TW201820194A - Identity verification system, method, device, and account verification method - Google Patents
Identity verification system, method, device, and account verification method Download PDFInfo
- Publication number
- TW201820194A TW201820194A TW106127337A TW106127337A TW201820194A TW 201820194 A TW201820194 A TW 201820194A TW 106127337 A TW106127337 A TW 106127337A TW 106127337 A TW106127337 A TW 106127337A TW 201820194 A TW201820194 A TW 201820194A
- Authority
- TW
- Taiwan
- Prior art keywords
- user
- information
- evaluation
- account
- user equipment
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
本發明係有關一種網際網路領域,具體而言,尤其是一種身分認證系統、方法、裝置及帳號認證方法。 The present invention relates to the field of the Internet, and in particular to an identity authentication system, method, device, and account authentication method.
目前,隨著科學技術不斷創新,開展個人網上業務(例如:在購物平臺網站上開設個人網店)的身分認證過程也發生了日新月異的變化。從最初的身分認證,為確保“人證合一”,提出了個人使用者手持證件照的認證方式;後來,逐步升級為要求個人使用者上傳/提交指定的動態手勢圖像;現如今,在實人認證方式加入到大資料風險管理模式後,為身分認證的技術手段的豐富多樣化提供了拓展可能性。 At present, with the continuous innovation of science and technology, the identity authentication process of conducting personal online business (for example, opening a personal online store on a shopping platform website) has also undergone rapid changes. From the initial identity authentication, in order to ensure the "unification of witnesses", an authentication method for individual users holding ID photos was proposed; later, it was gradually upgraded to require individual users to upload / submit specified dynamic gesture images; now, in the After the real person authentication method is added to the big data risk management mode, it provides expanded possibilities for the rich and diverse technical means of identity authentication.
然而,相關技術中所採用的主流身分認證方式通常僅能夠實現在認證階段開展基於使用者姓名,使用者個人身分證件以及使用者面部圖像等多項資訊對使用者身分進行核實。然而,卻無法長期對使用者身分的真實性進行實時監控,由此造成安全可靠性較低。 However, the mainstream identity authentication methods used in related technologies can usually only implement verification of the user's identity based on the user's name, the user's personal identity document, and the user's face image during the authentication phase. However, it is impossible to perform real-time monitoring of the authenticity of the user's identity for a long time, which results in lower security and reliability.
針對上述的問題,目前尚未提出有效的解決方案。 In view of the above problems, no effective solution has been proposed.
本發明實施例提供了一種身分認證系統、方法、裝置及帳號認證方法,以至少解決相關技術中所採用的身分認證方式較為單一,難以防止偽造、變造虛假身分資訊的技術問題。 Embodiments of the present invention provide an identity authentication system, method, device, and account authentication method to solve at least a single identity authentication method used in related technologies, and it is difficult to prevent technical problems of forging and altering false identity information.
根據本發明實施例的一個方面,提供了一種身分認證系統,包括:使用者設備和認證伺服器;使用者設備,用於運行應用程式,並請求認證伺服器對應用程式對應的使用者帳戶進行認證狀態檢測;認證伺服器,用於在確定使用者帳戶為待認證帳戶後,採用獲取到的使用者帳戶的歷史關聯資料進行評估,得到評估結果,並根據評估結果確定對應的身分認證方式,進行身分認證,其中,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊。 According to an aspect of an embodiment of the present invention, an identity authentication system is provided, including: a user device and an authentication server; the user device is configured to run an application program, and requests the authentication server to perform a user account corresponding to the application program. Authentication status detection; authentication server, used to determine the user account as the account to be authenticated, using the acquired historical account data for evaluation, to obtain the evaluation result, and determine the corresponding identity authentication method based on the evaluation result, Perform identity authentication, where historical association data is information associated with user accounts obtained within a preset business cycle.
可選地,上述歷史關聯資料包括以下至少之一:使用者設備資訊、使用者身分資訊、使用者網路行為資訊、使用者業務資訊。 Optionally, the historical association data includes at least one of the following: user equipment information, user identity information, user network behavior information, and user business information.
可選地,認證伺服器,還用於向使用者設備下發授權認證資訊。 Optionally, the authentication server is further configured to issue authorization authentication information to the user equipment.
可選地,認證伺服器,還用於對歷史關聯資料進行分析,構建評估模型,並統計評估模型中每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the authentication server is further configured to analyze historical related data, construct an evaluation model, and statistically evaluate the level or score corresponding to each characteristic index in the evaluation model to obtain an evaluation result.
可選地,使用者設備資訊至少包括:使用者設備使用的網際網路協議IP地址資訊,使用者設備所使用的操作系 統類型,使用者設備的使用記錄,認證伺服器,還用於根據使用者設備資訊構建評估模型,並統計評估模型中每個特徵指標對應的等級或評分,得到評估結果,其中,評估模型中的特徵指標包括:根據IP地址資訊確定使用者設備是否執行過違法操作、根據使用者設備所使用的操作系統類型確定使用者設備所使用的操作系統是否存在安全漏洞、根據使用者設備的使用記錄確定使用者設備是否安裝過高危應用。 Optionally, the user equipment information includes at least: Internet Protocol IP address information used by the user equipment, the type of operating system used by the user equipment, the use record of the user equipment, the authentication server, and further The user equipment information builds an evaluation model, and statistically evaluates the level or score corresponding to each characteristic index in the evaluation model to obtain the evaluation result. The characteristic indicators in the evaluation model include: determining whether the user device has performed illegal operations according to the IP address information, Determine whether the operating system used by the user equipment has a security vulnerability according to the type of operating system used by the user equipment, and determine whether the user equipment has installed a high-risk application according to the use record of the user equipment.
可選地,預設業務週期包括:第一評估週期和第二評估週期,認證伺服器,還用於對歷史關聯資料在第一評估週期與第二評估週期的變化趨勢進行分析,得到評估結果。 Optionally, the preset business cycle includes: a first evaluation cycle and a second evaluation cycle, and the authentication server is further configured to analyze a change trend of historical related data between the first evaluation cycle and the second evaluation cycle to obtain an evaluation result. .
可選地,認證伺服器,還用於根據評估結果確定待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊,並按照待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊進行身分認證。 Optionally, the authentication server is further configured to determine the verification steps to be performed and the identity authentication related information to be collected in each verification step according to the evaluation results, and according to the verification steps to be performed and the information to be collected in each verification step. Identity authentication related information for identity authentication.
根據本發明實施例的另一方面,還提供了一種身分認證方法,用於選擇身分認證方式,包括: 獲取與應用程式對應的使用者帳戶的歷史關聯資料,其中,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊;採用歷史關聯資料進行評估,得到評估結果;根據評估結果確定對應的身分認證方式,進行身分認證。 According to another aspect of the embodiments of the present invention, there is also provided an identity authentication method for selecting an identity authentication method, including: obtaining historical association data of a user account corresponding to an application, wherein the historical association data is preset Information associated with the user account obtained during the business cycle; evaluation using historical correlation data to obtain an evaluation result; determining the corresponding identity authentication method based on the evaluation result, and performing identity authentication.
可選地,歷史關聯資料包括以下至少之一:使用者設 備資訊、使用者身分資訊、使用者網路行為資訊、使用者業務資訊。 Optionally, the historical association data includes at least one of the following: user equipment information, user identity information, user network behavior information, and user business information.
可選地,在獲取歷史關聯資料之前,還包括:接收來自於使用者設備的第一請求訊息,其中,使用者設備用於運行應用程式;根據第一請求訊息使用者帳戶進行認證狀態檢測,並向使用者設備返回第一響應訊息,其中,第一響應訊息用於確認使用者帳戶為待認證帳戶。 Optionally, before obtaining the historical association data, the method further includes: receiving a first request message from the user equipment, wherein the user equipment is used to run an application program; and performing authentication status detection according to the user account of the first request message, A first response message is returned to the user equipment, where the first response message is used to confirm that the user account is an account to be authenticated.
可選地,在向使用者設備返回第一響應訊息之後,還包括:接收來自於使用者設備的第二請求訊息;根據第二請求訊息確定待下發的授權認證資訊;向使用者設備返回第二響應訊息,其中,第二響應訊息中攜帶有授權認證資訊。 Optionally, after returning the first response message to the user equipment, the method further includes: receiving a second request message from the user equipment; determining authorization authentication information to be issued according to the second request message; and returning to the user equipment The second response message, wherein the second response message carries authorization authentication information.
可選地,採用歷史關聯資料進行評估,得到評估結果包括:對歷史關聯資料進行分析,構建評估模型,其中,評估模型包括:與歷史關聯資料中每個特徵指標對應的等級或評分;統計評估模型中每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the historical correlation data is used for evaluation, and the obtained evaluation results include: analyzing the historical correlation data to construct an evaluation model, wherein the evaluation model includes: a level or score corresponding to each characteristic index in the historical correlation data; statistical evaluation The grade or score corresponding to each characteristic index in the model is used to obtain the evaluation result.
可選地,使用者設備資訊至少包括以下特徵指標:使用者設備使用的網際網路協議IP地址資訊,使用者設備所使用的操作系統類型,使用者設備的使用記錄;對歷史關聯資料進行分析,構建評估模型包括:獲取使用者設備資訊中所包含的IP地址資訊,操作系統類型,使用記錄,並構建評估模型;統計評估模型中每個特徵指標對應的等級或評分,得到評估結果包括:根據IP地址資訊確定使用者 設備是否執行過違法操作並統計對應的等級或評分,根據使用者設備所使用的操作系統類型確定使用者設備所使用的操作系統是否存在安全漏洞並統計對應的等級或評分,以及根據使用者設備的使用記錄確定使用者設備是否安裝過高危應用並統計對應的等級或評分;通過統計每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the user equipment information includes at least the following characteristic indicators: the Internet Protocol IP address information used by the user equipment, the type of operating system used by the user equipment, the use history of the user equipment, and analysis of historical association data The construction of the evaluation model includes: obtaining the IP address information, operating system type, usage records, and construction evaluation model included in the user equipment information; the statistical evaluation model corresponds to the level or score of each characteristic index, and the evaluation results include: According to the IP address information, determine whether the user equipment has performed illegal operations and count the corresponding rating or rating. According to the type of operating system used by the user device, determine whether the operating system used by the user device has a security vulnerability and count the corresponding level or Rating, and determining whether the user equipment has installed a high-risk application and counting the corresponding grade or rating according to the use record of the user equipment; the evaluation result is obtained by counting the grade or rating corresponding to each characteristic index.
可選地,將IP地址資訊,操作系統類型,使用記錄作為輸入資訊,通過採用隨機森林算法構建評估模型。 Optionally, the IP address information, the operating system type, and the record are used as input information to construct an evaluation model by using a random forest algorithm.
可選地,預設業務週期包括:第一評估週期和第二評估週期,採用歷史關聯資料進行評估,得到評估結果包括:獲取歷史關聯資料在第一評估週期與第二評估週期的變化趨勢;對變化趨勢進行分析,得到評估結果。 Optionally, the preset business cycle includes: a first evaluation cycle and a second evaluation cycle, and the evaluation is performed by using historical related data, and obtaining an evaluation result includes: obtaining a change trend of historical related data between the first evaluation cycle and the second evaluation cycle; Analyze the change trend and get the evaluation results.
可選地,根據評估結果確定身分認證方式,進行身分認證包括:根據評估結果確定待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊;按照待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊進行身分認證。 Optionally, determining the identity authentication mode according to the evaluation result, performing identity authentication includes: determining the verification steps to be performed and the identity authentication related information to be collected in each verification step according to the evaluation results; according to the verification steps to be performed and each verification The identity authentication related information to be collected in the step performs identity authentication.
根據本發明實施例的又一方面,還提供了另一種身分認證方法,用於選擇身分認證方式,包括: 運行應用程式;觸發認證伺服器對應用程式對應的使用者帳戶進行認證狀態檢測,其中,認證狀態檢測用於採用獲取到的使用者帳戶的歷史關聯資料進行評估以得到評估結果,並根據評估結果確定對應的身分認證方式,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯 的資訊。 According to yet another aspect of the embodiments of the present invention, another identity authentication method is provided for selecting an identity authentication method, including: running an application program; triggering an authentication server to perform authentication status detection on a user account corresponding to the application program, wherein The authentication status detection is used to evaluate the obtained historical association data of the user account to obtain an evaluation result, and determine the corresponding identity authentication method according to the evaluation result. The historical association data is obtained and used in a preset business cycle. Information associated with their account.
