CN106921626B - User registration method and device - Google Patents

User registration method and device Download PDF

Info

Publication number
CN106921626B
CN106921626B CN201510997278.5A CN201510997278A CN106921626B CN 106921626 B CN106921626 B CN 106921626B CN 201510997278 A CN201510997278 A CN 201510997278A CN 106921626 B CN106921626 B CN 106921626B
Authority
CN
China
Prior art keywords
user
registered
matched
registration
matching degree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510997278.5A
Other languages
Chinese (zh)
Other versions
CN106921626A (en
Inventor
栗志果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510997278.5A priority Critical patent/CN106921626B/en
Publication of CN106921626A publication Critical patent/CN106921626A/en
Application granted granted Critical
Publication of CN106921626B publication Critical patent/CN106921626B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application relates to the technical field of internet, in particular to a user registration method and device, which are used for solving the problems that registration efficiency is reduced by adopting a more complex registration verification process, and a large number of junk accounts and yellow cattle accounts may appear by adopting a simple registration verification process, so that network resources or application resources are wasted. The embodiment of the application provides a user registration method, which comprises the following steps: after receiving a registration request of a user to be registered, searching the safety score of the user to be registered in a database storing the safety scores of different users according to the registered user information corresponding to the registration request; selecting a registration verification mode according to the searched safe score; wherein, different safe score ranges correspond to different registration verification modes; and providing registration service for the user to be registered according to the selected registration verification mode.

