CN104426884A - Method for authenticating identity and device for authenticating identity - Google Patents
Method for authenticating identity and device for authenticating identity Download PDFInfo
- Publication number
- CN104426884A CN104426884A CN201310395457.2A CN201310395457A CN104426884A CN 104426884 A CN104426884 A CN 104426884A CN 201310395457 A CN201310395457 A CN 201310395457A CN 104426884 A CN104426884 A CN 104426884A
- Authority
- CN
- China
- Prior art keywords
- user
- characteristic
- data
- safety state
- account number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method for authenticating an identity and a device for authenticating the identity, relates to the technical field of Internet, and can solve the problem that individual accounts in internet application can not be practically protected. The method disclosed by the invention comprises the following steps: obtaining characteristic data of a user; analyzing an account safety state of a user according to the characteristic data; finding an operating authorization corresponding to the account safety state; executing the operating authorization corresponding to the account safety state. The method and the device are mainly applied to an account safety detection process.
Description
Technical field
The present invention relates to Internet technical field, particularly relate to a kind of method and device of identification authentication.
Background technology
At present, social network sites (Social Networking Services is called for short SNS) and numerous application all need user to register personal account.Data in personal account relate to the personal information of user mostly, and these personal informations should not be revealed to other people.For ensureing the fail safe of personal account, usually need user to input user name and password when logging in personal account, network side website carries out authentication by series of algorithms to the password that user inputs, thus realizes the identification authentication to user.
But code authentication is only a pass of subscriber identity authentication, authentication successfully can not the personal account of representative of consumer be perfectly safe.Such as, hacker embedded in stand-by program by illegal means in Webpage, when user inputs username and password in login page, hacker can steal username and password by stand-by program, the personal account of username and password login user then by stealing.That is, even if password or code authentication algorithm are after complexity, also there is the possibility that personal account is stolen, the fail safe of personal account cannot obtain absolute guarantee.
Along with the development of the Internet social, for the consideration improving adhesive between user, the web games such as social network standing-meeting provides colourful interactive application to user, such as fun farm.These application are usually directed to the virtual assets such as empirical value, electronic money, equipment, if the personal account of user is stolen, then the virtual assets of individual subscriber also exists risk that is stolen, transaction.At present; the increasing country in the whole world starts accreditation and comprises bit coin (Bitcoin; i.e. electronic money) in the legal status of interior virtual assets; virtual assets is as a part for Internet user's person property; how to be protected reliably together with the personal information of user, be a problem urgently to be resolved hurrily in current internet application.
Summary of the invention
The embodiment of the present invention provides a kind of method and device of identification authentication, can solve the problem that personal account in internet, applications cannot obtain protection conscientiously.
On the one hand, embodiments provide a kind of method of identification authentication, comprising:
Obtain the characteristic of user;
The account number safety state of described user is analyzed according to described characteristic;
Search the operating right corresponding with described account number safety state;
Perform the operating right that described account number safety state is corresponding.
On the other hand, the embodiment of the present invention additionally provides a kind of device of identification authentication, comprising:
Data capture unit, for obtaining the characteristic of user;
State analysis unit, the described characteristic for obtaining according to described data capture unit analyzes the account number safety state of described user;
Authority searches unit, for searching operating right corresponding to the described account number safety state analyzed with described state analysis unit;
Authority performance element, searches operating right corresponding to described account number safety state that unit searches for performing described authority.
The method of the identification authentication that the embodiment of the present invention provides and device, characteristic when user carries out network operation can be obtained, according to the characteristic analysis obtained, the reliability of user operation behavioural habits, draw the account number safety state of user thus, then search and perform the operating right corresponding with account number safety state.For the user that reliability is higher, the fail safe of account is higher, the operating right that user is higher can be given, and for the lower user of reliability, then the fail safe of account is also lower, need the lower operating right of imparting user even to cancel the operating right of this user, in case other people usurp the generation of the situation of validated user account, realize the security management of user account thus.Because the characteristic of user determined by the specific behavior custom of each user; and the behavioural habits of each user are not quite similar; therefore with the fingerprint of the mankind or iris similar; characteristic has stronger uniqueness and non-reproduction; compared with login password of the prior art; other people almost cannot imitate or steal the characteristic of other users, thus can realize the practical protection to personal account in internet, applications.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the method for first identification authentication in the embodiment of the present invention;
Fig. 2 is the flow chart of the method for second identification authentication in the embodiment of the present invention;
Fig. 3 is the schematic diagram of mapping relations between characteristic and account number safety state in the embodiment of the present invention;
Fig. 4 is the configuration diagram of artificial neural net in the embodiment of the present invention;
Fig. 5 is the schematic diagram of three kinds of comprehensive characteristics data models in the embodiment of the present invention;
Fig. 6 is the schematic diagram of the feature-based data model that in the embodiment of the present invention, website is chosen;
Fig. 7 is the structural representation of the device of first identification authentication in the embodiment of the present invention;
Fig. 8 is the structural representation of the device of second identification authentication in the embodiment of the present invention;
Fig. 9 is the structural representation of the device of the 3rd identification authentication in the embodiment of the present invention;
Figure 10 is the structural representation of the device of the 4th identification authentication in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the present embodiment, be clearly and completely described the technical scheme in the present embodiment, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
For making the safety of user account conscientiously be protected, present embodiments providing a kind of method of identification authentication, in order to the mode by user characteristic data authentication, user operation authority being authorized, thus make other people the account of user cannot carry out illegal operation.As shown in Figure 1, described method comprises:
101, the characteristic of user is obtained.
The characteristic produced when network side website (follow-up referred to as website) operates user obtains, described operation comprises the operation of user to electronic equipment or the operation to internet web page, described characteristic is for describing the behavioural habits of user's online, such as account login time, the use device identification of electronic equipment, the account grade etc. of user, the present embodiment does not do exclusive list to this.
The opportunity of station for acquiring characteristic can be before user's login account, the general operation that user triggers is obtained, also can when user's login account (or in a period of time afterwards) operation relating to account that user triggers is obtained, the present embodiment does not limit on opportunity of characteristic obtaining.
