An authentication method and device of a user in a knowledge question answering and a terminal device

An identity verification method and user identity technology, applied in the field of identity verification methods, devices and terminal equipment for answering questions in knowledge quizzes, can solve problems such as damage, inability to verify qualifications, and unreliable results of identity verification, so as to avoid defects and avoid The effect of misdirection

Inactive Publication Date: 2019-03-08
ALIBABA (CHINA) CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the emergence of counterfeiting technology and the difficulties in authenticity verification of identity documents, it is easy to cause unreliable identity verification results.
[0004] Even if the identity certificates of the answering users are verified, their qualifications and other capabilities cannot be verified correspondingly, resulting in various flaws and wrong guidance in the answering content provided by the users, reducing the satisfaction of the asking users, and even causing corresponding damages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] refer to Figure 1a , which shows a flow chart of the steps of a method for verifying the user's identity in quizzes and answers according to Embodiment 1 of the present application.

[0026] It is worth noting that the steps S101 to S103 described in this application do not represent the order in which they are executed.

[0027] The identity verification method of the answering user in the knowledge quiz of the present embodiment comprises the following steps:

[0028] Step S101: Verifying the identity of the user with a certificate matching the identity, and judging whether the identity of the user meets the requirements of the certificate verification.

[0029] Specifically, since the user's certificate is the most direct and legal way to represent the user's identity, the embodiment of the present application first performs certificate verification on the user's identity, and judges whether the user's identity is flawed through the certificate verification, that is...

Embodiment 2

[0047] This embodiment includes the above steps S101 to S103. see figure 2 , the step S101 includes:

[0048] S1011. Verify the identity certificate of the user, and the user whose identity certificate matches the user information passes the verification of the identity certificate.

[0049] Specifically, the identity documents include: identity cards, driver's licenses, passports, Hong Kong and Macau travel permits and other documents that can represent identity.

[0050] S1012. Perform certificate verification on the user who has passed the verification of the identity certificate, and the user whose certificate of representation ability matches the information provided by the user meets the requirements of the certificate verification.

[0051] Specifically, the certificates that represent capabilities include: degree certificates, lawyer certificates, accountant certificates, work badges, and other certificates that can represent capabilities.

[0052] Based on the ver...

Embodiment 3

[0057] This embodiment includes the above steps S101 to S103. see Figure 3a , the step S102 includes:

[0058] Step S1021. If yes, obtain the historical behavior data of the user, and analyze the data related to the identity of the user in the historical behavior data of the user.

[0059] Step S1022, if the data related to the user identity does not match the identity information provided by the user, it is determined that there is an alarming behavior in the user's historical behavior.

[0060] Specifically, the embodiment of the present application analyzes the user's historical behavior data to obtain data related to the user's identity. The data related to the user identity is data capable of verifying the user identity, so there is a corresponding relationship between the data related to the user identity and the identity of the user for authentication.

[0061] For example, if a user answers a question in English for identity verification, the language used in the h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the application provides an authentication method and device of a user in a knowledge question answering and a terminal device. The method comprises the following steps of performingauthentication of a certificate matching the identity of the user to determine whether the identity of the user meets the requirements of the authentication of the certificate; if yes, analyzing thehistorical behavior data of the user to determine whether the warning behavior exists in the historical behavior; if so, authenticating the user by mock questioning, and authenticating the user authenticated by the mock questioning. The embodiment of the present application can realize to recommend the answering user according to the matching relationship between the questioning user and the answering user, and avoid obtaining the answers of irrelevant answering users.

Description

technical field [0001] The embodiment of the present application relates to the field of Internet technology, and in particular to a method, device and terminal device for verifying the identity of users answering questions in knowledge quizzes. Background technique [0002] With the development of Internet technology, people are accustomed to solving problems and learning knowledge through the Internet. Through exchanges and communication in the knowledge discussion community, the efficiency of learning is improved and the knowledge structure is improved. An answering user who answers a question in a knowledge discussion community or a knowledge discussion application program provides an answer to a questioning user, and the questioning user obtains knowledge content by reading the answer. [0003] In the current knowledge quiz application, the identity of the answering user is usually not verified, and only a small number of applications will simply check the identity docu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 高雪陈喆孙昊莫智慧陈志宇毛书宇张梓丹王亚军杨茜
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products