Description

User registration method and device
Technical Field
The present application relates to the field of internet technologies, and in particular, to a user registration method and apparatus.
Background
Currently, when a website or an Application (APP) provides a service for a user, the user is usually required to register first, and the user is usually required to input verification information such as a mobile phone number, a short message verification code and the like in the registration process.
In order to simplify the registration process, one of the currently commonly used registration methods is an open authorization (Oauth) method, i.e., a user can skip registration and use an existing third-party account to log in. Specifically, a user clicks a third-party login button in a current APP or website, the current APP or website initiates authorization verification to the third-party website, the user clicks approval authorization, and the current APP or website acquires information and authorization of the user on the third-party website. The main problems of Oauth authentication are: the method can not prevent the generation of a large amount of junk accounts and cattle accounts, and provides convenience for the creation of the junk accounts and the cattle accounts. A hacker only needs to create an account in a weak system, and then can realize the creation of a junk account in an automatic mode; in addition, non-native authorization processes result in low conversion of high value users, mainly due to: when a user has a high-value account of a third-party website, great concerns exist about which information the third-party website authorizes.
If registration authorization is not obtained through the third-party website, but a native registration method (i.e., registration is performed on the website to be registered or the application to be registered), the level of the registration threshold (i.e., the complexity of the registration verification process) becomes an important factor to be considered. The use of a higher registration threshold increases the registration difficulty, reduces the registration efficiency, and even causes a high-value user to abandon the registration, and once the registration threshold is reduced, a large number of junk accounts and cattle accounts can be successfully established through the registration, so that website resources or application resources are wasted.
Disclosure of Invention
The embodiment of the application provides a user registration method and device, and aims to solve the problems that registration efficiency is reduced by adopting a relatively complex registration verification process, and network resources or application resources are wasted due to the fact that a large number of junk accounts and cattle accounts are likely to appear by adopting a simple registration verification process.
The embodiment of the application provides a user registration method, which comprises the following steps:
after receiving a registration request of a user to be registered, a server searches a safety score of the user to be registered in a database according to registered user information corresponding to the registration request; the database stores safe scores of different users;
selecting a registration verification mode according to the searched safe score; wherein, different safe score ranges correspond to different registration verification modes;
and providing registration service for the user to be registered according to the selected registration verification mode.
Optionally, searching the security score of the user to be registered in a pre-stored user name list library according to the registered user information corresponding to the registration request, where the searching includes:
according to the registered user information, at least one target user matched with the registered user information is searched in a user name list library stored in advance;
and determining the lowest value in the searched safety scores of the at least one target user as the safety score of the user to be registered.
Optionally, searching for at least one target user matched with the registered user information in a pre-stored user name list library according to the registered user information, including:
determining the matching degree between each user to be matched and the user to be registered according to the matching result of the user information of each user to be matched and the registered user information under each preset characteristic dimension;
and determining at least one target user matched with the registered user information according to the determined matching degree between each user to be matched and the user to be registered.
Optionally, for any user to be matched, determining a matching degree between the user to be matched and the user to be registered includes:
and determining the matching degree between the user to be matched and the registered user according to the characteristic dimension which can be matched between the user to be matched and the user to be registered and the weight corresponding to each characteristic dimension.
Optionally, determining at least one target user matched with the registered user information according to the determined matching degree between each user to be matched and the user to be registered, including:
if the user to be matched with the matching degree larger than or equal to a first threshold value exists, determining the user to be matched with the matching degree larger than or equal to the first threshold value as the target user;
if the user to be matched with the matching degree larger than or equal to the first threshold value does not exist, judging whether the user to be matched with the matching degree larger than or equal to a second threshold value exists, and if the user to be matched with the matching degree larger than or equal to the second threshold value exists, determining the user to be matched with the matching degree larger than or equal to the second threshold value as the target user; wherein the first threshold is greater than the second threshold.
Optionally, the method further comprises:
if the target user matched with the registered user information does not exist, determining the safety score of the registered user as a preset value; alternatively, the first and second electrodes may be,
and if the target user matched with the registered user information does not exist, selecting a registration verification mode preset for the target user which cannot be matched for the user to be registered.
An embodiment of the present application further provides a user registration apparatus, including:
the system comprises a searching module, a database and a processing module, wherein the searching module is used for searching the safety score of a user to be registered in the database according to the registered user information corresponding to a registration request after receiving the registration request of the user to be registered; the database stores safe scores of different users;