102, the account number safety state of user is analyzed according to characteristic.
Website selects one or more characteristics to carry out combination calculating account number safety state score according to analysis strategy, draws corresponding account number safety state according to account number safety state score.In the present embodiment, account number safety state can be " safety " with " dangerous " two kinds oppose result, also can be multiple state grade in various degree, such as " 1 grade of state ", " 2 grades of states ", " 3 grades of states ", " 4 grades of states " etc., wherein can preset " 1 grade of state " the safest, " 4 grades of states " is least safe.
Account number safety state score can be associated with account number safety state by the mode dividing score value section by website.Such as, score value is higher than the corresponding safe condition " safety " of account of 80 points, and score value is lower than the corresponding safe condition " dangerous " of account of 60 points; Or, full marks 100 points are divided into 10 score value sections, the corresponding one-level safe condition of each score value section, obtain ten level security states etc. thus, the present embodiment is only example to the division rule of account safe condition and account number safety state score with the corresponding algorithm of account number safety state and illustrates, not as the restriction to practical application.
103, the operating right corresponding with account number safety state is searched.
Can be preset with the mapping relations table that account number safety state associates with operating right in website, website, after acquisition account number safety state (rank), searches corresponding operating right automatically according to this mapping relations table.
In the present embodiment, described operating right includes but not limited to " complete authority ", " complete lack of competence ", also can comprise " part authority ", such as " visitor's authority ", " permission operating right ", " Information issued authority " or " information amendment authority ".
104, operating right corresponding to account number safety state is performed.
When website after user's login account is according to the operation behavior of the operating right limited subscriber performed, such as, forbid login account or allow login account etc.
The mode protected user account in prior art is mainly by the personal identification of code authentication authentication of users, if code authentication success, user can login account, if code authentication failure, user cannot login account.Although the mode of this identification authentication can ensure the uniqueness of password, cannot ensure to verify the adhesiveness according to user.Other people can obtain the password of user by deduction or technological means, such as infer that password is user's birthday, or steal user cipher etc. by stand-by program, checking is according to departing from user is actual in this case.
In the present embodiment, website can extract the characteristic of user according to the operation behavior of user, using characteristic as the foundation judging account number safety state and Authorized operation authority.Such as, the actual user of certain account usually in the afternoon 7 be a by IP address electronic equipment login account is played, if some day, website detected that this user is the electronic equipment login account of b at 10 in the morning by IP address, and the input password of more number of times, then website judges that this account exists by steal-number risk, therefore reduce the operating right of user, only allow user to browse, in case other people usurp user account revise its personal information.Due to the characteristic of user and the use habit of individual subscriber closely related, other people almost cannot imitate or steal, therefore using the characteristic of user as the foundation of identification authentication, the checking foundation problem that depart from actual in user in prior art can be avoided, real realization, to the identification authentication of user, can improve the fail safe of personal account thus conscientiously.
As to detailed description embodiment illustrated in fig. 1 and further expand, the present embodiment additionally provides a kind of method of identification authentication, and as shown in Figure 2, described method comprises:
201, the behavioural characteristic data of user operation case and the history feature data of account are obtained.
Data for subscriber identity authentication comprise dynamic data and static data two parts, and wherein so-called dynamic data is the behavioural characteristic data of user operation case, and so-called static data is the history feature data of account.
Behavioural characteristic data are operating datas of user's actual generation when operating a certain event, have stronger ageing.Such as user's open any browser, enters account log-on webpage by certain searching web pages, manually inputs username and password; Such as user enters certain portal website again, browses a certain subject picture, then displaying video etc.In the present embodiment, the various actions characteristic that the Action Events of station for acquiring user on the network side page or local client produces, these behavioural characteristic data comprise following at least one characteristic:
User/device identification (IDentity is called for short ID), operating time, IP(Internet Protocol) (InternetProtocol is called for short IP) address, website source or concrete operations behavior.
Wherein, the device identification of the hardware device that user/device identification can use for user can be also the physical label that user distributes for operator; Operating time comprises two parts, first for user carry out event action initial/termination time, this time is a moment value, and second carries out the duration of event action for user, and this time is one section of duration; IP address is as the mark in user network path, and the IP address that distinct device connecting Internet uses is usually different, and website can by the networking path of IP Address Recognition user; Website source is used for identifying user and which kind of mode is linked to this website by, such as, be linked to account log-on webpage by search and webpage, or be directly linked to account log-on webpage by the web page address stored in browser; Described operation behavior specifically refers to the sequence of operations action that user performs on webpage or client, such as start player, browsing page, clickable hyperlinks etc., in the present embodiment, website is by the operation behavior of the mode recording user of recording user operation track.Usually, the combination of multiple behavioural characteristic data can reflect the behavioural habits that user surfs the Net, use such as user morning 10 device identifications be 1 mobile phone log in individual account and browse news and carry out web game.
History feature data are for reflecting the characteristic of individual account usage frequency or user's validity, and this partial data is accumulated by the result of all previous event action of user and forms, but lower with the correlation degree of certain event action, is therefore called as static data.The history feature data of station for acquiring comprise following at least one characteristic: the attribute information of account grade, account relating business, history account number safety state, good friend's quantity or Information issued frequency/quantity.
Wherein, account relating business refer to this account be suitable for various application examples as web game, the attribute information of account relating business refers to the apply property information with this account relating, and such as, for web game, attribute information can be the equipment, ideal money quantity etc. of user; History account number safety state is the safe condition result obtained in all previous identification authentication process.
Website by static data and dynamic data the safe condition to user account analyze.
202, according to the account number safety state of behavioural characteristic data and history feature data analysis user.
Webmaster personnel can set up the incidence relation between characteristic (or characteristic combination) and account number safety state in advance, and website obtains the account number safety state of user according to this incidence relation.Such as shown in Figure 3, the behavioural characteristic data as dynamic data are:
IP address | a |
Website is originated | Browser |
Operation initial time | The morning 10 point |
History feature data as static data are:
Account grade | 14 |
History account number safety state | Safety |
Good friend's quantity | 178 |
Website is " safety " by behavioural characteristic data and history feature data search to the account number safety state of user.
