Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Event trigger implicit identity verification method based on mobile equipment

An identity verification method and mobile device technology, applied in the field of event-triggered implicit identity verification based on mobile devices, can solve problems such as low verification efficiency, large amount of user data, and susceptibility to objective factors

Active Publication Date: 2016-11-30
陕西尚品信息科技有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes an implicit identity verification method based on a trigger event triggered by a mobile device. Through the trigger event trigger technology and the segmented weighted moving average technology, the existing implicit identity verification method needs a large amount of user data and the verification efficiency is low. , easily affected by objective factors and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Event trigger implicit identity verification method based on mobile equipment
  • Event trigger implicit identity verification method based on mobile equipment
  • Event trigger implicit identity verification method based on mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] refer to figure 1 According to the present invention, a mobile device-based trigger event triggers an implicit identity verification method. The specific steps are as follows:

[0043] In order to illustrate the specific implementation of the present invention more clearly, first, necessary explanations are given to the concepts of trigger event type, trigger event confidence table, user confidence flow, and decision threshold involved in the present invention.

[0044] The types of triggering events are receiving or sending mobile phone text messages, incoming and outgoing calls, changes in browser browsing history, and changes in WIFI access history. When the trigger event Event occurs, the mobile phone conducts implicit authentication.

[0045] The trigger event confidence table represents the trustworthiness of the trigger event, including SMS statistics, call statistics, web page browsing statistics, and WIFI access statistics. refer to figure 2 , the content o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an event trigger implicit identity verification method based on mobile equipment. The event trigger implicit identity verification method comprises steps that a type of an implicit trigger event of equipment and a characteristic value of every trigger event are set; when the trigger event occurs, the equipment is used to acquire user confidence by comparing a habit of a current user with a habit of a valid user, and is used to acquire a current decision threshold after calculation by using historical user confidence and a historical decision threshold, and then is used to decide the validity of the current user by comparing the current user confidence with the decision threshold. Problems of a conventional implicit identity verification method such as low efficiency in identifying invalid users and requirement on a lot of user data and learning time are solved.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an event-triggered implicit identity authentication method based on a mobile device. Background technique [0002] Mobile devices are used more and more widely today. It is becoming more and more common for lawbreakers to steal user information through mobile devices, so many methods for protecting mobile device information have emerged. Existing information protection methods fall into two categories: explicit authentication and implicit authentication. Explicit authentication means that every time an application accesses the device or the user operates the device, the device directly requires the current user to prove his or her identity. These proofs often appear in the form of passwords or fingerprints. Implicit authentication means that every time an application accesses the device or the user operates the device, the device automatically judges the user's i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725H04W12/06H04W12/12
CPCH04W12/06H04W12/12H04M1/72484
Inventor 吴灼添刘涛刘轩刘宇鹏
Owner 陕西尚品信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products