the selection module is used for selecting a registration verification mode according to the safety score searched by the search module; wherein, different safe score ranges correspond to different registration verification modes;
and the registration module is used for providing registration service for the user to be registered according to the registration verification mode selected by the selection module.
According to the method and the device, the login verification mode is selected for the user to be registered by inquiring the safety score of the user to be registered, the login verification modes with different complexities are selected for the users with different safety levels, the garbage account can be effectively intercepted outside the system by adopting the diversified authentication modes, the login safety is improved, and the login efficiency of the user with higher safety can be improved.
Drawings
Fig. 1 is a flowchart of a user registration method according to an embodiment of the present application;
fig. 2 is a flowchart of a user registration method provided in the second embodiment of the present application;
FIG. 3(a) is a schematic diagram of a registration process for a high security level user;
FIG. 3(b) is a schematic diagram of a registration process for a medium security level user;
FIG. 3(c) is a schematic diagram of a registration flow for a low security level user;
fig. 4 is a schematic structural diagram of a user registration apparatus according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a native user registration method (namely, registration authorization is not performed through a third party), a registration verification mode is selected for a user to be registered by inquiring a security score of the user to be registered, registration verification modes with different complexities are selected for users with different security levels, for example, a simple registration process is provided for users with higher security scores, the registration can be directly completed only by sliding or shaking a mobile phone, multi-factor verification is adopted for users with lower security scores, and even real person authentication is adopted. By adopting the diversified authentication mode, the junk account can be effectively intercepted outside the system, the registration safety is improved, and the registration efficiency of a user with higher safety can be improved.
The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
Example one
As shown in fig. 1, a flowchart of a user registration method provided in an embodiment of the present application includes the following steps:
s101: after receiving a registration request of a user to be registered, a server searches the safety score of the user to be registered in a database according to the registered user information corresponding to the registration request, wherein the safety score of different users is stored in the database.
The registered user information may include one or more of device information (e.g., device identification ID), user input information (e.g., mobile phone number, email, IP address, identification number, password, etc.), user behavior characteristics, and the like.
In a specific implementation, according to the registered user information, a target user matched with the registered user information may be searched in a database storing security scores of different users, where there may be more than one target user (the registered user information may match the user to be registered, and may also match other users), and in consideration of registration security, a lowest value of the searched security scores of the at least one target user may be determined as the security score of the user to be registered.
S102: selecting a registration verification mode according to the searched safe score; wherein, different safe score value ranges correspond to different registration verification modes.
In specific implementation, different corresponding relations between the safe score ranges and the registration verification modes can be preset, and the registration verification mode is selected according to the found safe score range to which the safe score belongs, for example, the safe score is divided into three levels of a lowest score range, a medium score range and a highest score range, and the registration verification complexity corresponding to the lowest score range > the registration verification complexity corresponding to the medium score range > the registration verification complexity corresponding to the highest score range.
In a specific implementation, the safe score of the user may be determined and updated based on the accumulation of historical data, specifically: an initial safe score can be set for the user; when the information of the user relates to preset risk behaviors, the safety score of the user is subtracted, when the information of the user relates to the preset safety behaviors, the safety score of the user is added, and the specific score of the subtraction or the addition is related to the risk or the safety of the behaviors and the occurrence times of the behaviors.
For example, the preset risk behavior may include, but is not limited to, the following behaviors (the account is an account registered by a user in a third party):
(1) the device or account number of the user participates in the database-crashing behavior, such as the password of the device or account number used by the user is subjected to brute force cracking;
(2) a virus Trojan event occurs in the equipment or account of the user;
(3) the terminal number of the user belongs to fake or false information;
(4) the account number activity of the user is low;
as another example, the predetermined security actions may include, but are not limited to, the following actions:
(1) the account number of the user is authenticated by the terminal number, and the authentication is passed;
(2) the account number of the user is authenticated by the trusted equipment and passes the authentication;
(3) the account number of the user is authenticated and passes the authentication;
(4) the account number of the user is subjected to man-machine verification, and the verification is passed.
S103: and providing registration service for the user to be registered according to the selected registration verification mode.
Here, a registration procedure is executed based on a registration verification manner selected for the user to be registered. For example, a simple registration process is executed for a user with a high security level with a high security score, and the user can directly complete registration after completing a specified confirmation action; for a user with a low safety level with a low safety score, a complex registration process is executed, for example, real person authentication can be executed; for a user with a medium security level with a medium security score, a general registration process may be performed for the user, such as performing verification of a mobile phone number, a device, user behavior, and the like.
