TWI751422B - Core product push and core method and system - Google Patents
Core product push and core method and system Download PDFInfo
- Publication number
- TWI751422B TWI751422B TW108120846A TW108120846A TWI751422B TW I751422 B TWI751422 B TW I751422B TW 108120846 A TW108120846 A TW 108120846A TW 108120846 A TW108120846 A TW 108120846A TW I751422 B TWI751422 B TW I751422B
- Authority
- TW
- Taiwan
- Prior art keywords
- user
- information
- category
- core body
- core
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本說明書實施例提供一種核身產品推送及核身方法和系統,通過用戶基礎資訊、線上操作環境資訊以及歷史操作資訊綜合確定向用戶推送的核身產品的類別,能夠根據用戶實際情況為用戶選擇具有不同安全性的核身產品,提高了核身靈活性。The embodiments of this specification provide a core product push and core body method and system, which comprehensively determine the type of core body product pushed to the user through the user's basic information, online operating environment information and historical operation information, and can select the core body product for the user according to the user's actual situation. Nuclei products with different safety features increase the flexibility of the nuclei.
Description
本說明書涉及資料處理技術領域,尤其涉及核身產品推送及核身方法和系統。 This specification relates to the technical field of data processing, and in particular, to core body product push and core body methods and systems.
核身系統是風險控制的重要環節,是輸出風險管控動作的重要依據。通過核身,能夠實現對帳戶是本人持有的核驗,防範非本人的操作導致帳號被盜。因此,有必要對核身方式進行改進。 The core body system is an important part of risk control and an important basis for outputting risk management and control actions. Through verification, it is possible to verify that the account is held by oneself, and prevent the account from being stolen due to non-personal operations. Therefore, it is necessary to improve the way of nuclear body.
基於此,本說明書提供了核身產品推送及核身方法和系統。 Based on this, this specification provides a core body product push and core body methods and systems.
根據本說明書實施例的第一態樣,提供一種核身產品推送方法,所述方法包括:根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證;若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗 證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 According to a first aspect of the embodiments of the present specification, there is provided a method for pushing a core body product, the method comprising: determining the core body product pushed to the user according to user basic information, online operating environment information and historical operation information of the user. category; if the category is the first category with low core security, the first category is verified according to the basic user information, online operating environment information and historical operation information; , online operating environment information and experience obtained from historical operating information The verification results are all verified, and the core body product of the first category is pushed to the user.
可選地,所述方法還包括:若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的任一驗證結果未通過驗證,向所述用戶推送核身安全性較高的第二類別的核身產品。 Optionally, the method further includes: if any verification result obtained according to the user basic information, online operating environment information and historical operation information fails the verification, pushing a second one with higher core security to the user. category of core products.
可選地,根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向用戶推送的核身產品的類別的步驟包括:分別對所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊進行評分,得到對應的分數;根據所述用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數確定所述核身產品的分數;若所述核身產品的分數小於或等於預設值,確定所述類別為第一類別;否則,確定所述類別為第二類別。 Optionally, the step of determining the category of the core product to be pushed to the user according to the user basic information, online operating environment information, and historical operation information includes: performing the steps on the user basic information, online operating environment information, and historical operation information respectively. Score to obtain the corresponding score; determine the score of the core body product according to the score corresponding to the basic user information, the score corresponding to the online operating environment information, and the score corresponding to the historical operation information; if the score of the core body product is less than or If it is equal to the preset value, it is determined that the category is the first category; otherwise, the category is determined to be the second category.
可選地,在根據用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向用戶推送的核身產品的類別之後,所述方法還包括:若確定向用戶推送的核身產品的類別為安全性較高的第二類別,向所述用戶推送所述第二類別的核身產品。 Optionally, after determining the category of the core body product pushed to the user according to the user's basic information, online operating environment information and historical operation information, the method further includes: if it is determined that the category of the core body product pushed to the user is security. A higher second category, pushing the core body products of the second category to the user.
可選地,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證的步驟包括:根據所述用戶基礎資訊獲取用戶對核身產品的接受度特徵,將所述接受度特徵輸入到預先訓練的第一分類模型,獲取所述用戶基礎資訊對應的驗證結果;其中,所述 接受度特徵用於表徵用戶對所述第一類別的核身產品的接受程度;和/或獲取所述線上操作環境資訊中的高危環境特徵,將所述高危環境特徵輸入到預先訓練的第二分類模型,獲取所述線上操作環境資訊對應的驗證結果;和/或獲取所述歷史操作資訊中的高危操作特徵,將所述高危操作特徵輸入到預先訓練的第三分類模型,獲取所述歷史操作資訊對應的驗證結果。 Optionally, the step of verifying the first category according to the user basic information, online operating environment information and historical operation information respectively includes: obtaining the user's acceptance feature of the core product according to the user basic information; The acceptance feature is input into the pre-trained first classification model, and the verification result corresponding to the basic user information is obtained; wherein, the The acceptance feature is used to characterize the user's acceptance of the first category of nuclear body products; and/or obtain the high-risk environment feature in the online operating environment information, and input the high-risk environment feature into the pre-trained second A classification model to obtain the verification results corresponding to the online operating environment information; and/or to obtain high-risk operation features in the historical operation information, and to input the high-risk operation features into a pre-trained third classification model to obtain the historical The verification result corresponding to the operation information.
可選地,所述接受度特徵包括用戶對歷史推送的核身產品的完成度和/或反饋結果;和/或所述高危環境特徵包括不在常用位址和/或IP位址存在被舉報記錄;和/或所述高危操作特徵包括資金大額支出、短時間內頻繁進行同一操作。 Optionally, the acceptance feature includes the user's degree of completion and/or the feedback result of the historically pushed core product; and/or the high-risk environment feature includes not having a reported record at a commonly used address and/or an IP address. ; and/or the characteristics of the high-risk operation include large expenditure of funds and frequent execution of the same operation in a short period of time.