根據本發明實施例的再一方面,還提供了一種帳號認證方法,用於判斷帳號操作者是否改變,包括:獲取待認證帳戶的第一期間關聯資料和第二期間關聯資料,其中,第一期間關聯資料是在第一時間週期內與待認證帳戶關聯的資料,第二期間關聯資料是在第二時間週期內與待認證帳戶關聯的資料,並且第一時間週期與第二時間週期不完全相同;對第一期間關聯資料和第二期間關聯資料進行相似度計算,得到相似度結果;根據相似度結果判斷待認證帳戶的操作者是否改變。 According to still another aspect of the embodiments of the present invention, there is also provided an account authentication method for determining whether an account operator has changed, including: obtaining first period association data and second period association data of an account to be authenticated, where the first Period-related data is data associated with the account to be authenticated in the first time period, and second-period related data is data associated with the account to be authenticated in the second time period, and the first time period and the second time period are incomplete It is the same; similarity calculation is performed on the related data of the first period and the related data of the second period to obtain a similarity result; and whether the operator of the account to be authenticated is changed according to the similarity result.
可選地,在第一時間週期內與待認證帳戶關聯的資料,為第一操作資訊集合;在第二時間週期內與待認證帳戶關聯的資料,為第二操作資訊集合;對第一期間關聯資料和第二期間關聯資料進行相似度計算包括:計算第一操作資訊集合和第二操作資訊集合的差集;根據相似度結果判斷待認證帳戶的操作者是否改變包括:如果差集超過預定閾值,則確定待認證帳戶的操作者發生改變。 Optionally, the data associated with the account to be authenticated in the first time period is the first set of operational information; the data associated with the account to be authenticated in the second time period is the second set of operational information; for the first period The similarity calculation of the related data and the related data in the second period includes: calculating the difference between the first operation information set and the second operation information set; judging whether the operator of the account to be authenticated changes according to the similarity result includes: if the difference set exceeds a predetermined The threshold determines that the operator of the account to be authenticated has changed.
可選地,在第一時間週期內與待認證帳戶關聯的資料,為第一設備資訊集合;在第二時間週期內與待認證帳戶關聯的資料,為第二設備資訊集合;對第一期間關聯資料和第二期間關聯資料進行相似度計算包括:計算第一設備資訊集合和第二設備資訊集合的差集;根據相似度結果判斷待認證帳戶的操作者是否改變包括:如果差集超過預定閾值,則確定待認證帳戶的操作者發生改變。 Optionally, the data associated with the account to be authenticated in the first time period is the first device information set; the data associated with the account to be authenticated in the second time period is the second device information set; The calculation of the similarity between the related data and the related data in the second period includes: calculating the difference between the first device information set and the second device information set; determining whether the operator of the account to be authenticated has changed based on the similarity result includes: if the difference set exceeds a predetermined The threshold determines that the operator of the account to be authenticated has changed.
根據本發明實施例的再一方面,還提供了一種身分認證裝置,用於選擇身分認證方式,包括:獲取模組,用於獲取與應用程式對應的使用者帳戶的歷史關聯資料,其中,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊;評估模組,用於採用歷史關聯資料進行評估,得到評估結果;認證模組,用於根據評估結果確定對應的身分認證方式,進行身分認證。 According to still another aspect of the embodiments of the present invention, an identity authentication device is further provided for selecting an identity authentication method, including: an obtaining module for obtaining historical association data of a user account corresponding to an application, wherein the history Relevant data is information associated with user accounts obtained in a preset business cycle; an evaluation module is used to evaluate historical historical data to obtain an evaluation result; an authentication module is used to determine the corresponding identity based on the evaluation result Authentication method for identity authentication.
根據本發明實施例的再一方面,還提供了另一種身分認證裝置,用於選擇身分認證方式,包括:運行模組,用於運行應用程式;觸發模組,用於觸發認證伺服器對應用程式對應的使用者帳戶進行認證狀態檢測,其中,認證狀態檢測用於採用獲取到的使用者帳戶的歷史關聯資料進行評估以得到評估結果,並根據評估結果確定對應的身分認證方式,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊。 According to still another aspect of the embodiments of the present invention, another identity authentication device is provided for selecting an identity authentication method, including: an operation module for running an application program; and a trigger module for triggering an authentication server to apply to the application. The user account corresponding to the program performs authentication status detection. The authentication status detection is used to evaluate the obtained historical association data of the user account to obtain an evaluation result, and determine the corresponding identity authentication method and historical association data based on the evaluation result. Is information associated with a user ’s account obtained within a preset business cycle.
在本發明實施例中,採用獲取與應用程式對應的使用者帳戶的歷史關聯資料(即,在預設業務週期內獲取到的與使用者帳戶關聯的資訊);採用歷史關聯資料進行評估,得到評估結果的方式,通過評估結果確定對應的身分認證方式,進而執行身分認證流程,達到了通過對使用者帳戶積累的歷史關聯資料進行分別識別使用者帳戶是否存在風險的目的,從而實現了長期實時監控使用者身分的真實性與可靠性,提升身分認證安全等級的技術效果,進而解決了相關技術中所採用的身分認證方式較為單一,難以 防止偽造、變造虛假身分資訊的技術問題。另外,對於帳號交易導致的帳號操作者改變,通過不同週期內的帳戶關聯資訊及/或相關操作記錄之間相似度的匹配,也能提供客觀的操作依據。 In the embodiment of the present invention, historical association data of the user account corresponding to the application program (that is, information associated with the user account obtained in a preset business cycle) is adopted; evaluation is performed by using the historical association data to obtain The method of evaluating results, determining the corresponding identity authentication method through the evaluation results, and then performing the identity authentication process, achieving the purpose of separately identifying whether the user account is at risk through historical association data accumulated by the user account, thereby realizing long-term real-time It monitors the authenticity and reliability of the user's identity and improves the technical effect of the identity authentication security level, thereby solving the technical problem that the identity authentication method used in the related technology is relatively single and it is difficult to prevent forgery and alteration of false identity information. In addition, for account operator changes caused by account transactions, the similarity between account-related information and / or related operation records in different periods can also provide an objective operating basis.
10‧‧‧使用者設備 10‧‧‧User Equipment
20‧‧‧認證伺服器 20‧‧‧ authentication server
S32‧‧‧步驟 S32‧‧‧step
S34‧‧‧步驟 S34‧‧‧step
S36‧‧‧步驟 S36‧‧‧step
S42‧‧‧步驟 S42‧‧‧step
S44‧‧‧步驟 S44‧‧‧step
S52‧‧‧步驟 S52‧‧‧step
S54‧‧‧步驟 S54‧‧‧step
S56‧‧‧步驟 S56‧‧‧step
10‧‧‧獲取模組 10‧‧‧Get Module
20‧‧‧評估模組 20‧‧‧ Evaluation Module
30‧‧‧認證模組 30‧‧‧Certified Module
40‧‧‧第一接收模組 40‧‧‧First receiving module
50‧‧‧第一響應模組 50‧‧‧First Response Module
60‧‧‧第二接收模組 60‧‧‧Second receiving module
70‧‧‧第二響應模組 70‧‧‧Second Response Module
80‧‧‧運行模組 80‧‧‧operation module
90‧‧‧觸發模組 90‧‧‧Trigger Module
此處所說明的圖式用來提供對本發明的進一步理解,構成本申請的一部分,本發明的示意性實施例及其說明用於解釋本發明,並不構成對本發明的不當限定。在圖式中:圖1是根據本發明實施例的身分認證系統的硬體結構方塊圖;圖2是根據本發明較佳實施例的觸發認證流程的應用介面操作示意圖;圖3是根據本發明實施例的身分認證方法的流程圖;圖4是根據本發明實施例的另一種身分認證方法的流程圖;圖5是根據本發明實施例的帳號認證方法的流程圖;圖6是根據本發明實施例的身分認證裝置的結構方塊圖;圖7是根據本發明較佳實施例的身分認證裝置的結構方塊圖;圖8是根據本發明實施例的另一種身分認證裝置的結構方塊圖。 The drawings described herein are used to provide a further understanding of the present invention and constitute a part of the present application. The schematic embodiments of the present invention and the descriptions thereof are used to explain the present invention, and do not constitute an improper limitation on the present invention. In the drawings: FIG. 1 is a block diagram of a hardware structure of an identity authentication system according to an embodiment of the present invention; FIG. 2 is a schematic diagram of an application interface operation triggering an authentication process according to a preferred embodiment of the present invention; FIG. 3 is a diagram according to the present invention A flowchart of an identity authentication method according to an embodiment; FIG. 4 is a flowchart of another identity authentication method according to an embodiment of the present invention; FIG. 5 is a flowchart of an account authentication method according to an embodiment of the present invention; FIG. 6 is according to the present invention FIG. 7 is a structural block diagram of an identity authentication device according to a preferred embodiment of the present invention; FIG. 8 is a structural block diagram of another identity authentication device according to an embodiment of the present invention.
為了使所屬技術領域中具有通常知識者更好地理解本發明方案,下面將結合本發明實施例中的圖式,對本發明實施例中的技術方案進行清楚、完整地描述,顯然,所描述的實施例僅僅是本發明一部分的實施例,而不是全部的實施例。基於本發明中的實施例,所屬技術領域中具有通常知識者在沒有做出進步性勞動前提下所獲得的所有其他實施例,都應當屬於本發明保護的範圍。 In order to enable those with ordinary knowledge in the technical field to better understand the solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described in combination with the drawings in the embodiment of the present invention. Obviously, the described The examples are only examples of a part of the present invention, but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those with ordinary knowledge in the technical field without making progressive labor should belong to the scope of protection of the present invention.
需要說明的是,本發明的說明書和請求項申請專利範圍及上述圖式中的術語“第一”、“第二”等是用於區別類似的對象,而不必用於描述特定的順序或先後次序。應該理解這樣使用的資料在適當情況下可以互換,以便這裡描述的本發明的實施例能夠以除了在這裡圖示或描述的那些以外的順序實施。此外,術語“包括”和“具有”以及他們的任何變形,意圖在於覆蓋不排他的包含,例如,包含了一系列步驟或單元的過程、方法、系統、產品或設備不必限於清楚地列出的那些步驟或單元,而是可包括沒有清楚地列出的或對於這些過程、方法、產品或設備固有的其它步驟或單元。 It should be noted that the scope of the specification and claims of the present invention for patent application and the terms "first" and "second" in the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. order. It should be understood that the materials used as such are interchangeable under appropriate circumstances so that the embodiments of the invention described herein can be implemented in an order other than those illustrated or described herein. Furthermore, the terms "including" and "having" and any of their variations are intended to cover non-exclusive inclusions, for example, a process, method, system, product, or device that includes a series of steps or units need not be limited to those explicitly listed Those steps or units may instead include other steps or units not explicitly listed or inherent to these processes, methods, products or equipment.
首先,在對本申請實施例進行描述的過程中出現的部分名詞或術語適用於如下解釋: First, some terms or terms appearing during the description of the embodiments of the present application are applicable to the following explanations:
(1)智慧終端應用(APP):安裝於智慧終端,對智慧終端本身功能進行擴展,用於實現使用者個性化業務 需求的客戶端,例如:網上購物類APP、網上支付類APP、二手貨買賣APP。 (1) Smart terminal application (APP): a client installed on a smart terminal to extend the functions of the smart terminal itself to achieve the user's personalized business needs, such as: online shopping apps, online payment apps, Used goods trading app.
(2)使用者帳戶:為了使用應用程式提供的完整性功能服務,通過在註冊頁面填寫使用者個人資訊,產生的獨立資訊儲存區域。 (2) User account: In order to use the integrity function service provided by the application, an independent information storage area is generated by filling in the user's personal information on the registration page.