The idea of the application is further explained below by means of some preferred embodiments.
Example two
As shown in fig. 2, a flowchart of a user registration method provided in the second embodiment of the present application includes the following steps:
s201: the server receives a registration request of a user to be registered.
S202: and searching the safety score of the user to be registered in a database in a pre-stored user name list library according to the registered user information corresponding to the registration request, if so, entering S203, and otherwise, entering S206a or S206 b.
In a specific implementation, at the server, a database may be maintained, in which the database uses device information (e.g., International Mobile Equipment Identity (IMEI)), user numbers (including terminal numbers such as Mobile phone numbers, emails, IP addresses, identification numbers, passwords, and the like), user input information, user behavior characteristics (e.g., handwriting, fingerprints, habits, and the like of the user), and uses security scores (i.e., user reputation) as key values. In addition, in the application, after the registration page is started, the client may automatically acquire information such as current device information, a user number, user behavior characteristics, and the like, and send the information to the server as the registered user information, and the function of automatically acquiring the registered user information may be integrated as a client Software Development Kit (SDK) in an Application (APP) installed at the client and corresponding to the server service content.
Here, the step of the server finding the target user matching with the registered user information may specifically include:
the method comprises the following steps: and determining the matching degree between each user to be matched and the user to be registered according to the matching result of the user information of each user to be matched and the registered user information under each preset characteristic dimension.
Preferably, the matching degree between the user to be matched and the registered user may be determined according to the feature dimension that can be matched between the user to be matched and the user to be registered, and the weight corresponding to each feature dimension.
For example, three feature dimensions are preset, which are the device ID (weight is 0.4), the mobile phone number (weight is 0.4), and the user behavior (weight is 0.2), and for the device ID or the mobile phone number, if the device ID or the mobile phone number is completely matched, the device ID or the mobile phone number is considered to be matched, and for the user behavior, if more than 80% of the user behavior can be matched, the user behavior is considered to be matched.
In specific implementation, the weights respectively corresponding to the feature dimensions that can be matched between the user to be matched and the user to be registered may be directly added to serve as the matching degree between the user to be matched and the registered user. For example, the feature dimension that can be matched between a certain user to be matched and the user to be registered is the device ID and the mobile phone number, and the matching degree between the user to be matched and the registered user is 0.8.
Step two: if the user to be matched with the matching degree larger than a first threshold value exists, determining the user to be matched with the matching degree larger than or equal to the first threshold value as the target user;
step three: if the user to be matched with the matching degree larger than or equal to the first threshold value does not exist, judging whether the user to be matched with the matching degree larger than or equal to a second threshold value exists, and if the user to be matched with the matching degree larger than or equal to the second threshold value exists, determining the user to be matched with the matching degree larger than or equal to the second threshold value as the target user; wherein the first threshold is greater than the second threshold.
In specific implementation, the server determines at least one target user matched with the registered user information according to the determined matching degree between each user to be matched and the user to be registered, and can directly determine the user to be matched with the matching degree greater than or equal to a certain threshold value as the target user. In a preferred embodiment of the present application, a plurality of matching thresholds may be set, and whether there is a user to be matched that is greater than or equal to the current matching threshold is determined according to the sequence of the matching thresholds from large to small (i.e., according to the maximum matching principle), and if there is a user to be matched that is greater than or equal to the current matching threshold, the user to be matched is taken as a target user, and it is not necessary to match the user according to the remaining matching thresholds. This preferred embodiment may improve the accuracy of the resulting safe scores. For example, in the second and third steps, it is first determined whether there is a user to be matched whose matching degree is greater than or equal to a first threshold (for example, 0.8), and if so, determining the user to be matched whose matching degree is greater than or equal to 0.8 as a target user; if the user to be matched with the matching degree larger than or equal to 0.8 does not exist, whether the user to be matched with the matching degree larger than or equal to a second threshold (such as 0.4) and smaller than a first threshold exists or not is judged, and if the user to be matched with the matching degree larger than or equal to 0.4 and smaller than 0.8 exists, the user to be matched is determined as the target user.
S203: and determining the lowest value in the searched safe scores of the at least one target user as the safe score of the user to be registered.
S204: selecting a registration verification mode according to the searched safe score; wherein, different safe score value ranges correspond to different registration verification modes.
