Identity recognition method and device and related equipment

An identity recognition and identity technology, applied in the computer field, can solve the problems of reducing the reliability of security authentication of business systems, easy to crack account and passwords, and inability to guarantee the security of business systems, etc.

Active Publication Date: 2019-08-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]When the real user account or real user password is too simple, the account and password with weak security are easy to be cracked, as long as the user account and password are cracked, even if it is illegal Users can pass the security authentication of the business system, which reduces the reliability of the security authentication of the business system, and thus cannot guarantee the security of the business system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method and device and related equipment
  • Identity recognition method and device and related equipment
  • Identity recognition method and device and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0122] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0123] See figure 1 , is a system architecture diagram of identity recognition provided by an embodiment of the present invention. The server 10f establishes a connection with the user terminal cluster through the switch 10e and the communication bus 10d, and the user terminal cluster may include: a user terminal 10a, a user terminal 10b, . . . , a user terminal 10c.

[0124] Taking the user terminal 10a as an example, when the user terminal 10a detects that the u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity recognition method and device and related equipment, and the method comprises the steps: obtaining target behavior state information when receiving input identity verification information based on a target user, wherein the target behavior state information is behavior state information generated according to an operation behavior of inputtingthe identity verification information by a target user; obtaining an identity authentication model corresponding to the registered user, wherein the identity authentication model is obtained by training according to behavior state information of an input operation behavior of a registered user; identifying an identity matching relationship between the target user and the registered user in the identity authentication model according to the target behavior state information; and identifying the security type of the target user according to the identity matching relationship and the input identity verification information. According to the invention, the reliability of system security authentication can be improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an identification method, device and related equipment. Background technique [0002] In recent years, with the continuous popularization of smart terminals, various mobile Internet services store more and more user privacy information. At the same time, password leaks, privacy violations, and identity theft are emerging one after another, and the resulting leaks of private information and social property losses have aroused great concern. Therefore, how to safely, conveniently, and accurately verify the security of business systems has a huge market demand. [0003] The existing security verification method is mainly through account password verification, that is, the user enters the user account and the corresponding account password in the system client, and the system verifies whether the user account and the account password are the same as the real user account an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/4016G06Q20/40145
Inventor 黄泽丰白琨王庆梁健庄灿杰黄伟旭宾志豪倪晓臻徐森圣陈奋胡嘉琪
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products