skilled in the art can make additional changes and modifications to these embodiments once they learn the basic creative concept. Therefore, the appended claims are intended to be interpreted as including the preferred embodiments and all changes and modifications falling within the scope of the present invention.
[0088] Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. In this way, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalent technologies, the present invention is also intended to include these modifications and variations.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Piezoelectric vibration excitation self-diagnosis MEMS (Micro Electro Mechanical System) accelerometer core and accelerometer
PendingCN108761128ARealize detection
Owner:INST OF ELECTRONICS ENG CHINA ACAD OF ENG PHYSICS
Two-dimensional code detection method and device and storage medium
Owner:广州广电研究院有限公司
Mechanical detection shaping device for machining of Audi C8 base structural piece
Owner:四川众兴汽车零部件有限公司
Flexible capacitive sensor and preparation method thereof
PendingCN114791326ARealize the size rangeRealize detection
Owner:XI AN JIAOTONG UNIV
Detection method and system for E1 link phase jitter
InactiveCN106357353AAchieving phase jitterRealize detection
Owner:LIUZHOU DADI TELECOMM EQUIP +1
Classification and recommendation of technical efficacy words
- Realize detection
Test method and system for flow control device and data stream playback device
InactiveCN101841441ARealize detection
Owner:BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Time resolution dynamic thermal analysis ion mobility spectrometry detection method
InactiveCN106841367ARealize detection
Owner:DALIAN INST OF CHEM PHYSICS CHINESE ACAD OF SCI
Piezoelectric vibration excitation self-diagnosis MEMS (Micro Electro Mechanical System) accelerometer core and accelerometer
PendingCN108761128ARealize detection
Owner:INST OF ELECTRONICS ENG CHINA ACAD OF ENG PHYSICS
Two-dimensional code detection method and device and storage medium
Owner:广州广电研究院有限公司