Specifically, according to the searched safe score, determining a score range to which the safe score belongs, for example, determining which score range belongs to three grades, namely, a lowest score range, a medium score range and a highest score range, and selecting a registration verification mode matched with the score range to which the safe score belongs from the three registration verification modes, wherein the registration verification complexity corresponding to the lowest score range > the registration verification complexity corresponding to the medium score range > the registration verification complexity corresponding to the highest score range. These three registration/authentication methods will be described below as examples after S205.
S205: and providing registration service for the user to be registered according to the selected registration verification mode.
And if the user to be registered is determined to be the user with a higher safe score, selecting the simplest registration verification mode for the user. As shown in fig. 3(a), the user only needs to shake a mobile phone after confirming the mobile phone number, and then can complete the registration. If it is determined that the safe score of the user to be registered belongs to the middle score range, the authentication may be performed according to a common authentication procedure, such as authenticating a mobile phone number, a device, a user behavior, and the like, as shown in fig. 3 (b). If the security score of the user to be registered is determined to be low, the most complicated real person authentication mode is selected for the user, as shown in fig. 3(c), for example, when real person authentication is performed, the user may be required to take an image of an identity document whose identity is authenticated by holding the identity document by hand with a camera or a mobile phone camera, the user may be prompted to stretch out a complete arm, and the camera or the mobile phone is focused on the document (pressed against the identity document in the picture on a mobile phone screen) during photographing, so that the text of the document is clear.
S206 a: if the target user matched with the registered user information does not exist, determining the safety score of the registered user as a preset value, and entering S204;
s206 b: if it is determined that there is no target user matching the registered user information, a registration verification manner preset for the target user that cannot be matched is directly selected for the user to be registered, and the process proceeds to S205.
Here, there is no target user matching the registered user information, that is, there is no target user whose matching degree is greater than the second threshold.
In a specific implementation, if it is determined that there is no target user matching the registered user information, the security score of the user to be registered may be set as an intermediate value, and then, based on the intermediate value score, a registration verification manner with a medium complexity as shown in fig. 3(b) is selected. Alternatively, a registration verification manner of the complexity level shown in fig. 3(b) may be directly selected.
Based on the same inventive concept, the embodiment of the present application further provides a user registration apparatus corresponding to the user registration method, and as the principle of the apparatus for solving the problem is similar to the user registration method in the embodiment of the present application, the implementation of the apparatus may refer to the implementation of the method, and repeated details are not repeated.
As shown in fig. 4, a schematic structural diagram of a user registration apparatus provided in the embodiment of the present application includes:
the searching module 41 is configured to, after receiving a registration request of a user to be registered, search a database for a security score of the user to be registered according to registered user information corresponding to the registration request, where the database stores security scores of different users;
a selecting module 42, configured to select a registration verification manner according to the safety score found by the finding module 41; wherein, different safe score ranges correspond to different registration verification modes;
and a registration module 43, configured to provide a registration service for the user to be registered according to the registration verification manner selected by the selection module 42.
Optionally, the search module 41 is specifically configured to:
according to the registered user information, at least one target user matched with the registered user information is searched in a user name list library stored in advance; and determining the lowest value in the searched safety scores of the at least one target user as the safety score of the user to be registered.
Optionally, the search module 41 is specifically configured to:
determining the matching degree between each user to be matched and the user to be registered according to the matching result of the user information of each user to be matched and the registered user information under each preset characteristic dimension; and determining at least one target user matched with the registered user information according to the determined matching degree between each user to be matched and the user to be registered.
Optionally, the search module 41 is specifically configured to:
and determining the matching degree between the user to be matched and the registered user according to the characteristic dimension which can be matched between the user to be matched and the user to be registered and the weight corresponding to each characteristic dimension.
Optionally, the search module 41 is specifically configured to:
if the user to be matched with the matching degree larger than or equal to a first threshold value exists, determining the user to be matched with the matching degree larger than or equal to the first threshold value as the target user; if the user to be matched with the matching degree larger than or equal to the first threshold value does not exist, judging whether the user to be matched with the matching degree larger than or equal to a second threshold value exists, and if the user to be matched with the matching degree larger than or equal to the second threshold value exists, determining the user to be matched with the matching degree larger than or equal to the second threshold value as the target user; wherein the first threshold is greater than the second threshold.
Optionally, the lookup module 41 is further configured to:
if the target user matched with the registered user information does not exist, determining the safety score of the registered user as a preset value;
alternatively, the first and second electrodes may be,
the selection module 42 is further configured to;
and if the searching module determines that the target user matched with the registered user information does not exist, selecting a registration verification mode preset for the target user which cannot be matched for the user to be registered.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (12)

