A user identification method, device, equipment and storage medium

A user identification and user technology, applied in the field of data analysis, can solve the problems of easy theft of authentication means, inconvenient carrying, easy loss, etc., and achieve the effect of convenient identification method

Active Publication Date: 2021-07-09
BEIJING TRUSFORT TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] As we all know, the first type of authentication method is easy to be stolen and embezzled in the Internet age
The second type of authentication means requires devices other than smart mobile terminals, which are inconvenient to carry and easy to lose
However, with the development of science and technology, human biometric codes such as fingerprints, faces, and voiceprints are copied, disseminated, and abused, and such identity authentication methods are no longer applicable.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user identification method, device, equipment and storage medium
  • A user identification method, device, equipment and storage medium
  • A user identification method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060]In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0061] In order to identify users more conveniently and securely, such as figure 1 As shown, the disclosed example provides a method for identifying a user, the method comprising:

[0062] Step 101, acquiring the first behavior feature data of keystrokes by the first user when inputting the password;

[0063] Step 102, constructing the first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a user identity identification method, device, device and storage medium, comprising: obtaining the first behavior characteristic data of a first user inputting a password and keystroke; constructing the first behavior biometric fingerprint sequence of the first user, the The first behavioral biometric fingerprint sequence includes a first behavioral characteristic data set of each keystroke when the first user enters the password this time, and the first behavioral characteristic data set includes a plurality of first behavioral characteristic data of this keystroke; according to Multiple sets of the first behavioral biometric fingerprint sequence and multiple sets of public behavioral biological fingerprint sequences obtain the identification threshold of the first user; obtain the keystroke behavior characteristic data of the second user when entering the password, and construct the second user's second behavioral biometric fingerprint sequence; determine the average distance between the second behavioral biometric fingerprint sequence and multiple groups of the first behavioral biometric fingerprint sequence; when the average distance satisfies the identification threshold, it is determined that the second user is the first user.

Description

technical field [0001] The present invention relates to the field of data analysis, in particular to a user identification method, device, equipment and storage medium. Background technique [0002] The existing user identity authentication methods for smart mobile terminals are mainly divided into three categories: [0003] Type 1 Knows: Passwords, Privacy Questions, etc. [0004] The second type of holdings: U-Shield, dynamic tokens, etc. [0005] The third category: fingerprints, faces, voiceprints, etc. [0006] As we all know, the first type of authentication means is easy to be stolen and embezzled in the Internet age. The second type of authentication means requires devices other than smart mobile terminals, which are inconvenient to carry and easy to lose. The third type of authentication method largely solves the problems of being easy to steal and inconvenient to carry, and is currently the most widely used method. However, with the development of science and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06K9/00G06K9/62
CPCG06F21/32G06V40/12G06F18/22
Inventor 房华锋韦凯陈曦孙悦郭晓鹏
Owner BEIJING TRUSFORT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products