Method and device for verifying user operation

A user and user terminal technology, applied in the field of information processing, can solve problems such as the inability to realize real-time monitoring

Inactive Publication Date: 2019-08-02
BEIJING TRUSFORT TECH CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the user's password is leaked or the fingerprint is stolen, the illegal user can maliciously borrow the user's account to perform illegal operations. The...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying user operation
  • Method and device for verifying user operation
  • Method and device for verifying user operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] see figure 1 As shown, it is a schematic flowchart of a user operation verification method provided by the embodiment of the present application, which is executed by the server and includes the following steps:

[0063] Step 101. When receiving an operation request sent by a user terminal, acquire detection data of operations detected by the user terminal performed before sending the operation request.

[0064] When the user performs an operation through the user terminal, the user may send an operation request to the server through the user terminal, and the server may acquire detection data of the user terminal when receiving the operation request sent by the user terminal.

[0065] Wherein, the detection data of the user terminal may be the detection data of the operation performed by the user terminal before sending the operation request, and the user terminal may detect the data through a component installed on the application software.

[0066] In a possible imp...

Embodiment 2

[0100] see image 3 As shown, it is a schematic diagram of the structure of a user-operated verification device provided by the embodiment of the present application, including an acquisition module 301, a security assessment module 302, a determination module 303, a verification module 304, and a construction module 305, specifically:

[0101] The obtaining module 301 is configured to, when receiving the operation request sent by the user terminal, obtain the detection data of the operation performed before sending the operation request detected by the user terminal;

[0102] A safety evaluation module 302, configured to input the detection data into a pre-built safety evaluation model, and output a safety factor, wherein the safety factor is used to describe the level of risk of the operation request;

[0103] A determining module 303, configured to determine the level of the safety factor, and determine a target verification rule matching the level of the safety factor;

...

Embodiment 3

[0123] Based on the same technical idea, an embodiment of the present application also provides an electronic device. refer to Figure 4 As shown, it is a schematic structural diagram of an electronic device 400 provided in the embodiment of the present application, including a processor 401 , a memory 402 , and a bus 403 . Among them, the memory 402 is used to store execution instructions, including a memory 4021 and an external memory 4022; the memory 4021 here is also called an internal memory, and is used to temporarily store calculation data in the processor 401 and exchange data with an external memory 4022 such as a hard disk. The processor 401 exchanges data with the external memory 4022 through the memory 4021. When the electronic device 400 is running, the processor 401 communicates with the memory 402 through the bus 403, so that the processor 401 executes the following instructions:

[0124] When receiving the operation request sent by the user terminal, acquiring...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user operation verification method and device, and the method comprises the steps: obtaining the detection data of an operation which is detected by a user terminal and executed before an operation request is sent when the operation request sent by the user terminal is received; inputting the detection data into a pre-established security evaluation model, and outputting to obtain a security coefficient which is used for describing the risk of the operation request; determining the level of the security coefficient, and determining a target verification rule matched with the level of the security coefficient; and verifying the legality of the operation request by using the target verification rule, and indicating whether the user terminal is allowed to execute theoperation requested by the operation request based on an obtained verification result. By means of the method, the safety of the user account in the operation execution process of the user can be improved, and the behavior that the user executes illegal operation after logging in maliciously is avoided.

Description

technical field [0001] The present application relates to the technical field of information processing, and in particular to a method and device for verifying user operations. Background technique [0002] In the prior art, when verifying the legality of a user's behavior, the identity of the user is generally verified on the user login interface through an account password or other verification methods (such as fingerprint verification, face verification, etc.), and when the user When the authentication is passed, the user identity will not be authenticated again. [0003] If the user's password is leaked or the fingerprint is stolen, the illegal user can maliciously borrow the user's account to perform illegal operations. Therefore, the existing legality authentication method can only ensure the security of the user when logging in, and cannot Real-time monitoring of user operation behavior. Contents of the invention [0004] In view of this, the purpose of the presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/50
CPCG06F21/31G06F21/50
Inventor 郭阳王俊杰赵军孙悦郭晓鹏
Owner BEIJING TRUSFORT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products