可選地,所述方法還包括:獲取用戶對歷史推送的核身產品中各個流程的反饋結果;根據所述反饋結果確定未來時間內向所述用戶推送的核身產品中的核身流程。 Optionally, the method further includes: obtaining feedback results of the user on each process in the core body product pushed historically; determining the core body process in the core body product pushed to the user in the future according to the feedback result.
可選地,所述第二類別的核身產品包括生物資訊核身產品和/或金融卡核身產品;和/或所述第一類別的核身產品包括簡訊驗證碼核身產品和/或電子郵箱驗證碼核身產品。 Optionally, the verification products of the second category include bio-information verification products and/or financial card verification products; and/or the verification products of the first category include SMS verification code verification products and/or E-mail verification code verification products.
可選地,向所述用戶推送的核身產品的數量大於1。 Optionally, the number of core body products pushed to the user is greater than 1.
根據本說明書實施例的第二態樣,提供一種核身方法,所述方法包括:採用核身產品對用戶資訊進行核身;所述核身產品根據任一實施例所述的方法獲取。 According to a second aspect of the embodiments of this specification, there is provided a verification method, the method comprising: using a verification product to verify user information; the verification product is obtained according to the method described in any one of the embodiments.
可選地,所述方法還包括:若向用戶推送的核身產品 的數量大於1,當其中一種核身產品核身通過時,判定核身通過。 Optionally, the method further includes: if the core body product pushed to the user The number of is greater than 1, when one of the core body products passes through the core body, it is determined that the core body passes.
根據本說明書實施例的第三態樣,提供一種核身產品推送裝置,所述裝置包括:確定模組,用於根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;驗證模組,用於若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證;推送模組,用於若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。 According to a third aspect of the embodiments of the present specification, there is provided a device for pushing a core product, the device comprising: a determination module for determining the user to send to the user according to the user's basic user information, online operating environment information and historical operation information. The category of the pushed core product; the verification module is used for, if the category is the first category with low core security, respectively, according to the user basic information, online operating environment information and historical operation information One category is used for verification; the push module is used to push the core products of the first category to the user if the verification results obtained according to the basic user information, online operating environment information and historical operation information are all verified. .
根據本說明書實施例的第四態樣,提供一種核身裝置,所述裝置包括:核身模組,用於採用核身產品對用戶資訊進行核身;所述核身產品根據任一實施例所述的方法獲取。 According to a fourth aspect of the embodiments of the present specification, there is provided a nucleation device, the device comprising: a nucleation module for nudging user information by using a nucleation product; the nucleation product according to any one of the embodiments obtained by the method described.
根據本說明書實施例的第五態樣,提供一種電腦可讀儲存媒體,其上儲存有電腦程式,所述程式被處理器執行時實現任一實施例所述的方法。 According to a fifth aspect of the embodiments of the present specification, there is provided a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the method described in any one of the embodiments is implemented.
根據本說明書實施例的第六態樣,提供一種電腦設備,包括儲存器、處理器及儲存在儲存器上並可在處理器上運行的電腦程式,所述處理器執行所述程式時實現任一實施例所述的方法。 According to a sixth aspect of the embodiments of the present specification, a computer device is provided, including a storage, a processor, and a computer program stored on the storage and executable on the processor, the processor executing the program to achieve any The method of an embodiment.
