Information identification method, information identification equipment and user terminal
A technology for user terminal and information identification, applied in the field of mobile Internet, can solve the problems of poor security guarantee effect, insufficient security guarantee measures, and increase the cumbersome operation of users.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0075] Example 1:
[0076] Refer to the attached figure 1 , an embodiment of the present invention provides an information identification method, including:
[0077] S1. Acquire a first behavior parameter of the user terminal, where the first behavior parameter includes location information of the user terminal and time information corresponding to the location information;
[0078] In an embodiment of the present invention, the first behavior parameter of the user terminal may be the previous historical behavior parameter of the user terminal, and the server may continuously obtain the user terminal's data in a fixed period (such as a week, a month, a quarter, a year, etc.) Behavior parameters, and perform statistical analysis on the obtained behavior parameters. In a preferred solution of this embodiment, the first behavior parameter includes location information of the user terminal and time information corresponding to the location information. For example, the user term...
Example Embodiment
[0112] Embodiment 2:
[0113] Refer to the attached figure 2 , the embodiment of the present invention also provides an information identification method, wherein:
[0114] 200. Configure the behavior analysis model of the user terminal on the server, and specifically establish a matrix on the server, where the matrix contains the scene factors of the user terminal in different scenarios, the row vector of the matrix can represent the identifier of the user terminal, and the column vector can represent the The scene identifier, the cross space between the row vector and the column vector, fill in the scene factor of the scene, specifically:
[0115]
[0116] ……
[0117] In addition, configured on the server, all areas with a scenario factor greater than 1 are safe areas, and the user terminal can perform online services in this scenario, otherwise the user terminal needs to start the advanced authentication program
[0118] 201. The user terminal 1 sends...
Example Embodiment
[0121] Embodiment three:
[0122] Refer to the attached image 3 , the embodiment of the present invention also provides an information identification method, wherein:
[0123] 300. Configure the behavior analysis model of the user terminal on the server. Specifically, according to the aforementioned clustering method, the user terminals saved on the server are clustered and grouped. For example, user terminals 2, 3, 4, and 5 are clustered as the first. group, and the user terminals 6, 7, 8, and 9 are clustered into a second group. The security rule corresponding to the first group is that the user terminals in the group can perform all online services, and the security rule corresponding to the second group is that the user terminals in the group can only perform online payment services;
[0124] 301. When the user terminal 7 initiates the online remittance service, the server obtains the identification of the user terminal 7, and determines that the user terminal 7 is loca...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap