Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A user identity verification method and device based on user behavior characteristics

A technology of user identity and verification method, which is applied in the field of user identity verification method and device based on user behavior characteristics, can solve problems such as illegal user cracking, and achieve the effect of not being easy to crack and improving security

Active Publication Date: 2020-11-24
BEIJING BANGCLE TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, this method of verification only through SMS verification codes or other dynamic passwords may be caught by phishing software and easily cracked by illegal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user identity verification method and device based on user behavior characteristics
  • A user identity verification method and device based on user behavior characteristics
  • A user identity verification method and device based on user behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0036] In order to solve the technical problem of low identification security of user identity verification schemes in the prior art, embodiments of the present application provide a user identity verification method and device based on user behavior characteristics, which will be described below with reference to the accompanying drawings.

[0037] A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identity authentication method and a user identity authentication device based on a user behavior feature. According to the method, a quantized value of the behavior feature can be acquired when a user to be authenticated triggers preset business operation, and a behavior feature identifier of the behavior feature can be determined; the behavior feature comprises oneor more of the gyroscope fluctuation behavior feature, the sliding behavior feature and the click behavior feature; according to the behavior feature identifier, a variation range of the quantized value of the behavior feature corresponding to the behavior feature identifier is acquired from a behavior feature library; and validity of the user to be authenticated is determined according to a relation between the quantized value of the behavior feature and the acquired variation range of quantized value. Different users have different postures for holding a same terminal and operation habits,so that the quantized value of the behavior feature also has different variation ranges when different users trigger the same business operation, and is not prone to break and simulate, so that the method and the device can improve identity authentication security of the user.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a user identity verification method and device based on user behavior characteristics. Background technique [0002] With the rapid development of the mobile Internet, it is very common for users to operate various "Internet+" services through mobile terminals. For example, the user can conduct online shopping through a shopping website APP installed on the mobile phone, or the user can transfer money, pay, etc. through the financial APP installed on the mobile phone. [0003] However, although the popularity of various mobile "Internet +" services has brought convenience to users, there are also more security risks. For example, in the "Internet + Finance" business, it often happens that the account number and password of a legitimate user are stolen or cracked by a malicious user. account, transfer, payment and other business operations, causing losses to the prop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q20/40
Inventor 阚志刚陈彪闫布福孙俊飞方宁卢佐华
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products