應用本說明書實施例方案,通過用戶基礎資訊、線上操作環境資訊以及歷史操作資訊綜合確定向用戶推送的核身產品的類別,能夠根據用戶實際情況為用戶選擇具有不同安全性的核身產品,提高了核身靈活性。 應當理解的是,以上的一般描述和後文的細節描述僅是範例性和解釋性的,並不能限制本說明書。By applying the solutions of the embodiments of this specification, the types of core products to be pushed to users can be comprehensively determined through the user's basic information, online operating environment information and historical operation information. nuclear flexibility. It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the specification.
這裡將詳細地對範例性實施例進行說明,其範例表示在圖式中。下面的描述涉及圖式時,除非另有表示,不同圖式中的相同數字表示相同或相似的要素。以下範例性實施例中所描述的實施方式並不代表與本說明書相一致的所有實施方式。相反,它們僅是與如所附申請專利範圍中所詳述的、本說明書的一些態樣相一致的裝置和方法的例子。
在本說明書使用的術語是僅僅出於描述特定實施例的目的,而非意於限制本說明書。在本說明書和所附申請專利範圍中所使用的單數形式的“一種”、“所述”和“該”也意於包括多數形式,除非上下文清楚地表示其他含義。還應當理解,本文中使用的術語“和/或”是指並包含一個或多個相關聯的列出項目的任何或所有可能組合。
應當理解,儘管在本說明書可能採用術語第一、第二、第三等來描述各種資訊,但這些資訊不應限於這些術語。這些術語僅用來將同一類型的資訊彼此區分開。例如,在不脫離本說明書範圍的情況下,第一資訊也可以被稱為第二資訊,類似地,第二資訊也可以被稱為第一資訊。取決於語境,如在此所使用的詞語“如果”可以被解釋成為“在……時”或“當……時”或“響應於確定”。
如圖1所示,是一個實施例的核身場景示意圖。核身是指核驗身份。核身產品可包括人臉識別核身產品、簡訊驗證碼核身產品等。在一些主動場景(例如修改密碼核身、更換綁定手機號核身)下,用戶可以通過用戶端觸發核身流程,例如,可以通過向伺服器發送帳戶資訊(密碼、綁定的手機號等)更改請求來觸發核身流程。伺服器在該觸發下可以向用戶端傳回一種或多種核身產品。用戶通過用戶端傳回核身產品所需的身份驗證資訊,例如,簡訊驗證碼、人臉圖像、指紋資訊等,伺服器對用戶傳回的資訊進行驗證,並將核身結果傳回給用戶端。如果驗證成功,允許更改帳戶資訊;否則,不允許更改帳戶資訊。通過這種方式,能夠對操作者的身份進行核實,減少帳戶被盜用的情況,保障用戶的帳戶安全。
基於此,本說明書實施例提供一種核身產品推送方法,如圖2所示,所述方法可包括:
步驟202:根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;
步驟204:若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證;
步驟206:若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。
在步驟202中,可以將用戶基礎資訊、線上操作環境資訊以及歷史操作資訊共同作為確定向所述用戶推送的核身產品類別的依據。其中,用戶基礎資訊可包括用戶的學歷、年齡、註冊時間、是否認證用戶等用戶個人資訊。可以在用戶註冊時獲取用戶基礎資訊,也可以在觸發核身流程之後請求用戶提供用戶基礎資訊。獲取用戶基礎資訊之前,還可以先請求用戶授權,只有在授權成功之後,才獲取用戶基礎資訊。用戶基礎資訊可以作為判斷用戶對不同核身難度的核身產品的接受程度的依據。線上操作環境資訊可用於表徵用戶當前使用的網路操作環境的安全性,具體可包括網路類型(公共網路、家庭網路等)、網路IP位址的歷史被舉報次數、當前所處的網路IP位址是否為常用位址等資訊。歷史操作資訊可用於表徵用戶在歷史時間段內對帳戶執行的操作是否存在風險,具體可包括資金支出資訊、執行操作的時間間隔資訊(即,是否在短時間內頻繁進行同一操作)等資訊。
核身產品的類別與核身產品的安全性及操作複雜度相關。一般來說,核身產品的類別可分為第一類別和第二類別,其中,第一類別為核身安全性較低的類別,這種類別的核身產品通常包括若干個複雜度較低的核身流程。第二類別為核身安全性較高的類別,這種類別的核身產品通常包括若干個複雜度較高的核身流程。第一類別的核身產品可稱為弱核身,第二類別的核身產品可稱為強核身。一般來說,強核身對帳戶的安全保障高於弱核身;與此同時,強核身方式相對於弱核身也更加容易造成操作成本高,導致部分用戶無法通過核驗,最終帳戶被棄用。
通過將用戶基礎資訊、線上操作環境資訊以及歷史操作資訊共同作為確定向所述用戶推送的核身產品類別的依據,能夠綜合考慮用戶對核身產品的體驗感,以及潛在的核身威脅,在提高用戶體驗的同時保障一定的安全性。
在一個實施例中,可以分別對所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊進行評分,得到對應的分數;根據所述用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數確定所述核身產品的分數;若所述核身產品的分數小於或等於預設值,確定所述類別為第一類別;否則,確定所述類別為第二類別。
用戶基礎資訊對應的分數可用於表徵用戶接受強核身的程度,分數越高,用戶接受強核身的程度越高。例如,用戶註冊時間越長,用戶基礎資訊對應的分數越高,可認為用戶接受強核身的程度越高。線上操作環境資訊對應的分數可用於表徵用戶當前的線上操作環境的危險性,分數越高,危險性越高,從而採用強核身的需求越大。歷史操作資訊對應的分數可用於表徵用戶對帳戶的操作是否存在風險,分數越高,風險越高,從而採用強核身的需求越大。根據所述用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數確定所述核身產品的分數,可以是對用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數進行加權平均,也可以是根據預設的演算法或者模型來求解用戶基礎資訊對應的分數、線上操作環境資訊對應的分數以及歷史操作資訊對應的分數,以得到核身產品的分數。核身產品的分數越高,表示向用戶推送第二類別的核身產品的傾向性越高;反之,表示向用戶推送第一類別的核身產品的傾向性越高。
本步驟會綜合評估用戶當前的情況,例如當前操作下不僅會評估基礎的網路等環境資訊,還會根據用戶的基礎資訊、操作行為變化、近期來電留言等諮詢資訊得出一個綜合評分作為初步區分強弱核身的臨界值。
在步驟204中,若步驟202中判定出的類別為核身安全性較低的第一類別,則可以對該判定結果進行再次驗證,以確定採用第一類別的核身產品的可靠程度。這樣,可以進一步提高核身產品的可靠性。
本步驟可執行三次驗證,分別是:根據用戶基礎資訊進行驗證、根據線上操作環境資訊進行驗證,以及根據歷史操作資訊進行驗證。具體來說,三次驗證可分別通過以下方式進行:
在根據用戶基礎資訊進行驗證時,可以根據所述用戶基礎資訊獲取用戶對核身產品的接受度特徵,將所述接受度特徵輸入到預先訓練的第一分類模型,獲取所述用戶基礎資訊對應的驗證結果;其中,所述接受度特徵用於表徵用戶對所述第一類別的核身產品的接受程度。
本步驟的第一分類模型可以採用一個體感評估模型來實現,體感評估模型可以是一個評估當前用戶使用過程心裡接受度的二分類器,主要關注於用戶的安全感受、使用訴求和接受程度。其中,所述接受度特徵可以包括用戶對歷史推送的核身產品的完成度和/或反饋結果。例如,可以獲取用戶對最近一個月內推送的核身產品的完成度。完成度可以通過已完成的核身流程占全部核身流程的比例來計算。如果完成度大於預設的完成度臨界值,可以將該核身產品作為向該用戶推送的備選核身產品之一,並在需要推送時,將備選核身產品中的至少一者推送給用戶。如果完成度小於完成度臨界值,則不向該用戶推送所述核身產品。反饋結果可以是用戶對整個核身產品的反饋結果,例如,通過問卷調查等方式獲取的用戶“是”或者“否”接受該核身產品的反饋結果;也可以是用戶對核身產品中某個流程的反饋結果,例如,核身產品包括獲取簡訊驗證碼、進行人臉識別以及輸入綁定的金融卡號三個流程,而用戶每次在核身過程中需要進行人臉識別時即退出核身流程,則可以通過後臺獲取該反饋資訊。
Exemplary embodiments will be described in detail herein, examples of which are illustrated in the drawings. When the following description refers to the drawings, the same numerals in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples are not intended to represent all implementations consistent with this specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of this specification as detailed in the appended claims.
