CN111488567A - Method, apparatus, device and medium for generating authentication information - Google Patents

Method, apparatus, device and medium for generating authentication information Download PDF

Info

Publication number
CN111488567A
CN111488567A CN202010270431.5A CN202010270431A CN111488567A CN 111488567 A CN111488567 A CN 111488567A CN 202010270431 A CN202010270431 A CN 202010270431A CN 111488567 A CN111488567 A CN 111488567A
Authority
CN
China
Prior art keywords
bucket
data
sub
group
dividing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010270431.5A
Other languages
Chinese (zh)
Inventor
罗灵杰
李想
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010270431.5A priority Critical patent/CN111488567A/en
Publication of CN111488567A publication Critical patent/CN111488567A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Embodiments of the present disclosure disclose a method, apparatus, electronic device, and computer-readable medium for generating verification information. One embodiment of the method comprises: determining a data type of data for which a bucket method group is aimed, wherein the data type comprises single-value type data and array type data, and the bucket method group comprises at least two bucket methods; based on the data type, determining a corresponding bucket verification algorithm, wherein the bucket verification algorithm comprises: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm; and generating the verification information of the bucket dividing method group based on the bucket dividing verification algorithm. According to the embodiment, the verification information of the bucket dividing method group is generated, so that the appropriate bucket dividing method can be selected quickly.