Preferably, website is by artificial neural net (Artificial NeuralNetwork is called for short ANN) in the present embodiment, is called for short the account number safety state that neural net (Neural Network is called for short NN) analyzes user.Artificial neural net is a kind of Mathematical Modeling or computation model of 26S Proteasome Structure and Function of mimic biology neural net.Artificial neural net is calculated by a large amount of artificial neurons connection.In most cases artificial neural net can change internal structure on the basis of external information, is a kind of Adaptable System.Modern's artificial neural networks is a kind of Nonlinear Statistical data modeling tool, is commonly used to carry out modeling to relation complicated between input and output, or is used for the pattern of heuristic data.
Artificial neural net is a kind of operational model, by a large amount of node (or claiming neuron or unit) and between be coupled to each other and form.A kind of specific output function of each node on behalf, is called excitation function (Activation Function is called for short AF).Every two internodal connections all represent one for the weighted value by this connection signal, and be referred to as weighted value (weight), this is equivalent to the memory of artificial neural net.The output of network then according to the connected mode of network, the difference of weighted value and excitation function and different.And network self is all approaching certain algorithm of nature or function usually, also may be the expression to a kind of logic strategy.
Artificial neural net has very strong classification and recognition capability to input amendment.Suppose that input X has m class sample, sample elements is n, exports Yk, and the relation between input X and output Y as shown in Figure 4.Website is using the input as artificial neural net of the behavioural characteristic data of user and history feature data, and the Output rusults obtained is the account number safety state of user.
When Primary Assay, webmaster personnel need to set up feature-based data model set, comprise multiple feature-based data model obtained according to the different permutation and combination results of Different quantitative specificity data in this feature-based data model set, webmaster personnel also will preset weighted value for each characteristic in feature-based data model.Website can set up the set of behavioural characteristic data model and the set of history feature data model respectively according to behavioural characteristic data and history feature data, also can set up the set of comprehensive characteristics data model according to behavioural characteristic data and history feature data.
In Figure 5 example illustrate several comprehensive characteristics data model, wherein, the characteristic related in model 1 comprises: 1) website source, 2) IP address, 3) account grade, wherein 1) and 2) be behavioural characteristic data, 3) be history feature data; The characteristic related in model 2 comprises: 1) website source, 2) device identification, 3) good friend's quantity, wherein 1) and 2) be behavioural characteristic data, 3) be history feature data; The characteristic related in model 3 comprises: 1) website source, 2) device identification, 3) IP address, 4) account grade, 5) ideal money quantity, 6) issued state quantity, wherein 1) to 3) be behavioural characteristic data, 4) to 6) be history feature data.
Webmaster personnel can choose different behavioural characteristic data according to different emphasis and history feature data combine, and obtain the feature-based data model set comprising various features data model.When setting up feature-based data model, for the situation of Primary Assay, webmaster personnel can arrange the weighted value of each characteristic according to practical experience value, when subsequent analysis, the different every weighted value of mode auto modification learnt by behavioural habits of artificial neural net, makes it the real behavior custom of being more close to the users.Every weighted value after arranging as shown in Figure 5.
When analyzing according to the account number safety state of characteristic to user, website calculates sub-result according to the behavioural characteristic data of user and history feature data respectively by artificial neural net, then comprehensively analyzes the account number safety state drawing user according to two sub-results.Concrete:
202a, from the behavioural characteristic data model set preset, choose a default behavioural characteristic data model.
Example, website chooses behavioural characteristic data model is as shown in Figure 6 IP address+website source.
202b, extract at least one behavioural characteristic data of corresponding behavior feature-based data model.
Website extracts the concrete behavior characteristic of corresponding behavior feature-based data model from the current register of user, the IP address of such as user is a, website source is URL(uniform resource locator) (Uniform Resoure Locator the is called for short URL) address of browser link.
202c, the first weighted value according at least one behavioural characteristic data and each behavioural characteristic data corresponding, calculate the first sub-safe condition.
Website is each behavioural characteristic data assignment, then calculates the score value of the first sub-safe condition according to the assignment of each behavioural characteristic data and the weighted value of correspondence.
In the present embodiment, the implementation calculating the first sub-safe condition score value can have two, concrete:
1) the constant adjustment assignment of fixed weight value
For the IP address of user, website can the IP address that uses of the usual login account of recording user be b by learning process, if the IP address that this register of user uses is b, is behavior characteristic assignment 50; If the IP address that this register of user uses is a, i.e. the IP address registration account of user by being of little use is then behavior characteristic assignment 20.Such as website is originated again, if this website source logged in of user is the URL address of browser link, being then behavior characteristic assignment 50, if this website source logged in of user is the URL address of the lower website of certain level of security, is then behavior characteristic assignment 35.
Every behavioural characteristic data are multiplied with corresponding weighted value by website respectively, then sum up, and obtain the first sub-safe condition score value.Such as, the first sub-safe condition score value that website calculates is: 50*0.6+35*0.4=44.
2) the constant adjustment weighted value of fixed assignment
With 1) contrary, website is difference IP address and website source assignment 60 and 40.If the IP address that this register of user uses is b, by the behavior, the weighted value of feature is revised as 0.5; If this register of user use IP address be a, i.e. the IP address registration account of user by being of little use, then by the behavior characteristic weighted value be revised as 0.2.Such as website is originated again, if this website source logged in of user is the URL address of browser link, then by the behavior characteristic weighted value be revised as 0.5, if the URL address that this website source logged in of user is the lower website of certain level of security, then by the behavior characteristic weighted value be revised as 0.35.
Every behavioural characteristic data are multiplied with corresponding weighted value by website respectively, then sum up, and obtain the first sub-safe condition score value.Such as, for above-mentioned assignment, the first sub-safe condition score value that website calculates is: 60*0.5+40*0.35=44.
202d, from the history feature data model set preset, choose a default history feature data model.
Then, the history feature data model of website according to Fig. 6 (account grade+history safe condition) calculates the second sub-safe condition.
202e, extract at least one history feature data of corresponding history feature data model.