The terms used in this specification are for the purpose of describing particular embodiments only and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a," "the," and "the" are intended to include plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and/or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this specification to describe various information, such information should not be limited by these terms. These terms are only used to distinguish information of the same type from one another. For example, the first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information without departing from the scope of the present specification. Depending on the context, the word "if" as used herein can be interpreted as "at the time of" or "when" or "in response to determining."
As shown in FIG. 1 , it is a schematic diagram of a nuclear body scene of an embodiment. Verification refers to verification of identity. Nucleation products may include facial recognition nucleation products, SMS verification code nucleation products, etc. In some active scenarios (such as changing the password verification, changing the binding mobile phone number verification), the user can trigger the verification process through the client, for example, by sending account information (password, bound mobile phone number, etc.) to the server ) change request to trigger the core body process. Under the trigger, the server can return one or more core products to the client. The user returns the identity verification information required by the verification product through the client, such as SMS verification code, face image, fingerprint information, etc. The server verifies the information returned by the user and sends the verification result back to user terminal. If verification is successful, changes to account information are allowed; otherwise, changes to account information are not allowed. In this way, the identity of the operator can be verified, the situation of account being stolen can be reduced, and the security of the user's account can be guaranteed.
Based on this, an embodiment of this specification provides a method for pushing a core body product, as shown in FIG. 2 , the method may include:
Step 202: Determine the category of the core product to be pushed to the user according to the user's basic information, online operating environment information and historical operation information;
Step 204: If the category is the first category with low core security, verify the first category according to the user basic information, online operating environment information and historical operation information respectively;
Step 206: If the verification results obtained according to the user basic information, online operating environment information, and historical operation information are all verified, push the first category of core body products to the user.
In
將所述接受度特徵輸入到預先訓練的第一分類模型,從而可以獲取用戶所屬的類別,即,傾向於接受強核身的類別,或者傾向於接受弱核身的類別。若驗證結果表明用戶為傾向於接受強核身的類別,則表示驗證失敗;若驗證結果表明用戶為傾向於接受弱核身的類別,則表示驗證成功。 The acceptance degree feature is input into the pre-trained first classification model, so that the category to which the user belongs can be obtained, that is, the category that tends to accept a strong core body, or a category that tends to accept a weak core body. If the verification result shows that the user is in a category that tends to accept strong nuclei, it means that the verification fails; if the verification result shows that the user is in a category that tends to accept weak nuclei, it means that the verification is successful.
在根據線上操作環境資訊進行驗證時,可以獲取所述線上操作環境資訊中的高危環境特徵,將所述高危環境特徵輸入到預先訓練的第二分類模型,獲取所述線上操作環境資訊對應的驗證結果。 When verifying according to the online operating environment information, the high-risk environment features in the online operating environment information can be obtained, the high-risk environment features can be input into the pre-trained second classification model, and the verification corresponding to the online operating environment information can be obtained. result.
本步驟的第二分類模型可以採用一個環境評估模型來實現,環境評估模型可以用於評估當前操作環境是否處於風險之中。其中,所述高危環境特徵可包括不在常用位址和/或IP位址存在被舉報記錄等特徵。將所述高危環境特徵輸入到預先訓練的第二分類模型,從而可以獲取當前操作環境的類別,即,存在風險的類別,或者不存在風險的類別。若驗證結果表明當前操作環境為存在風險的類別,則表示校驗失敗;若驗證結果表明當前操作環境為不存在風險的類別,則表示驗證成功。 The second classification model of this step can be implemented by using an environmental assessment model, and the environmental assessment model can be used to assess whether the current operating environment is at risk. Wherein, the high-risk environment features may include features such as not having a reported record at a commonly used address and/or an IP address. The high-risk environment feature is input into the pre-trained second classification model, so that the category of the current operating environment, that is, the category with risk or the category without risk can be obtained. If the verification result indicates that the current operating environment is in a category with risks, it indicates that the verification fails; if the verification result indicates that the current operating environment is in a category without risks, it indicates that the verification is successful.
在根據歷史操作資訊進行驗證時,可以獲取所述歷史操作資訊中的高危操作特徵,將所述高危操作特徵輸入到預先訓練的第三分類模型,獲取所述歷史操作資訊對應的驗證結果。 When verifying according to historical operation information, high-risk operation features in the historical operation information can be obtained, and the high-risk operation features can be input into a pre-trained third classification model to obtain a verification result corresponding to the historical operation information.
本步驟的第三分類模型可以採用一個行為評估模型來實現,行為評估模型可用於對用戶的操作過程進行評估,評測用戶操作高危或者會造成高危情形。其中,所述高危操作特徵可包括資金大額支出、短時間內頻繁進行同一操作等特徵。將所述高危操作特徵輸入到預先訓練的第三分類模型,從而可以獲取當前操作行為的類別,即,存在風險的類別,或者不存在風險的類別。若驗證結果表明當前操作行為為存在風險的類別,則表示校驗失敗;若驗證結果表明當前操作行為為不存在風險的類別,則表示驗證成功。 The third classification model in this step can be implemented by using a behavior evaluation model, which can be used to evaluate the user's operation process, and evaluate the high-risk or high-risk situation of the user's operation. The high-risk operation characteristics may include characteristics such as large expenditure of funds, frequent execution of the same operation in a short period of time, and the like. The high-risk operation feature is input into the pre-trained third classification model, so that the category of the current operation behavior, that is, the category with risk or the category without risk can be obtained. If the verification result indicates that the current operation behavior is in the category with risk, it means that the verification fails; if the verification result indicates that the current operation behavior is in the category without risk, it indicates that the verification is successful.
在一個實施例中,若確定向用戶推送的核身產品的類 別為安全性較高的第二類別,則可以直接向所述用戶推送所述第二類別的核身產品,無需進行驗證。 In one embodiment, if it is determined that the category of the core product pushed to the user is If it is the second category with higher security, the core body product of the second category can be directly pushed to the user without verification.
在步驟206中,若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的任一驗證結果未通過驗證,則表示當前採用第一類別的核身產品與實際情況可能不符合,例如,用戶更加傾向於採用安全性更高的第二類別的核身產品,或者當前操作環境或者用戶操作行為存在風險,需要採用更加安全的核身方式,因此,可以向所述用戶推送核身安全性較高的第二類別的核身產品。
In
在一個實施例中,還可以獲取用戶對歷史推送的核身產品中各個流程的反饋結果;根據所述反饋結果確定未來時間內向所述用戶推送的核身產品中的核身流程。例如,歷史推送給用戶的核身產品中包括流程A,B和C,且反饋結果表明用戶對流程B的接受程度較低,則可在未來推送給用戶的核身產品中去除掉流程B。還可以將流程B替換為流程D,其中,流程D可以是資料庫中預存的流程。這樣,每次推送給用戶的核身產品中可能包括不同的核身流程,一態樣更加符合實際應用的需求,另一態樣也提高了不法分子進行風險對抗的難度。 In one embodiment, the user's feedback results of each process in the core body product pushed historically can also be obtained; the core body process in the core body product pushed to the user in the future is determined according to the feedback result. For example, processes A, B and C are included in the core body products pushed to users in the past, and the feedback result shows that the user has a low degree of acceptance of process B, then process B can be removed from core body products pushed to users in the future. The process B can also be replaced with a process D, where the process D can be a pre-stored process in the database. In this way, the core body products pushed to users each time may include different core body processes. One aspect is more in line with the needs of practical applications, and the other aspect also increases the difficulty of criminals in risk confrontation.
在一個實施例中,第一類別的核身產品可以是包括若干個難度係數較低的流程的核身產品,第二類別的核身產品可以是包括若干個難度係數較高的流程的核身產品。每個流程的難度係數可以預先設定。例如,所述第二類別的核身產品包括生物資訊核身產品和/或金融卡核身產品; 所述第一類別的核身產品包括簡訊驗證碼核身產品和/或電子郵箱驗證碼核身產品。 In one embodiment, the core product of the first category may be a core product including several processes with a relatively low degree of difficulty, and the core product of the second category may be a core product including a number of processes with a relatively high degree of difficulty product. The difficulty factor of each process can be preset. For example, the second category of verification products includes biometric verification products and/or financial card verification products; The first category of verification products includes SMS verification code verification products and/or email verification code verification products.
在一個實施例中,向所述用戶推送的核身產品的數量大於1。也就是說,如果確定向所述用戶推送所述第一類別的核身產品,每次可以向用戶推送多種第一類別的核身產品。同理,如果確定向所述用戶推送所述第二類別的核身產品,每次可以向用戶推送多種第二類別的核身產品。用戶在進行核身時,可以自行選擇其中一種核身產品,只要其中一種核身產品核身驗證通過,即表示用戶核身通過。通過提供多種選擇方案供用戶主動選擇,能夠提高用戶的自主選擇性,核身積極性和通過率,進一步提高了用戶體驗。 In one embodiment, the number of core products pushed to the user is greater than one. That is, if it is determined to push the first category of nudity products to the user, multiple nucleated body products of the first category may be pushed to the user each time. Similarly, if it is determined to push the second category of nudity products to the user, multiple nucleated body products of the second category may be pushed to the user each time. When a user performs a nudging, he can choose one of the nudging products by himself. As long as one of the nudging products passes the nudging verification, it means that the user has passed the nudging. By providing a variety of options for users to actively choose, it can improve the user's independent selectivity, core enthusiasm and pass rate, and further improve the user experience.
本說明書實施例的方案可通過圖3(a)所示的核身產品推送系統執行圖3(b)所示的流程來實現。該系統可包括資料層、評估層和核身層。其中,資料層可以採集用戶基礎資訊、操作環境資訊和歷史操作資訊。評估層可包括用戶綜合評分模組以及體感評估模型、環境評估模型和行為評估模型,其中體感評估模型、環境評估模型和行為評估模型可分別採用一個二分類器來實現。核身層可包括強校驗決策模組、弱校驗決策模組和核身驗證模組。用戶綜合評分模組可以對用戶基礎資訊、操作環境資訊和歷史操作資訊進行綜合評分,如果得到的分數大於預設值,則採用強核身校驗決策;如果得到的分數小於或等於預設值,則通過體感評估模型、環境評估模型和行為評估模型進一步進行驗證,根據驗證結果確定採用強核身校驗決策或者弱核身校驗決策。如果體感評估模型、環境評估模型和行為評估模型中的任意一者判定為採用強校驗,則採用強校驗;如果三者均判定為採用弱校驗,則採用弱校驗。若評估層的評估結果為強核身校驗,則執行強校驗決策模組的功能;若評估層的評估結果為弱核身校驗,則執行弱校驗決策模組的功能。強/弱校驗決策模組可確定推送給用戶的核身產品,核身驗證模組可採用該核身產品進行核身驗證。
本說明書實施例的方案在識別使用環境的同時,更考慮到用戶行為、安全感受和自身訴求,提供了一套安全友好的核身校驗。該核身方式基於用戶核身體感、線上環境和歷史操作的綜合評分,同時考慮用戶特點、操作合理性及環境風險性,形成一套根據用戶的不同訴求和不同感受,對不同用戶群體以及對各群組差異化核身校驗。該系統能在確保環境安全的前提下,根據用戶的自身需求和感受,以用戶更可能接受的方式進行核身,有效提高了用戶的核身積極性和成功率,核身系統配置靈活。
如圖4所示,本說明書實施例還提供一種核身方法,所述方法可包括步驟402:採用核身產品對用戶資訊進行核身;其中,所述核身產品根據任一實施例所述的方法獲取。
進一步地,若向用戶推送的核身產品的數量大於1,當其中一種核身產品核身通過時,判定核身通過。
以上實施例中的各種技術特徵可以任意進行組合,只要特徵之間的組合不存在衝突或矛盾,但是限於篇幅,未進行一一描述,因此上述實施方式中的各種技術特徵的任意進行組合也屬本說明書公開的範圍。
與上述方法相對應,本說明書實施例還提供一種核身產品推送裝置,如圖5所示,所述裝置可包括:
確定模組502,用於根據用戶的用戶基礎資訊、線上操作環境資訊以及歷史操作資訊確定向所述用戶推送的核身產品的類別;
驗證模組504,用於若所述類別為核身安全性較低的第一類別,分別根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊對所述第一類別進行驗證;
推送模組506,用於若根據所述用戶基礎資訊、線上操作環境資訊以及歷史操作資訊獲得的驗證結果均為驗證通過,向所述用戶推送所述第一類別的核身產品。
如圖6所示,本說明書實施例還提供一種核身裝置,所述裝置可包括:核身模組602,用於採用核身產品對用戶資訊進行核身;所述核身產品根據任一實施例所述的方法獲取。
上述裝置中各個模組的功能和作用的實現過程具體詳情見上述方法中對應步驟的實現過程,在此不再贅述。