1. A method for user registration, the method comprising:
after receiving a registration request of a user to be registered, a server searches for a safety score of at least one target user matched with the user to be registered in a database according to registered user information corresponding to the registration request, wherein the safety scores of different users are stored in the database;
selecting a registration verification mode according to the searched safe score; wherein, different safe score ranges correspond to different registration verification modes;
and providing registration service for the user to be registered according to the selected registration verification mode.
2. The method of claim 1, wherein searching a security score of a target user matched with the user to be registered in a pre-stored user name list library according to the registered user information corresponding to the registration request comprises:
according to the registered user information, at least one target user matched with the registered user information is searched in a user name list library stored in advance;
and determining the lowest value in the searched safety scores of the at least one target user as the safety score of the user to be registered.
3. The method of claim 2, wherein searching for at least one target user matching the registered user information in a pre-stored user name list library based on the registered user information comprises:
determining the matching degree between each user to be matched and the user to be registered according to the matching result of the user information of each user to be matched and the registered user information under each preset characteristic dimension;
and determining at least one target user matched with the registered user information according to the determined matching degree between each user to be matched and the user to be registered.
4. The method of claim 3, wherein determining the matching degree between the user to be matched and the user to be registered for any user to be matched comprises:
and determining the matching degree between the user to be matched and the registered user according to the characteristic dimension which can be matched between the user to be matched and the user to be registered and the weight corresponding to each characteristic dimension.
5. The method of claim 3, wherein determining at least one target user matching the registered user information according to the determined matching degree between each user to be matched and the user to be registered comprises:
if the user to be matched with the matching degree larger than or equal to a first threshold value exists, determining the user to be matched with the matching degree larger than or equal to the first threshold value as the target user;
if the user to be matched with the matching degree larger than or equal to the first threshold value does not exist, judging whether the user to be matched with the matching degree larger than or equal to a second threshold value exists, and if the user to be matched with the matching degree larger than or equal to the second threshold value exists, determining the user to be matched with the matching degree larger than or equal to the second threshold value as the target user; wherein the first threshold is greater than the second threshold.
6. The method of any of claims 2 to 5, further comprising:
if the target user matched with the registered user information does not exist, determining the safety score of the registered user as a preset value; alternatively, the first and second electrodes may be,
and if the target user matched with the registered user information does not exist, selecting a registration verification mode preset for the target user which cannot be matched for the user to be registered.
7. A user registration apparatus, comprising:
the system comprises a searching module, a searching module and a searching module, wherein the searching module is used for searching the safety score of at least one target user matched with a user to be registered in a database according to the registered user information corresponding to a registration request after receiving the registration request of the user to be registered; the database stores safe scores of different users;
the selection module is used for selecting a registration verification mode according to the safety score searched by the search module; wherein, different safe score ranges correspond to different registration verification modes;
and the registration module is used for providing registration service for the user to be registered according to the registration verification mode selected by the selection module.
8. The apparatus of claim 7, wherein the lookup module is specifically configured to:
according to the registered user information, at least one target user matched with the registered user information is searched in a user name list library stored in advance; and determining the lowest value in the searched safety scores of the at least one target user as the safety score of the user to be registered.
9. The apparatus of claim 8, wherein the lookup module is specifically configured to:
determining the matching degree between each user to be matched and the user to be registered according to the matching result of the user information of each user to be matched and the registered user information under each preset characteristic dimension; and determining at least one target user matched with the registered user information according to the determined matching degree between each user to be matched and the user to be registered.
10. The apparatus of claim 9, wherein the lookup module is specifically configured to:
and determining the matching degree between the user to be matched and the registered user according to the characteristic dimension which can be matched between the user to be matched and the user to be registered and the weight corresponding to each characteristic dimension.
11. The apparatus of claim 9, wherein the lookup module is specifically configured to:
if the user to be matched with the matching degree larger than or equal to a first threshold value exists, determining the user to be matched with the matching degree larger than or equal to the first threshold value as the target user; if the user to be matched with the matching degree larger than or equal to the first threshold value does not exist, judging whether the user to be matched with the matching degree larger than or equal to a second threshold value exists, and if the user to be matched with the matching degree larger than or equal to the second threshold value exists, determining the user to be matched with the matching degree larger than or equal to the second threshold value as the target user; wherein the first threshold is greater than the second threshold.
12. The apparatus of any of claims 8 to 11, wherein the lookup module is further configured to:
if the target user matched with the registered user information does not exist, determining the safety score of the registered user as a preset value; alternatively, the first and second electrodes may be,
the selection module is further configured to;
and if the searching module determines that the target user matched with the registered user information does not exist, selecting a registration verification mode preset for the target user which cannot be matched for the user to be registered.
CN201510997278.5A 2015-12-25 2015-12-25 User registration method and device Active CN106921626B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510997278.5A CN106921626B (en) 2015-12-25 2015-12-25 User registration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510997278.5A CN106921626B (en) 2015-12-25 2015-12-25 User registration method and device