Website extracts the concrete history feature data of corresponding history feature data model, and such as account grade is 14 grades, and history safe condition is " dangerous ".
202f, the second weighted value according at least one history feature data and each history feature data corresponding, calculate the second sub-safe condition.
Similar with step 203c, the implementation that website calculates the second sub-safe condition score value also can have two, repeats no more here.
Example, the second sub-safe condition score value that website calculates is: 60*0.6+40*0.3=48, wherein " 60 " are the assignment of account grade, " 0.6 " is when account grade is higher than the weighted value of amendment when 10 grades, " 40 " are the assignment of history safe condition, and " 0.3 " is the weighted value of the amendment when history safe condition is " dangerous ".
202g, draw account number safety state according to the first sub-safe condition and the second sub-safe condition COMPREHENSIVE CALCULATING.
Website can be weighted the first sub-safe condition score value and the second sub-safe condition score value according to the allocation proportion preset, or carries out arithmetic average calculating to both, and the present embodiment does not limit specific algorithm.
Example, the account number safety state score that website calculates is (44+48)/2=46.
In the present embodiment, website first performs step 202a to step 202c, perform the implementation of step 202d to step 202f more only for ease of statement, in practical application, both execution sequences can have change, such as first perform step 202d to step 202f and perform step 202a again to step 202c, or perform step 202a to step 202c and step 202d to step 202f, as long as calculated the first sub-safe condition score value and the second sub-safe condition score value before step 202g simultaneously.
Concrete numerical value involved in the present embodiment is only example and illustrates, is not limited to this in practical application.
203, the operating right corresponding with account number safety state is searched.
Website, according to account number safety state and default mapping relations table, searches the operating right of corresponding account number safety state, and wherein, mapping relations table is for characterizing the corresponding relation between different account number safety state and different operation authority.This mapping relations table of example can shape as shown in the table:
Account number safety state (score value) | Operating right |
0-10 | Complete lack of competence |
11-20 | Visitor's authority |
21-30 | Allow operating right |
31-40 | Information issued authority |
41-50 | Complete authority |
The operating right related in the present embodiment comprises: authority, completely lack of competence, visitor's authority, permission operating right, Information issued authority or information amendment authority completely.For " complete authority ", user has the operating right of all operations, and for " complete lack of competence ", and user then at all cannot login account; For " visitor's authority ", only allow user to browse, do not allow to carry out the operations such as related application; Except user browses, user is also allowed to carry out the application operatings such as web game except allowing for " permission operating right "; For " Information issued authority " except the operation of above-mentioned permission, user is also allowed to carry out photo upload, write the operations such as daily record; Allow user to have the operating right of higher amendment personal information for " information amendment authority ", and delete the operating right of data message.For 46 points that calculate in step 202, it is " complete authority " that correspondence mappings relation table can find the operating right should authorizing user.
204, operating right corresponding to account number safety state is performed.
When the operating right finding user is for " complete authority ", website performs " complete authority ", can have after user's login account browse, operate, revise, all operations authority such as issue.
Further, as another optimal technical scheme in the present embodiment, for adapting to the change of user behavior custom, thus improve the accuracy of identification authentication, website can also receive audit feedback result that is that customer complaint sends or artificial neural net self-inspection transmission.This audit feedback result is for evaluating the accuracy of account number safety state analysis.Then website is according to the kind of characteristic and/or the weighted value of characteristic in audit feedback result adjustment feature-based data model, thus makes next safety state analysis more accurate.
Such as, certain user is usually at 10 login accounts in the morning, and its behavioural habits are comparatively fixing, website each analyze account number safety state time by the behavior characteristic weighted value arrange higher, calculate higher account number safety state score thus.Certain this user in the afternoon 4 carried out account login, if corresponding weighted value is turned down because this operation is not inconsistent with the behavioural habits of user, then calculate compared with account number safety state score will reduce, cause analysis result produce error.If artificial neural net comes from the change of user operation habits according to the difference that other characteristics such as operation behavior, IP address analyze the operating time, but not other people usurp this user account, then website improves weighted value corresponding to operating time according to the audit feedback result of feedback, avoids user operation habits to change erroneous effects to analysis result.
The characteristic obtained in the present embodiment not only comprises the characteristic that user's login account produces, and also comprises user's various data that (such as browsing page) produces when carrying out the operation that the login of pre-account has nothing to do.Website can go out the daily behavioural habits of user by analytic learning equally by these data.When obtaining the data that irrelevant account logs in, its opportunity obtaining data is not limited to carry out after user starts account login page, and in fact, website can obtain the data that user operation produces and analyze at any time.
The method of the identification authentication that the present embodiment provides, can when carrying out identification authentication, the behavioural habits that user operation behavior reflects are embodied in account number safety state score, the operation of user more meets fixing behavioural habits, account number safety state score is higher, and then the analysis result drawn is more safety, otherwise the analysis result then drawn is more for dangerous.The unique identification of the operation behavior of user as user can be used as the password of user thus.Because the operation behavior of user varies with each individual, just have stronger non-reproduction, therefore relative user cipher, better can protect the safety of user account.
Secondly, the method of the identification authentication that the present embodiment provides, can also according to the weighted value of audit feedback result correction characteristic, avoid the non routine operation of user to be mistaken for the operating right of other people illegal operation and limited subscriber, accuracy and the practicality of right discriminating system can be improved further.
Finally, the method for the identification authentication that the present embodiment provides can also be that user distributes different operating rights according to different safe conditions, the valid operation scope of refinement and distinct user.Correctly then distributing full operation authority, Password Input mistake with Password Input in prior art does not then distribute compared with any operating right completely, can to user carry out authentication and authority are authorized more accurately, do not usurped on the basis of amendment by other people at guarantee user account, the impact of identification authentication on validated user is reduced to minimum.
