Identity information identification method and device

An identity information and identity technology, applied in the field of identity information identification methods and devices, can solve problems such as the inability to effectively identify fraudulent identity information.

Active Publication Date: 2019-02-15
ADVANCED NEW TECH CO LTD
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method cannot effectively identify fraudulently used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity information identification method and device
  • Identity information identification method and device
  • Identity information identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The embodiments of this specification provide a method and device for identifying identity information.

[0023] In order to enable those skilled in the art to better understand the technical solutions in this specification, the following will clearly and completely describe the technical solutions in the embodiments of this specification in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only a part of the embodiments of this specification, rather than all the embodiments. Based on the embodiments in this specification, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this specification.

[0024] See figure 1 The method for identifying identity information provided in an embodiment of this specification may include the following steps.

[0025] S1: Obtain user data, where the user data includes the user's identity informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity information identification method and device. The method comprises the following steps: acquiring user data, wherein the user data comprises identity information and account information of the user; establishing an incidence relation between the account information and the identity information which are bound together in the user data, and establishing an incidence relation between two pieces of account information having common features in the user data; and determining a risk value of target identity information in the user data accordingto the built incidence relation, and judging whether the target identity information has an illegal use risk or not based on the risk value. The identity information identification method provided bythe embodiment of the invention can improve the identity information identification efficiency.

Description

Technical field [0001] The embodiments of this specification relate to the field of Internet technology, and in particular to a method and device for identifying identity information. Background technique [0002] With the continuous development of Internet technology, information security issues in the network have become increasingly prominent. At present, the user's identity information may be stolen by criminals. Criminals will use the stolen identity information to register accounts, and use the registered accounts to perform various illegal operations, which will bring adverse consequences to users. [0003] Currently, when identifying whether the identity information is fraudulently used by others, it can usually be determined according to the usage environment of the account. For example, if an account is authenticated in the same device with a large number of other accounts, the identity information corresponding to the account is likely to be fraudulently used. However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0815H04L67/306H04L63/1483H04L63/1441G06Q20/3674G06Q20/4014G06Q20/4016
Inventor 陈弢李超
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products