Description

Method, apparatus, device and medium for generating authentication information
Technical Field
Embodiments of the present disclosure relate to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a computer-readable medium for generating verification information.
Background
At present, the barrel dividing effect of each barrel dividing method in the barrel dividing method group is determined in the industry mostly from the perspective of business experience, and no professional method is used for verification. And moreover, the problems of redundant subjectivity and objectivity of evaluation exist, a large number of experts are needed for manual judgment and thinking, and the efficiency is low.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose methods, apparatuses, devices and computer readable media for generating authentication information to solve the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a method for generating authentication information, the method comprising: determining a data type of data for which a bucket method group is directed, wherein the data type comprises single-value data and array (array) data, and the bucket method group comprises at least two bucket methods; determining a corresponding bucket verification algorithm based on the data type, wherein the bucket verification algorithm comprises: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm; and generating the verification information of the bucket dividing method group based on the bucket dividing verification algorithm.
In a second aspect, some embodiments of the present disclosure provide an apparatus for generating authentication information, the apparatus comprising: a first determining unit configured to determine a data type of data for which a set of barreling methods is applied, wherein the data type includes single-value type data and array type data, and the set of barreling methods includes at least two barreling methods; a second determining unit configured to determine a corresponding bucket validation algorithm based on the data type, wherein the bucket validation algorithm includes: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm; and the generating unit is configured to generate the verification information of the bucket dividing method group based on the bucket dividing verification algorithm.
In a third aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to implement a method as in any one of the first aspects.
In a fourth aspect, some embodiments of the disclosure provide a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements a method as in any one of the first aspect.
One of the above-described various embodiments of the present disclosure has the following advantageous effects: and determining the data type in the barrel dividing method, further dividing the barrel dividing method into two types according to the data type, and determining a basis for the verification information of the barrel dividing method group. Finally, the verification information of the bucket method group is generated by selecting different bucket verification algorithms through the data types. And determining a barrel dividing method with better application effect and more accurate barrel dividing result in the barrel dividing method group through the verification information.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
FIG. 1 is a schematic diagram of one application scenario of a method for generating authentication information of some embodiments of the present disclosure;
FIG. 2 is a flow diagram of some embodiments of a method for generating authentication information according to the present disclosure;
FIG. 3 is a flow diagram of further embodiments of methods for generating authentication information according to the present disclosure;
FIG. 4 is a flow diagram of further embodiments of methods for generating authentication information according to the present disclosure;
FIG. 5 is a schematic illustration of an application scenario of a method for generating authentication information according to further embodiments of the present disclosure;
FIG. 6 is a schematic block diagram of some embodiments of an apparatus for generating authentication information according to the present disclosure;
FIG. 7 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram 100 of one application scenario of a method for generating authentication information, in accordance with some embodiments of the present disclosure.
As shown in fig. 1, as an example, a data type 102 for which a bucket-divided method group is determined is divided into single-value type data 103 and array type data 104. In response to the data type 102 being the single-valued data 103, the method of chunking is determined to be a first chunking validation algorithm 105. In response to the data type 102 being the array type data 104 described above, the method of bucketing is determined to be a second bucketing validation algorithm 106. Finally, the verification information 107 of the bucket method group is generated through different bucket verification algorithms.
The electronic device 101 may be hardware or software. When the electronic device is hardware, the electronic device may be implemented as a distributed cluster formed by a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the electronic device is embodied as software, it may be implemented as a plurality of software or software modules, for example, for providing distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of electronic devices in fig. 1 is merely illustrative. There may be any number of electronic devices, as desired for implementation.
With continued reference to fig. 2, a flow 200 of some embodiments of a method for generating verification information in accordance with the present disclosure is shown. The method for generating the verification information comprises the following steps:
in step 201, the data type of the data for which the set of barreled methods is intended is determined.
In some embodiments, the subject of the method for generating verification information (e.g., the electronic device shown in FIG. 1) may determine the data type from data already entered in the database, the data type may include, but is not limited to, at least one of single-valued data, array-like data, in a single-valued data set, each single-valued data in the single-valued data set corresponds to an entity one-to-one, the entity corresponding to the single-valued data has a single-valued attribute, where a single-valued attribute refers to an attribute that one entity corresponds to one value, for example, the price of an entity "book" is only one (e.g., ¥ 38.5.5). in an array-like data set, each array-like data in an array-like data set corresponds to an entity one-to-one, the subject corresponding to the array-like data has a multi-valued attribute.
It should be noted that the above bucket methods in the bucket method group can divide data for the model process by different divisions of the threshold. Wherein the model process may include, but is not limited to, at least one of: user clustering model, user portrait model. Each of the above bucket methods in the above bucket method group can bucket data in the target model process, wherein the above data may include, but is not limited to, at least one of the following: the data of interest information of the user, the portrait information data of the user, the reading type data of the user and the application duration data of the user. For example, the data is reading type data of a user, wherein the reading type of the user may include: video, graphics and text, and voice. Furthermore, the user reading type data may be divided by each of the above-described method groups.
Step 202, based on the data types, determining a corresponding bucket verification algorithm.
In some embodiments, the execution agent may select a corresponding bucket validation algorithm based on the determined data type. Wherein, the bucket verification algorithm comprises: a first bucket validation algorithm and a second bucket validation algorithm. The first sub-bucket validation algorithm may be a single-value type sub-bucket validation algorithm and the second sub-bucket validation algorithm may be an array type sub-bucket validation algorithm.
