CN108600237A - Identity identifying method, device and medium - Google Patents

Identity identifying method, device and medium Download PDF

Info

Publication number
CN108600237A
CN108600237A CN201810401962.6A CN201810401962A CN108600237A CN 108600237 A CN108600237 A CN 108600237A CN 201810401962 A CN201810401962 A CN 201810401962A CN 108600237 A CN108600237 A CN 108600237A
Authority
CN
China
Prior art keywords
data
user
terminal device
grader
feature vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810401962.6A
Other languages
Chinese (zh)
Inventor
王健
吕军
王美青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Financial Technology Holding Co Ltd
Original Assignee
Beijing Jingdong Financial Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Financial Technology Holding Co Ltd filed Critical Beijing Jingdong Financial Technology Holding Co Ltd
Priority to CN201810401962.6A priority Critical patent/CN108600237A/en
Publication of CN108600237A publication Critical patent/CN108600237A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/12Classification; Matching

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Present disclose provides a kind of identity identifying methods, including:Obtain the data that terminal device generates during user's use;The data are handled, the feature vector of the data is obtained;Authentication is carried out according to the feature vector of the data using grader;Wherein, the feature vector of data of the grader by using the terminal device during user's use trains to obtain.The disclosure additionally provides a kind of identification authentication system and medium.