With reference to the method shown in figure 1 or Fig. 2, the present embodiment additionally provides a kind of device of identification authentication, and this device can be arranged in network side website, such as, be arranged in server, in order to realize the method shown in Fig. 1 or Fig. 2.As shown in Figure 7, described device comprises: data capture unit 71, state analysis unit 72, authority search unit 73 and authority performance element 74, wherein,
Described data capture unit 71, for obtaining the characteristic of user;
Described state analysis unit 72, the described characteristic for obtaining according to described data capture unit 71 analyzes the account number safety state of described user;
Described authority searches unit 73, for the operating right that the described account number safety state of searching with described state analysis unit 72 is analyzed is corresponding;
Described authority performance element 74, searches operating right corresponding to described account number safety state that unit 73 searches for performing described authority.
Further, as shown in Figure 8, described data capture unit 71 comprises: the first data acquisition subelement 81 and the second data acquisition subelement 82;
Described first data acquisition subelement 81, for obtaining the behavioural characteristic data of described user operation case;
Described second data acquisition subelement 82, for obtaining the history feature data of described account.
Further, the various actions characteristic that described first data acquisition subelement 81 produces for obtaining the Action Events of described user on the network side page or local client, described behavioural characteristic data comprise following at least one characteristic: user/device id, operating time, IP address, website source or concrete operations behavior;
Described second data acquisition subelement 82 is for obtaining the described account usage frequency of reflection or the history feature data of user's validity, and described history feature data comprise following at least one characteristic: the attribute information of account grade, account relating business, history account number safety state, good friend's quantity or Information issued frequency/quantity.
Further, as shown in Figure 9, described state analysis unit 72 comprises: the first computation subunit 91, second computation subunit 92 and COMPREHENSIVE CALCULATING subelement 93;
Described first computation subunit 91, for choosing a default behavioural characteristic data model from the behavioural characteristic data model set preset, extract at least one behavioural characteristic data of corresponding described behavioural characteristic data model, according to the first weighted value of described at least one behavioural characteristic data and each behavioural characteristic data corresponding, calculate the first sub-safe condition;
Described second computation subunit 92, for choosing a default history feature data model from the history feature data model set preset, extract at least one history feature data of corresponding described history feature data model, according to the second weighted value of described at least one history feature data and each history feature data corresponding, calculate the second sub-safe condition;
Described COMPREHENSIVE CALCULATING subelement 93, draws described account number safety state for the described second sub-safe condition COMPREHENSIVE CALCULATING calculated according to described first sub-safe condition and described second computation subunit 92 of described first computation subunit 91 calculating.
Further, described authority searches unit 73 for according to described account number safety state and default mapping relations table, search the operating right of corresponding described account number safety state, wherein, described mapping relations table is for characterizing the corresponding relation between different account number safety state and different operation authority, and described operating right comprises: authority, completely lack of competence, visitor's authority, permission operating right, Information issued authority or information amendment authority completely.
Further, as shown in Figure 10, described device also comprises:
Unit 101 set up by model, before obtaining the characteristic of user at described data capture unit 71, set up feature-based data model set, for each characteristic in described feature-based data model presets weighted value, in described feature-based data model set, comprise multiple feature-based data model obtained according to the different permutation and combination results of Different quantitative specificity data.
Feedback reception unit 102, for receiving audit feedback result, described audit feedback result is for evaluating the accuracy of described account number safety state;
Model adjustment unit 103, adjusts the kind of characteristic and/or the weighted value of characteristic in described feature-based data model according to the described audit feedback result that described feedback reception unit 102 receives.
The mode protected user account in prior art is mainly by the personal identification of code authentication authentication of users, if code authentication success, user can login account, if code authentication failure, user cannot login account.Although the mode of this identification authentication can ensure the uniqueness of password, cannot ensure to verify the adhesiveness according to user.Other people can obtain the password of user by deduction or technological means, such as infer that password is user's birthday, or steal user cipher etc. by stand-by program, checking is according to departing from user is actual in this case.
The device of the identification authentication that the present embodiment provides, can extract the characteristic of user, using characteristic as the foundation judging account number safety state and Authorized operation authority according to the operation behavior of user.Such as, the actual user of certain account usually in the afternoon 7 be a by IP address electronic equipment login account is played, if some day, website detected that this user is the electronic equipment login account of b at 10 in the morning by IP address, and the input password of more number of times, then website judges that this account exists by steal-number risk, therefore reduce the operating right of user, only allow user to browse, in case other people usurp user account revise its personal information.Due to the characteristic of user and the use habit of individual subscriber closely related, other people almost cannot imitate or steal, therefore using the characteristic of user as the foundation of identification authentication, the checking foundation problem that depart from actual in user in prior art can be avoided, real realization, to the identification authentication of user, can improve the fail safe of personal account thus conscientiously.
Secondly, the device of the identification authentication that the present embodiment provides, can also according to the weighted value of audit feedback result correction characteristic, avoid the non routine operation of user to be mistaken for the operating right of other people illegal operation and limited subscriber, accuracy and the practicality of right discriminating system can be improved further.
Finally, the device of the identification authentication that the present embodiment provides can also be that user distributes different operating rights according to different safe conditions, the valid operation scope of refinement and distinct user.Correctly then distributing full operation authority, Password Input mistake with Password Input in prior art does not then distribute compared with any operating right completely, can to user carry out authentication and authority are authorized more accurately, do not usurped on the basis of amendment by other people at guarantee user account, the impact of identification authentication on validated user is reduced to minimum.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required common hardware by software and realize, and can certainly pass through hardware, but in a lot of situation, the former is better execution mode.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in the storage medium that can read, as the floppy disk of computer, hard disk or CD etc., comprise some instructions and perform method described in each embodiment of the present invention in order to make a computer equipment (can be personal computer, server, or the network equipment etc.).
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection range of claim.
Claims (14)
1. a method for identification authentication, is characterized in that, comprising:
Obtain the characteristic of user;
The account number safety state of described user is analyzed according to described characteristic;
Search the operating right corresponding with described account number safety state;
Perform the operating right that described account number safety state is corresponding.
2. the method for identification authentication according to claim 1, is characterized in that, the step of the characteristic of described acquisition user, comprising:
Obtain the behavioural characteristic data of described user operation case and the history feature data of described account.