It should be noted that, the bucket dividing method may include: an array bucket method and a single-valued bucket method. And determining that the data type targeted by the bucket dividing method group is single-value data, and selecting the single-value bucket dividing verification algorithm to generate verification information of the single-value bucket dividing method in the bucket dividing method group. And determining that the data type aimed at by the bucket dividing method group is array data, and selecting the array type bucket dividing algorithm to generate verification information of the array bucket dividing method in the bucket dividing method group. The single-value type bucket dividing method is a method for discretizing continuous single-value type data or aggregating discrete single-value type data through a segmentation threshold and a determined bucket dividing method. Finally, independent sub-buckets are formed in the aspect of data value taking. The array type bucket dividing method can perform bucket dividing operation on array type data, and a final bucket dividing result of the data can be composed of a plurality of labels, wherein the labels represent that the array type data simultaneously meet various conditions.
And 203, generating the verification information of the bucket dividing method group based on the bucket dividing verification algorithm.
In some embodiments, the above-mentioned bucket verification algorithm obtained from step 202 includes: single value type bucket verification algorithm and array type bucket verification algorithm. The verification information of the method for dividing the bucket can refer to the applicability of the method for dividing the bucket in the process of creating a model process such as user clustering or user portraits. Wherein, different barrel dividing methods in the barrel dividing method group correspond to different application degrees. Here, the authentication information of the above-described bucket method group may be generated by various methods using the above-described bucket authentication algorithm.
In some optional implementations of some embodiments, the data in the model process may be subjected to the bucket partitioning by using the verification information of the bucket partitioning method group, where the model process includes at least one of: user clustering model, user portrait model. Here, the method of the bucket separation method group suitable for the model process may be obtained from the verification information of the bucket separation method group, and the model process may be subjected to bucket separation.
As can be seen from the above example, the corresponding bucket validation algorithm is selected by determining the data type. Then, according to the bucket verification algorithm, verification information of at least one bucket method is generated. The method realizes effective verification of the bucket dividing method, and solves the problems of complicated verification, insufficient intuition and low efficiency of the existing bucket dividing method.
With continued reference to fig. 3, a flow 300 of further embodiments of methods for generating verification information in accordance with the present disclosure is shown. The method for generating the verification information of the bucket dividing method comprises the following steps:
the first bucket verification algorithm may be a single-value type bucket verification algorithm and the second bucket verification algorithm may be an array type bucket verification algorithm.
Step 301, determining that the data type for the barreled method group is single-value data.
Step 302, in response to the data type being single-valued data, determining the first sub-bucket verification algorithm as a corresponding sub-bucket verification algorithm.
In some embodiments, in response to the data type being single-valued data, the first sub-bucket validation algorithm is determined to be the single-valued sub-bucket validation algorithm. The single value type verification algorithm comprises the following operation steps:
first, each barrel method in the barrel method group is utilized to carry out barrel dividing on the data to generate a barrel dividing sequence, and a barrel dividing sequence set is obtained
And secondly, determining the data distribution of the data included in each sub-bucket in the sub-bucket sequence set. As an example, the distribution characteristics (e.g., mean, variance) of each bucket may be obtained from actual usage data of the user over a window period and in response to each bucket being a normal distribution.
And thirdly, determining the significance difference value between two adjacent buckets contained in each bucket sequence. As an example, determining a significant difference value between two adjacent sub-buckets may be according to the following formula:
Figure BDA0002442958230000071
wherein z _ score is a significant difference value, μ, between two adjacent sub-buckets included in each sub-bucket sequence1Is the variance of bucket 1, μ2Is the variance of the sub-bucket 2,
Figure BDA0002442958230000072
is the square of the standard deviation of bucket 1,
Figure BDA0002442958230000073
is the square of the standard deviation of the fractional barrel 2, n1Is the number of data in sub-bucket 1,n2Is the number of data in bucket 2.
And fourthly, carrying out weighted summation on the various significance difference values associated with each barrel sequence to serve as the significance difference value of the barrel method for generating the barrel sequence. The significant difference value of the bucket dividing method of the bucket dividing sequence can be obtained by the following formula:
Figure BDA0002442958230000074
where z _ score _ wt _ all is a significant difference value as a bucket method for generating the above bucket sequence, and i and j represent tags that determine the buckets included in each bucket sequence.
And fifthly, generating verification information of the barreled method group according to the significance difference value of each barreled method.
Step 303, generating verification information for the bucketized methodology may be based on at least one of: comparison between significant difference values for each of the bucket-splitting methods; and comparing the significance difference value of each barreled method with a preset threshold value to generate verification information of the barreled method group.
In some embodiments, the validation information for the set of bucketing methods described above is obtained at step 302. It may be determined which of the set of barreling methods is more appropriate for use in creating models of user clusters, user representations, etc., by comparing the significance difference values between different ones of the set of barreling methods. In addition, multiple thresholds may be determined for the significance difference value for each method in the set of bucket methods. And comparing the significance difference values corresponding to different barreling methods in the barreling method group with the plurality of threshold values to generate verification information of the different barreling methods in the barreling method group. Wherein the division criterion may be the following: if the significant difference value of the bucket dividing method is far lower than the first threshold value, the applicability degree of the bucket dividing method is low. The significance of the bucket dividing method is higher than the first threshold value, but lower than the second threshold value, the applicability degree of the bucket dividing method is lower. The significance of the bucket dividing method is higher than the second threshold value, but is lower than the third threshold value, so that the applicability degree of the bucket dividing method is higher. And if the significant difference value of the bucket dividing method is higher than the third threshold value, the applicability degree of the bucket dividing method is high. As an example, from the perspective of business experience, a segmentation threshold in creating a model such as a user group or a user profile may be determined, and the segmentation threshold may be used as a standard, and a segmentation standard in a barreling method may be compared with the segmentation threshold to obtain verification information of at least one barreling method.
As can be seen from fig. 3, the flow 300 of the method for generating verification information of the method for chunking in some embodiments corresponding to fig. 3 illustrates the specific implementation steps of selecting different chunking verification algorithms and different generation processes of verification information for different data types in more detail than the description of some embodiments corresponding to fig. 2. Therefore, the scheme described by the embodiments can embody the intuitiveness and the efficiency of generating the verification information of the barreled method in a larger way.