Description

Identity identifying method, device and medium
Technical field
This disclosure relates to a kind of Internet technical field more particularly to authentication, device and medium.
Background technology
With the fast development of internet, smart machine emerges one after another, life of the various smart machines to user It brings great convenience, acquisition information can be facilitated by smart machine user, the activities such as communicated, done shopping, entertained.But It is while user enjoys convenient, to be also faced with user information leakage problem, loss of assets may be caused to user.For The problem, the prior art prevent user's assets from losing using the method for authenticating user identification at present.For example, close by user name The means such as code, pattern, fingerprint carry out the identity of certification user.
But during realizing present inventive concept, inventor has found that at least there are the following problems in the prior art:It is existing There is the identity identifying method of technology to need user that setting interface is actively gone to be configured.For example, user name password, pattern, fingerprint It is required for the specific interface that user enters smart machine to be configured it, user needs fill message in the provisioning process, institute The privacy of user may be related to by stating information, consequently, it is possible to user information is caused to be leaked, loss of assets is caused to user.
Invention content
In view of this, the disclosure provides a kind of identity identifying method, device and medium, so solve at least partly by One or more problem caused by the limitation and defect of the relevant technologies.
Present disclose provides a kind of identity identifying methods, including:Obtain what terminal device generated during user's use Data;The data are handled, the feature vector of the data is obtained;Using grader according to the features of the data to Amount carries out authentication;Wherein, the spy for the data that the grader is generated by the terminal device during user's use Sign vector training obtains.
In accordance with an embodiment of the present disclosure, the data that acquisition terminal device generates during user's use, which are included in user, to be made When with terminal device, the data of the data and the terminal device of the user are obtained by the sensor of the terminal device.
In accordance with an embodiment of the present disclosure, the data of the user include that the user is clicking and/or sliding the terminal The data of the data generated when device screen, the terminal device include acceleration of gravity, angular speed, magnetic field state.
In accordance with an embodiment of the present disclosure, the data are handled, the feature vector for obtaining the data includes:Extraction User characteristics, temporal signatures, frequency domain character, velocity characteristic and/or the slope characteristics of the data;Based on the user characteristics, Temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics generate the feature vector of the data.
In accordance with an embodiment of the present disclosure, the number that the grader is generated by the terminal device during user's use According to feature vector train to obtain the feature vector including being formed according to the data of the user and the data of the terminal device, Using algorithm of support vector machine to the default classifier training, the grader is obtained, the grader is used for defeated every time The feature vector of the data entered carries out authentication.
In accordance with an embodiment of the present disclosure, if the above method further includes authentication failure, continued by predetermined manner The identity of the currently used terminal user of certification.
Another aspect of the disclosure provides a kind of identification authentication system, including:Acquisition module is set for obtaining terminal The standby data generated during user's use;Processing module obtains the spy of the data for handling the data Sign vector;First authentication module, for carrying out authentication according to the feature vector of the data using grader;Wherein, institute The feature vector for stating the data that grader is generated by the terminal device during user's use trains to obtain.
In accordance with an embodiment of the present disclosure, the acquisition module is additionally operable to, in user's using terminal equipment, pass through the end The sensor of end equipment obtains the data of the data and the terminal device of the user.
In accordance with an embodiment of the present disclosure, the data of the user include that the user is clicking and/or sliding the terminal The data of the data generated when device screen, the terminal device include acceleration of gravity, angular speed, magnetic field state.
In accordance with an embodiment of the present disclosure, the processing module includes:Extraction module, the user for extracting the data are special Sign, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics;Generation module, it is special based on the user characteristics, time domain Sign, frequency domain character, velocity characteristic and/or slope characteristics generate the feature vector of the data.
In accordance with an embodiment of the present disclosure, the feature of the data generated during user's use by the terminal device to It includes the feature vector formed according to the data of the user and the data of the terminal device that amount training, which obtains grader, is used Algorithm of support vector machine obtains the grader to the default classifier training, and the grader is used for inputting every time The feature vector of the data carries out authentication.
In accordance with an embodiment of the present disclosure, above-mentioned apparatus further includes:Second authentication module leads to if authentication fails Cross the identity that predetermined manner continues the currently used terminal user of certification.
Another aspect of the present disclosure provides a kind of identification authentication system.Described device includes one or more processors, And storage device.The storage device is for storing one or more programs.Wherein, when one or more of programs are by institute When stating one or more processors execution so that one or more of processors execute identity identifying method as described above.
Another aspect of the present disclosure provides a kind of computer-readable medium, is stored thereon with executable instruction, the instruction Processor is set to execute identity identifying method as described above when being executed by processor.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to It enables, described instruction is when executed for realizing identity identifying method.
