Abnormity detection model updating method and device and electronic equipment

A technology for anomaly detection and model updating, which is applied in character and pattern recognition, instruments, digital data authentication, etc., and can solve problems that affect user experience and are not convenient enough

Inactive Publication Date: 2020-03-24
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the static authentication information is fixed, once stolen, it will lead to more serious consequences
In addition, this method also requires the user to cooperate with the operation. For example, the password authentication requires the user to enter the password information. For the user, it is not convenient enough and affects the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormity detection model updating method and device and electronic equipment
  • Abnormity detection model updating method and device and electronic equipment
  • Abnormity detection model updating method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0030] As mentioned above, the current user identity authentication mainly adopts static security authentication methods, such as fingerprint authentication, face authentication, password authentication and so on. In this way, the static authentication information is fixed, once stolen, it will lead to more serious consequences. In addition, this method also r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an abnormity detection model updating method and device and electronic equipment. The method comprises: obtaining user time sequence behavior characteristics collected by terminal equipment of a target user; inputting the user time sequence behavior characteristics into an anomaly detection model deployed for the target user, and obtaining an exception detection result of the exception detection model for the user time sequence behavior characteristics, wherein the abnormity detection model is obtained by training based on historical user behavior timesequence characteristics of the target user in at least one terminal device and corresponding tags, and the tags comprise user behavior anomalies and user behavior non-anomalies; and if the anomaly detection result indicates that the user behavior is non-abnormal, performing iterative training on the anomaly detection model based on the user behavior time sequence feature and the label with the non-abnormal user behavior.

Description

technical field [0001] This document relates to the field of artificial intelligence technology, and in particular to an anomaly detection model updating method, device and electronic equipment. Background technique [0002] Current user identity authentication mainly adopts static security authentication methods, such as fingerprint authentication, facial authentication, password authentication, and the like. In this way, the static authentication information is fixed, once stolen, it will lead to more serious consequences. In addition, this method also requires the user to cooperate with the operation. For example, the password authentication requires the user to enter the password information, which is not convenient enough for the user and affects the user experience. [0003] In view of this, there is an urgent need for a more user-friendly and reliable security authentication method. Contents of the invention [0004] The purpose of the embodiments of this specific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06K9/62
CPCG06F21/31G06F18/214G06F18/241
Inventor 刘磊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products