With continued reference to fig. 4, a flow 400 of further embodiments of methods for generating verification information in accordance with the present disclosure is shown. The method for generating the verification information of the bucket dividing method comprises the following steps:
the first bucket verification algorithm may be a single-value type bucket verification algorithm and the second bucket verification algorithm may be an array type bucket verification algorithm.
Step 401, determining that the data type targeted by the bucket method group is array type data.
Step 402, in response to the data type being array type data, determining the second sub-bucket verification algorithm as a corresponding sub-bucket verification algorithm.
In some embodiments, in response to the data type being array type data, the second sub-bucket verification algorithm is determined to be the array type sub-bucket verification algorithm. The operation steps of the array type bucket-dividing verification algorithm comprise:
first, each barrel method in the barrel method group is utilized to carry out barrel dividing on the data to generate a barrel dividing sequence, and a barrel dividing sequence set is obtained
In the second step, a data distribution of data included in each of the buckets in the set of bucket groups is determined, and as an example, the data distribution of data included in each of the buckets in the set of bucket groups may be determined to be a polynomial distribution.
And thirdly, for each sub-bucket in the sub-bucket group set, determining the probability that the data value of the data included in the sub-bucket falls on each value in the value group to obtain a probability group. The set of values may be a set of values of data for which the set of bucket methods is applied. As an example, in response to a value set of data being 2 to 100, determining a distribution of each sub-bucket in the sub-bucket set over 2 to 100 values, respectively, and further determining a probability distribution of each sub-bucket over different values in the data, to obtain a probability distribution set
And fourthly, determining the information loss amount between the two sub-buckets contained in each sub-bucket group based on the principle of K-L divergence and the obtained probability group, wherein the formula of the K-L divergence is as follows:
Figure BDA0002442958230000091
wherein klp,qThe information loss between two sub-buckets included in each sub-bucket group is defined, K is the number of types of different values of data, i is a coordinate label on the different values of the data, and x is the number of the coordinate labelsiRefers to the value, p (x), on the coordinate label ii) Is that the partial barrel p is in xiProbability of (c), q (x)i) Means that the partial barrel q is in xiThe probability of (c) above.
And fifthly, summing the information loss quantities related to each bucket group to serve as the information loss quantity of the bucket dividing method for generating the bucket group. Wherein the formula of the information loss amount as the bucket grouping method for generating the bucket grouping is as follows:
Figure BDA0002442958230000092
where Kl _ all refers to the amount of information lost as a bucket grouping method for generating the above-described bucket group, and N refers to the number of buckets in each bucket group.
And sixthly, generating verification information of the bucket dividing method group according to the information loss amount of each bucket dividing method.
Step 403, based on at least one of: comparing the information loss amount of each bucket dividing method; and comparing the information loss amount of each barreling method with a preset threshold value to generate verification information of the barreling method group.
In some embodiments, the validation information for the set of bucketing methods obtained at step 402. The amount of information lost between different methods in the set of methods can be compared to determine which method in the set of methods is more appropriate for creating models such as user clusters, user representations, and the like. In addition, multiple thresholds may be determined for the amount of information lost for each of the set of barreled methods. And comparing the information loss amount corresponding to different barreling methods in the barreling method group with the plurality of thresholds to generate verification information of different barreling methods in the barreling method group. Wherein the division criterion may be the following: the information loss amount of the bucket dividing method is far lower than the first threshold value, and the applicability degree of the bucket dividing method is low. The significance of the bucket dividing method is higher than the first threshold value, but lower than the second threshold value, the applicability degree of the bucket dividing method is lower. The significance of the bucket dividing method is higher than the second threshold value, but is lower than the third threshold value, so that the applicability degree of the bucket dividing method is higher. And if the information loss of the bucket dividing method is higher than the third threshold value, the applicability degree of the bucket dividing method is high. As an example, from the perspective of business experience, a segmentation threshold in creating a model such as a user group or a user profile may be determined, and the segmentation threshold may be used as a standard, and a segmentation standard in a barreling method may be compared with the segmentation threshold to obtain verification information of at least one barreling method.
As can be seen from fig. 4, the flow 300 of the method for generating verification information of the method for chunking in some embodiments corresponding to fig. 3 illustrates the specific implementation steps of selecting different chunking verification algorithms and different generation processes of verification information for different data types in more detail than the description of some embodiments corresponding to fig. 2. Therefore, the scheme described by the embodiments can embody the intuitiveness and the efficiency of generating the verification information of the barreled method in a larger way.
Fig. 5 is a schematic diagram 500 of an application scenario of a method for generating authentication information according to further embodiments of the present disclosure.
As shown in FIG. 5, by way of example, the data 501 of the model process includes: user data 1, user data 2, user data 3, user data 4, user data 5 and user data 6. The data 501 of the model process is divided into two sub-buckets by the sub-bucket method 502, namely sub-bucket 1 in the sub-bucket method 502 and sub-bucket 2 in the sub-bucket method 502. Likewise, the method 503 divides the data 501 of the model process into two buckets, namely bucket 1 in the method 503 and bucket 2 in the method 503. Wherein, the data included in the sub-bucket 1 in the sub-bucket method 502: user data 1, user data 2, user data 4, user data 5 and user data 6. Data included in bucket 2 in bucket splitting method 502: user data 2, user data 4, user data 5 and user data 6. Data included in bucket 1 in bucket splitting method 503: user data 2, user data 3, user data 4, user data 5 and user data 6. Data included in bucket 2 in bucket splitting method 503: user data 1, user data 3, user data 5 and user data 6. Finally, the above-mentioned method 502 and method 503 are respectively passed through the array type bucket verification algorithm 504, so that the bucket method of the bucket method 502 is more suitable for the data partitioning of the above-mentioned model process.
The electronic device 501 may be hardware or software. When the electronic device is hardware, the electronic device may be implemented as a distributed cluster formed by a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the electronic device is embodied as software, it may be implemented as a plurality of software or software modules, for example, for providing distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of electronic devices in fig. 5 is merely illustrative. There may be any number of electronic devices, as desired for implementation.
With continuing reference to fig. 6, as an implementation of the above-described method for the above-described figures, the present disclosure provides some embodiments of an apparatus for generating authentication information, which correspond to those of the method embodiments described above for fig. 2, and which may be particularly applicable in various electronic devices.
