Method and device for verifying user identity

A technology for user identity and verification methods, applied in data processing applications, instruments, payment systems, etc., can solve problems such as improper user settings and uneven security awareness, achieve objective determination of risk levels, and improve reliability.

Inactive Publication Date: 2017-06-30
CHINA CONSTRUCTION BANK
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the unevenness of users' security awareness, users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying user identity
  • Method and device for verifying user identity
  • Method and device for verifying user identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0025] figure 1 It is a flow chart of the user identity verification method according to Embodiment 1 of the method of the present invention. see figure 1 , in this embodiment, the method includes:

[0026] S11: Calculate the risk level of the transaction performed by the user based on the transaction data.

[0027] S12: Identify a verification means corresponding to the risk level.

[0028] S13: Verify the identity of the user by using the verification means.

[0029] Among them, the data items (or attributes) in the transaction data include, but are not limited to: hardware information of the terminal device that executes the transaction, geographic location information of the terminal device, transaction time information, transaction type information, transaction object information, and transaction amount information etc.

[0030] In addition, verification means include, but are not limited to: static passwords, SMS verification codes, biometric identification, and dig...

Embodiment approach 2

[0033] The method provided in this embodiment includes all the content in the method embodiment 1, which will not be repeated here. Wherein, in this embodiment, processing S11 is realized by the following processing:

[0034] Transaction data for the transaction is input into a classification model to obtain the risk rating.

[0035] Among them, the classification model is also called a classifier, which can map data to one of the given categories, so that it can be applied to data prediction. The algorithms used include decision tree, logistic regression, naive Bayesian, neural network etc.

[0036] The process of constructing the classification model (classifier) ​​will be described in detail below.

[0037] First, select sample data from the user's historical transaction data, classify the sample data, mark the type corresponding to each piece of sample data, that is, add classification marks, and divide the sample data after adding classification marks into a training se...

Embodiment approach 3

[0042] The method provided in this embodiment includes all the content in the method embodiment 1, which will not be repeated here. Among them, such as figure 2 As shown, in this embodiment, processing S11 includes the following processing:

[0043] S111: Use the prediction model to predict the predicted transaction data of the transaction.

[0044] S112: Obtain the risk level based on the actual transaction data of the transaction and the predicted transaction data.

[0045] Among them, similar to the construction process of the classification model, the training set is used to build the prediction model first, and the same evaluation index as the classification model is used, and then the verification set is used to verify the prediction model, but the training set and verification used to build the prediction model Sets do not need to introduce categorical tags.

[0046] Since the specific values ​​of the sample data may have a large degree of dispersion, preferably, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for verifying user identity wherein the method comprises: based on transaction data, calculating the risk level of the transaction a user is dealing with; identifying the verification means corresponding to the risk level; and using the verification means to identify the user identity. According to the invention, based on the transaction data, the risk level is calculated, which avoids the influence of human subjective factors so that the determining of the risk level becomes more objective and reasonable and that the verification of user identity becomes more reliable and that the transaction becomes more secure.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, to a method and device for verifying user identity. Background technique [0002] With the continuous development of e-commerce, non-cash electronic channels have become the main way for users to trade funds, and the security of fund transactions is the focus of each trading platform. In the existing technology, user settings are usually used to determine the verification means for user identity verification (for example, static passwords, SMS verification codes, and biometric identification, etc.), that is, the user can set the verification method for a certain amount range or a certain transaction by himself. You can only use less secure but convenient verification methods such as static passwords or SMS verification codes. However, due to uneven security awareness of users, users may make improper settings, thereby causing greater security risks. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40G06Q20/38G06Q10/06
CPCG06Q20/401G06Q10/0635G06Q20/382
Inventor 杨杰邓玉廖敏飞刘丽娟梁志坚许腾
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products