Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity authentication method, device and equipment

An identity authentication and equipment technology, which is applied in digital data authentication, neural learning methods, computer security devices, etc., can solve the problems of easy interception, inability to guarantee the accuracy of user identity authentication, and easy leakage.

Active Publication Date: 2021-10-12
BEIJING TRUSFORT TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, although the above identity authentication methods can protect the user identity to a certain extent, there are still many security problems, such as traditional password authentication and pattern pattern matching authentication, which are easy to intercept, easy to crack, easy to leak, easy to forge, and Risks such as weak correlation of user identity cannot guarantee the accuracy of user identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity authentication method, device and equipment
  • An identity authentication method, device and equipment
  • An identity authentication method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, features, and advantages of the application more obvious and understandable, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of this application.

[0029] In the era of mobile Internet, smart mobile terminals act as the material carrier connecting the real world and the mobile Internet world, and are used in all aspects of our lives, such as shopping, travel, etc. Therefore, the security of smart mobile terminals is becoming increasingly important. Passive defensive measures such as passwords, fingerprints, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an identity authentication method, device and equipment. The method includes: obtaining the behavior data of the current user and the device data of the current device; inputting the behavior data and the device data into a feature extraction model for feature extraction, wherein the feature extraction model is based on historical behavior data and historical equipment A deep self-encoder obtained from data training; according to the extracted user features, the current user is authenticated. In this application, a richer user feature is learned from the original data through a deep autoencoder, and the user feature can be used to more accurately and richly describe the owner user of the current device, thereby improving the accuracy of identity authentication.

Description

technical field [0001] This application relates to artificial intelligence technology, and in particular to an identity authentication method, device and equipment. Background technique [0002] In the era of mobile Internet, users are increasingly dependent on smart devices, and the security requirements for smart devices are also stricter. At present, a class of identity authentication products that occupy the vast majority of the market are based on hardware devices, mainly based on device authentication, tokens and keys. [0003] However, although the above identity authentication methods can protect the user identity to a certain extent, there are still many security problems, such as traditional password authentication and pattern pattern matching authentication, which are easy to intercept, crack, leak, forge, and Risks such as weak correlation of user identities cannot guarantee the accuracy of user identity authentication. Contents of the invention [0004] The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/31G06N3/04G06N3/08
CPCH04L63/08H04L63/0876G06F21/316G06N3/084G06N3/044
Inventor 郭翊麟郭晓雯郭豪蔡准孙悦郭晓鹏
Owner BEIJING TRUSFORT TECH CO LTD