Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity verification method and device based on user operation behavior characteristics

A behavior and user technology, applied in the computer field, can solve problems such as insufficient optimization of identity verification methods, and achieve the effects of optimizing identity verification methods, improving security, and protecting interests

Active Publication Date: 2020-06-30
BEIJING BANGCLE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides an identity verification method based on user operation behavior characteristics, which is used to solve the problem that the identity verification method in the business processing process in the prior art is not optimized enough
[0007] The embodiment of the present application also provides an identity verification device based on user operation behavior characteristics, which is used to solve the problem that the identity verification method in the business processing process in the prior art is not optimized enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity verification method and device based on user operation behavior characteristics
  • An identity verification method and device based on user operation behavior characteristics
  • An identity verification method and device based on user operation behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0030] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0031] All information in the computer network, including the user's identity information, is represented by a specific set of data. Since computers can only recognize the user's d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user operation behavior characteristic-based identity authentication method and device and aims at solving the problem that the identity authentication method is not properly optimized in the business processing process in the prior art. The method comprises the following steps of when a user to be authenticated processes first business, acquiring a quantized value of an operation behavior characteristic of the user to be authenticated on a touch terminal; determining a type of the quantized value of the operation behavior characteristic, and determining a corresponding operation behavior characteristic mark according to the type of the quantized value of the operation behavior characteristic; acquiring a variation range of the quantized values of the operation behavior characteristics corresponding to the operation behavior characteristic mark and the first business mark from an operation behavior characteristic library according to the operation behavior characteristic mark and the first business mark; and determining the validity of the user to be authenticated according to a relationship between the quantized value of the operation behavior characteristic and the corresponding variation range of the quantized value. The invention also discloses a user operation behavior characteristic-based identity authentication device.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an identity verification method and device based on user operation behavior characteristics. Background technique [0002] With the rapid development of Internet technology, there are more and more services based on the mobile Internet, for example: transaction services in e-commerce websites; for example, interactive services in social networking sites, etc., are gradually increasing. [0003] In order to ensure the security of business processing based on the mobile Internet, it is often necessary to perform identity verification on the business user during the business processing process, that is, to determine whether the identity of the business user is legal. Wherein, the legality mentioned here means that the user has the access and / or use authority to a certain resource; on the contrary, the illegal means that the user does not have the access and / or use au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40H04L29/06
CPCG06Q20/4014H04L63/0807H04L63/1416H04L63/1441
Inventor 阚志刚陈彪闫布福孙俊飞方宁卢佐华
Owner BEIJING BANGCLE TECH CO LTD