User identity verification method and device based on user operation habits and contact area

An area and touch pressure technology, applied in the computer field, can solve the problem of insufficient optimization of the authentication method, and achieve the effect of optimizing the authentication method, protecting the interests, and being difficult to crack.

Active Publication Date: 2018-02-02
BEIJING BANGCLE TECH CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a user identity verification method and device based on the user's operating ha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity verification method and device based on user operation habits and contact area
  • User identity verification method and device based on user operation habits and contact area
  • User identity verification method and device based on user operation habits and contact area

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0047] In order to solve the identification security of user identity verification schemes in the prior art, reduce the success rate of malicious attacks by criminals, and ensure the technical problems of low interests of users, the embodiment of this application provides a method based on user operating habits and touch pressure. The user identity ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity verification method and device based on user operation habits and a contact area. The method comprises the following steps that: obtaining a contact area and areference touch area model corresponding to first business when a user to be verified triggers a first business operation; obtaining the quantization value of a behavior feature, wherein the behaviorfeature comprises one of or a plurality of gyroscope fluctuation behaviors, sliding behavior features, click behavior features and input time interval sequence behavior features; according to behaviorfeature identification and the business identification of the first business, obtaining the quantization value change range of the behavior features corresponding to behavior feature identification and business identification from a behavior feature library; and according to a corresponding relationship between the contact area and the reference contact area model and a relationship between the quantification value of the behavior feature and the obtained quantification value change range, determining the validity of the user to be verified. Therefore, an identity verification method in the prior art is optimized, the safety of the identity verification is improved, the success rate of the malicious attack of lawbreakers is lowered, and the interest of a user is guaranteed.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a user identity verification method and device based on user operating habits and touch area. Background technique [0002] With the rapid development of Internet technology, there are more and more services based on the mobile Internet, for example: transaction services in e-commerce websites; for example, interactive services in social networking sites, etc., are gradually increasing. [0003] In order to ensure the security of business processing based on the mobile Internet, it is often necessary to verify the identity of the business user during business processing, that is, it is necessary to determine whether the identity of the business user is legal. Wherein, the legality mentioned here means that the user has the access and / or use authority to a certain resource; on the contrary, the illegal means that the user does not have the access and / or use authori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F3/0487
CPCG06F3/0487G06F21/316
Inventor 阚志刚陈彪闫布福孙俊飞方宁卢佐华
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products