A method and device for identifying identity information

An identity information and identity technology, applied in the field of identity information identification methods and devices, can solve problems such as the inability to effectively identify fraudulent identity information and the like

Active Publication Date: 2020-08-04
ADVANCED NEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method cannot effectively identify fraudulently used identities if the environment in which the account is used changes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identifying identity information
  • A method and device for identifying identity information
  • A method and device for identifying identity information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The embodiments of this specification provide a method and device for identifying identity information.

[0023] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0024] see figure 1 The method for identifying identity information provided by an embodiment of this specification may include the following steps.

[0025] S1: Obtain user data, which includes user identity information and account information.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of this specification provide a method and device for identifying identity information, wherein the method includes: acquiring user data, the user data including the user's identity information and account information; account information and identity information, and establish an association relationship between two account information with common characteristics in the user data; according to the established association relationship, determine the target identity information in the user data risk value, and based on the determined risk value, determine whether the target identity information has a risk of fraudulent use. The technical solution described in this manual can improve the identification efficiency of identity information.

Description

technical field [0001] The embodiments of this specification relate to the field of Internet technology, and in particular to a method and device for identifying identity information. Background technique [0002] With the continuous development of Internet technology, the problem of information security in the network has become increasingly prominent. At present, the user's identity information may be stolen by criminals. Lawbreakers will use stolen identity information to register accounts, and use the registered accounts to perform various illegal operations, thereby bringing adverse consequences to users. [0003] Currently, when identifying whether identity information has been fraudulently used by others, it can usually be determined according to the usage environment of the account. For example, if an account is authenticated on the same device as a large number of other accounts, the identity information corresponding to the account may be fraudulently used. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0815H04L67/306H04L63/1483H04L63/1441G06Q20/3674G06Q20/4014G06Q20/4016
Inventor 陈弢李超
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products