Method and device for verifying identity of user

A user identity and user technology, applied in the field of information security, can solve the problems of forgetting answers, unable to provide continuous verification, mobile phone Trojan horses, etc., to ensure security and achieve the effect of sustainable identity verification

Active Publication Date: 2015-01-28
TONGDUN HLDG CO LTD
View PDF4 Cites 91 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned verification methods either have the problem of high cost. For example, hardware tokens require users to apply for corresponding devices in advance and associate with account settings, and they need to be carried with them when using them, which is relatively costly for service providers and users; or There are operational risks such as mobile phone Trojans, mailbox theft, forgotten answers, and password device loss
Moreover, the above verification methods cannot provide continuous verification. For example, after the user has passed the verification, the user performs a second high-risk operation within a short period of time, such as account modification, fund payment, etc. If the user chooses to perform identity verification again, it will be Poor user experience and risk of session hijacking if you choose not to authenticate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying identity of user
  • Method and device for verifying identity of user
  • Method and device for verifying identity of user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0061] refer to figure 1 , which shows a flow chart of steps of an embodiment of a method for verifying user identity in the present invention, which may specifically include the following steps:

[0062] Step 101, collecting user behavior data;

[0063] Embodiments of the present invention can be applied to interactive interfaces of various Internet applications such as browsers and APP (Application Programs, Application) clients. Behavioral data of users, so as to realize continuous authentication of user behavior data. Wherein, websites of various Internet applications can be run on the browser, and APP clients can be clients of various online banks and various e-commerce companies.

[0064] In a specific implementation, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a device for verifying the identity of a user. The method specifically comprises the following steps of acquiring behavior data of the user; extracting the current behavior index of the behavior data; determining the cognitive parameters of the current behavior index; matching the cognitive parameters of the current behavior index with the cognitive parameter threshold value of the behavior model of the user to obtain a matched result or an unmatched result; wherein the cognitive parameter threshold value of the behavior model is obtained through training according to the historical dependable behavior data of the user; when the match result is obtained, the behavior data pass the verification, and when the unmatched result is obtained, the behavior data do not pass the verification. According to the method and the device, the continuous verification on the identity of the user can be realized.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for verifying user identity. Background technique [0002] With the advent of the Internet era, the Internet is becoming more and more open, and there are more and more user devices, and users have higher and higher requirements for the security of personal information. The first hurdle in ensuring the security of personal information or electronic property is the accuracy of user authentication. A good user authentication mechanism should ensure that access to specific information is granted only when the correct user provides the correct authentication password. [0003] Traditional ways to verify user identity mainly include: static password, dynamic password, hardware token, digital certificate, biotechnology and other methods. However, the above-mentioned verification methods either have the problem of high cost. For example, hardware token...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F3/01
CPCG06F21/316
Inventor 马明
Owner TONGDUN HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products