Publications (2)

Publication Number Publication Date
CN106921626A CN106921626A (en) 2017-07-04
CN106921626B true CN106921626B (en) 2020-03-31

Family

ID=59455650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510997278.5A Active CN106921626B (en) 2015-12-25 2015-12-25 User registration method and device

Country Status (1)

Country Link
CN (1) CN106921626B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714301B (en) * 2017-10-25 2021-11-30 北京京东尚科信息技术有限公司 Registration risk identification method and device, electronic equipment and storage medium
CN109298926B (en) * 2018-09-29 2021-10-22 创新先进技术有限公司 Method and device for entering resource transfer party into resource transfer platform and electronic equipment
CN110278241B (en) * 2019-05-09 2021-07-16 创新先进技术有限公司 Registration request processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035116A (en) * 2006-03-10 2007-09-12 腾讯科技(深圳)有限公司 Instant-communication-based accounts security management system and method
CN101420436A (en) * 2008-12-03 2009-04-29 腾讯科技(深圳)有限公司 Register method and register system for network service system
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system
CN103297417A (en) * 2013-04-02 2013-09-11 上海启年信息科技有限公司 Method for shaking intelligent terminal to conduct registration

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8528018B2 (en) * 2011-04-29 2013-09-03 Cisco Technology, Inc. System and method for evaluating visual worthiness of video data in a network environment
US8955154B2 (en) * 2011-07-08 2015-02-10 Credibility Corp. Single system for authenticating entities across different third party platforms

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035116A (en) * 2006-03-10 2007-09-12 腾讯科技(深圳)有限公司 Instant-communication-based accounts security management system and method
CN101420436A (en) * 2008-12-03 2009-04-29 腾讯科技(深圳)有限公司 Register method and register system for network service system
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system
CN103297417A (en) * 2013-04-02 2013-09-11 上海启年信息科技有限公司 Method for shaking intelligent terminal to conduct registration

Also Published As

Publication number Publication date
CN106921626A (en) 2017-07-04

Similar Documents

Publication Publication Date Title
US11256812B2 (en) End user social network protection portal
CN105847245B (en) Electronic mailbox login authentication method and device
CN107430654B (en) Method and system for switching biometric authentication
US9191411B2 (en) Protecting against suspect social entities
CN108011863B (en) Method and device for identifying brute force cracking
WO2015144058A1 (en) Account binding processing method, apparatus and system
JP6622316B2 (en) System and method for user attribute information confirmation, and client and server using the same
CN108989291B (en) Login verification method, automatic login verification method, server side and client side
US11165793B2 (en) Method and system for detecting credential stealing attacks
US10419431B2 (en) Preventing cross-site request forgery using environment fingerprints of a client device
WO2015024447A1 (en) Methods and systems for secure internet access and services
US20160072792A1 (en) Verification method, apparatus, server and system
US10284565B2 (en) Security verification method, apparatus, server and terminal device
US20150278504A1 (en) User authentication based on established network activity
CN104980402B (en) Method and device for identifying malicious operation
US9197646B2 (en) Verifying source of email
CN105306210B (en) Method, device and system for realizing authorization by using application program
CN110445769B (en) Access method and device of business system
US11770385B2 (en) Systems and methods for malicious client detection through property analysis
CN107688733B (en) Service interface calling method, device, user terminal and readable storage medium
JP2017526995A (en) Dual channel identification and authentication
CN109547426B (en) Service response method and server
CN106921626B (en) User registration method and device
EP3641269A1 (en) Systems and methods for multi-device multi-factor authentication
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant