Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method and device

An identity verification method and identity verification technology, applied in the field of identity verification methods and devices, capable of solving problems such as low security of user identity verification methods, easy cracking, and intrusion into user systems

Active Publication Date: 2019-09-17
ADVANCED NEW TECH CO LTD
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the existing technology, when authenticating a user, the verification questions displayed to the user are fixed, and illegal users can crack the verification question by answering the question multiple times, obtain the answer to the verification question, and thus invade the user system
[0004] It can be seen that the existing user authentication methods have the problems of low security and easy cracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device
  • Identity verification method and device
  • Identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0025] The purpose of the embodiments of the present application is to provide an identity verification method and device, so as to improve the security of user identity verification. Wherein, the identity verification method may be executed by an identity verification device (such as a background server).

[0026] figure 1 Schematic di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity verification method and device which aims to improve the security of the user identity verification. The method comprises the following steps of firstly, acquiring the behavior information of a network behavior of a user and the network environment information and / or the user equipment information associated with the behavior information, according to a preset feature extraction rule, extracting the specific features from the acquired information, then, judging whether the network behavior is a risk behavior or not through a risk behavior recognition model according to each extracted specific feature; and if yes, selecting a target feature enabling the network behavior to be judged as a risk behavior from all specific features through an attribution analysis model, and finally, determining an identity verification problem of the user according to the target feature and carrying out identity verification on the user.

Description

technical field [0001] The present application relates to the computer field, in particular to an identity verification method and device. Background technique [0002] At present, in the risk control system, when the user's behavior is abnormal, the user needs to be authenticated. For example, when the system judges that the user's login behavior is abnormal, the user can be identified by entering the SMS verification code and answering the pre-set verification questions. verify. [0003] However, in the prior art, when authenticating a user, the verification questions presented to the user are fixed, and illegal users can crack the verification question by answering the question multiple times, obtain the answer to the verification question, and thus invade the user system. [0004] It can be seen that the existing user authentication method has the problems of low security and easy cracking. Contents of the invention [0005] The purpose of the embodiments of the pres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/45G06F21/55G06Q20/40
CPCG06F21/31G06F21/45G06F21/552G06Q20/4014G06Q20/4016
Inventor 金宏王维强赵闻飙
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products