In accordance with an embodiment of the present disclosure, the identity identifying method that can solve the prior art at least partly needs to use householder It is dynamic that setting interface is gone to be configured.For example, user name password, pattern, fingerprint are required for user to enter the specific boundary of smart machine It being configured in face of it, user needs fill message, described information that may be related to the privacy of user in the provisioning process, to May result in the problem of user information is leaked, loss of assets is caused to user, and it is achieved that verification process user just It is often used smart machine, user is not needed and passively coordinates, whole process user's unaware, to improve user experience.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
Fig. 1 diagrammatically illustrates the flow chart of the identity identifying method according to the embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment;
Fig. 3 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment;
Fig. 4 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment;
Fig. 5 diagrammatically illustrates the block diagram of the identification authentication system according to the embodiment of the present disclosure;
Fig. 6 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure;
Fig. 7 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure;
Fig. 8 diagrammatically illustrates the block diagram of the computer system of the authentication according to the embodiment of the present disclosure.
Specific implementation mode
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In addition, in the following description, descriptions of well-known structures and technologies are omitted, with Avoid unnecessarily obscuring the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or other one or more features of addition, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without should by idealization or it is excessively mechanical in a manner of explain.
It, in general should be according to this using " in A, B and C etc. at least one " such statement is similar to Field technology personnel are generally understood the meaning of the statement to make an explanation (for example, " with system at least one in A, B and C " Should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C, and/or System etc. with A, B, C).Using " in A, B or C etc. at least one " such statement is similar to, it is general come Say be generally understood the meaning of the statement to make an explanation (for example, " having in A, B or C at least according to those skilled in the art One system " should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or system etc. with A, B, C).It should also be understood by those skilled in the art that substantially arbitrarily indicating two or more The adversative conjunction and/or phrase of optional project shall be construed as either in specification, claims or attached drawing It gives including one of these projects, the possibility of these projects either one or two projects.For example, phrase " A or B " should It is understood to include the possibility of " A " or " B " or " A and B ".
Embodiment of the disclosure provides a kind of identity identifying method, including:It obtains terminal device and uses process in user The data of middle generation;The data are handled, the feature vector of the data is obtained;Using grader according to the data Feature vector carry out authentication;Wherein, the grader is generated by the terminal device during user's use The feature vector of data trains to obtain.
By the above-mentioned means, the identity identifying method of the embodiment of the present disclosure, can solve the prior art at least partly Identity identifying method needs user that setting interface is actively gone to be configured.For example, user name password, pattern, fingerprint are required for using The specific interface that family enters smart machine is configured it, and user needs fill message, described information can in the provisioning process It can be related to the privacy of user, consequently, it is possible to the problem of causing user information to be leaked, loss of assets is caused to user, and because This realizes verification process user's normal use smart machine, does not need user and passively coordinates, whole process user's unaware, from And improve user experience.
Fig. 1 diagrammatically illustrates the flow chart of the identity identifying method according to the embodiment of the present disclosure.
As shown in Figure 1, identity identifying method includes step S101~step S103.
In step S101, the data that terminal device generates during user's use are obtained.
In step s 102, the data are handled, obtains the feature vector of the data.
In step s 103, authentication is carried out according to the feature vector of the data using grader.
The data that this method is generated by obtaining terminal device during user's use, and the data are handled, Can obtain the feature vector of the data, in such a case, it is possible to using grader according to the feature vectors of the data into Row authentication.Being authenticated by this way to the identity of user can be to avoid the privacy of leakage user, to protect use The assets security at family, and without user terminal device specific interface (for example, setting unlocking pin interface, setting Input of secret number etc.) passive input data, and then improve user experience.
In some embodiments of the present disclosure, data that terminal device generates during user's use can refer to user and exist The data generated in operating process are carried out to terminal device in daily life.For example, terminal device is smart mobile phone, the data The data that user generates whens making smart mobile phone make a phone call, taking pictures, play game, read novel etc. can be referred to.In short, with As long as family can obtain terminal device during user's use in using terminal equipment, using disclosed method and produce in real time Raw data, and will not relate in gathered data the privacy information of user, passively coordinate without user, entirely obtain number User's unaware during.
In accordance with an embodiment of the present disclosure, grader described above can use process in user by the terminal device In the feature vector of data of generation train.
In some embodiments of the present disclosure, grader is instructed by data of terminal device during user's use It may include the feature vector formed according to the data of the user and the data of the terminal device to get, using support to Amount machine algorithm obtains the grader to the default classifier training, and the grader is used for the number to inputting every time According to feature vector carry out authentication.
For example, the identity identifying method using the disclosure can in use be generated by obtaining terminal user Mass data, and mass data is handled, obtains a large amount of feature vector.Using algorithm of support vector machine according to a large amount of Feature vector preset grader is trained, when preset grader is in convergence state, deconditioning.This In the case of, user identity can be authenticated using the grader, help to improve the safety in verification process in this way. Because identity identifying method in the prior art needs user to be configured in advance in the specific interface of terminal device.For example, with Family when being unlocked to terminal device must in advance in the setting interface of terminal device be arranged unlocking pin, the unlocking pattern, Unlock fingerprint etc..And set-up mode is that passively cooperation is configured user in this way, and therefore, user is in the provisioning process It can perceive.But it is trained by obtaining the feature vector for the data that user generates in routine use terminal device Grader, it is that user perceives less than because user does not have to obtain the data that user generates in using terminal equipment by this method Passive cooperation, to improve user experience.
