Access data verification method and device, equipment and storage medium
A technology for accessing data and verifying methods, applied in the computer field, can solve the problems of triggering dangerous events, the network access control model cannot meet the requirements of identity authentication and data security, etc., to achieve the effect of improving the efficiency of verification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] figure 1 It is a flow chart of a method for verifying access data provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of verifying the data of a user accessing a system or a web page, and the method can be executed by a verification device for accessing data. The device can be composed of hardware and / or software, and generally can be integrated into a device with a verification function for accessing data, and the device can be an electronic device such as a server or a server cluster. Such as figure 1 As shown, the method specifically includes the following steps:
[0025] Step 110, creating an initial decision tree model based on the access data samples.
[0026] Wherein, the access data may include multi-dimensional access information and risk labels. Multi-dimensional access information can be login account, login time, login location, and login device model, etc.; the risk label can be a preset risk level, for example, l...
Embodiment 2
[0050] figure 2 It is a schematic structural diagram of a verification device for accessing data provided by Embodiment 2 of the present invention. Such as figure 2 As shown, the device includes:
[0051] An initial decision tree model creation module 210, configured to create an initial decision tree model based on the access data sample;
[0052] The target decision tree acquisition module 220 is used for pruning the initial decision tree model according to the access data samples to obtain the target decision tree model;
[0053] A risk category acquisition module 230, configured to input the access data to be verified into the target decision tree model, and obtain the risk category of the access data to be verified;
[0054] The verification result determination module 240 is configured to verify the risk category and the access data to be verified according to the set rules, and obtain the verification result.
[0055] Optionally, the access data includes multi-dim...
Embodiment 3
[0081] image 3 It is a schematic structural diagram of a computer device provided by Embodiment 3 of the present invention. image 3 A block diagram of a computer device 312 suitable for implementing embodiments of the invention is shown. image 3 The computer device 312 shown is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present invention. Device 312 is typically a computing device that accesses authentication functions of data.
[0082] Such as image 3 As shown, computer device 312 takes the form of a general-purpose computing device. Components of computer device 312 may include, but are not limited to: one or more processors 316, storage device 328, bus 318 connecting various system components (including storage device 328 and processor 316).
[0083] Bus 318 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated gra...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