(3)歷史關聯資料:在預設業務週期內所能夠獲取到的與該使用者帳戶關聯的資訊,其中,預設業務週期既可以從使用者帳戶註冊成功開始至觸發認證流程時刻截止,也可以是使用者帳戶註冊成功後的特定時間段;與該使用者帳戶關聯的資訊可以包括但不限於以下至少之一:使用者身分資訊、使用者網路行為資訊、使用者所使用的使用者設備資訊、使用者業務資訊,其中,使用者身分資訊可以包括但不限於以下至少之一:使用者為使用特定應用程式提供的功能而註冊的使用者帳號、使用者在註冊時所提供的身分證件中呈現的資訊、使用者的聯繫方式、使用者的家庭住址及/或工作單位住址;使用者設備資訊可以包括但不限於以下至少之一:使用者設備所使用的操作系統、使用者設備的機型、使用者設備的國際移動使用者識別碼(IMSI)/國際移動設備識別碼(IMEI)、使用者設備所使用的網際網路協議(IP)地址及/或媒體接入控制(MAC)地址;使用者網路行為資訊可以包括但不限於以下至少之一:當前認證操作行為、在執行身分認證之前與使用者帳戶關聯的過往行為(例如:購物記錄體現的購物行為);使用者業務資訊可以包括但不限於以下至少之 一:購物記錄、使用者操作軌跡。 (3) Historically associated data: information associated with the user account that can be obtained within a preset business cycle, where the preset business cycle can be from the time when the user account is successfully registered to the time when the authentication process is triggered, or It can be a specific time period after the user account is successfully registered; the information associated with the user account can include, but is not limited to, at least one of the following: user identity information, user network behavior information, user used by the user Device information and user business information, where user identity information can include but is not limited to at least one of the following: a user account registered by a user to use a function provided by a specific application, and an identity provided by the user during registration The information presented in the certificate, the user's contact information, the user's home address and / or work address; the user device information can include but is not limited to at least one of the following: the operating system used by the user device, the user device Model, user equipment International Mobile Subscriber Identity (IMSI) / International Mobile Equipment Identity (IMEI), Internet Protocol (IP) address and / or Media Access Control (MAC) address used by user equipment; user network behavior information may include but is not limited to at least one of the following: current authentication operation behavior 2. The past behaviors associated with the user account before performing identity authentication (for example: shopping behavior reflected in shopping records); user business information may include, but is not limited to, at least one of the following: shopping records, user operation trajectories.
圖1是根據本發明實施例的身分認證系統的硬體結構方塊圖,如圖1所示,使用者設備10可以經由資料網路連接或電子連接到一個或多個認證伺服器20。一種可選實施例中,上述使用者設備10可以是個人電腦(PC)、智慧手機、平板電腦。資料網路連接可以是區域網路連接、廣域網路連接、因特網連接,或其他類型的資料網路連接。使用者設備10可以執行以連接到由一個伺服器或一組伺服器執行的網路服務。網路伺服器是基於網路的使用者服務,諸如社交網路、雲資源、電子郵件、線上支付或其他線上應用。 FIG. 1 is a block diagram of a hardware structure of an identity authentication system according to an embodiment of the present invention. As shown in FIG. 1, the user equipment 10 may be connected to one or more authentication servers 20 via a data network connection or electronically. In an optional embodiment, the user equipment 10 may be a personal computer (PC), a smart phone, or a tablet computer. The data network connection can be a local area network connection, a wide area network connection, an Internet connection, or another type of data network connection. The user equipment 10 may execute to connect to a network service performed by a server or a group of servers. Web servers are web-based user services such as social networks, cloud resources, email, online payments or other online applications.
在本實施例中,使用者設備10,用於運行應用程式,並請求認證伺服器對應用程式對應的使用者帳戶進行認證狀態檢測;認證伺服器20,用於在確定使用者帳戶為待認證帳戶後,採用獲取到的使用者帳戶的歷史關聯資料進行評估,得到評估結果,並根據評估結果確定對應的身分認證方式,進行身分認證,其中,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊。 In this embodiment, the user device 10 is configured to run an application and requests an authentication server to perform authentication status detection on a user account corresponding to the application; the authentication server 20 is configured to determine that the user account is pending authentication After the account is used, the obtained historical association data of the user account is used for evaluation, and the evaluation result is obtained, and the corresponding identity authentication method is determined according to the evaluation result to perform identity authentication. Among them, the historical association data is obtained within a preset business cycle. Information associated with a user account.
圖2是根據本發明較佳實施例的觸發認證流程的應用介面操作示意圖。如圖2所示,使用者如果需要在網上執行二手貨交易,則使用者設備上安裝的應用程式(例如:使用者二手貨買賣)在運行後,使用者可以登入預先註冊 的使用者帳號。使用者設備需要檢測該使用者帳號是否開通過網上店鋪帳號,如果尚未開通,則需要觸發使用者設備對使用者認證狀態進行檢查。而使用者設備則會調用實人認證伺服器(即上述認證伺服器20)來判斷當前的使用者認證狀態,進而確定是否需要對該使用者執行認證流程,其中,實人認證伺服器的判斷依據可以包括但不限於以下至少之一:使用者身分資訊(例如:使用者姓名、使用者的身分證號)、使用者設備所使用的操作系統(例如:android系統、iOS系統)、使用者設備自身的性能(例如:硬體配置、是否執行過越獄操作)。 FIG. 2 is a schematic diagram of an application interface operation that triggers an authentication process according to a preferred embodiment of the present invention. As shown in Figure 2, if the user needs to perform second-hand goods transactions online, after the application installed on the user's device (for example, the user's second-hand goods sale) runs, the user can log in to a pre-registered user account . The user device needs to detect whether the user account is opened through an online store account. If the user device is not opened, the user device needs to be triggered to check the user authentication status. The user equipment will call a real-person authentication server (ie, the above-mentioned authentication server 20) to determine the current user authentication status, and then determine whether the authentication process needs to be performed on the user. Among them, the real-person authentication server judges The basis may include, but is not limited to, at least one of the following: user identity information (for example: user name, user ID card number), operating system used by the user device (for example: android system, iOS system), user The performance of the device itself (for example: hardware configuration, whether jailbreak operation has been performed).
可選地,認證伺服器20,還用於向使用者設備下發授權認證資訊。 Optionally, the authentication server 20 is further configured to issue authorization authentication information to the user equipment.
如果實人認證伺服器確定需要對該使用者執行認證流程,則使用者設備需要向實人認證伺服器請求下發授權認證資訊,例如:符記(Token),並獲取實人認證伺服器返回的授權認證資訊,其中,上述授權認證資訊用於認證權限校驗,產生認證任務以及在不同認證執行主體之間傳遞。 If the real person authentication server determines that the authentication process needs to be performed on the user, the user device needs to request the real person authentication server to issue authorization authentication information, such as a token, and obtain the real person authentication server to return Authorized authentication information, wherein the above-mentioned authorized authentication information is used for authentication authority verification, generating authentication tasks, and passing between different authentication execution subjects.
以Token為例,其格式可以包括以下三個部分:(1)header,用於表示該Token的類型;(2)claims set,用於表示儲存的資料,其可以包括:使用者授權資訊;(3)signature,用於驗證Token的真偽。 Taking a token as an example, its format can include the following three parts: (1) header, which indicates the type of the token; (2) claims set, which indicates the stored data, which can include: user authorization information; ( 3) signature, used to verify the authenticity of the Token.
可選地,認證伺服器20,還用於對歷史關聯資料進行 分析,構建評估模型,並統計評估模型中每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the authentication server 20 is further configured to analyze historical related data, construct an evaluation model, and statistically evaluate the level or score corresponding to each characteristic index in the evaluation model to obtain an evaluation result.
使用者設備在獲取到實人認證伺服器頒發的Token之後,向實人認證伺服器請求開始身分認證流程。實人認證伺服器根據使用者使用的應用程式的業務類型為該使用者選取對應的認證通道。在利用選取的認證通道進行身分認證過程中,實人認證伺服器可以獲取使用者通過使用者設備上傳過的使用者身分資訊、使用者執行過的網路行為資訊、使用者所使用的使用者設備資訊、曾經採集過的使用者生物特徵資訊等歷史關聯資料建立評估模型進行綜合判斷,以確定使用者的風險程度,並為不同風險程度的使用者提供差異化認證方式,其中,使用者身分資訊可以包括但不限於以下至少之一:使用者為使用特定應用程式提供的功能而註冊的使用者帳號、使用者在註冊時所提供的身分證件中呈現的資訊、使用者的聯繫方式、使用者的家庭住址及/或工作單位住址;使用者設備資訊可以包括但不限於以下至少之一:使用者設備所使用的操作系統、使用者設備的機型、使用者設備的國際移動使用者識別碼(IMSI)/國際移動設備識別碼(IMEI)、使用者設備所使用的網際網路協議(IP)地址及/或媒體接入控制(MAC)地址;使用者網路行為資訊可以包括但不限於以下至少之一:當前認證操作行為、在執行身分認證之前與使用者帳戶關聯的過往行為(例如:購物記錄);生物特徵資訊可以包括但不限於以下至少之一:聲紋、指紋、眼 紋、虹膜、靜態使用者圖像、動態活體檢測使用者圖像。 After obtaining the token issued by the real person authentication server, the user equipment requests the real person authentication server to start the identity authentication process. The real person authentication server selects a corresponding authentication channel for the user according to the business type of the application used by the user. During the identity authentication process using the selected authentication channel, the real person authentication server can obtain user identity information uploaded by the user through the user device, information about the network behavior performed by the user, and the user used by the user Establish an evaluation model for historical correlation data such as device information, user biometric information that has been collected, and make comprehensive judgments to determine the risk level of users and provide differentiated authentication methods for users with different levels of risk. Among them, user identity The information may include, but is not limited to, at least one of the following: user account registered by the user to use the functions provided by the specific application, information presented in the identity document provided by the user during registration, user contact information, use The home address and / or work address of the user; the user equipment information may include but is not limited to at least one of the following: the operating system used by the user equipment, the model of the user equipment, and the international mobile user identification of the user equipment Code (IMSI) / International Mobile Equipment Identity (IMEI), User Equipment Institute Used Internet Protocol (IP) address and / or media access control (MAC) address; user network behavior information may include, but is not limited to, at least one of the following: current authentication operation behavior, before and during identity authentication Past behaviors (such as shopping records) associated with the user ’s account; biometric information may include, but is not limited to, at least one of the following: voiceprint, fingerprint, eye pattern, iris, static user image, dynamic living detection user image.
活體檢測通過要求使用者在特定場景下指示使用者完成一個或多個指定動作,例如:指示使用者搖頭、指示使用者點頭、指示使用者說一句話,其目的在於:判定當前接受身分認證的使用者為真實的活人而並非是一張照片。 Biometric detection requires users to instruct users to complete one or more specified actions in specific scenarios, such as: instructing users to shake their heads, instructing users to nod, and instruct users to say a word. The user is a real living person and not a photo.
可選地,使用者設備資訊至少包括:使用者設備使用的網際網路協議IP地址資訊,使用者設備所使用的操作系統類型,使用者設備的使用記錄,認證伺服器,還用於根據使用者設備資訊構建評估模型,並統計評估模型中每個特徵指標對應的等級或評分,得到評估結果,其中,評估模型中的特徵指標包括:根據IP地址資訊確定使用者設備是否執行過違法操作、根據使用者設備所使用的操作系統類型確定使用者設備所使用的操作系統是否存在安全漏洞、根據使用者設備的使用記錄確定使用者設備是否安裝過高危應用。 Optionally, the user equipment information includes at least: Internet Protocol IP address information used by the user equipment, the type of operating system used by the user equipment, the use record of the user equipment, the authentication server, and further The user equipment information builds an evaluation model, and statistically evaluates the level or score corresponding to each characteristic index in the evaluation model to obtain the evaluation result. The characteristic indicators in the evaluation model include: determining whether the user device has performed illegal operations according to the IP address information, Determine whether the operating system used by the user equipment has a security vulnerability according to the type of operating system used by the user equipment, and determine whether the user equipment has installed a high-risk application according to the use record of the user equipment.
作為本發明的一個較佳實施例,可以採用諸如隨機森林算法來構建上述評估模型,並採用該評估模型作為風險防控的主要判斷因子。該評估模型的輸入資訊可以包括但不限於上述使用者設備資訊、使用者身分資訊、使用者網路行為資訊、使用者業務資訊,通過隨機森林算法進行計算後得到的輸出資訊即為模型分值,然後最終依照模型分值來確定對應的身分認證方式。具體地,首先需要獲取可用資料(例如:使用者設備資訊、使用者身分資訊、使用者網路行為資訊、使用者業務資訊);其次,需要進行特 徵構建,即判定獲取到的可用資料的真實度;再次,需要進行特徵分析,即,對構建的特徵進行特徵質量分析、特徵單調情況分析、特徵重要性分析以及特徵合成;然後,再選用隨機森林算法來進行模型選連,並最終得到評估結果。 As a preferred embodiment of the present invention, such a random forest algorithm can be used to construct the above evaluation model, and the evaluation model is used as a main judgment factor for risk prevention and control. The input information of the evaluation model may include, but is not limited to, the above-mentioned user equipment information, user identity information, user network behavior information, and user business information. The output information obtained after calculation by the random forest algorithm is the model score. , And finally determine the corresponding identity authentication method according to the model score. Specifically, first of all, we need to obtain the available data (for example: user equipment information, user identity information, user network behavior information, user business information); second, we need to build features, that is, determine the authenticity of the available data. Degree; again, feature analysis is needed, that is, feature quality analysis, feature monotonic situation analysis, feature importance analysis, and feature synthesis are performed on the constructed features; then, a random forest algorithm is used for model selection and finally evaluation result.