As shown in fig. 6, an apparatus 600 for generating authentication information of some embodiments includes: a first determining unit 601, a second determining unit 602 and a generating unit 603. The first determining unit 601 is configured to determine a data type of data for which a set of barreling methods includes at least two barreling methods, where the data type includes single-value data and array-type data. A second determining unit 602, configured to determine a corresponding bucket verification algorithm based on a type data type of the data, wherein the bucket verification algorithm includes: a first bucket validation algorithm and a second bucket validation algorithm. A generating unit 603 configured to generate the verification information of the above-mentioned bucket method group based on the above-mentioned bucket verification algorithm.
In some optional implementations of some embodiments, the second determining unit 602 may be further configured to: and determining the first bucket verification algorithm as a corresponding bucket verification algorithm in response to the data type being single-value data.
In some optional implementations of some embodiments, the generating unit 603 may be further configured to: performing barrel division on the data based on each barrel division method in the barrel division method group to generate a barrel division sequence, and obtaining a barrel division sequence set; determining data distribution of data included in each sub-bucket in the sub-bucket sequence set; determining a significance difference value between two adjacent sub-buckets contained in each sub-bucket sequence; carrying out weighted summation on each significant difference value associated with each barrel sequence to serve as a significant difference value of a barrel dividing method for generating the barrel sequence; and generating verification information of the bucket dividing method group according to the significance difference value of each bucket dividing method.
In some optional implementations of some embodiments, the generating unit 603 may be further configured to: based on at least one of: comparison between significant difference values for each of the bucket-splitting methods; and comparing the significance difference value of each barreled method with a preset threshold value to generate verification information of the barreled method group.
In some optional implementations of some embodiments, the second determining unit 602 may be further configured to: and determining the second bucket verification algorithm as a corresponding bucket verification algorithm in response to the data type being array type data.
In some optional implementations of some embodiments, the generating unit 603 is further configured to bucket the data based on each of the bucket methods in the bucket method set to generate a bucket group, obtain a bucket group set, determine a data distribution of the data included in each bucket in the bucket group set, determine, for each bucket in the bucket group set, a probability that a data value of the data included in the bucket falls on each value in the value set, obtain a probability group, determine, based on a principle of divergence of K-L and the obtained probability group, an information loss amount between two buckets included in each bucket group, sum respective information loss amounts associated with each bucket group as information loss amounts of the bucket methods used for generating the bucket group, and generate verification information of the bucket method set according to the information loss amounts of the respective bucket methods.
In some optional implementations of some embodiments, the generating unit 603 is further configured to: based on at least one of: comparing the information loss amount of each bucket dividing method; and comparing the information loss amount of each barreling method with a preset threshold value to generate verification information of the barreling method group.
In some optional implementations of some embodiments, the apparatus 600 may further include: a barrel-separating unit (not shown in the figure). The data of the model process is subjected to bucket distribution based on the verification information of the bucket distribution method group, wherein the model process comprises at least one of the following items: user clustering model, user portrait model.
It will be understood that the elements described in the apparatus 600 correspond to various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting advantages described above with respect to the method are also applicable to the apparatus 600 and the units included therein, and are not described herein again.
Referring now to FIG. 7, a block diagram of an electronic device (e.g., the computing device of FIG. 1) 700 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device in some embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle-mounted terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, electronic device 700 may include a processing means (e.g., central processing unit, graphics processor, etc.) 701 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from storage 708 into a Random Access Memory (RAM) 703. In the RAM703, various programs and data necessary for the operation of the electronic apparatus 700 are also stored. The processing device 701, the ROM 702, and the RAM703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
Generally, input devices 706 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc., output devices 707 including, for example, a liquid crystal display (L CD), speaker, vibrator, etc., and communication devices 709, the communication devices 709 may allow the electronic device 700 to communicate wirelessly or wiredly with other devices to exchange data, although FIG. 7 illustrates the electronic device 700 as having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network via communications means 709, or may be installed from storage 708, or may be installed from ROM 702. The computer program, when executed by the processing device 701, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText transfer protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communications network). examples of communications networks include local area networks ("L AN"), wide area networks ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: determining a data type of data for which a bucket dividing method group is aimed, wherein the data type comprises single-value type data and array type data, and the bucket dividing method group comprises at least two bucket dividing methods; determining a corresponding bucket verification algorithm based on the data type, wherein the bucket verification algorithm comprises: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm; and generating the verification information of the bucket dividing method group based on the bucket dividing verification algorithm.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including AN object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language, or similar programming languages.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described units may also be provided in a processor, and may be described as: a processor includes a unit and a unit generation unit. The names of these units do not in some cases constitute a limitation to the unit itself, and may be described as "a unit that generates authentication information of the above bucket method group based on the above bucket authentication algorithm", for example.
For example, without limitation, exemplary types of hardware logic that may be used include Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex programmable logic devices (CP L D), and so forth.
In accordance with one or more embodiments of the present disclosure, there is provided a method for generating authentication information, including: determining a data type of data for which a bucket dividing method group is aimed, wherein the data type comprises single-value type data and array type data, and the bucket dividing method group comprises at least two bucket dividing methods; determining a corresponding bucket verification algorithm based on the data type, wherein the bucket verification algorithm comprises: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm; and generating the verification information of the bucket dividing method group based on the bucket dividing verification algorithm.
According to one or more embodiments of the present disclosure, the determining a corresponding bucket validation algorithm based on the data type includes: and determining the first bucket verification algorithm as a corresponding bucket verification algorithm in response to the data type being single-value data.