3. the method for identification authentication according to claim 2, is characterized in that, the step of the behavioural characteristic data of the described user operation case of described acquisition, comprising:
Obtain the various actions characteristic that the Action Events of described user on the network side page or local client produces, described behavioural characteristic data comprise following at least one characteristic:
User/device identification (ID), operating time, IP(Internet Protocol) (IP) address, website source or concrete operations behavior;
The step of the history feature data of the described account of described acquisition, comprising:
Obtain the history feature data of the described account usage frequency of reflection or user's validity, described history feature data comprise following at least one characteristic:
The attribute information of account grade, account relating business, history account number safety state, good friend's quantity or Information issued frequency/quantity.
4. the method for identification authentication according to claim 2, is characterized in that, the described step analyzing the account number safety state of described user according to described characteristic, comprising:
A default behavioural characteristic data model is chosen from the behavioural characteristic data model set preset;
Extract at least one behavioural characteristic data of corresponding described behavioural characteristic data model;
According to the first weighted value of described at least one behavioural characteristic data and each behavioural characteristic data corresponding, calculate the first sub-safe condition;
A default history feature data model is chosen from the history feature data model set preset;
Extract at least one history feature data of corresponding described history feature data model;
According to the second weighted value of described at least one history feature data and each history feature data corresponding, calculate the second sub-safe condition;
Described account number safety state is drawn according to described first sub-safe condition and described second sub-safe condition COMPREHENSIVE CALCULATING.
5. the method for identification authentication according to claim 1, is characterized in that, described in search the step of the operating right corresponding with described account number safety state, comprising:
According to described account number safety state and default mapping relations table, search the operating right of corresponding described account number safety state, wherein, described mapping relations table is for characterizing the corresponding relation between different account number safety state and different operation authority;
Described operating right comprises: authority, completely lack of competence, visitor's authority, permission operating right, Information issued authority or information amendment authority completely.
6. the method for identification authentication according to claim 1, is characterized in that, before the step of the characteristic of described acquisition user, described method comprises further:
Set up feature-based data model set, in described feature-based data model set, comprise multiple feature-based data model obtained according to the different permutation and combination results of Different quantitative specificity data;
For each characteristic in described feature-based data model presets weighted value.
7. the method for identification authentication according to claim 6, is characterized in that, described method comprises further:
Receive audit feedback result, described audit feedback result is for evaluating the accuracy of described account number safety state;
The kind of characteristic and/or the weighted value of characteristic in described feature-based data model is adjusted according to described audit feedback result.
8. a device for identification authentication, is characterized in that, comprising:
Data capture unit, for obtaining the characteristic of user;
State analysis unit, the described characteristic for obtaining according to described data capture unit analyzes the account number safety state of described user;
Authority searches unit, for searching operating right corresponding to the described account number safety state analyzed with described state analysis unit;
Authority performance element, searches operating right corresponding to described account number safety state that unit searches for performing described authority.
9. the device of identification authentication according to claim 8, is characterized in that, described data capture unit comprises: the first data acquisition subelement and the second data acquisition subelement;
Described first data acquisition subelement, for obtaining the behavioural characteristic data of described user operation case;
Described second data acquisition subelement, for obtaining the history feature data of described account.
10. the device of identification authentication according to claim 9, it is characterized in that, the various actions characteristic that described first data acquisition subelement produces for obtaining the Action Events of described user on the network side page or local client, described behavioural characteristic data comprise following at least one characteristic: user/device identification (ID), operating time, IP(Internet Protocol) (IP) address, website source or concrete operations behavior;
Described second data acquisition subelement is for obtaining the described account usage frequency of reflection or the history feature data of user's validity, and described history feature data comprise following at least one characteristic: the attribute information of account grade, account relating business, history account number safety state, good friend's quantity or Information issued frequency/quantity.
The device of 11. identification authentications according to claim 9, is characterized in that, described state analysis unit comprises: the first computation subunit, the second computation subunit and COMPREHENSIVE CALCULATING subelement;
Described first computation subunit, for choosing a default behavioural characteristic data model from the behavioural characteristic data model set preset, extract at least one behavioural characteristic data of corresponding described behavioural characteristic data model, according to the first weighted value of described at least one behavioural characteristic data and each behavioural characteristic data corresponding, calculate the first sub-safe condition;
Described second computation subunit, for choosing a default history feature data model from the history feature data model set preset, extract at least one history feature data of corresponding described history feature data model, according to the second weighted value of described at least one history feature data and each history feature data corresponding, calculate the second sub-safe condition;
Described COMPREHENSIVE CALCULATING subelement, draws described account number safety state for the described second sub-safe condition COMPREHENSIVE CALCULATING calculated according to described first sub-safe condition and described second computation subunit of described first computation subunit calculating.
The device of 12. identification authentications according to claim 8, it is characterized in that, described authority searches unit for according to described account number safety state and default mapping relations table, search the operating right of corresponding described account number safety state, wherein, described mapping relations table is for characterizing the corresponding relation between different account number safety state and different operation authority, and described operating right comprises: authority, completely lack of competence, visitor's authority, permission operating right, Information issued authority or information amendment authority completely.
The device of 13. identification authentications according to claim 8, is characterized in that, described device also comprises:
Unit set up by model, for before the characteristic of described data capture unit acquisition user, set up feature-based data model set, for each characteristic in described feature-based data model presets weighted value, in described feature-based data model set, comprise multiple feature-based data model obtained according to the different permutation and combination results of Different quantitative specificity data.