在較佳實施過程中,以歷史關聯資料為使用者設備為例加以說明,通過構建評估模型綜合判斷使用者的風險程度可以包括:如果IP地址歸屬地先前發生過電信詐騙案件,那麼可以降低使用該IP地址的使用者設備的安全等級(例如:安全等級降低1級)或安全評分(例如:安全評分扣去1分),進而降低意圖運行應用程式執行購物操作或轉帳操作前的信用度,進而提升身分認證門檻;如果使用者設備使用的是android系統或者執行過越獄操作的iOS系統,由於存在安全漏洞,因此可以降低使用該IP地址的使用者設備的安全等級(例如:安全等級降低1級)或安全評分(例如:安全評分扣去1分),進而降低意圖運行應用程式執行購物操作或轉帳操作前的信用度,進而提升身分認證門檻;如果使用者設備安裝過作弊軟體或瀏覽過非法(例如:色情、賭博)網站,那麼可以降低使用該IP地址的使用者設備的安全等級(例如:安全等級降低1級)或安全評分(例如:安全評分扣去1分),進而降低意圖運行應用程式執行購物操作或轉帳操作前的信用度,進而提升身分認證門檻。 In the preferred implementation process, historically related data is taken as an example of the user equipment. The comprehensive assessment of the user ’s risk level by constructing an evaluation model may include: if a telecommunications fraud case has previously occurred in the IP address's place of ownership, the use of it can be reduced. The security level of the user device of the IP address (for example, the security level is reduced by 1 level) or the security score (for example, the security score is deducted by 1 point), thereby reducing the credibility of the intent to run the application before performing a shopping operation or a transfer operation, and further Raise the threshold of identity authentication; if the user device is using android system or iOS system that has performed jailbreak operation, due to security vulnerabilities, the security level of the user device using the IP address can be reduced (for example: the security level is reduced by 1 level ) Or safety score (for example, 1 point is deducted from the safety score), thereby reducing the credibility before intending to run an application to perform a shopping operation or a transfer operation, thereby raising the identity authentication threshold; if the user ’s device has installed cheating software or viewed illegally ( (E.g. pornography, gambling), you can reduce your use The security level of the user device of the IP address (for example, the security level is reduced by 1 level) or the security score (for example, the security score is deducted by 1 point), thereby reducing the credibility before intending to run the application to perform a shopping operation or a transfer operation, thereby improving Identity authentication threshold.
此外,針對歷史關聯資料包含的其他資訊同樣也可以 依次構建評估模型,進行安全評估。例如:如果在特定使用者設備的使用者帳戶下存在多次惡意網路行為(例如:刷單)那麼可以降低使用該使用者設備意圖運行應用程式執行購物操作前的信用度,進而提升身分認證門檻;如果使用者在登錄使用者帳戶後上傳的個人資訊與實人認證伺服器先前儲存過的相關資訊不符,那麼可以降低使用該使用者帳戶意圖運行應用程式執行購物操作或轉帳操作前的信用度,進而提升身分認證門檻。如果使用者登記過的使用者的聯繫方式、使用者的家庭住址及/或工作單位住址存在虛假資訊,那麼可以降低使用該使用者帳戶意圖運行應用程式執行購物操作或轉帳操作前的信用度,進而提升身分認證門檻。如果使用者在購物車內放入大量商品的訂單卻並未按時付款,那麼可以降低使用該使用者帳戶意圖運行應用程式執行購物操作或轉帳操作前的信用度,進而提升身分認證門檻。 In addition, for other information contained in historically related data, an evaluation model can also be constructed in turn for security evaluation. For example, if there are multiple malicious online behaviors under the user account of a specific user device (for example, swiping a bill), then the credibility before using the user device to run an application to perform a shopping operation can be reduced, thereby increasing the threshold for identity authentication. ; If a user ’s personal information uploaded after signing in to a user account does not match the relevant information previously stored by the real authentication server, the creditworthiness before using the user account to run an application for a shopping or transfer operation may be reduced, Raising the threshold for identity authentication. If the user ’s registered user ’s contact information, the user ’s home address, and / or work address have false information, then the user ’s credibility before using the user account to run the application to perform a shopping operation or a transfer operation may be reduced, thereby further Raising the threshold for identity authentication. If a user places an order for a large number of items in a shopping cart but does not pay on time, then the user ’s credibility before using the user ’s intent to run an application to perform a shopping operation or a transfer operation may be lowered, thereby increasing the threshold for identity verification.
需要說明的是,評估可以根據應用程式的業務類型僅針對其中一種判定因素進行評分,還可以同時綜合多種判定因素進行評分,最終確定是否需要提升身分認證門檻。上述關於歷史關聯資料的示例僅為舉例說明,而並非對歷史關聯資料所包含的內容構成不當限制。 It should be noted that the evaluation can score only one of the determining factors according to the business type of the application, and can also comprehensively evaluate multiple determining factors at the same time, and finally determine whether the identity authentication threshold needs to be raised. The above examples of historically related materials are for illustration only, and do not constitute improper restrictions on the content contained in historically related materials.
可選地,上述預設業務週期至少包括:第一評估週期和第二評估週期,認證伺服器20,還用於對歷史關聯資料在第一評估週期與第二評估週期的變化趨勢進行分析,得到評估結果。 Optionally, the preset business cycle includes at least a first evaluation cycle and a second evaluation cycle, and the authentication server 20 is further configured to analyze a change trend of historical associated data between the first evaluation cycle and the second evaluation cycle, Get the evaluation result.
上述第一評估週期與上述第二評估週期可以是預先選取的兩個相鄰時間段,假設第一評估週期為距離當前時間最近的十天,而第二評估週期為與最近十天相鄰的過去十天,那麼通過比對歷史關聯資料在第一評估週期與第二評估週期的變化趨勢,即比對歷史關聯資料在第一評估週期內與在第二評估週期內的相似度來確定評估結果。 The first evaluation cycle and the second evaluation cycle may be two adjacent time periods selected in advance. It is assumed that the first evaluation cycle is ten days closest to the current time, and the second evaluation cycle is adjacent to the last ten days. In the past ten days, then the evaluation is determined by comparing the historical trend of historical related data in the first evaluation cycle and the second evaluation cycle, that is, comparing the similarity of historical related data in the first evaluation cycle and the second evaluation cycle. result.
以使用者網路行為資訊為例,假設帳戶A在第一評估週期內的銷售行為或者購物行為始終保持正常狀態(即正常按照訂單進行發貨且物品質量良好,或者,在下訂單後及時付款),然而帳戶A在第二評估週期內由於帳戶被盜等緣故出現異常銷售行為(例如:由於原先銷售物美價錢的商品轉變為銷售高價的劣質商品或者基於買家的長期信任進行付款後,該帳戶A長時間沒有發貨)或者異常購物行為(例如:頻繁下單但不支付或頻繁向賣家投訴完好商品存在質量問題並要求賣家退/換貨),那麼可以據此判定帳戶A可能存在被盜號等異常,需要重新對使用帳戶A的使用者進行實人認證。 Taking the user's online behavior information as an example, it is assumed that the sales or shopping behavior of Account A during the first evaluation cycle has always remained normal (that is, the order is shipped normally and the quality of the item is good, or the payment is made in time after the order is placed) However, during the second evaluation period, account A had abnormal sales behaviors due to account theft, etc. (for example, the original sales of high-quality goods changed to the sale of high-quality inferior goods or the payment was made based on the buyer's long-term trust. A has not shipped for a long time) or abnormal shopping behavior (for example: frequent orders but not paying or frequent complaints to the seller about the quality of the intact product and asking the seller to return / replace), then you can determine that the account A may be stolen. If it is abnormal, the user who uses account A needs to be authenticated again.
以使用者設備資訊和使用者網路行為資訊為例,假設帳戶A在第一評估週期內使用的是ioS系統的蘋果手機,使用的IP地址顯示在C地,在此期間的銷售行為始終處於正常狀態,然而帳戶A在第二評估週期內由於帳戶轉讓等緣故,由使用ioS系統的蘋果手機轉變為使用Android系統的華為手機,使用的IP地址顯示由C地轉變為D地,並且在此期間出現異常銷售行為(例如:由於原先銷售物美價錢 的商品轉變為銷售高價的劣質商品或者基於買家的長期信任進行付款後,該帳戶A長時間沒有發貨),那麼可以據此判定帳戶A可能存在帳戶使用用途發生異常,需要重新對使用帳戶A的使用者進行實人認證。 Taking user equipment information and user network behavior information as an example, assuming that account A uses an ios system Apple phone in the first evaluation cycle, the IP address used is displayed in C, and the sales behavior during this period is always in Normal state, however, account A changed from an iPhone with an ios system to a Huawei phone with an Android system during the second evaluation cycle due to account transfers, etc. The IP address used changed from C to D, and here During the period of abnormal sales behavior (for example, because the original sale of high-quality goods changed to sell high-quality inferior goods or after payment based on the buyer's long-term trust, the account A has not been shipped for a long time), then the account A can be judged accordingly There may be an abnormal use of the account, and the user who uses account A needs to be authenticated again.
可選地,認證伺服器20,還用於根據評估結果確定待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊,並按照待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊進行身分認證。 Optionally, the authentication server 20 is further configured to determine the verification steps to be performed and the identity authentication related information to be collected in each verification step according to the evaluation results, and according to the verification steps to be performed and the to-be-collected information in each verification step. Identity verification information for.
在身分認證過程中,整合在應用程式內部的用於執行身分認證功能的軟體開發工具包(SDK)按照認證流程所需要執行的步驟序列以及每個步驟中需要採集的身分認證相關資訊進行採集,並實時與實人認證伺服器進行交互。通過上述評估模型得到的評估結果可以將使用者帳戶為正常帳戶與風險帳戶,對於正常帳戶則可以按照常規設置的自動化認證流程,包括:採集靜態身分證件圖像、動態活體檢測使用者圖像等資訊;對於危險帳戶則需要在常規設置的自動化認證流程基礎上增加補充資料採集過程,例如:增加動態手勢驗證環節,以採集更多使用者資訊,便於進一步查驗。 During the identity authentication process, a software development kit (SDK) integrated in the application for performing identity authentication functions is collected in accordance with the sequence of steps required for the authentication process and the identity authentication-related information that needs to be collected in each step. And interact with real person authentication server in real time. The evaluation results obtained through the above evaluation model can be used for normal and risk accounts of user accounts. For normal accounts, the automated authentication process can be set according to the routine, including: collecting static identity image, dynamic living detection user image, etc. Information; for dangerous accounts, it is necessary to add a supplementary data collection process based on the conventional automated authentication process, such as adding a dynamic gesture verification link to collect more user information for further inspection.
在完成上述身分認證流程之後,實人認證伺服器會向使用者設備反饋最終的身分認證結果。 After completing the above identity authentication process, the real person authentication server will feed back the final identity authentication result to the user device.
在上述運行環境下,本申請提供了如圖3所示的身分認證方法,需要說明的是,在圖式的流程圖示出的步驟可以在諸如一組電腦可執行指令的電腦系統中執行,並且, 雖然在流程圖中示出了邏輯順序,但是在某些情況下,可以以不同於此處的順序執行所示出或描述的步驟。 Under the above operating environment, this application provides an identity authentication method as shown in FIG. 3. It should be noted that the steps shown in the flowchart of the figure can be executed in a computer system such as a set of computer executable instructions. And, although the logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.
圖3是根據本發明實施例的身分認證方法的流程圖。如圖3所示,該方法可以包括以下處理步驟:步驟S32,獲取與應用程式對應的使用者帳戶的歷史關聯資料,其中,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊;步驟S34,採用歷史關聯資料進行評估,得到評估結果;步驟S36,根據評估結果確定對應的身分認證方式,進行身分認證。 FIG. 3 is a flowchart of an identity authentication method according to an embodiment of the present invention. As shown in FIG. 3, the method may include the following processing steps: Step S32, obtaining historical association data of the user account corresponding to the application, wherein the historical association data is obtained with the user account within a preset business cycle. Related information; step S34, using historical related data for evaluation to obtain an evaluation result; step S36, determining a corresponding identity authentication method according to the evaluation result, and performing identity authentication.
在較佳實施過程中,上述歷史關聯資料可以包括但不限於以下至少之一:使用者設備資訊、使用者身分資訊、使用者網路行為資訊、使用者業務資訊。 In a preferred implementation process, the above historical association data may include, but is not limited to, at least one of the following: user equipment information, user identity information, user network behavior information, and user business information.
可選地,在步驟S32,獲取歷史關聯資料之前,還可以包括以下執行步驟:步驟S30,接收來自於使用者設備的第一請求訊息,其中,使用者設備用於運行應用程式;步驟S31,根據第一請求訊息使用者帳戶進行認證狀態檢測,並向使用者設備返回第一響應訊息,其中,第一響應訊息用於確認使用者帳戶為待認證帳戶。 Optionally, before obtaining historical association data in step S32, the method may further include the following execution steps: step S30, receiving a first request message from the user equipment, wherein the user equipment is used to run an application program; step S31, The user account is checked for authentication status according to the first request message, and a first response message is returned to the user device, where the first response message is used to confirm that the user account is an account to be authenticated.
可選地,在步驟S31,向使用者設備返回第一響應訊息之後,還可以包括以下執行步驟:步驟S37,接收來自於使用者設備的第二請求訊息; 步驟S38,根據第二請求訊息確定待下發的授權認證資訊;步驟S39,向使用者設備返回第二響應訊息,其中,第二響應訊息中攜帶有授權認證資訊。 Optionally, after returning the first response message to the user equipment in step S31, the method may further include the following execution steps: step S37, receiving a second request message from the user equipment; step S38, determining according to the second request message Authorization authentication information to be issued; step S39, returning a second response message to the user equipment, where the second response message carries the authorization authentication information.
可選地,在步驟S34中,採用歷史關聯資料進行評估,得到評估結果可以包括以下執行步驟:步驟S340,對歷史關聯資料進行分析,構建評估模型,其中,評估模型包括:與歷史關聯資料中每個特徵指標對應的等級或評分;步驟S342,統計評估模型中每個特徵指標對應的等級或評分,得到評估結果。 Optionally, in step S34, the evaluation is performed using historical association data, and the obtained evaluation result may include the following execution steps: step S340, analyzing the historical association data, and constructing an evaluation model, wherein the evaluation model includes: The rank or score corresponding to each feature index; step S342, the rank or score corresponding to each feature index in the statistical evaluation model is obtained to obtain an evaluation result.
可選地,上述使用者設備資訊至少包括以下特徵指標:使用者設備使用的網際網路協議IP地址資訊,使用者設備所使用的操作系統類型,使用者設備的使用記錄;在步驟S340中,對歷史關聯資料進行分析,構建評估模型可以包括以下執行步驟:步驟S3400,獲取使用者設備資訊中所包含的IP地址資訊,操作系統類型,使用記錄,並構建評估模型;在步驟S342中,統計評估模型中每個特徵指標對應的等級或評分,得到評估結果可以包括以下執行步驟:步驟S3420,根據IP地址資訊確定使用者設備是否執行過違法操作並統計對應的等級或評分,根據使用者設備所使用的操作系統類型確定使用者設備所使用的操作系統是否存在安全漏洞並統計對應的等級或評分,以及根據使 用者設備的使用記錄確定使用者設備是否安裝過高危應用並統計對應的等級或評分;通過統計每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the above user equipment information includes at least the following characteristic indicators: Internet protocol IP address information used by the user equipment, the type of operating system used by the user equipment, and the use record of the user equipment; in step S340, Analyze historical association data, and construct an evaluation model may include the following execution steps: step S3400, obtaining IP address information, operating system type, usage records, and constructing an evaluation model included in user equipment information; in step S342, statistics The level or score corresponding to each characteristic index in the evaluation model, and the evaluation result obtained may include the following execution steps: Step S3420, determining whether the user equipment has performed illegal operations according to the IP address information, and counting the corresponding grade or score, according to the user equipment The type of operating system used determines whether there is a security vulnerability in the operating system used by the user device and counts the corresponding rating or rating, and determines whether the user device has installed high-risk applications and counts the corresponding level or rating based on the user device's use record. Score; pass statistics The grade or score corresponding to each characteristic index is used to obtain the evaluation result.
可選地,預設業務週期包括:第一評估週期和第二評估週期,在步驟S34中,採用歷史關聯資料進行評估,得到評估結果可以包括以下執行步驟:步驟S344,獲取歷史關聯資料在第一評估週期與第二評估週期的變化趨勢;步驟S346,對變化趨勢進行分析,得到評估結果。 Optionally, the preset business cycle includes a first evaluation cycle and a second evaluation cycle. In step S34, the evaluation is performed using historical related data, and the obtained evaluation result may include the following execution steps: step S344, obtaining historical related data in the first step. The change trend of the first evaluation cycle and the second evaluation cycle; step S346, analyzing the change trend to obtain an evaluation result.
可選地,在步驟S36中,根據評估結果確定身分認證方式,進行身分認證可以包括以下執行步驟:步驟S360,根據評估結果確定待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊;步驟S362,按照待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊進行身分認證。 Optionally, in step S36, the identity authentication mode is determined according to the evaluation result. Performing identity authentication may include the following execution steps: step S360, determining the verification steps to be performed and the identity authentication associations to be collected in each verification step according to the evaluation results. Information; step S362, performing identity authentication according to the verification steps to be performed and the identity authentication related information to be collected in each verification step.
在上述運行環境下,本申請提供了如圖4所示的另一種身分認證方法,需要說明的是,在圖式的流程圖示出的步驟可以在諸如一組電腦可執行指令的電腦系統中執行,並且,雖然在流程圖中示出了邏輯順序,但是在某些情況下,可以以不同於此處的順序執行所示出或描述的步驟。 Under the above-mentioned operating environment, this application provides another identity authentication method as shown in FIG. 4. It should be noted that the steps shown in the flowchart of the figure can be implemented in a computer system such as a set of computer-executable instructions. Perform, and although the logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.
圖4是根據本發明實施例的另一種身分認證方法的流程圖。如圖4所示,該方法可以包括以下處理步驟:步驟S42,運行應用程式;步驟S44,觸發認證伺服器對應用程式對應的使用者 帳戶進行認證狀態檢測,其中,認證狀態檢測用於採用獲取到的使用者帳戶的歷史關聯資料進行評估以得到評估結果,並根據評估結果確定對應的身分認證方式,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊。 FIG. 4 is a flowchart of another identity authentication method according to an embodiment of the present invention. As shown in FIG. 4, the method may include the following processing steps: step S42, running an application program; step S44, triggering an authentication server to perform authentication status detection on a user account corresponding to the application program, wherein the authentication status detection is used for acquiring The obtained historical association data of the user account is evaluated to obtain an evaluation result, and a corresponding identity authentication method is determined according to the evaluation result. The historical association data is information associated with the user account obtained in a preset business cycle.
在上述運行環境下,本申請提供了如圖5所示的帳號認證方法,需要說明的是,在圖式的流程圖示出的步驟可以在諸如一組電腦可執行指令的電腦系統中執行,並且,雖然在流程圖中示出了邏輯順序,但是在某些情況下,可以以不同於此處的順序執行所示出或描述的步驟。 Under the above operating environment, this application provides an account authentication method as shown in FIG. 5. It should be noted that the steps shown in the flowchart of the figure can be executed in a computer system such as a set of computer executable instructions. And, although the logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.
圖5是根據本發明實施例的帳號認證方法的流程圖。如圖5所示,該方法可以包括以下處理步驟:步驟S52,獲取待認證帳戶的第一期間關聯資料和第二期間關聯資料,其中,第一期間關聯資料是在第一時間週期內與待認證帳戶關聯的資料,第二期間關聯資料是在第二時間週期內與待認證帳戶關聯的資料,並且第一時間週期與第二時間週期不完全相同;步驟S54,對第一期間關聯資料和第二期間關聯資料進行相似度計算,得到相似度結果;步驟S56,根據相似度結果判斷待認證帳戶的操作者是否改變。 FIG. 5 is a flowchart of an account authentication method according to an embodiment of the present invention. As shown in FIG. 5, the method may include the following processing steps: Step S52: Obtain first-period correlation data and second-period correlation data of the account to be authenticated, where the first-period correlation data is related to the The data associated with the authentication account, the data associated with the second period are data associated with the account to be authenticated within the second time period, and the first time period is not exactly the same as the second time period; step S54, the data associated with the first period and The similarity calculation is performed on the related data in the second period to obtain the similarity result; step S56, it is determined whether the operator of the account to be authenticated is changed according to the similarity result.
上述第一時間週期與上述第二時間週期可以是預先選取的兩個相鄰時間段,即第一時間週期與第二時間週期在時間範圍上並不發生重疊,假設第一時間週期為距離當前 時間最近的十天,而第二時間週期為與最近十天相鄰的過去十天;上述第一時間週期與上述第二時間週期可以是預先選取的兩個部分重疊的時間段,假設第一時間週期為當月的一號至十號,而第二時間週期為當月的五號至十五號。通過對第一期間關聯資料和第二期間關聯資料進行相似度比較,來判斷待認證帳戶的操作者是否改變。 The first time period and the second time period may be two adjacent time periods selected in advance, that is, the first time period and the second time period do not overlap in time range. It is assumed that the first time period is a distance from the current time period. The last ten days, and the second time period is the past ten days adjacent to the last ten days; the first time period and the second time period may be a pre-selected two overlapping time periods, assuming the first The time period is from the 1st to the 10th of the month, and the second time period is from the 5th to the 15th of the month. By comparing the similarity between the first period related data and the second period related data, it is determined whether the operator of the account to be authenticated has changed.
在較佳實施過程中,在第一時間週期內與待認證帳戶關聯的資料可以為第一操作資訊集合;在第二時間週期內與待認證帳戶關聯的資料可以為第二操作資訊集合;在步驟S54中,對第一期間關聯資料和第二期間關聯資料進行相似度計算可以包括以下執行步驟:步驟S540,計算第一操作資訊集合和第二操作資訊集合的差集;在步驟S56中,根據相似度結果判斷待認證帳戶的操作者是否改變可以包括以下執行步驟:步驟S560,如果差集超過預定閾值,則確定待認證帳戶的操作者發生改變。 In a preferred implementation process, the data associated with the account to be authenticated during the first time period may be the first set of operational information; the data associated with the account to be authenticated during the second time period may be the second set of operational information; In step S54, performing similarity calculation on the first period related data and the second period related data may include the following execution steps: step S540, calculating a difference set between the first operation information set and the second operation information set; in step S56, Judging whether the operator of the account to be authenticated is changed according to the similarity result may include the following execution steps: step S560, if the difference set exceeds a predetermined threshold, determining that the operator of the account to be authenticated is changed.
假設帳戶A在第一時間週期內的銷售行為或者購物行為始終保持正常狀態(即正常按照訂單進行發貨且物品質量良好,或者,在下訂單後及時付款),然而帳戶A在第二時間週期內由於帳戶被盜等緣故出現異常銷售行為(例如:由於原先銷售物美價錢的商品轉變為銷售高價的劣質商品或者基於買家的長期信任進行付款後,該帳戶A長時間沒有發貨)或者異常購物行為(例如:頻繁下單但不支 付或頻繁向賣家投訴完好商品存在質量問題並要求賣家退/換貨),那麼通過比對第一期間關聯資料(即帳戶A在第一時間週期內的銷售行為或者購物行為的日誌記錄)與第二期間關聯資料(即帳戶A在第二時間週期內的銷售行為或者購物行為的日誌記錄)之間的相似度,可以據此判定帳戶A的操作人員很有可能發生變化,需要重新對使用帳戶A的操作人員進行實人認證。 Assume that account A's sales or shopping behavior has always remained normal during the first time period (that is, the order is shipped normally and the goods are of good quality, or the payment is made in time after placing the order), but account A is in the second time period Abnormal sales due to account theft (for example, because account A has not been shipped for a long time due to the original sale of high-quality goods converted to high-quality inferior goods or payment based on the buyer's long-term trust) or abnormal shopping Behavior (for example: frequent orders but not paying or frequent complaints to sellers about the quality of intact products and requiring sellers to return / replace), then by comparing the relevant data in the first period (that is, the sales of account A in the first time period) Behavior or log records of shopping behavior) and related data in the second period (that is, log records of account A ’s sales behavior or shopping behavior during the second time period) can be used to determine that the operator of Account A is very There may be changes, and the operator who uses account A needs to be re-authenticated.
在較佳實施過程中,在第一時間週期內與待認證帳戶關聯的資料,為第一設備資訊集合;在第二時間週期內與待認證帳戶關聯的資料,為第二設備資訊集合;在步驟S54中,對第一期間關聯資料和第二期間關聯資料進行相似度計算可以包括以下執行步驟:步驟S542,計算第一設備資訊集合和第二設備資訊集合的差集;在步驟S56中,根據相似度結果判斷待認證帳戶的操作者是否改變可以包括以下執行步驟:步驟S562,如果差集超過預定閾值,則確定待認證帳戶的操作者發生改變。 In a preferred implementation process, the data associated with the account to be authenticated in the first time period is the first device information set; the data associated with the account to be authenticated in the second time period is the second device information set; In step S54, performing similarity calculation on the first period related data and the second period related data may include the following execution steps: step S542, calculating a difference set between the first device information set and the second device information set; in step S56, Judging whether the operator of the account to be authenticated is changed according to the similarity result may include the following execution steps: step S562, if the difference set exceeds a predetermined threshold, determining that the operator of the account to be authenticated is changed.
假設帳戶A在第一時間週期內使用的是ioS系統的蘋果手機,使用的IP地址顯示在C地,使用的IMSI中MNC顯示的運營商為中國移動,然而帳戶A在第二時間週期內由使用ioS系統的蘋果手機轉變為使用Android系統的華為手機,使用的IP地址顯示由C地轉變為D地,並且在此期間還發現其使用的IMSI中MNC顯示的運營商由中國移動轉變 為中國聯通,那麼通過比對第一期間關聯資料(即帳戶A在第一時間週期內使用的使用者設備資訊相關的日誌記錄)與第二期間關聯資料(即帳戶A在第二時間週期內使用的使用者設備資訊相關的日誌記錄)之間的相似度,可以據此判定帳戶A的操作人員很有可能發生變化,需要重新對使用帳戶A的操作人員進行實人認證。 Assume that account A uses an ios system Apple phone in the first time period, the IP address used is displayed in C, and the operator displayed by MNC in the IMSI used is China Mobile, however, account A is issued by the second time period. The Apple phone using the ioS system was transformed into a Huawei phone using the Android system, and the IP address display changed from C to D. During this period, it was also found that the operator displayed by MNC in the IMSI used by it was changed from China Mobile to China China Unicom, then by comparing the associated data in the first period (that is, the log records related to the user equipment information used by Account A in the first time period) and the associated data in the second period (that is, the account used by Account A in the second time period) The similarity between the log records related to user equipment information) can be used to determine that the operator of account A is likely to change, and it is necessary to re-authenticate the operator using account A.
通過獲取個人使用者通過使用者設備曾經上傳過的使用者身分資訊、使用者曾經執行過的網路行為資訊、使用者曾經所使用的使用者設備資訊、使用者設備曾經採集過的使用者生物特徵資訊等歷史關聯資料建立評估模型進行綜合分析,對使用者帳戶的風險程度/程式進行實時監控,同時還將認證手段進一步升級為活體檢測。不僅如此,實人認證業務還可以被拓展到其他需要通過個人身分認證才能夠開展的網上業務。 By obtaining the user identity information that the individual user has uploaded through the user device, the network behavior information that the user has performed, the user device information that the user has used, and the user biology that the user device has collected Establish an evaluation model for historical analysis of characteristic related information such as feature information for comprehensive analysis, real-time monitoring of the risk level / program of user accounts, and further upgrade the authentication method to live detection. Not only that, the real person authentication business can also be expanded to other online businesses that need to pass personal identity authentication.
需要說明的是,對於前述的各方法實施例,為了簡單描述,故將其都表述為一系列的動作組合,但是所屬技術領域中具有通常知識者應該知悉,本發明並不受所描述的動作順序的限制,因為依據本發明,某些步驟可以採用其他順序或者同時進行。其次,所屬技術領域中具有通常知識者也應該知悉,說明書中所描述的實施例均屬於較佳實施例,所涉及的動作和模組並不一定是本發明所必須的。 It should be noted that, for the foregoing method embodiments, for simplicity of description, they are all described as a series of action combinations, but those with ordinary knowledge in the technical field should know that the present invention is not subject to the described actions. The order is limited because according to the present invention, certain steps may be performed in other orders or simultaneously. Secondly, those with ordinary knowledge in the technical field should also know that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.
通過以上的實施方式的描述,所屬技術領域中具有通常知識者可以清楚地瞭解到根據上述實施例的身分認證方法可藉助軟體加必需的通用硬體平臺的方式來實現,當然 也可以通過硬體,但很多情況下前者是更佳的實施方式。基於這樣的理解,本發明的技術方案本質上或者說對現有技術做出貢獻的部分可以以軟體產品的形式體現出來,該電腦軟體產品儲存在一個儲存媒介(如ROM/RAM、磁碟、光碟)中,包括若干指令用以使得一台終端設備(可以是手機,電腦,伺服器,或者網路設備等)執行本發明各個實施例所述的方法。 Through the description of the above embodiments, those with ordinary knowledge in the technical field can clearly understand that the identity authentication method according to the above embodiments can be implemented by means of software plus the necessary universal hardware platform, and of course, it can also be implemented by hardware. , But in many cases the former is a better implementation. Based on such an understanding, the technical solution of the present invention, in essence, or a part that contributes to the existing technology, can be embodied in the form of a software product. The computer software product is stored in a storage medium (such as ROM / RAM, magnetic disk, optical disk). ) Includes several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in the embodiments of the present invention.
根據本發明實施例,還提供了一種用於實施上述身分認證方法的裝置實施例。圖6是根據本發明實施例的身分認證裝置的結構方塊圖。如圖6所示,該裝置包括:獲取模組10,用於獲取與應用程式對應的使用者帳戶的歷史關聯資料,其中,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊;評估模組20,用於採用歷史關聯資料進行評估,得到評估結果;認證模組30,用於根據評估結果確定對應的身分認證方式,進行身分認證。 According to an embodiment of the present invention, an embodiment of a device for implementing the foregoing identity authentication method is also provided. FIG. 6 is a structural block diagram of an identity authentication device according to an embodiment of the present invention. As shown in FIG. 6, the device includes: an obtaining module 10 for obtaining historical association data of a user account corresponding to an application, wherein the historical association data is obtained with a user account in a preset business cycle Relevant information; an evaluation module 20 is configured to perform evaluation using historical correlation data to obtain an evaluation result; and an authentication module 30 is configured to determine a corresponding identity authentication method according to the evaluation result to perform identity authentication.
可選地,圖7是根據本發明較佳實施例的身分認證裝置的結構方塊圖。如圖7所示,上述裝置還可以包括:第一接收模組40,用於接收來自於使用者設備的第一請求訊息,其中,使用者設備用於運行應用程式;第一響應模組50,用於根據第一請求訊息使用者帳戶進行認證狀態檢測,並向使用者設備返回第一響應訊息,其中,第一響應訊息用於確認使用者帳戶為待認證帳戶。 Optionally, FIG. 7 is a structural block diagram of an identity authentication device according to a preferred embodiment of the present invention. As shown in FIG. 7, the above device may further include: a first receiving module 40 for receiving a first request message from a user equipment, wherein the user equipment is used to run an application program; the first response module 50 For detecting the authentication status of the user account according to the first request message, and returning a first response message to the user device, wherein the first response message is used to confirm that the user account is an account to be authenticated.
在較佳實施過程中,上述歷史關聯資料可以包括但不限於以下至少之一:使用者設備資訊、使用者身分資訊、使用者網路行為資訊、使用者業務資訊。 In a preferred implementation process, the above historical association data may include, but is not limited to, at least one of the following: user equipment information, user identity information, user network behavior information, and user business information.
可選地,如圖7所示,上述裝置還可以包括:第二接收模組60,用於接收來自於使用者設備的第二請求訊息;第二響應模組70,用於根據第二請求訊息確定待下發的授權認證資訊,並向使用者設備返回第二響應訊息,其中,第二響應訊息中攜帶有授權認證資訊。 Optionally, as shown in FIG. 7, the above device may further include: a second receiving module 60 for receiving a second request message from the user equipment; and a second response module 70 for receiving a second request according to the second request. The message determines the authorization authentication information to be issued, and returns a second response message to the user equipment, where the second response message carries the authorization authentication information.
可選地,評估模組20可以包括:分析單元(圖中未示出),用於對歷史關聯資料進行分析,構建評估模型,其中,評估模型包括:與歷史關聯資料中每個特徵指標對應的等級或評分;第一統計單元(圖中未示出),用於統計評估模型中每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the evaluation module 20 may include: an analysis unit (not shown in the figure), configured to analyze historically related data and construct an evaluation model, where the evaluation model includes: corresponding to each characteristic index in the historically related data The first statistical unit (not shown in the figure) is used to statistically evaluate the level or score corresponding to each characteristic index in the evaluation model to obtain the evaluation result.
可選地,上述使用者設備資訊至少包括以下特徵指標:使用者設備使用的網際網路協議IP地址資訊,使用者設備所使用的操作系統類型,使用者設備的使用記錄;分析單元(圖中未示出),用於獲取使用者設備資訊中所包含的IP地址資訊,操作系統類型,使用記錄,並構建評估模型;統計單元(圖中未示出),用於根據IP地址資訊確定使用者設備是否執行過違法操作並統計對應的等級或評分,根據使用者設備所使用的操作系統類型確定使用者設備所使用的操作系統是否存在安全漏洞並統計對應的等級或評分,以及根據使用者設備的使用記錄確定使用者設備 是否安裝過高危應用並統計對應的等級或評分;通過統計每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the above user equipment information includes at least the following characteristic indicators: Internet Protocol IP address information used by the user equipment, the type of operating system used by the user equipment, the use history of the user equipment, and an analysis unit (in the figure) (Not shown), used to obtain the IP address information, operating system type, usage records, and build an evaluation model included in the user device information; a statistical unit (not shown in the figure) is used to determine the use according to the IP address information Whether the user ’s device has performed an illegal operation and counted the corresponding rating or rating, according to the type of operating system used by the user ’s device, determine whether the operating system used by the user ’s device has a security vulnerability, and count the corresponding level or rating, and The device usage record determines whether the user's device has installed a high-risk application and counts the corresponding grade or score; the evaluation result is obtained by counting the grade or score corresponding to each characteristic index.
可選地,上述預設業務週期至少包括:第一評估週期和第二評估週期,評估模組20可以包括:獲取單元(圖中未示出),用於獲取歷史關聯資料在第一評估週期與第二評估週期的變化趨勢;第二統計單元(圖中未示出),用於對變化趨勢進行分析,得到評估結果。 Optionally, the above-mentioned preset service cycle includes at least a first evaluation cycle and a second evaluation cycle. The evaluation module 20 may include: an acquisition unit (not shown in the figure), configured to acquire historical associated data in the first evaluation cycle. And the change trend of the second evaluation cycle; the second statistical unit (not shown in the figure) is used to analyze the change trend and obtain an evaluation result.
可選地,認證模組30可以包括:確定單元(圖中未示出),用於根據評估結果確定待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊;認證單元(圖中未示出),用於按照待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊進行身分認證。 Optionally, the authentication module 30 may include: a determining unit (not shown in the figure) for determining the verification steps to be performed and the identity authentication related information to be collected in each verification step according to the evaluation results; the authentication unit (FIG. (Not shown in the figure), used to perform identity authentication according to the verification steps to be performed and the identity authentication related information to be collected in each verification step.
根據本發明實施例,還提供了另一種用於實施上述身分認證方法的裝置實施例。圖8是根據本發明實施例的另一種身分認證裝置的結構方塊圖。如圖8所示,該裝置包括:運行模組80,用於運行應用程式;觸發模組90,用於觸發認證伺服器對應用程式對應的使用者帳戶進行認證狀態檢測,其中,認證狀態檢測用於採用獲取到的使用者帳戶的歷史關聯資料進行評估以得到評估結果,並根據評估結果確定對應的身分認證方式,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊。 According to an embodiment of the present invention, another apparatus embodiment for implementing the foregoing identity authentication method is also provided. FIG. 8 is a structural block diagram of another identity authentication device according to an embodiment of the present invention. As shown in FIG. 8, the device includes: a running module 80 for running an application program; and a triggering module 90 for triggering an authentication server to perform an authentication status detection on a user account corresponding to the application, wherein the authentication status detection It is used to use the obtained historical association data of the user account for evaluation to obtain the evaluation result, and determine the corresponding identity authentication method according to the evaluation result. The historical association data is obtained in a preset business cycle and is associated with the user account. Information.