According to one or more embodiments of the present disclosure, the generating the verification information of the bucket dividing method group based on the bucket dividing verification algorithm includes: performing barrel division on the data based on each barrel division method in the barrel division method group to generate a barrel division sequence, and obtaining a barrel division sequence set; determining data distribution of data included in each sub-bucket in the sub-bucket sequence set; determining a significance difference value between two adjacent sub-buckets contained in each sub-bucket sequence; carrying out weighted summation on each significant difference value associated with each barrel sequence to serve as a significant difference value of a barrel dividing method for generating the barrel sequence; and generating verification information of the bucket dividing method group according to the significance difference value of each bucket dividing method.
According to one or more embodiments of the present disclosure, the generating verification information of the bucket dividing method group according to the significance difference value of each bucket dividing method includes: based on at least one of: comparison between significant difference values for each of the bucket-splitting methods; and comparing the significance difference value of each barreled method with a preset threshold value to generate verification information of the barreled method group.
According to one or more embodiments of the present disclosure, the determining a corresponding bucket validation algorithm based on the data type includes: and determining the second bucket verification algorithm as a corresponding bucket verification algorithm in response to the data type being array type data.
According to one or more embodiments of the present disclosure, the method further includes: and performing barrel division on a model process based on the verification information of the barrel division method group, wherein the model process comprises at least one of the following items: user clustering model, user portrait model.
According to one or more embodiments of the disclosure, the generating of the verification information of the bucket dividing method group based on the bucket dividing verification algorithm includes dividing the data to generate bucket dividing groups based on each bucket dividing method in the bucket dividing method group to obtain a bucket dividing group set, determining data distribution of the data included in each bucket dividing group set, determining probability that a data value of the data included in the bucket dividing group falls on each value in a value taking group for each bucket in the bucket dividing group set to obtain a probability group, determining an information loss amount between two buckets included in each bucket dividing group based on a principle of divergence of K-L and the obtained probability group, summing the information loss amounts associated with each bucket dividing group to serve as the information loss amount of the bucket dividing method used for generating the bucket dividing group, and generating the verification information of the bucket dividing method group according to the information loss amounts of the bucket dividing methods.
According to one or more embodiments of the present disclosure, the generating of the verification information of the bucket dividing method group according to the information loss amount of each bucket dividing method includes: based on at least one of: comparing the information loss amount of each bucket dividing method; and comparing the information loss amount of each barreling method with a preset threshold value to generate verification information of the barreling method group.
According to one or more embodiments of the present disclosure, there is provided an apparatus for generating authentication information, including: a first determining unit configured to determine a data type for which a set of bucket partitioning methods is applied, wherein the data type includes: single value type data and array type data; a second determining unit configured to determine a corresponding bucket validation algorithm based on the data type, wherein the bucket validation algorithm includes: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm; and the generating unit is configured to generate the verification information of the bucket dividing method group based on the bucket dividing verification algorithm.
According to one or more embodiments of the present disclosure, the second determining unit in the apparatus for generating authentication information may be further configured to: and determining the first bucket verification algorithm as a corresponding bucket verification algorithm in response to the data type being single-value data.
According to one or more embodiments of the present disclosure, the generating unit in the apparatus for generating authentication information may be further configured to: performing barrel division on the data based on each barrel division method in the barrel division method group to generate a barrel division sequence, and obtaining a barrel division sequence set; determining data distribution of data included in each sub-bucket in the sub-bucket sequence set; determining a significance difference value between two adjacent sub-buckets contained in each sub-bucket sequence; carrying out weighted summation on each significant difference value associated with each barrel sequence to serve as a significant difference value of a barrel dividing method for generating the barrel sequence; and generating verification information of the bucket dividing method group according to the significance difference value of each bucket dividing method.
According to one or more embodiments of the present disclosure, the generating unit in the apparatus for generating authentication information may be further configured to: based on at least one of: comparison between significant difference values for each of the bucket-splitting methods; and comparing the significance difference value of each barreled method with a preset threshold value to generate verification information of the barreled method group.
According to one or more embodiments of the present disclosure, the second determining unit in the apparatus for generating authentication information may be further configured to: and determining the second bucket verification algorithm as a corresponding bucket verification algorithm in response to the data type being array type data.
According to one or more embodiments of the disclosure, the generation unit in the apparatus for generating verification information is further configured to bucket the data based on each of the bucket methods to generate a bucket group to obtain a bucket group set, determine a data distribution of the data included in each bucket of the bucket group set, determine, for each bucket of the bucket group set, a probability that a data value of the data included in the bucket falls on each value of the value set to obtain a probability group, determine an information loss amount between two buckets included in each bucket group based on a principle of divergence of K-L and the obtained probability group, sum respective information loss amounts associated with each bucket group as information loss amounts of the bucket methods used for generating the bucket group, and generate verification information of the bucket method group according to the information loss amounts of the respective bucket methods.
According to one or more embodiments of the present disclosure, the generating unit in the apparatus for generating authentication information is further configured to: based on at least one of: comparing the information loss amount of each bucket dividing method; and comparing the information loss amount of each barreling method with a preset threshold value to generate verification information of the barreling method group.
According to one or more embodiments of the present disclosure, there is provided an electronic device including: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to implement a method as described in any of the embodiments above.
According to one or more embodiments of the present disclosure, a computer-readable medium is provided, on which a computer program is stored, wherein the program, when executed by a processor, implements the method as described in any of the embodiments above.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (11)

