Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An implicit authentication method, apparatus and computer-readable storage medium

An implicit authentication and algorithm technology, applied in computer parts, computing, secure communication devices, etc., can solve problems such as cloud platform and user privacy leakage, and achieve the effect of improving accuracy and protecting behavior privacy.

Active Publication Date: 2022-06-07
CHINA MOBILE COMM LTD RES INST +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The implicit authentication method mentioned in the related technology uses the cloud platform for classification processing, but it does not take into account that the cloud platform is a semi-trusted organization. When the mobile terminal sends the user behavior to be classified to the cloud platform, it will cause user privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An implicit authentication method, apparatus and computer-readable storage medium
  • An implicit authentication method, apparatus and computer-readable storage medium
  • An implicit authentication method, apparatus and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described below with reference to the accompanying drawings and embodiments.

[0047] The embodiment of the present invention provides an implicit authentication method, and the method is applied to the mobile terminal side, such as figure 1 shown, including:

[0048] Step 101: Encrypt the user behavior data to be classified using the user public key, and send the encrypted user behavior data ciphertext to the big data platform;

[0049] Step 102: Receive the classification result of the user behavior data ciphertext based on the support vector machine SVM algorithm by the big data platform;

[0050] Step 103: Decrypt the classification result based on the user's private key and complete the authentication.

[0051] In the embodiment of the present invention, the mobile terminal encrypts the user behavior data to be classified by using the user public key and sends it to the big data platform, so that the semi-trusted big data platform ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide an implicit authentication method, device, and computer-readable storage medium. The method includes: encrypting user behavior data to be classified by using a user public key, and sending the encrypted user behavior data ciphertext to The big data platform: receiving the classification result of the user behavior data ciphertext based on the support vector machine (SVM) algorithm by the big data platform; decrypting the classification result based on the user private key and completing the authentication.

Description

technical field [0001] The present invention relates to the field of mobile communication technologies, and in particular, to an implicit authentication method, device and computer-readable storage medium. Background technique [0002] With the rapid development of mobile networks and the popularization of mobile terminals, more and more identity authentication is completed on mobile terminals (mobile devices). At present, an identity authentication method commonly used on mobile terminals is explicit authentication. Implicit authentication corresponding to explicit authentication has been proposed in the past two years. Implicit authentication refers to completing identity authentication without the user's perception through the user's unique behavioral habits or biometric data. [0003] The implicit authentication method mentioned in the related art uses the cloud platform for classification processing, but does not consider that the cloud platform is a semi-trusted organ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06K9/62
CPCH04L63/0442G06F18/2411Y02D30/70
Inventor 傅镜艺
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products