Fig. 2 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment.
As shown in Fig. 2, the step S101 of Fig. 1 descriptions can be specifically step S201.
In step s 201, in user's using terminal equipment, the use is obtained by the sensor of the terminal device The data of the data at family and the terminal device.
According to the embodiment of the present disclosure, the data of the user, which include the user, to be set clicking and/or slide the terminal The data generated when standby screen, the data of the terminal device include acceleration of gravity, angular speed, magnetic field state.
In some embodiments of the present disclosure, above-mentioned data can be obtained by terminal device self-sensor device.For example, Above-mentioned data are obtained using acceleration transducer, gyroscope, gravity accelerometer, magnetometric sensor etc. sensor, But not limited to this.
In some embodiments of the present disclosure, user can be obtained by acceleration transducer in using terminal equipment, The size of the acceleration of the terminal device.User can be obtained by gyroscope in using terminal equipment, the terminal device The size of angular speed.User can be obtained by gravity accelerometer in using terminal equipment, the weight of the terminal device The size of power acceleration.User can be obtained by magnetometric sensor in using terminal equipment, the magnetic field shape of the terminal device The variation of state.
In some embodiments of the present disclosure, user's using terminal equipment may include the screen that user clicks terminal device And/or user slides the screen etc. of terminal device.User click terminal device screen when, can obtain user's finger with Finger area, user when screen contact click the pressure generated to screen when terminal device.Terminal device is slided in user When screen, user's finger sliding trace on the screen can be obtained, user slides the pressure generated to screen when terminal device.
The data of the user generated in user's using terminal equipment of above-mentioned example shown and/or terminal device Data are to help the technical solution those skilled in the art understand that the disclosure.In addition to the data enumerated, further include due to Family using terminal equipment and other data generated, it is numerous to list herein.
It should be understood that the data of above-mentioned user and the data of/above-mentioned terminal device be all user's perception less than In the case of obtain, that is to say, that do not need the passive input data of user.
Fig. 3 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment.
As described in Figure 3, the step S102 of Fig. 1 embodiments description includes step S301 and step S302.
In step S301, the user characteristics of the data, temporal signatures, frequency domain character, velocity characteristic and/or tiltedly are extracted Rate feature.
In step s 302, it is special that the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope are based on Sign, generates the feature vector of the data.
This method user characteristics based on the data, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics The feature vector of the data can be generated, the feature vector of the data can reflect user in using terminal to the end The operating habit of end equipment.That is the identity identifying method of the disclosure can be according to user to the operating habit of terminal device The identity of user is authenticated using grader.The identity of user is authenticated by this method and will not relate to the hidden of user Private, therefore will not cause damages to the assets of user.
In some embodiments of the present disclosure, the user characteristics of the data, temporal signatures, frequency domain character, speed are extracted Feature and/or slope characteristics can calculate separately user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope spy Maximum value, minimum value, average value, variance, the difference of maxima and minima of sign.
In some embodiments of the present disclosure, pass through acceleration transducer, gyroscope, gravity accelerometer, magnetic force The data that sensor etc. sensor obtains can be three groups of vectors on three axis of x, y, z, for example, three groups on three axis of x, y, z Vector can be x=[x1,x2,x3,…,xn], y=[y1,y2,y3,…,yn], z=[z1,z2,z3,…,zn].According to the disclosure Embodiment, maximum value, minimum value, average value, variance, the difference of maxima and minima for calculating temporal signatures can be calculate Maximum value, minimum value, average value, variance, the difference of maxima and minima of the x, y, z of the data, to obtain the number According to temporal signatures feature vector.
In some embodiments of the present disclosure, three groups of vectors on three axis of x, y, z are done into discrete Fourier transform, obtain three Group vector xfft、yfft、zfft.In accordance with an embodiment of the present disclosure, calculate the maximum value of frequency domain character, minimum value, average value, variance, The difference of maxima and minima can be the x for calculating the datafft、yfft、zfftMaximum value, minimum value, average value, variance, The difference of maxima and minima, to obtain the data frequecy characteristic feature vector.
In some embodiments of the present disclosure, maximum value, minimum value, average value, variance, the maximum value of user characteristics are calculated To screen when difference with minimum value can be the finger area and user's click terminal device when calculating user's finger and screen contact Maximum value, minimum value, average value, variance, the difference of maxima and minima for the pressure that curtain generates, to obtain the data The feature vector of user characteristics.
In some embodiments of the present disclosure, to user the screen of terminal device sliding trace coordinate extraction rate, Slope characteristics.Sliding trace is a vector being made of abscissa x, ordinate y and time t three-dimensional coordinate, and form is [(x1,y1,t1),(x2,y2,t2),(x3,y3,t3),…,(xn,yn,tn)].Wherein, velocity characteristic is that former and later two coordinates ask Europe Formula distance is then divided by time difference, slope are the difference of the ordinate of former and later two points divided by the difference of abscissa, and formula is (yn- yn-1)/(xn-xn-1).The velocity characteristic vector sum slope characteristics vector of the data can be obtained by this method.