1. A method for generating authentication information, comprising:
determining a data type of data for which a bucket method group is aimed, wherein the data type comprises single-value type data and array type data, and the bucket method group comprises at least two bucket methods;
determining a corresponding sub-bucket validation algorithm based on the data type, wherein the sub-bucket validation algorithm comprises: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm;
and generating verification information of the bucket dividing method group based on the bucket dividing verification algorithm.
2. The method of claim 1, wherein said determining a respective bucket validation algorithm based on said data type comprises:
in response to the data type being single-valued data, determining the first bucket validation algorithm as a corresponding bucket validation algorithm.
3. The method of claim 2, wherein said generating authentication information for the set of bucketizing methods based on the bucketizing algorithm comprises:
performing barrel dividing on the data based on each barrel dividing method in the barrel dividing method group to generate a barrel dividing sequence, and obtaining a barrel dividing sequence set;
determining a data distribution of data included in each sub-bucket in the set of sub-bucket sequences;
determining a significance difference value between two adjacent sub-buckets contained in each sub-bucket sequence;
performing weighted summation on each significant difference value associated with each barrel sequence to serve as a significant difference value of a barrel method for generating the barrel sequence;
and generating verification information of the bucket dividing method group according to the significance difference value of each bucket dividing method.
4. The method of claim 3, wherein the generating validation information for the set of bucketing methods from the significance difference values for each bucketing method comprises:
based on at least one of: comparison between significant difference values for each of the bucket-splitting methods; and comparing the significance difference value of each barreled method with a preset threshold value to generate verification information of the barreled method group.
5. The method of claim 1, wherein said determining a respective bucket validation algorithm based on said data type comprises:
in response to the data type being array type data, determining the second sub-bucket validation algorithm as a corresponding sub-bucket validation algorithm.
6. The method of claim 5, wherein said generating authentication information for the set of bucketizing methods based on the bucketizing algorithm comprises:
performing barrel division on the data based on each barrel division method in the barrel division method group to generate a barrel division group, and obtaining a barrel division group set;
determining a data distribution of data included in each sub-bucket in the set of sub-bucket groups;
for each sub-bucket in the sub-bucket group set, determining the probability that the data value of the data included in the sub-bucket falls on each value in the value taking group to obtain a probability group;
determining the information loss amount between two sub-buckets included in each sub-bucket group based on the principle of K-L divergence and the obtained probability group;
summing the information loss quantities associated with each sub-bucket group to obtain the information loss quantity of the sub-bucket method for generating the sub-bucket group;
and generating verification information of the bucket dividing method group according to the information loss amount of each bucket dividing method.
7. The method of claim 6, wherein the generating validation information for a set of bucketizing methods from an amount of information loss for each bucketizing method comprises:
based on at least one of: comparing the information loss amount of each bucket dividing method; and comparing the information loss amount of each barreling method with a preset threshold value to generate verification information of the barreling method group.
8. The method of claim 1, wherein the method further comprises:
and based on the verification information of the bucket dividing method group, dividing buckets of data in a model process, wherein the model process comprises at least one of the following items: user clustering model, user portrait model.
9. An apparatus for generating authentication information, comprising:
a first determination unit configured to determine a data type of data for which a set of barreling methods includes at least two barreling methods, wherein the data type includes single-value type data and array type data;
a second determination unit configured to determine a corresponding bucket validation algorithm based on the data type, wherein the bucket validation algorithm comprises: a first sub-bucket validation algorithm and a second sub-bucket validation algorithm;
a generating unit configured to generate the verification information of the set of barreled methods based on the barreled verification algorithm.
10. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-8.
11. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-8.
CN202010270431.5A 2020-04-08 2020-04-08 Method, apparatus, device and medium for generating authentication information Pending CN111488567A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010270431.5A CN111488567A (en) 2020-04-08 2020-04-08 Method, apparatus, device and medium for generating authentication information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010270431.5A CN111488567A (en) 2020-04-08 2020-04-08 Method, apparatus, device and medium for generating authentication information