本發明的實施例還提供了一種儲存媒介。所屬技術領 域中具有通常知識者可以理解上述實施例的各種方法中的全部或部分步驟是可以通過程式來指令終端設備/伺服端設備相關的硬體來完成,該程式可以儲存於一電腦可讀儲存媒介中,儲存媒介可以包括:快閃隨身碟、只讀儲存器(Read-Only Memory,ROM)、隨機存取器(Random Access Memory,RAM)、磁碟或光碟等。 An embodiment of the present invention also provides a storage medium. Those with ordinary knowledge in the technical field can understand that all or part of the steps in the various methods of the above embodiments can be completed by a program instructing the terminal / server-end device-related hardware, and the program can be stored in a computer-readable Among the storage media, the storage medium may include: a flash drive, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like.
可選地,在本實施例中,上述儲存媒介可以用於保存上述實施例一所提供的身分認證方法所執行的程式代碼。 Optionally, in this embodiment, the storage medium may be used to store program code executed by the identity authentication method provided in the first embodiment.
可選地,在本實施例中,上述儲存媒介可以位於電腦網路中伺服端群中的任意一個伺服器中,或者位於伺服端群中的任意一個伺服器中。 Optionally, in this embodiment, the storage medium may be located in any server in a server group in a computer network, or in any server in a server group.
可選地,在本實施例中,儲存媒介被設置為儲存用於執行以下步驟的程式代碼:S1,獲取與應用程式對應的使用者帳戶的歷史關聯資料,其中,歷史關聯資料是在預設業務週期內獲取到的與使用者帳戶關聯的資訊;S2,採用歷史關聯資料進行評估,得到評估結果;S3,根據評估結果確定對應的身分認證方式,進行身分認證。 Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: S1, obtaining historical association data of a user account corresponding to the application, wherein the historical association data is preset Information associated with the user account obtained during the business cycle; S2, the evaluation is performed using historical association data to obtain the evaluation result; S3, the corresponding identity authentication method is determined based on the evaluation result, and identity authentication is performed.
可選地,在本實施例中,儲存媒介還被設置為儲存用於執行以下步驟的程式代碼:接收來自於使用者設備的第一請求訊息,其中,使用者設備用於運行應用程式;根據第一請求訊息使用者帳戶進行認證狀態檢測,並向使用者設備返回第一響應訊息,其中,第一響應訊息用於確認使 用者帳戶為待認證帳戶。 Optionally, in this embodiment, the storage medium is further configured to store program code for performing the following steps: receiving a first request message from a user equipment, wherein the user equipment is used to run an application program; The first request message detects the authentication status of the user account, and returns a first response message to the user device, where the first response message is used to confirm that the user account is an account to be authenticated.
可選地,在本實施例中,儲存媒介還被設置為儲存用於執行以下步驟的程式代碼:接收來自於使用者設備的第二請求訊息;根據第二請求訊息確定待下發的授權認證資訊;向使用者設備返回第二響應訊息,其中,第二響應訊息中攜帶有授權認證資訊。 Optionally, in this embodiment, the storage medium is further configured to store program code for performing the following steps: receiving a second request message from the user equipment; and determining the authorization authentication to be issued according to the second request message Information; a second response message is returned to the user equipment, wherein the second response message carries authorization authentication information.
可選地,在本實施例中,儲存媒介還被設置為儲存用於執行以下步驟的程式代碼:對歷史關聯資料進行分析,構建評估模型,其中,評估模型包括:與歷史關聯資料中每個特徵指標對應的等級或評分;統計評估模型中每個特徵指標對應的等級或評分,得到評估結果。 Optionally, in this embodiment, the storage medium is further configured to store program code for performing the following steps: analyzing historically-related data and constructing an evaluation model, where the evaluation model includes: The rank or score corresponding to the feature index; the rank or score corresponding to each feature index in the statistical evaluation model to obtain the evaluation result.
可選地,使用者設備資訊至少包括以下特徵指標:使用者設備使用的網際網路協議IP地址資訊,使用者設備所使用的操作系統類型,使用者設備的使用記錄;在本實施例中,儲存媒介還被設置為儲存用於執行以下步驟的程式代碼:獲取使用者設備資訊中所包含的IP地址資訊,操作系統類型,使用記錄,並構建評估模型;根據IP地址資訊確定使用者設備是否執行過違法操作並統計對應的等級或評分,根據使用者設備所使用的操作系統類型確定使用者設備所使用的操作系統是否存在安全漏洞並統計對應的等級或評分,以及根據使用者設備的使用記錄確定使用者設備是否安裝過高危應用並統計對應的等級或評分;通過統計每個特徵指標對應的等級或評分,得到評估結果。 Optionally, the user equipment information includes at least the following characteristic indicators: the Internet Protocol IP address information used by the user equipment, the type of operating system used by the user equipment, and the use history of the user equipment; in this embodiment, The storage medium is also set to store program code for performing the following steps: obtaining the IP address information contained in the user equipment information, the type of operating system, the use record, and constructing an evaluation model; determining whether the user equipment is based on the IP address information Illegal operations have been performed and the corresponding grades or scores have been counted, according to the type of operating system used by the user equipment, whether the operating system used by the user equipment has a security vulnerability, and the corresponding grades or ratings have been calculated, and according to the use of the user equipment The record determines whether the user equipment has installed a high-risk application and counts the corresponding rating or rating; the statistical result is obtained by counting the rating or rating corresponding to each characteristic index.
可選地,預設業務週期包括:第一評估週期和第二評 估週期,在本實施例中,儲存媒介還被設置為儲存用於執行以下步驟的程式代碼:獲取歷史關聯資料在第一評估週期與第二評估週期的變化趨勢;對變化趨勢進行分析,得到評估結果。 Optionally, the preset business cycle includes a first evaluation cycle and a second evaluation cycle. In this embodiment, the storage medium is further configured to store program code for performing the following steps: obtaining historical association data in the first evaluation Change trend of the cycle and the second evaluation cycle; analyze the change trend to get the evaluation result.
可選地,在本實施例中,儲存媒介還被設置為儲存用於執行以下步驟的程式代碼:根據評估結果確定待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊;按照待執行的驗證步驟以及每個驗證步驟中待採集的身分認證關聯資訊進行身分認證。 Optionally, in this embodiment, the storage medium is further configured to store program code for performing the following steps: determining the verification steps to be performed and the identity authentication related information to be collected in each verification step according to the evaluation results; The verification steps to be performed and the identity authentication related information to be collected in each verification step perform identity verification.
上述本發明實施例序號僅僅為了描述,不代表實施例的優劣。 The sequence numbers of the foregoing embodiments of the present invention are only for description, and do not represent the superiority or inferiority of the embodiments.
在本發明的上述實施例中,對各個實施例的描述都各有側重,某個實施例中沒有詳述的部分,可以參見其他實施例的相關描述。 In the above embodiments of the present invention, the description of each embodiment has its own emphasis. For a part that is not described in detail in an embodiment, reference may be made to the description of other embodiments.
在本申請所提供的幾個實施例中,應該理解到,所揭露的技術內容,可通過其它的方式實現。其中,以上所描述的裝置實施例僅僅是示意性的,例如所述單元的劃分,僅僅為一種邏輯功能劃分,實際實現時可以有另外的劃分方式,例如多個單元或組件可以結合或者可以整合到另一個系統,或一些特徵可以忽略,或不執行。另一點,所顯示或討論的相互之間的耦合或直接耦合或通信連接可以是通過一些介面,單元或模組的間接耦合或通信連接,可以是電性或其它的形式。 In the several embodiments provided in this application, it should be understood that the disclosed technical content can be implemented in other ways. The device embodiments described above are only schematic. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or integrated. To another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, units or modules, and may be electrical or other forms.
所述作為分離部件說明的單元可以是或者也可以不是 實體上分開的,作為單元顯示的部件可以是或者也可以不是實體單元,即可以位於一個地方,或者也可以分佈到多個網路單元上。可以根據實際的需要選擇其中的部分或者全部單元來實現本實施例方案的目的。 The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, which may be located in one place, or may be distributed on multiple network units. . Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
另外,在本發明各個實施例中的各功能單元可以整合在一個處理單元中,也可以是各個單元單獨實體存在,也可以兩個或兩個以上單元整合在一個單元中。上述整合的單元既可以採用硬體的形式實現,也可以採用軟體功能單元的形式實現。 In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist as a separate entity, or two or more units may be integrated into one unit. The above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
所述整合的單元如果以軟體功能單元的形式實現並作為獨立的產品銷售或使用時,可以儲存在一個電腦可讀取儲存媒介中。基於這樣的理解,本發明的技術方案本質上或者說對現有技術做出貢獻的部分或者該技術方案的全部或部分可以以軟體產品的形式體現出來,該電腦軟體產品儲存在一個儲存媒介中,包括若干指令用以使得一台電腦設備(可為個人電腦、伺服器或者網路設備等)執行本發明各個實施例所述方法的全部或部分步驟。而前述的儲存媒介包括:隨身碟、只讀儲存器(ROM,Read-Only Memory)、隨機存取儲存器(RAM,Random Access Memory)、行動硬碟、磁碟或者光碟等各種可以儲存程式代碼的媒介。 When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention essentially or part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium, It includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present invention. The aforementioned storage media include: various types of programs that can store programs such as flash drives, Read-Only Memory (ROM), Random Access Memory (RAM), mobile hard disks, magnetic disks, or optical disks Media.
以上所述僅是本發明的較佳實施方式,應當指出,對於所屬技術領域中具有通常知識者來說,在不脫離本發明原理的前提下,還可以做出若干改進和潤飾,這些改進和 潤飾也應視為本發明的保護範圍。 The above is only a preferred embodiment of the present invention. It should be noted that, for those with ordinary knowledge in the technical field, several improvements and retouchings can be made without departing from the principles of the present invention. These improvements and Retouching should also be regarded as the protection scope of the present invention.