It in accordance with an embodiment of the present disclosure, can be with temporal signatures based on the data vector, frequency domain character vector, Yong Hute Sign vector, velocity characteristic vector sum slope characteristics vector generate a feature vector in training set, i.e., as in training set One training data includes the data of user in training set, is labeled as 1, and the data of non-user are labeled as 0.It should Understand, grader is for input every time, probability value of the output value range 0 to 1, output valve closer to 1, then for 1 possibility Property it is bigger, closer to 0, then for it is non-I possibility it is bigger.
For example, when user's using terminal equipment, user is in terminal device screen sliding trace coordinate, user's finger for acquisition Area, user touch finger pressure, acceleration, angular speed, magnetic field state, the acceleration of gravity of screen, are obtained to data processing Multiple feature vectors are spliced into one group of one-dimensional vector, grader are input to, according to the output of grader by multiple feature vectors Value carries out the authentication of user and non-user.
Fig. 4 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment.
As shown in figure 4, this method further includes step S401 other than step S101~step S103 that Fig. 1 is described.
In step S101, the data that terminal device generates during user's use are obtained.
In step s 102, the data are handled, obtains the feature vector of the data.
In step s 103, authentication is carried out according to the feature vector of the data using grader.
In step S401, if authentication fails, the currently used terminal of certification is continued by predetermined manner The identity of equipment user.
It, can be with if carrying out authentication failure according to the feature vector of the data using grader in this method Continue the identity of the currently used terminal user of certification by predetermined manner.For example, can be by short message verification code, logical The input authentication modes such as password are crossed to continue to be authenticated the identity of the user of the currently used terminal device, it in this way can be into The assets for protecting user of one step are not suffered a loss.
The above method is described below by a specific application scenarios.
For example, by Jingdone district financial product exempt from close payment scene for, two kinds of air control grades of scene settings thus:Certification is logical It crosses to add with short message and tests or input password, when user is in use Jingdone district finance app, the sensor real-time collecting user of terminal device Finger area, user touch the finger pressure of screen, the acceleration of terminal device, the angular speed of terminal device, terminal device The data such as magnetic field state, the acceleration of gravity of terminal device, screen sliding trace coordinate, when user transfers accounts or pays, One-dimensional feature vector is obtained by the original data processing being collected into sensor, and is entered into trained grader In, grader provides the fractional value that a section is 0 to 1, such as the fractional value that this grader provides is 0.9, and grader is set Fixed threshold value is 0.5, it is clear that 0.9 is more than 0.5, therefore grader judges that this time operation operates as user, and user can carry out Without close payment, when the score that grader provides is relatively low, for example, 0.1, it is less than threshold value 0.5, the result that grader judges is non- People operates, and needs to add carrying out short message to user to test or carry out by way of input password plus test, if short-message verification or inputting close Code passes through, then user's certification passes through, and otherwise refusal passes through.
Fig. 5 diagrammatically illustrates the block diagram of the identification authentication system according to the embodiment of the present disclosure.
As shown in figure 5, identification authentication system 500 includes acquisition module 510, processing module 520 and the first authentication module 530。
Acquisition module 510, the data generated during user's use for obtaining terminal device.
Processing module 520 obtains the feature vector of the data for handling the data.
First authentication module 530, for carrying out authentication according to the feature vector of the data using grader, In, the feature vector for the data that the grader is generated by the terminal device during user's use trains to obtain.
In accordance with an embodiment of the present disclosure, the authentication side that identification authentication system 500 describes for realizing Fig. 1 embodiments Method.
The device 500 can by obtaining the data that be generated during user's use of terminal device, and to the data into Row processing, can obtain the feature vector of the data, in such a case, it is possible to using grader according to the feature of the data Vector carries out authentication.Being authenticated by this way to the identity of user can be to avoid the privacy of leakage user, to protect Protected the assets security of user, and without user terminal device specific interface (for example, the boundary of setting unlocking pin Face, the input etc. that secret number is set) passive input data, and then improve user experience.
Fig. 6 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure.
As shown in fig. 6, the processing module 520 of Fig. 5 embodiments description includes extraction module 521 and generation module 522.
Extraction module 521, for extract the user characteristics of the data, temporal signatures, frequency domain character, velocity characteristic and/ Or slope characteristics.
Generation module 522 is based on the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics, Generate the feature vector of the data.
In accordance with an embodiment of the present disclosure, the identification authentication system 500 of Fig. 6 embodiments description is retouched for realizing Fig. 3 embodiments The identity identifying method stated.
Fig. 7 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure.
As shown in fig. 7, in addition to acquisition module 510, processing module 520 and the first authentication module 530 of the description of Fig. 5 embodiments Except, identification authentication system 600 further includes the second authentication module 610.
Second authentication module 610 continues the certification currently used end if authentication fails by predetermined manner The identity of end equipment user.