The device of 14. identification authentications according to claim 13, is characterized in that, described device also comprises:
Feedback reception unit, for receiving audit feedback result, described audit feedback result is for evaluating the accuracy of described account number safety state;
Model adjustment unit, adjusts the kind of characteristic and/or the weighted value of characteristic in described feature-based data model according to the described audit feedback result that described feedback reception unit receives.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310395457.2A CN104426884A (en) | 2013-09-03 | 2013-09-03 | Method for authenticating identity and device for authenticating identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310395457.2A CN104426884A (en) | 2013-09-03 | 2013-09-03 | Method for authenticating identity and device for authenticating identity |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104426884A true CN104426884A (en) | 2015-03-18 |
Family
ID=52974832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310395457.2A Pending CN104426884A (en) | 2013-09-03 | 2013-09-03 | Method for authenticating identity and device for authenticating identity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104426884A (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104917756A (en) * | 2015-05-08 | 2015-09-16 | 四川天上友嘉网络科技有限公司 | Login authentication method for network games |
CN105208409A (en) * | 2015-08-28 | 2015-12-30 | 北京奇艺世纪科技有限公司 | Information recommendation method and device |
CN105574401A (en) * | 2015-12-18 | 2016-05-11 | 北京奇虎科技有限公司 | Method and device for entering password in webpage |
CN106385421A (en) * | 2016-09-29 | 2017-02-08 | 广州鹤互联网科技有限公司 | Signing and approving initiating user management method and equipment |
CN106411897A (en) * | 2016-09-29 | 2017-02-15 | 广州鹤互联网科技有限公司 | Signing initiation user management method and equipment |
CN106570384A (en) * | 2015-10-08 | 2017-04-19 | 阿里巴巴集团控股有限公司 | Identity verification method and apparatus |
CN106686013A (en) * | 2017-03-10 | 2017-05-17 | 湖北天专科技有限公司 | Identity recognition device for unmanned aerial vehicle, recognition system and recognition method thereof |
CN107169499A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | A kind of Risk Identification Method and device |
CN107248995A (en) * | 2017-06-28 | 2017-10-13 | 北京五八信息技术有限公司 | Account verification method and device |
CN107347077A (en) * | 2017-08-30 | 2017-11-14 | 郑州云海信息技术有限公司 | A kind of Software security protection method and apparatus based on user right |
CN107622197A (en) * | 2016-07-15 | 2018-01-23 | 阿里巴巴集团控股有限公司 | Device identification method and device, weighing computation method and device for equipment identification |
CN107872436A (en) * | 2016-09-27 | 2018-04-03 | 阿里巴巴集团控股有限公司 | A kind of account recognition methods, apparatus and system |
CN107992744A (en) * | 2016-10-26 | 2018-05-04 | 珠海市魅族科技有限公司 | Log in the Risk Identification Method and device of behavior |
CN108009807A (en) * | 2017-10-17 | 2018-05-08 | 国家计算机网络与信息安全管理中心 | A kind of bit coin transaction identity method |
WO2018090839A1 (en) * | 2016-11-16 | 2018-05-24 | 阿里巴巴集团控股有限公司 | Identity verification system, method, device, and account verification method |
CN108989150A (en) * | 2018-07-19 | 2018-12-11 | 新华三信息安全技术有限公司 | A kind of login method for detecting abnormality and device |
CN109190342A (en) * | 2018-08-20 | 2019-01-11 | 济南大学 | The owner's auth method and community server of intelligence community |
CN109409097A (en) * | 2017-08-16 | 2019-03-01 | 中国石油天然气股份有限公司 | information management method, device and computer readable storage medium |
CN109933963A (en) * | 2019-03-21 | 2019-06-25 | 娄奥林 | One kind knowing method for distinguishing for user behavior track characteristic |
CN109993233A (en) * | 2016-06-13 | 2019-07-09 | 第四范式(北京)技术有限公司 | Based on machine learning come the method and system of prediction data audit target |
CN110210205A (en) * | 2019-04-19 | 2019-09-06 | 平安科技(深圳)有限公司 | Determination method, apparatus, computer equipment and the computer storage medium of logging state |
WO2020037919A1 (en) * | 2018-08-22 | 2020-02-27 | 平安科技(深圳)有限公司 | User behavior recognition method and device employing prediction model |
CN111339506A (en) * | 2020-02-21 | 2020-06-26 | 安徽斯跑特科技有限公司 | Customer management platform for sale of trusted operating system |
CN111404888A (en) * | 2020-03-04 | 2020-07-10 | 清华大学 | Network data auditing method and device |
CN112218146A (en) * | 2020-10-10 | 2021-01-12 | 百度(中国)有限公司 | Video content distribution method and device, server and medium |
CN115544500A (en) * | 2022-12-02 | 2022-12-30 | 智鲸科技(北京)有限公司 | User information security management method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1464402A (en) * | 2002-06-10 | 2003-12-31 | 联想(北京)有限公司 | User identification confirmation and operation conferring process |
CN102325062A (en) * | 2011-09-20 | 2012-01-18 | 北京神州绿盟信息安全科技股份有限公司 | Abnormal login detecting method and device |
CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
-
2013
- 2013-09-03 CN CN201310395457.2A patent/CN104426884A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1464402A (en) * | 2002-06-10 | 2003-12-31 | 联想(北京)有限公司 | User identification confirmation and operation conferring process |
CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
CN102325062A (en) * | 2011-09-20 | 2012-01-18 | 北京神州绿盟信息安全科技股份有限公司 | Abnormal login detecting method and device |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104917756A (en) * | 2015-05-08 | 2015-09-16 | 四川天上友嘉网络科技有限公司 | Login authentication method for network games |
CN105208409A (en) * | 2015-08-28 | 2015-12-30 | 北京奇艺世纪科技有限公司 | Information recommendation method and device |
CN105208409B (en) * | 2015-08-28 | 2019-05-31 | 北京奇艺世纪科技有限公司 | A kind of information recommendation method and device |
CN106570384A (en) * | 2015-10-08 | 2017-04-19 | 阿里巴巴集团控股有限公司 | Identity verification method and apparatus |
CN106570384B (en) * | 2015-10-08 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of identity verification method and device |
CN105574401A (en) * | 2015-12-18 | 2016-05-11 | 北京奇虎科技有限公司 | Method and device for entering password in webpage |
CN107169499A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | A kind of Risk Identification Method and device |
