User behaviour based data verification method and device

A data verification and user technology, applied in the direction of digital data authentication, etc., can solve the problem of low security, achieve the effect of reducing security risks and improving security

Active Publication Date: 2016-10-05
ALIBABA GRP HLDG LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved in this application is to provide a data verification method based on user behavior, and a data push method based on user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behaviour based data verification method and device
  • User behaviour based data verification method and device
  • User behaviour based data verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0038] The present application may be used in numerous general purpose or special purpose computing device environments or configurations. For example: personal computers, server computers, handheld or portable devices, tablet-type devices, multi-processor devices, distributed computing environments including any of the above, and the like.

[0039] The application may be described in the general context of computer-executable instructio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user behaviour based data verification method and device. The method comprises the following steps: responding to a service request which is triggered by a user and related to account information, and acquiring verification information of the user, wherein the verification information comprises the account information; according to user behaviour data related to the verification information in a preset user behaviour data set, determining a verification problem and a candidate answer of the user, wherein the user behaviour data comprises basic behaviour data and deeply expanded data related to the basic behaviour data; rendering the verification problem and the candidate answer according to a preset display manner, so as to display to the user; and responding to feedback information which is triggered by the user according to the verification problem and the candidate answer, and carrying out data verification on the user. In the embodiment of the invention, data verification safety can be improved, and potential safety hazard of a user account can be reduced.

Description

technical field [0001] The present application relates to the technical field of Internet data processing, and in particular, to a method and device for data verification based on user behavior, and a method and device for data push based on user behavior. Background technique [0002] With the development of the Internet, more and more website systems are attacked by automated (semi-automated) programs, which may affect normal website operations. For example, the program tries to log in a large number of accounts and passwords in batches to steal account information, uses scripts to grab red envelopes (coupons), rush to buy train tickets on 12306, or rubbish registration on the website. [0003] In the prior art, in order to verify some malicious login information, data verification based on verification code is generally used, specifically: after the user's account information and password information are all verified, a graphic verification needs to be popped up to the us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/45
Inventor 姜博向涛
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products