It is understood that acquisition module 510, processing module 520, extraction module 521, generation module 522, the first certification Module 530 and the second authentication module 610, which may be incorporated in a module, to be realized or any one module therein can To be split into multiple modules.Alternatively, at least partly function of one or more of these modules module can be with other moulds At least partly function of block is combined, and is realized in a module.According to an embodiment of the invention, acquisition module 510, processing At least one in module 520, extraction module 521, generation module 522, the first authentication module 530 and the second authentication module 610 It is a to be at least implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, application-specific integrated circuit (ASIC), or can with to circuit into Row is integrated or the hardware such as any other rational method of encapsulation or firmware are realized, or with three kinds of software, hardware and firmware The appropriately combined of realization method is realized.Alternatively, acquisition module 510, processing module 520, extraction module 521, generation module 522, at least one of the first authentication module 530 and the second authentication module 610 can at least be implemented partly as calculating Machine program module can execute the function of corresponding module when the program is run by computer.
Fig. 8 diagrammatically illustrates the block diagram of the computer system of the authentication according to the embodiment of the present disclosure.Fig. 8 is shown Computer system be only an example, any restrictions should not be brought to the function and use scope of the embodiment of the present disclosure.
As shown in figure 8, include processor 701 according to the computer system 700 of the identity identifying method of the embodiment of the present disclosure, It can be loaded into random access storage according to the program being stored in read-only memory (ROM) 702 or from storage section 708 Program in device (RAM) 703 and execute various actions appropriate and processing.Processor 701 for example may include general microprocessor Device (such as CPU), instruction set processor and/or related chip group and/or special microprocessor are (for example, application-specific integrated circuit (ASIC)), etc..Processor 701 can also include the onboard storage device for caching purposes.Processor 701 may include using In the different single treatment units acted for executing the method flow according to the embodiment of the present disclosure with reference to figure 1~Fig. 4 description or Person is multiple processing units.
In RAM 703, it is stored with system 700 and operates required various programs and data.Processor 701, ROM 702 with And RAM 703 is connected with each other by bus 704.Processor 701 is held by executing the program in ROM 702 and/or RAM 703 Various steps of the row above with reference to Fig. 1~Fig. 4 identity identifying methods described.It is removed it is noted that the program can also be stored in In one or more memories other than ROM 702 and RAM 703.Processor 701 can also be stored in this by executing Or the program in multiple memories executes the various steps above with reference to Fig. 1~Fig. 4 identity identifying methods described.
In accordance with an embodiment of the present disclosure, system 700 can also include input/output (I/O) interface 707, input/output (I/O) interface 707 is also connected to bus 704.System 700 can also include be connected to I/O interfaces 705 with one in lower component Item is multinomial:Importation 706 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD) Deng and loud speaker etc. output par, c 707;Storage section 708 including hard disk etc.;And including such as LAN card, modulatedemodulate Adjust the communications portion 709 of the network interface card of device etc..Communications portion 709 executes communication process via the network of such as internet. Driver 710 is also according to needing to be connected to I/O interfaces 705.Detachable media 711, such as disk, CD, magneto-optic disk, semiconductor Memory etc. is mounted on driver 710, as needed in order to be pacified as needed from the computer program read thereon It is packed into storage section 708.
In accordance with an embodiment of the present disclosure, it may be implemented as computer software journey above with reference to the method for flow chart description Sequence.For example, embodiment of the disclosure includes a kind of computer program product comprising carry meter on a computer-readable medium Calculation machine program, the computer program include the program code for method shown in execution flow chart.In such embodiments, The computer program can be downloaded and installed by communications portion 709 from network, and/or be pacified from detachable media 711 Dress.When the computer program is executed by processor 701, the above-mentioned function of being limited in the system of the embodiment of the present disclosure is executed.Root According to embodiment of the disclosure, system as described above, unit, module, unit etc. can by computer program module come It realizes.
It should be noted that computer-readable medium shown in the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two arbitrarily combines.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or arbitrary above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more conducting wires, just It takes formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type and may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, can be any include computer readable storage medium or storage journey The tangible medium of sequence, the program can be commanded the either device use or in connection of execution system, device.And at this In open, computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to:Wirelessly, electric wire, optical cable, RF etc. or above-mentioned Any appropriate combination.In accordance with an embodiment of the present disclosure, computer-readable medium may include above-described ROM 702 And/or one or more memories other than RAM 703 and/or ROM 702 and RAM 703.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, program segment, or code of table, above-mentioned module, program segment, or code includes one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
As on the other hand, the disclosure additionally provides a kind of computer-readable medium, which can be Included in equipment described in above-described embodiment;Can also be individualism, and without be incorporated the equipment in.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the equipment, makes Obtain identity card method of the equipment execution according to the embodiment of the present disclosure.This method includes:Terminal device is obtained to use in user The data generated in journey;The data are handled, the feature vector of the data is obtained;Using grader according to the number According to feature vector carry out authentication;Wherein, the grader is generated by the terminal device during user's use The feature vectors of data train to obtain.
Embodiment of the disclosure is described above.But the purpose that these embodiments are merely to illustrate that, and It is not intended to limit the scope of the present disclosure.Although respectively describing each embodiment above, but it is not intended that each reality Use cannot be advantageously combined by applying the measure in example.The scope of the present disclosure is defined by the appended claims and the equivalents thereof.It does not take off From the scope of the present disclosure, those skilled in the art can make a variety of alternatives and modifications, these alternatives and modifications should all be fallen at this Within scope of disclosure.

