Identity recognition method based on abnormal behavior detection

A technology of identity recognition and behavior, applied in the field of identity recognition, can solve problems such as weak generalization ability

Active Publication Date: 2020-09-04
杭州乘云数字技术有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The second is that we know that there are only data with normal behavior, so this situation belongs to the singular value detection problem of semi-supervised learning
[0013]

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method based on abnormal behavior detection
  • Identity recognition method based on abnormal behavior detection
  • Identity recognition method based on abnormal behavior detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Such as image 3 As shown, an identification method based on abnormal behavior detection includes the following steps:

[0061] Step 1): Collect the sensor data of the user entering the same password multiple times on the same smartphone;

[0062] Each sensor includes device orientation sensor, acceleration sensor, magnetic field sensor, gyroscope sensor;

[0063] Each sensor data includes device orientation sensor, acceleration sensor, magnetic field sensor, gyroscope sensor axis data;

[0064] Step 2): Collect the user's response to the preset behavior mechanism before and after entering the user password;

[0065] The response results of the preset behavioral habit mechanism specifically include:

[0066] When there are numbers in the entered user name, it will be used as the reaction result of the user's first behavior habit mechanism according to whether the user uses the number keyboard or directly uses the numbers in the alphabet keyboard;

[0067] The data o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity recognition method based on abnormal behavior detection. The main technical scheme comprises the following steps of firstly, pre-embedding multiple behavioral habitmechanisms, then collecting behavior data based on a sensor and generating features by adopting a standardized preprocessing method; and according to the historical behavior characteristics of the password input by the target user, adopting an OCSVM algorithm training model to obtain the probability of behavior abnormality, combining results of multiple preset behavior habit mechanisms and finally, acquiring an identity authentication result in a linear combination mode. Only the target user sample exists in the training process, whether the new sample is the target user can be accurately andstably recognized, and therefore the judgment accuracy and stability can be improved.

Description

technical field [0001] The invention relates to the technical field of identification, in particular to an identification method based on abnormal behavior detection. Background technique [0002] With the development of the mobile Internet, smart phones have been widely used in people's lives. While the mobile Internet brings convenience, it is also accompanied by the threat of user information loss. Most APP applications on smart phones need to enter a password to identify whether they are operating in scenarios such as login and payment. However, only one password input operation is still very risky. When the password is stolen by an intruder through shoulder spying, etc. Finally, the intruder only needs to enter the correct password to steal all the information of the user's APP, and even transfer the money in the APP to other accounts. [0003] Although some APPs have already used fingerprint recognition, facial recognition and other methods for identification, these ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06K9/62
CPCG06F21/316G06F18/256G06F18/24
Inventor 谢林涛向成钢
Owner 杭州乘云数字技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products