CN109993233A (en) * | 2016-06-13 | 2019-07-09 | 第四范式(北京)技术有限公司 | Based on machine learning come the method and system of prediction data audit target |
CN109993233B (en) * | 2016-06-13 | 2022-11-01 | 第四范式(北京)技术有限公司 | Method and system for predicting data auditing objective based on machine learning |
CN107622197A (en) * | 2016-07-15 | 2018-01-23 | 阿里巴巴集团控股有限公司 | Device identification method and device, weighing computation method and device for equipment identification |
CN107622197B (en) * | 2016-07-15 | 2020-12-11 | 阿里巴巴集团控股有限公司 | Equipment identification method and device, and weight calculation method and device for equipment identification |
CN107872436A (en) * | 2016-09-27 | 2018-04-03 | 阿里巴巴集团控股有限公司 | A kind of account recognition methods, apparatus and system |
CN107872436B (en) * | 2016-09-27 | 2020-11-24 | 阿里巴巴集团控股有限公司 | Account identification method, device and system |
CN106411897A (en) * | 2016-09-29 | 2017-02-15 | 广州鹤互联网科技有限公司 | Signing initiation user management method and equipment |
CN106385421A (en) * | 2016-09-29 | 2017-02-08 | 广州鹤互联网科技有限公司 | Signing and approving initiating user management method and equipment |
CN107992744A (en) * | 2016-10-26 | 2018-05-04 | 珠海市魅族科技有限公司 | Log in the Risk Identification Method and device of behavior |
WO2018090839A1 (en) * | 2016-11-16 | 2018-05-24 | 阿里巴巴集团控股有限公司 | Identity verification system, method, device, and account verification method |
CN108076018A (en) * | 2016-11-16 | 2018-05-25 | 阿里巴巴集团控股有限公司 | Identity authorization system, method, apparatus and account authentication method |
CN106686013A (en) * | 2017-03-10 | 2017-05-17 | 湖北天专科技有限公司 | Identity recognition device for unmanned aerial vehicle, recognition system and recognition method thereof |
CN107248995B (en) * | 2017-06-28 | 2021-06-01 | 北京五八信息技术有限公司 | Account verification method and device |
CN107248995A (en) * | 2017-06-28 | 2017-10-13 | 北京五八信息技术有限公司 | Account verification method and device |
CN109409097A (en) * | 2017-08-16 | 2019-03-01 | 中国石油天然气股份有限公司 | information management method, device and computer readable storage medium |
CN109409097B (en) * | 2017-08-16 | 2020-11-03 | 中国石油天然气股份有限公司 | Information management method, device and computer readable storage medium |
CN107347077A (en) * | 2017-08-30 | 2017-11-14 | 郑州云海信息技术有限公司 | A kind of Software security protection method and apparatus based on user right |
CN108009807A (en) * | 2017-10-17 | 2018-05-08 | 国家计算机网络与信息安全管理中心 | A kind of bit coin transaction identity method |
CN108989150B (en) * | 2018-07-19 | 2021-03-26 | 新华三信息安全技术有限公司 | Login abnormity detection method and device |
CN108989150A (en) * | 2018-07-19 | 2018-12-11 | 新华三信息安全技术有限公司 | A kind of login method for detecting abnormality and device |
CN109190342B (en) * | 2018-08-20 | 2020-10-23 | 济南大学 | Owner identity verification method of smart community and community server |
CN109190342A (en) * | 2018-08-20 | 2019-01-11 | 济南大学 | The owner's auth method and community server of intelligence community |
WO2020037919A1 (en) * | 2018-08-22 | 2020-02-27 | 平安科技(深圳)有限公司 | User behavior recognition method and device employing prediction model |
CN109933963A (en) * | 2019-03-21 | 2019-06-25 | 娄奥林 | One kind knowing method for distinguishing for user behavior track characteristic |
CN110210205A (en) * | 2019-04-19 | 2019-09-06 | 平安科技(深圳)有限公司 | Determination method, apparatus, computer equipment and the computer storage medium of logging state |
CN111339506A (en) * | 2020-02-21 | 2020-06-26 | 安徽斯跑特科技有限公司 | Customer management platform for sale of trusted operating system |
CN111404888A (en) * | 2020-03-04 | 2020-07-10 | 清华大学 | Network data auditing method and device |
CN112218146A (en) * | 2020-10-10 | 2021-01-12 | 百度(中国)有限公司 | Video content distribution method and device, server and medium |
CN112218146B (en) * | 2020-10-10 | 2023-02-24 | 百度(中国)有限公司 | Video content distribution method and device, server and medium |
CN115544500A (en) * | 2022-12-02 | 2022-12-30 | 智鲸科技(北京)有限公司 | User information security management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104426884A (en) | Method for authenticating identity and device for authenticating identity | |
US10771471B2 (en) | Method and system for user authentication | |
US10044730B1 (en) | Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system | |
EP2748781B1 (en) | Multi-factor identity fingerprinting with user behavior | |
US8880435B1 (en) | Detection and tracking of unauthorized computer access attempts | |
US8613059B2 (en) | Methods, systems and computer program products for secure access to information | |
CN103634317A (en) | Method and system of performing safety appraisal on malicious web site information on basis of cloud safety | |
US10484426B2 (en) | Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity | |
Altinkemer et al. | Cost and benefit analysis of authentication systems | |
US8683597B1 (en) | Risk-based authentication duration | |
CN104036780A (en) | Man-machine identification method and system | |
CN106470204A (en) | User identification method based on request behavior characteristicss, device, equipment and system | |
CN107451819A (en) | A kind of auth method and device based on user's operation behavior feature | |
US11533328B2 (en) | Systems and methods for analyzing vulnerabilities of networked systems | |
Bakar et al. | Adaptive authentication based on analysis of user behavior | |
Olanrewaju et al. | A frictionless and secure user authentication in web-based premium applications | |
CN105022939A (en) | Information verification method and device | |
WO2019046034A1 (en) | Method, computer program, and system to realize and guard over a secure input routine based on their behavior | |
CN107679865B (en) | Identity verification method and device based on touch area | |
Pons | Biometric marketing: targeting the online consumer | |
Zhu et al. | Realid: Building a secure anonymous yet transparent immutable id service | |
CN116452135A (en) | Distributed anonymous voting method, device, equipment and medium based on Ethernet | |
KR20200004666A (en) | Biometric information authentication system using machine learning and block chain and its method | |
CN118013489B (en) | User operation safety control method and system | |
CN107612921A (en) | A kind of auth method and device based on click location |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150318 |