Claims (14)

1. a kind of identity identifying method, including:
Obtain the data that terminal device generates during user's use;
The data are handled, the feature vector of the data is obtained;
Authentication is carried out according to the feature vector of the data using grader;
Wherein, the feature vectors of the data that the grader is generated by the terminal device during user's use is trained It arrives.
2. according to the method described in claim 1, wherein, obtaining the data packet that terminal device generates during user's use It includes:
In user's using terminal equipment, the data of the user and the terminal are obtained by the sensor of the terminal device The data of equipment.
3. according to the method described in claim 2, wherein, the data of the user include that the user is clicking and/or sliding The data of the data generated when the terminal device screen, the terminal device include acceleration of gravity, angular speed, magnetic field shape State.
4. according to the method described in claim 1, wherein, handling the data, the feature vector of the data is obtained Including:
Extract user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or the slope characteristics of the data;
Based on the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics, the spy of the data is generated Sign vector.
5. according to the method described in claim 2, wherein, the grader is by the terminal device during user's use The feature vector of the data of generation train including:
According to the feature vector that the data of the user and the data of the terminal device are formed, using algorithm of support vector machine pair The default classifier training, obtains the grader, the grader be used for the features of the data inputted every time to Amount carries out authentication.
6. according to the method described in claim 1, further including:
If authentication fails, continue the identity of the currently used terminal user of certification by predetermined manner.
7. a kind of identification authentication system, including:
Acquisition module, the data generated during user's use for obtaining terminal device;
Processing module obtains the feature vector of the data for handling the data;
First authentication module, for carrying out authentication according to the feature vector of the data using grader;
Wherein, the feature vectors of the data that the grader is generated by the terminal device during user's use is trained It arrives.
8. device according to claim 7, wherein the acquisition module is additionally operable to:
In user's using terminal equipment, the data of the user and the terminal are obtained by the sensor of the terminal device The data of equipment.
9. device according to claim 8, wherein the data of the user include that the user is clicking and/or sliding The data of the data generated when the terminal device screen, the terminal device include acceleration of gravity, angular speed, magnetic field shape State.
10. device according to claim 7, wherein the processing module includes:
Extraction module, user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or the slope for extracting the data are special Sign;
Generation module is based on the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics, generates institute State the feature vector of data.
11. device according to claim 7, wherein the number generated during user's use by the terminal device According to feature vector train to obtain grader include:The spy formed according to the data of the user and the data of the terminal device Sign vector obtains the grader using algorithm of support vector machine to the default classifier training, the grader for pair The feature vector of the data inputted every time carries out authentication.
12. device according to claim 7, further includes:
Second authentication module continues the currently used terminal device of certification if authentication fails by predetermined manner The identity of user.
13. a kind of identity witness device, including:
One or more processors;And
Storage device, for storing one or more programs,
Wherein, when one or more of programs are executed by one or more of processors so that one or more of Processor executes the method according to claim 1~6 any one.
14. a kind of computer-readable medium, is stored thereon with executable instruction, which makes processor hold when being executed by processor Method of the row according to claim 1~6 any one.
CN201810401962.6A 2018-04-28 2018-04-28 Identity identifying method, device and medium Pending CN108600237A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810401962.6A CN108600237A (en) 2018-04-28 2018-04-28 Identity identifying method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810401962.6A CN108600237A (en) 2018-04-28 2018-04-28 Identity identifying method, device and medium

