User authentication method and device

A technology for user identity and verification methods, applied in the direction of user identity/authority verification, etc., can solve problems such as affecting user experience, difficult identification, theft of money or virtual property, etc., to improve system security, ensure verification accuracy, and improve user experience. The effect of experience

Inactive Publication Date: 2017-08-08
ALIBABA GRP HLDG LTD
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The second hidden danger is: Hackers steal users' account passwords, log in to specific application software as users, spy on other people's privacy, steal money or virtual property, etc.
[0015] For CAPTCHA technology, there are already many ways to crack it, for example, machine automatic recognition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device
  • User authentication method and device
  • User authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to reduce the operation complexity of the verification process and ensure the verification accuracy, in the embodiment of this application, various sensors are used to collect user behavior data in real time in advance, and then the user identity verification device uses a specific algorithm to collect The various collected user behavior data are integrated into the benchmark user characteristic information, so that when the user triggers the user identity verification process, the user identity verification device can generate current user characteristic information based on the user behavior data collected in the second period, and pass the current According to the matching degree of the user characteristic information and the benchmark user characteristic information, it is judged whether the user authentication is successful.

[0075] Preferred embodiments of the present application will be described in further detail below in conjunction with the accompanyi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application relates to a computer technology, and discloses a user authentication method and device aiming at ensuring the accuracy of authentication while reducing the operation complexity of a verification process. The method comprises the following step: a user authentication device real-timely collects and stores a plurality of user behavior data of a first user through a plurality of sensors, separately generates corresponding user characteristic information based on two segments of user behavior data with different storage time, and then matches the two pieces of user characteristic information, and judges that the user is successfully authenticated when a successful match is determined. Thereby, according to a method for authenticating the user by using the user characteristic information extracted based on the user behavior data, the information leakage can be effectively avoided, the difficulty of password cracking can be increased, the possibility of stealing or copying passwords by third parties can be effectively reduced, the accuracy of authentication can be ensured, and the security of the system can be enhanced.

Description

technical field [0001] This application relates to computer technology, in particular to a method and device for user identity verification. Background technique [0002] With the rapid development of the times, smart devices, especially handheld smart devices (such as: laptops, tablets, mobile phones or other mobile terminals) are becoming more and more popular. These smart devices usually have built-in various sensors (such as: acceleration sensor, gyroscope sensor, gravity sensor, etc.). [0003] On the other hand, in order to meet the increasingly rich usage needs of users, various application service providers have developed a large number of application software to carry the core business of customers, which provides great convenience for users' life. Human beings have begun to rely more and more on smart devices, such as recharge, transfer and other operations related to vital interests. [0004] At the same time, there are also a lot of hidden dangers in the login ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/32
Inventor 丁健生
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products