Publications (1)

Publication Number Publication Date
CN111488567A true CN111488567A (en) 2020-08-04

Family

ID=71798691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010270431.5A Pending CN111488567A (en) 2020-04-08 2020-04-08 Method, apparatus, device and medium for generating authentication information

Country Status (1)

Country Link
CN (1) CN111488567A (en)

Similar Documents

Publication Publication Date Title
CN113221183B (en) Method, device and system for realizing privacy protection of multi-party collaborative update model
US10169710B2 (en) Automated decision support provenance and simulation
CN109542352B (en) Method and apparatus for storing data
CN107741986B (en) User behavior prediction and corresponding information recommendation method and device
US20210295231A1 (en) Machine learning model training outliers
CN111368013A (en) Unified identification method, system, equipment and storage medium based on multiple accounts
JP2021111316A (en) Method of processing information in parallel and apparatus
CN112836128A (en) Information recommendation method, device, equipment and storage medium
US20230069079A1 (en) Statistical K-means Clustering
CN111784246B (en) Logistics path estimation method
CN111488567A (en) Method, apparatus, device and medium for generating authentication information
CN115827705A (en) Data processing method and device for counterfactual interpretation
WO2022105183A1 (en) User clustering method, apparatus and device
CN114926234A (en) Article information pushing method and device, electronic equipment and computer readable medium
CN111784377B (en) Method and device for generating information
CN111949860B (en) Method and apparatus for generating a relevance determination model
CN113742564A (en) Target resource pushing method and device
CN111475618A (en) Method and apparatus for generating information
CN111582456A (en) Method, apparatus, device and medium for generating network model information
CN113111254B (en) Training method, fitting method and device of recommendation model and electronic equipment
CN117435963B (en) Digital asset fraud group determination method, device, electronic equipment and storage medium
CN117391763B (en) Application information trend determining method and device, electronic equipment and storage medium
CN113536078B (en) Method, apparatus and computer storage medium for screening data
US11630849B2 (en) Optimizing insight generation in heterogeneous datasets
US20230394298A1 (en) Watermarking deep generative models

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant before: Tiktok vision (Beijing) Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant after: Tiktok vision (Beijing) Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200804