Publications (1)

Publication Number Publication Date
CN108600237A true CN108600237A (en) 2018-09-28

Family

ID=63619276

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810401962.6A Pending CN108600237A (en) 2018-04-28 2018-04-28 Identity identifying method, device and medium

Country Status (1)

Country Link
CN (1) CN108600237A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614777A (en) * 2018-11-23 2019-04-12 第四范式(北京)技术有限公司 The user ID authentication method and device of smart machine and smart machine
CN110321689A (en) * 2019-07-08 2019-10-11 深圳大学 A kind of personal identification method and system based on snap
CN111563746A (en) * 2020-04-30 2020-08-21 中国工商银行股份有限公司 Method, device, electronic equipment and medium for user identity authentication

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356168B2 (en) * 2004-04-23 2008-04-08 Hitachi, Ltd. Biometric verification system and method utilizing a data classifier and fusion model
CN103595538A (en) * 2013-11-25 2014-02-19 中南大学 Identity verification method based on mobile phone acceleration sensor
CN103886341A (en) * 2014-03-19 2014-06-25 国家电网公司 Gait behavior recognition method based on feature combination
CN104408341A (en) * 2014-11-13 2015-03-11 西安交通大学 Smart phone user identity authentication method based on gyroscope behavior characteristics
CN104765995A (en) * 2015-04-24 2015-07-08 福建师范大学 Intelligent device identity authentication method and client side based on touch screen operation
CN105530095A (en) * 2014-09-29 2016-04-27 中移电子商务有限公司 Method and device for user identity authentication
CN106127103A (en) * 2016-06-12 2016-11-16 广州广电运通金融电子股份有限公司 A kind of off-line identity authentication method and device
CN107153780A (en) * 2017-05-05 2017-09-12 西安交通大学苏州研究院 The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist
CN107273728A (en) * 2017-05-05 2017-10-20 西安交通大学苏州研究院 Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356168B2 (en) * 2004-04-23 2008-04-08 Hitachi, Ltd. Biometric verification system and method utilizing a data classifier and fusion model
CN103595538A (en) * 2013-11-25 2014-02-19 中南大学 Identity verification method based on mobile phone acceleration sensor
CN103886341A (en) * 2014-03-19 2014-06-25 国家电网公司 Gait behavior recognition method based on feature combination
CN105530095A (en) * 2014-09-29 2016-04-27 中移电子商务有限公司 Method and device for user identity authentication
CN104408341A (en) * 2014-11-13 2015-03-11 西安交通大学 Smart phone user identity authentication method based on gyroscope behavior characteristics
CN104765995A (en) * 2015-04-24 2015-07-08 福建师范大学 Intelligent device identity authentication method and client side based on touch screen operation
CN106127103A (en) * 2016-06-12 2016-11-16 广州广电运通金融电子股份有限公司 A kind of off-line identity authentication method and device
CN107153780A (en) * 2017-05-05 2017-09-12 西安交通大学苏州研究院 The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist
CN107273728A (en) * 2017-05-05 2017-10-20 西安交通大学苏州研究院 Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614777A (en) * 2018-11-23 2019-04-12 第四范式(北京)技术有限公司 The user ID authentication method and device of smart machine and smart machine
CN110321689A (en) * 2019-07-08 2019-10-11 深圳大学 A kind of personal identification method and system based on snap
CN111563746A (en) * 2020-04-30 2020-08-21 中国工商银行股份有限公司 Method, device, electronic equipment and medium for user identity authentication

Similar Documents

Publication Publication Date Title
US20230281612A1 (en) Virtual pos terminal method and apparatus
EP3332372B1 (en) Apparatus and method for trusted execution environment based secure payment transactions
CN105874494B (en) Disabling mobile payment for lost electronic devices
TWI710971B (en) Method and device for scene-based storage of facial information based on blockchain
KR20160100151A (en) Processing for secure information
CN110493039A (en) Device management method and equipment management system based on block chain
CN106465126A (en) Verifying a secure connection between a network beacon and a user computing device
CN108055132A (en) The method, apparatus and equipment of a kind of service authorization
CN108600237A (en) Identity identifying method, device and medium
CN105635168B (en) A kind of application method of offline transaction device and its security key
CN109408250A (en) Call application programming interface API approach, device, electronic equipment
CN109063653A (en) Image processing method and device
CN105791277B (en) A kind of identity authentication method
CN110175474A (en) Merging method, device, medium, server and the user terminal of Electronic Signature
CN109977839A (en) Information processing method and device
CN108415653A (en) Screen locking method and device for terminal device
CN106464502A (en) Methods and systems for authentication of a communication device
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN109033784A (en) Identity identifying method and device in a communication network
CN110189252A (en) The method and apparatus for generating average face image
CN105578384B (en) A kind of business information storage method and device
US20230281600A1 (en) System and method for indicating entry of personal identification number
US20220108008A1 (en) Platform health verification
CN109635558A (en) Access control method, device and system
CN110048831A (en) The distribution method and diostribution device of POS terminal master key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Daxing District, Beijing

Applicant after: Jingdong Digital Technology Holding Co., Ltd.

Address before: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant before: Beijing Jingdong Financial Technology Holding Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180928