Claims (22)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201611010182.6A CN108076018A (en) | 2016-11-16 | 2016-11-16 | Identity authentication system, method, device and account authentication method |
| ??201611010182.6 | 2016-11-16 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW201820194A true TW201820194A (en) | 2018-06-01 |
Family
ID=62146141
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW106127337A TW201820194A (en) | 2016-11-16 | 2017-08-11 | Identity verification system, method, device, and account verification method |
Country Status (3)
| Country | Link |
|---|---|
| CN (1) | CN108076018A (en) |
| TW (1) | TW201820194A (en) |
| WO (1) | WO2018090839A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI712917B (en) * | 2018-07-17 | 2020-12-11 | 開曼群島商創新先進技術有限公司 | Method and device for detecting safety of data model |
| US11075942B2 (en) | 2018-07-27 | 2021-07-27 | Advanced New Technologies Co., Ltd. | Identity verification and account information updating methods and apparatuses |
| TWI743656B (en) * | 2019-05-31 | 2021-10-21 | 開曼群島商創新先進技術有限公司 | Verification method and device |
| US11218493B2 (en) | 2019-05-31 | 2022-01-04 | Advanced New Technologies Co., Ltd. | Identity verification |
Families Citing this family (58)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108875327A (en) | 2018-05-28 | 2018-11-23 | 阿里巴巴集团控股有限公司 | One seed nucleus body method and apparatus |
| CN109102159B (en) * | 2018-07-18 | 2023-06-20 | 平安科技(深圳)有限公司 | Passenger rating model generation method, device, computer equipment and storage medium |
| CN110399713B (en) * | 2018-07-27 | 2024-06-25 | 腾讯科技(北京)有限公司 | Information authentication method and related device |
| CN109165328A (en) * | 2018-07-27 | 2019-01-08 | 阿里巴巴集团控股有限公司 | A kind of method for authenticating user identity and device |
| CN110798432A (en) * | 2018-08-03 | 2020-02-14 | 京东数字科技控股有限公司 | Security authentication method, device and system, mobile terminal |
| CN112508568B (en) * | 2018-08-15 | 2024-08-30 | 创新先进技术有限公司 | Identity verification product push and identity verification method and system |
| CN109344582B (en) * | 2018-08-21 | 2021-12-14 | 中国联合网络通信集团有限公司 | Authentication method, device and storage medium |
| CN110879820B (en) * | 2018-09-06 | 2023-05-26 | 阿里巴巴集团控股有限公司 | Industrial data processing method and device |
| CN109067791B (en) * | 2018-09-25 | 2020-05-12 | 阿里巴巴集团控股有限公司 | User identity authentication method and device in network |
| CN111104658A (en) * | 2018-10-25 | 2020-05-05 | 北京嘀嘀无限科技发展有限公司 | Registration method and device, authentication method and device |
| CN110033362B (en) * | 2018-11-14 | 2023-07-18 | 创新先进技术有限公司 | A payment method, device and equipment |
| CN111245770B (en) * | 2018-11-28 | 2023-03-24 | 北京默契破冰科技有限公司 | Method, apparatus and computer storage medium for user account management |
| CN109635872B (en) * | 2018-12-17 | 2020-08-04 | 上海观安信息技术股份有限公司 | Identity recognition method, electronic device and computer program product |
| CN109636607B (en) * | 2018-12-18 | 2024-03-15 | 平安科技(深圳)有限公司 | Service data processing method and device based on model deployment and computer equipment |
| CN111385136B (en) * | 2018-12-29 | 2023-01-06 | 华为技术服务有限公司 | Method and device for determining user communication identifier |
| CN109815853A (en) * | 2019-01-04 | 2019-05-28 | 深圳壹账通智能科技有限公司 | Liveness detection method, apparatus, computer equipment and storage medium |
| CN109905369B (en) * | 2019-01-24 | 2022-11-04 | 平安科技(深圳)有限公司 | Early warning method and device for employee account number theft and computer readable storage medium |
| CN109933974B (en) * | 2019-02-14 | 2024-06-18 | 平安科技(深圳)有限公司 | Password initialization method, device, computer equipment and storage medium |
| CN110245474B (en) * | 2019-04-19 | 2023-07-14 | 创新先进技术有限公司 | A processing method and system for public accounts |
| CN110069414B (en) * | 2019-04-25 | 2023-05-30 | 浙江吉利控股集团有限公司 | Regression testing method and system |
| CN110084011A (en) * | 2019-05-08 | 2019-08-02 | 北京芯盾时代科技有限公司 | A kind of method and device of the verifying of user's operation |
| CN110245475B (en) * | 2019-05-30 | 2023-08-22 | 创新先进技术有限公司 | Authentication method and device |
| CN112183167B (en) * | 2019-07-04 | 2023-09-22 | 钉钉控股(开曼)有限公司 | Attendance checking method, authentication method, living body detection method, device and equipment |
| CN110569418A (en) * | 2019-07-24 | 2019-12-13 | 阿里巴巴集团控股有限公司 | Method and device for verifying academic calendar information |
| CN110675197B (en) * | 2019-09-30 | 2023-09-26 | 北京达佳互联信息技术有限公司 | Method, device, equipment and storage medium for evaluating data |
| CN113949585A (en) * | 2019-12-17 | 2022-01-18 | 支付宝(杭州)信息技术有限公司 | Credit-based information identifier generation method and device |
| CN111178949B (en) * | 2019-12-18 | 2023-07-28 | 中电金信软件有限公司 | Service resource matching reference data determining method, device, equipment and storage medium |
| CN111339829B (en) * | 2020-01-19 | 2021-04-06 | 海通证券股份有限公司 | User identity authentication method, device, computer equipment and storage medium |
| CN111708995A (en) * | 2020-06-12 | 2020-09-25 | 中国建设银行股份有限公司 | Service processing method, device and equipment |
| CN111652596B (en) * | 2020-06-15 | 2024-08-13 | 深圳前海微众银行股份有限公司 | Anti-fraud method, device, terminal equipment and storage medium for credit business |
| CN111815457A (en) * | 2020-07-01 | 2020-10-23 | 北京金堤征信服务有限公司 | Evaluation method and device for target object |
| CN113452795B (en) * | 2020-07-27 | 2024-11-12 | 费希敏 | A system for setting access rights for associated devices |
| CN112231692A (en) * | 2020-10-13 | 2021-01-15 | 中移(杭州)信息技术有限公司 | Security authentication method, device, equipment and storage medium |
| CN112199652B (en) * | 2020-10-23 | 2023-08-25 | 网易(杭州)网络有限公司 | Login method, terminal, server, system, medium and equipment of application program |
| CN112653679B (en) * | 2020-12-14 | 2022-11-15 | 北京指掌易科技有限公司 | Dynamic identity authentication method, device, server and storage medium |
| CN112633986B (en) * | 2020-12-31 | 2022-07-22 | 北京华录新媒信息技术有限公司 | Intelligent online movie ticket exchange method and system |
| CN115017509A (en) * | 2021-03-05 | 2022-09-06 | 华为技术有限公司 | Risk measurement method of user account and related device |
| CN112966243B (en) * | 2021-03-30 | 2022-09-09 | 支付宝(杭州)信息技术有限公司 | Privacy-protected verification processing method and device |
| CN113553158A (en) * | 2021-07-29 | 2021-10-26 | 北京达佳互联信息技术有限公司 | A data processing method, device, electronic device and storage medium |
| CN113779521B (en) * | 2021-09-09 | 2024-05-24 | 北京安天网络安全技术有限公司 | Identity authentication method and device, storage medium and electronic equipment |
| CN113779632B (en) * | 2021-09-14 | 2023-08-22 | 深圳市神州路路通网络科技有限公司 | Method, system, equipment and readable storage medium for protecting sensitive information of vehicle |
| CN113987455A (en) * | 2021-10-25 | 2022-01-28 | 浙江中控技术股份有限公司 | BS architecture-based industrial control system multi-factor authentication login method and system |
| CN114244582B (en) * | 2021-11-29 | 2023-06-20 | 国网江西省电力有限公司电力科学研究院 | A low-profile data acquisition terminal authentication method for data association in the Internet of Things |
| CN114285614B (en) * | 2021-12-16 | 2025-07-22 | 北京安捷金科信息技术有限公司 | Identity authentication method, identity authentication system, and readable storage medium |
| CN113987466B (en) * | 2021-12-27 | 2022-04-12 | 国网浙江省电力有限公司 | Information sequencing auditing method and device based on middlebox and storage medium |
| CN114329386B (en) * | 2021-12-28 | 2025-01-07 | 奇安信科技集团股份有限公司 | User identity authentication method, device, computing equipment and computer storage medium |
| CN114444039B (en) * | 2021-12-31 | 2025-07-18 | 长威信息科技发展股份有限公司 | Identity verification method and terminal based on data model |
| CN114423007B (en) * | 2022-01-25 | 2025-10-17 | 北京邮电大学 | Determination method and determination device for terminal access point, electronic equipment and storage medium |
| CN115022002B (en) * | 2022-05-27 | 2024-02-06 | 中国电信股份有限公司 | Verification mode determining method and device, storage medium and electronic equipment |
| CN115408673B (en) * | 2022-11-02 | 2023-10-27 | 杭州优百顺科技有限公司 | Software validity period access control management system and method |
| CN115964687A (en) * | 2022-12-14 | 2023-04-14 | 武汉卓讯互动信息科技有限公司 | Block chain-based enterprise unified account authentication method and platform |
| CN116405290B (en) * | 2023-04-11 | 2025-10-10 | 中国工商银行股份有限公司 | A method, device, system, electronic device, storage medium and program product for authorization and authentication in cross-channel and multi-business scenarios |
| CN116738509B (en) * | 2023-08-14 | 2023-12-22 | 深圳市龙勤信息技术有限公司 | A blockchain-based electronic disk encryption storage system and method |
| CN116976897A (en) * | 2023-09-20 | 2023-10-31 | 青岛华正信息技术股份有限公司 | A digital execution system and method for comprehensive safety management indicators |
| CN117349811B (en) * | 2023-10-18 | 2024-04-05 | 广州元沣智能科技有限公司 | Information authentication system based on user identity |
| CN118261768B (en) * | 2024-05-27 | 2024-08-09 | 山东恒宇电子有限公司 | Bus passenger identification analysis method based on multidimensional information combination |
| CN118631594B (en) * | 2024-08-13 | 2024-10-15 | 深圳雪峰电子有限公司 | A two-way authenticated electronic detonator system and control method thereof |
| CN120639506B (en) * | 2025-08-05 | 2025-10-14 | 北京芯盾时代科技有限公司 | AI identity authentication system and method based on user behavior |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2492834A1 (en) * | 2011-02-28 | 2012-08-29 | Gemalto SA | Method for authenticating a user |
| EP2498529A1 (en) * | 2011-03-08 | 2012-09-12 | Trusted Logic Mobility SAS | User authentication method for accessing an online service |
| CN102510337B (en) * | 2011-12-15 | 2014-07-09 | 复旦大学 | Quantitative risk and income self-adaptive dynamic multiple-factor authentication method |
| CN104426847A (en) * | 2013-08-22 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Method, system and server for securely accessing and verifying an Internet service |
| CN104426884A (en) * | 2013-09-03 | 2015-03-18 | 深圳市腾讯计算机系统有限公司 | Method for authenticating identity and device for authenticating identity |
| CN103646197B (en) * | 2013-12-12 | 2016-06-15 | 中国石油大学(华东) | User reliability Verification System and method based on user behavior |
| CN107172049A (en) * | 2017-05-19 | 2017-09-15 | 北京信安世纪科技有限公司 | A kind of intelligent identity identification system |
-
2016
- 2016-11-16 CN CN201611010182.6A patent/CN108076018A/en active Pending
-
2017
- 2017-08-11 TW TW106127337A patent/TW201820194A/en unknown
- 2017-11-03 WO PCT/CN2017/109215 patent/WO2018090839A1/en not_active Ceased
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI712917B (en) * | 2018-07-17 | 2020-12-11 | 開曼群島商創新先進技術有限公司 | Method and device for detecting safety of data model |
| US11075942B2 (en) | 2018-07-27 | 2021-07-27 | Advanced New Technologies Co., Ltd. | Identity verification and account information updating methods and apparatuses |
| TWI743656B (en) * | 2019-05-31 | 2021-10-21 | 開曼群島商創新先進技術有限公司 | Verification method and device |
| US11218493B2 (en) | 2019-05-31 | 2022-01-04 | Advanced New Technologies Co., Ltd. | Identity verification |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018090839A1 (en) | 2018-05-24 |
| CN108076018A (en) | 2018-05-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TW201820194A (en) | Identity verification system, method, device, and account verification method | |
| US12229768B2 (en) | Fraud deterrence for secure transactions | |
| US10628828B2 (en) | Systems and methods for sanction screening | |
| US10037533B2 (en) | Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud | |
| US10346845B2 (en) | Enhanced automated acceptance of payment transactions that have been flagged for human review by an anti-fraud system | |
| TWI699720B (en) | Risk control method and device for business operation | |
| CN103875015B (en) | Gathered using the multiple-factor identity fingerprint of user behavior | |
| US8918904B2 (en) | Systems and methods for user identity verification and risk analysis using available social and personal data | |
| US10074089B1 (en) | Smart authentication and identification via voiceprints | |
| US9246899B1 (en) | Authentication and interaction tracking system and method | |
| US20120185386A1 (en) | Authentication tool | |
| US20130144888A1 (en) | Dynamic network analytics system | |
| EP2933981A1 (en) | Method and system of user authentication | |
| CN107729727B (en) | Real-name authentication method and device for account | |
| WO2017196609A1 (en) | User authentication and access control using identity services | |
| JP2018018511A (en) | System and method for identifying suspicious user behavior in user's interaction with various banking services | |
| CN105786707A (en) | Method and device for testing program | |
| Lovisotto et al. | Mobile biometrics in financial services: A five factor framework | |
| WO2020233070A1 (en) | Payment risk verification method and apparatus, computer device, and storage medium | |
| CN111489175B (en) | Online identity authentication method, device, system and storage medium | |
| CN111899100A (en) | Service control method, device and equipment and computer storage medium | |
| CN104704521B (en) | Multifactor profile and security fingerprint analysis | |
| CN108009406B (en) | Account freezing method, account unfreezing method and server | |
| CA2982231A1 (en) | Method of accessing netowrk connectivity with a portable computing device | |
| CN118333630A (en) | Abnormal transfer monitoring method and device and electronic equipment |