對於裝置實施例而言,由於其基本對應於方法實施例,所以相關之處參見方法實施例的部分說明即可。以上所描述的裝置實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是實體上分開的,作為模組顯示的部件可以是或者也可以不是實體模組,即可以位於一個地方,或者也可以分佈到多個網路模組上。可以根據實際的需要選擇其中的部分或者全部模組來實現本說明書方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。
本說明書裝置的實施例可以應用在電腦設備上,例如伺服器或終端設備。裝置實施例可以通過軟體實現,也可以通過硬體或者軟硬體結合的方式實現。以軟體實現為例,作為一個邏輯意義上的裝置,是通過其所在檔案處理的處理器將非揮發性儲存器中對應的電腦程式指令讀取到記憶體中運行形成的。從硬體層面而言,如圖7所示,為本說明書裝置所在電腦設備的一種硬體結構圖,除了圖7所示的處理器702、記憶體704、網路介面706、以及非揮發性儲存器708之外,實施例中裝置所在的伺服器或電子設備,通常根據該電腦設備的實際功能,還可以包括其他硬體,對此不再贅述。
相應的地,本說明書實施例還提供一種電腦儲存媒體,其上儲存有電腦程式,所述程式被處理器執行時實現任一實施例所述的方法。
相應的地,本說明書實施例還提供一種電腦設備,包括儲存器、處理器及儲存在儲存器上並可在處理器上運行的電腦程式,所述處理器執行所述程式時實現任一實施例所述的方法。
本發明可採用在一個或多個其中包含有程式代碼的儲存媒體(包括但不限於磁碟儲存器、CD-ROM、光學儲存器等)上實施的電腦程式產品的形式。電腦可用儲存媒體包括永久性和非永久性、可移動和非可移動媒體,可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括但不限於:相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。
本領域技術人員在考慮說明書及實踐這裡公開的說明書後,將容易想到本公開的其它實施方案。本公開意於涵蓋本公開的任何變型、用途或者適應性變化,這些變型、用途或者適應性變化遵循本公開的一般性原理並包括本公開未公開的本技術領域中的眾所皆知常識或慣用技術手段。說明書和實施例僅被視為範例性的,本公開的真正範圍和精神由下面的申請專利範圍指出。
應當理解的是,本公開並不局限於上面已經描述並在圖式中顯示的精確結構,並且可以在不脫離其範圍進行各種修改和改變。本公開的範圍僅由所附的申請專利範圍來限制。
以上所述僅為本公開的較佳實施例而已,並不用以限制本公開,凡在本公開的精神和原則之內,所做的任何修改、等同替換、改進等,均應包含在本公開保護的範圍之內。The solution of the embodiment of this specification can be implemented by executing the process shown in FIG. 3(b) by the core body product push system shown in FIG. 3(a). The system may include a data layer, an evaluation layer, and a core body layer. Among them, the data layer can collect basic user information, operating environment information and historical operation information. The evaluation layer may include a user comprehensive scoring module, a somatosensory evaluation model, an environmental evaluation model and a behavioral evaluation model, wherein the somatosensory evaluation model, the environmental evaluation model and the behavioral evaluation model may be implemented by using a binary classifier respectively. The core body layer may include a strong verification decision module, a weak verification decision module and a core body verification module. The user comprehensive scoring module can comprehensively score the user's basic information, operating environment information and historical operation information. If the obtained score is greater than the preset value, a strong verification decision will be adopted; if the obtained score is less than or equal to the preset value , then further verification is carried out through the somatosensory evaluation model, the environmental evaluation model and the behavioral evaluation model, and according to the verification results, it is determined to adopt a strong core body verification decision or a weak core body verification decision. If any one of the somatosensory evaluation model, the environmental evaluation model, and the behavioral evaluation model is determined to use strong verification, the strong verification is adopted; if all three are determined to be weak verification, the weak verification is adopted. If the evaluation result of the evaluation layer is strong verification, the function of the strong verification decision module is executed; if the evaluation result of the evaluation layer is the weak verification, the function of the weak verification decision module is executed. The strong/weak verification decision module can determine the core body product to be pushed to the user, and the core body verification module can use the core body product for core body verification.
The solutions of the embodiments of this specification provide a set of safe and friendly verification of identity while taking into account the user's behavior, security feeling and their own demands while recognizing the use environment. The core body method is based on the comprehensive score of the user's core body feeling, online environment and historical operations, and considers the user's characteristics, operation rationality and environmental risk. Differentiated core verification of each group. Under the premise of ensuring the safety of the environment, the system can perform the core body in a way that the user is more likely to accept according to the user's own needs and feelings, effectively improving the user's core body enthusiasm and success rate, and the core body system configuration is flexible.
As shown in FIG. 4 , an embodiment of the present specification further provides a method for authentication, and the method may include step 402 : use an authentication product to authenticate user information; wherein the authentication product is according to any one of the embodiments. method to obtain.
