An identity verification device, terminal and method
An identity verification method and identity verification technology, applied in the field of terminals, can solve problems such as inability to effectively identify real users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0069]This embodiment provides an identity verification device, seefigure 2 ,figure 2 A schematic diagram of an identity verification device provided in this embodiment. The identity verification device includes: a display module 201, a receiving module 202, and a verification module 203, wherein:
[0070]The display module 201 is used to display preset verification questions according to preset rules; each preset verification question corresponds to a preset correct answer, and each preset verification question is based on basic data in the system, user historical behavior data or user model data Generate, user model data is generated by analyzing the user's historical behavior data.
[0071]Optional, seeimage 3 ,image 3 A schematic diagram of another identity verification device provided in this embodiment, the identity verification device further includes: a first acquisition module 204, an analysis module 205, a question and answer generation module 206, and a storage module 207, wher...
no. 2 example
[0119]This embodiment provides a terminal, seeFigure 5 ,Figure 5 This embodiment is a schematic diagram of a terminal provided in this embodiment. The terminal includes the identity verification device in the first embodiment. The functions performed by the functional modules of the above identity verification device can be passedfigure 1 Part of the hardware in the hardware implementation, of course, the functions performed by each hardware can also be implemented by the above functional modules. The functions of the above functional modules are specifically implemented by the following hardware:
[0120]The function of the display module 201 can be implemented by the display sub-module 131.
[0121]The function of the receiving module 202 can be implemented by the user input unit 110.
[0122]The functions of the verification module 203, the first acquisition module 204, the analysis module 205, the question and answer generation module 206, the second acquisition module 208, and the judgm...
no. 3 example
[0171]This embodiment provides an identity verification method, seeFigure 6,Figure 6This embodiment provides a flowchart of an identity verification method, the method includes the following steps:
[0172]S601: Display preset verification questions according to preset rules; each preset verification question corresponds to a preset correct answer, and each preset verification question is generated based on basic data in the system, user historical behavior data or user model data, and the user model The data is generated by analyzing the user's historical behavior data.
[0173]Optionally, before S601 displays preset verification questions according to preset rules, it also includes:
[0174]Collect historical behavior data of users and obtain basic data in the system;
[0175]Analyze historical behavior data to generate user model data;
[0176]According to the basic data, historical behavior data and user model data in the system, generate corresponding preset verification questions and preset ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


