User identity authentication method and device, computer equipment and storage medium

A technology of user identity and verification method, applied in the fields of user identity verification method, device, computer equipment and storage media, capable of solving problems such as user loss

Pending Publication Date: 2020-01-31
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the password-free payment function provides users with convenien

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device, computer equipment and storage medium
  • User identity authentication method and device, computer equipment and storage medium
  • User identity authentication method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0049] The user authentication method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the first terminal 102 communicates with the server 104 through the network. The second terminal 106 communicates with the server 104 through the network. Among them, the first terminal 102 and the second terminal 104 can be but not limited to various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the server 104 can be an independent server or a server composed of mu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user identity authentication method and device, computer equipment and a storage medium in the field of information security. The method comprises the steps of acquiring first information corresponding to a first terminal of a logged-in user account, and extracting multi-dimensional features corresponding to the first terminal from the first information; associating themulti-dimensional feature corresponding to the first terminal with the user account; when a password-free payment request sent by a second terminal logging in the user account is received, obtaining multi-dimensional features corresponding to the second terminal; calculating a similar distance between the multi-dimensional feature corresponding to the first terminal and the multi-dimensional feature corresponding to the second terminal; and if the similarity distance exceeds a threshold value, determining that the user identity of the second terminal does not pass the verification, intercepting the password-free payment request, and sending corresponding prompt information to the first terminal. By adopting the method, the security of the password-free payment function can be effectively improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a user identity verification method, device, computer equipment and storage medium. Background technique [0002] With the development of Internet technology and the popularization of mobile terminals, mobile payment has become an important payment method in people's daily life. With the increasing use frequency of mobile payment, in order to simplify the operation of mobile payment, a variety of payment software has also introduced the function of password-free payment, that is, when users make payment on mobile terminals, they can complete the payment without entering a password. Although the password-free payment function provides convenience for the user, if the user account is stolen, it will bring great losses to the user. Therefore, how to improve the security of the password-free payment function has become a technical problem to be solved at present. Conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40
CPCG06Q20/4014
Inventor 周萌文莉
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products