Further, if the number of core products pushed to the user is greater than 1, when one of the core products has passed the core, it is determined that the core has passed.
Various technical features in the above embodiments can be arbitrarily combined, as long as there is no conflict or contradiction between the combinations of features, but due to space limitations, they are not described one by one. Therefore, any combination of various technical features in the above-mentioned embodiments also belongs to The scope of the disclosure of this specification.
Corresponding to the above method, an embodiment of the present specification further provides a device for pushing a core body product, as shown in FIG. 5 , the device may include:
A
202〜206‧‧‧步驟
402‧‧‧步驟
502‧‧‧確定模組
504‧‧‧驗證模組
506‧‧‧推送模組
602‧‧‧核身模組
702‧‧‧處理器
704‧‧‧記憶體
706‧‧‧網路介面
708‧‧‧非揮發性儲存器202~206‧‧‧Steps
402‧‧‧
此處的圖式被併入說明書中並構成本說明書的一部分,顯示了符合本說明書的實施例,並與說明書一起用於解釋本說明書的原理。 圖1是一個實施例的核身場景示意圖。 圖2是本說明書一個實施例的核身產品推送方法流程圖。 圖3(a)是本說明書一個實施例的核身產品推送系統的總體架構圖。 圖3(b)是本說明書一個實施例的核身產品推送方法的總體流程圖。 圖4是本說明書一個實施例的核身方法流程圖。 圖5是本說明書一個實施例的核身產品推送裝置的方塊圖。 圖6是本說明書一個實施例的核身裝置的方塊圖。 圖7是本說明書一個實施例的用於實施本說明書實施例方法的電腦設備的示意圖。The drawings incorporated herein into and constitute a part of this specification illustrate embodiments consistent with this specification, and together with the description serve to explain the principles of this specification. FIG. 1 is a schematic diagram of a core body scene according to an embodiment. FIG. 2 is a flowchart of a method for pushing a core body product according to an embodiment of the present specification. Fig. 3(a) is an overall architecture diagram of a core body product push system according to an embodiment of the present specification. Fig. 3(b) is an overall flow chart of a method for pushing a core body product according to an embodiment of the present specification. FIG. 4 is a flowchart of a core body method according to an embodiment of the present specification. FIG. 5 is a block diagram of a core body product pushing device according to an embodiment of the present specification. FIG. 6 is a block diagram of a core device according to an embodiment of the present specification. FIG. 7 is a schematic diagram of a computer device for implementing the method of the embodiment of the present specification according to an embodiment of the present specification.
Claims (14)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810931250.5 | 2018-08-15 | ||
| CN201810931250.5A CN109359972B (en) | 2018-08-15 | 2018-08-15 | Core body product push and core body method and system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW202009834A TW202009834A (en) | 2020-03-01 |
| TWI751422B true TWI751422B (en) | 2022-01-01 |
Family
ID=65350025
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW108120846A TWI751422B (en) | 2018-08-15 | 2019-06-17 | Core product push and core method and system |
Country Status (3)
| Country | Link |
|---|---|
| CN (2) | CN112508568B (en) |
| TW (1) | TWI751422B (en) |
| WO (1) | WO2020034761A1 (en) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112508568B (en) * | 2018-08-15 | 2024-08-30 | 创新先进技术有限公司 | Identity verification product push and identity verification method and system |
| CN110071915B (en) * | 2019-04-10 | 2021-08-06 | 创新先进技术有限公司 | An identity verification product push method, device, device and system architecture |
| CN110659466B (en) * | 2019-09-26 | 2021-11-23 | 支付宝(杭州)信息技术有限公司 | Method and device for processing encryption behavior |
| CN110795707A (en) * | 2019-10-25 | 2020-02-14 | 支付宝(杭州)信息技术有限公司 | Core body strategy recommendation method and device and electronic equipment |
| CN110879865B (en) * | 2019-10-31 | 2022-08-12 | 支付宝(杭州)信息技术有限公司 | Recommended method and apparatus for core body products |
| CN112084486A (en) * | 2020-09-08 | 2020-12-15 | 中国平安财产保险股份有限公司 | User information verification method, device, electronic device and storage medium |
| CN112966243B (en) * | 2021-03-30 | 2022-09-09 | 支付宝(杭州)信息技术有限公司 | Privacy-protected verification processing method and device |
| CN115767537B (en) * | 2022-11-15 | 2023-10-17 | 南京鼎山信息科技有限公司 | Permission processing method and device for short message verification code and computer equipment |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW200642408A (en) * | 2004-12-07 | 2006-12-01 | Farsheed Atef | System and method for identity verification and management |
| US20090178144A1 (en) * | 2000-11-13 | 2009-07-09 | Redlich Ron M | Data Security System and with territorial, geographic and triggering event protocol |
| CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
| US8572391B2 (en) * | 2003-09-12 | 2013-10-29 | Emc Corporation | System and method for risk based authentication |
| CN105678544A (en) * | 2015-12-31 | 2016-06-15 | 深圳前海微众银行股份有限公司 | Risk monitoring method of remote account opening and server |
| CN107018119A (en) * | 2016-08-30 | 2017-08-04 | 阿里巴巴集团控股有限公司 | Authentication system, method and platform |
| TW201804397A (en) * | 2016-07-22 | 2018-02-01 | 阿里巴巴集團服務有限公司 | Risk control method and device for business operation |
Family Cites Families (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8474018B2 (en) * | 2010-09-03 | 2013-06-25 | Ebay Inc. | Role-based attribute based access control (RABAC) |
| CN103888255B (en) * | 2012-12-21 | 2017-12-22 | 中国移动通信集团公司 | A kind of identity identifying method, apparatus and system |
| KR101436404B1 (en) * | 2013-02-15 | 2014-09-01 | 주식회사 안랩 | User authenticating method and apparatus |
| CN104349313B (en) * | 2013-07-23 | 2018-12-07 | 阿里巴巴集团控股有限公司 | Service authorization method, device and system |
| US9331994B2 (en) * | 2014-02-07 | 2016-05-03 | Bank Of America Corporation | User authentication based on historical transaction data |
| US9185101B2 (en) * | 2014-02-07 | 2015-11-10 | Bank Of America Corporation | User authentication based on historical user behavior |
| CN104063150A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | Mobile terminal capable of entering corresponding scene modes by means of face recognition and implementation method thereof |
| WO2016049898A1 (en) * | 2014-09-30 | 2016-04-07 | 华为技术有限公司 | Method and apparatus for identity authentication and user equipment |
| US9684775B2 (en) * | 2014-10-15 | 2017-06-20 | Qualcomm Incorporated | Methods and systems for using behavioral analysis towards efficient continuous authentication |
| CN104301117B (en) * | 2014-10-22 | 2017-11-28 | 中国联合网络通信集团有限公司 | Identity verify method and device |
| CN106295349B (en) * | 2015-05-29 | 2020-06-05 | 阿里巴巴集团控股有限公司 | Account stolen risk identification method, identification device and prevention and control system |
| CN106713241B (en) * | 2015-11-16 | 2019-09-27 | 腾讯科技(深圳)有限公司 | A kind of auth method, device and system |
| CN105704155B (en) * | 2016-03-31 | 2018-11-09 | 广州华多网络科技有限公司 | Information-pushing method and device |
| CN105933328B (en) * | 2016-06-12 | 2017-07-18 | 北京三快在线科技有限公司 | A kind for the treatment of method and apparatus of user access activity |
| CN106251214A (en) * | 2016-08-02 | 2016-12-21 | 东软集团股份有限公司 | account monitoring method and device |
| CN106899567B (en) * | 2016-08-24 | 2019-12-13 | 阿里巴巴集团控股有限公司 | User authentication method, device and system |
| CN107872433A (en) * | 2016-09-27 | 2018-04-03 | 腾讯科技(深圳)有限公司 | A kind of auth method and its equipment |
| CN108076018A (en) * | 2016-11-16 | 2018-05-25 | 阿里巴巴集团控股有限公司 | Identity authentication system, method, device and account authentication method |
| CN107104973A (en) * | 2017-05-09 | 2017-08-29 | 北京潘达互娱科技有限公司 | The method of calibration and device of user behavior |
| CN107124420A (en) * | 2017-05-10 | 2017-09-01 | 北京潘达互娱科技有限公司 | Auth method and device |
| CN112508568B (en) * | 2018-08-15 | 2024-08-30 | 创新先进技术有限公司 | Identity verification product push and identity verification method and system |
-
2018
- 2018-08-15 CN CN202011439348.2A patent/CN112508568B/en active Active
- 2018-08-15 CN CN201810931250.5A patent/CN109359972B/en active Active
-
2019
- 2019-06-17 TW TW108120846A patent/TWI751422B/en not_active IP Right Cessation
- 2019-06-24 WO PCT/CN2019/092516 patent/WO2020034761A1/en not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090178144A1 (en) * | 2000-11-13 | 2009-07-09 | Redlich Ron M | Data Security System and with territorial, geographic and triggering event protocol |
| US8572391B2 (en) * | 2003-09-12 | 2013-10-29 | Emc Corporation | System and method for risk based authentication |
| TW200642408A (en) * | 2004-12-07 | 2006-12-01 | Farsheed Atef | System and method for identity verification and management |
| CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
| CN105678544A (en) * | 2015-12-31 | 2016-06-15 | 深圳前海微众银行股份有限公司 | Risk monitoring method of remote account opening and server |
| TW201804397A (en) * | 2016-07-22 | 2018-02-01 | 阿里巴巴集團服務有限公司 | Risk control method and device for business operation |
| CN107018119A (en) * | 2016-08-30 | 2017-08-04 | 阿里巴巴集团控股有限公司 | Authentication system, method and platform |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2020034761A1 (en) | 2020-02-20 |
| CN112508568A (en) | 2021-03-16 |
| CN109359972B (en) | 2020-10-30 |
| CN112508568B (en) | 2024-08-30 |
| TW202009834A (en) | 2020-03-01 |
| CN109359972A (en) | 2019-02-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TWI751422B (en) | Core product push and core method and system | |
| US12010513B2 (en) | Method for automatic possession-factor authentication | |
| US11075942B2 (en) | Identity verification and account information updating methods and apparatuses | |
| US10868672B1 (en) | Establishing and verifying identity using biometrics while protecting user privacy | |
| EP3719678B1 (en) | Identity verification method and apparatus | |
| US10771471B2 (en) | Method and system for user authentication | |
| US12341771B2 (en) | Context-based authentication of a user | |
| CN107645482A (en) | A kind of risk control method and device for business operation | |
| US12079810B2 (en) | Method for determining the likelihood for someone to remember a particular transaction | |
| US11321449B2 (en) | System for security analysis and authentication across downstream applications | |
| CN109784031B (en) | A kind of account identity verification processing method and device | |
| US11575670B2 (en) | Adaptive user authentication | |
| CN110276178B (en) | A risk control method, device and equipment based on identity verification | |
| CN108876386B (en) | Object authentication method and device, and transaction method and device based on object authentication | |
| US12236430B2 (en) | Biometrics-infused dynamic knowledge-based authentication tool | |
| HK40049164B (en) | Identity verification product pushing method, identity verification method, and systems | |
| HK40049164A (en) | Identity verification product pushing method, identity verification method, and systems | |
| EP4075364A1 (en) | Method for determining the likelihood for someone to remember a particular transaction | |
| WO2023203543A1 (en) | Method and system for determining at least one right associated with at least one given computing node | |
| CN121304170A (en) | Glasses payment method, device, glasses, equipment, storage medium and program product | |
| Lai | Intelligent online risk-based authentication using Bayesian network model | |
| CN114444039A (en) | A data model-based authentication method and terminal | |
| CN119648227A (en) | Transfer processing method, device, equipment, storage medium and program product |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |