CN108600237A - Identity identifying method, device and medium - Google Patents
Identity identifying method, device and medium Download PDFInfo
- Publication number
- CN108600237A CN108600237A CN201810401962.6A CN201810401962A CN108600237A CN 108600237 A CN108600237 A CN 108600237A CN 201810401962 A CN201810401962 A CN 201810401962A CN 108600237 A CN108600237 A CN 108600237A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- terminal device
- grader
- feature vector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/12—Classification; Matching
Landscapes
- Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
Present disclose provides a kind of identity identifying methods, including:Obtain the data that terminal device generates during user's use;The data are handled, the feature vector of the data is obtained;Authentication is carried out according to the feature vector of the data using grader;Wherein, the feature vector of data of the grader by using the terminal device during user's use trains to obtain.The disclosure additionally provides a kind of identification authentication system and medium.
Description
Technical field
This disclosure relates to a kind of Internet technical field more particularly to authentication, device and medium.
Background technology
With the fast development of internet, smart machine emerges one after another, life of the various smart machines to user
It brings great convenience, acquisition information can be facilitated by smart machine user, the activities such as communicated, done shopping, entertained.But
It is while user enjoys convenient, to be also faced with user information leakage problem, loss of assets may be caused to user.For
The problem, the prior art prevent user's assets from losing using the method for authenticating user identification at present.For example, close by user name
The means such as code, pattern, fingerprint carry out the identity of certification user.
But during realizing present inventive concept, inventor has found that at least there are the following problems in the prior art:It is existing
There is the identity identifying method of technology to need user that setting interface is actively gone to be configured.For example, user name password, pattern, fingerprint
It is required for the specific interface that user enters smart machine to be configured it, user needs fill message in the provisioning process, institute
The privacy of user may be related to by stating information, consequently, it is possible to user information is caused to be leaked, loss of assets is caused to user.
Invention content
In view of this, the disclosure provides a kind of identity identifying method, device and medium, so solve at least partly by
One or more problem caused by the limitation and defect of the relevant technologies.
Present disclose provides a kind of identity identifying methods, including:Obtain what terminal device generated during user's use
Data;The data are handled, the feature vector of the data is obtained;Using grader according to the features of the data to
Amount carries out authentication;Wherein, the spy for the data that the grader is generated by the terminal device during user's use
Sign vector training obtains.
In accordance with an embodiment of the present disclosure, the data that acquisition terminal device generates during user's use, which are included in user, to be made
When with terminal device, the data of the data and the terminal device of the user are obtained by the sensor of the terminal device.
In accordance with an embodiment of the present disclosure, the data of the user include that the user is clicking and/or sliding the terminal
The data of the data generated when device screen, the terminal device include acceleration of gravity, angular speed, magnetic field state.
In accordance with an embodiment of the present disclosure, the data are handled, the feature vector for obtaining the data includes:Extraction
User characteristics, temporal signatures, frequency domain character, velocity characteristic and/or the slope characteristics of the data;Based on the user characteristics,
Temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics generate the feature vector of the data.
In accordance with an embodiment of the present disclosure, the number that the grader is generated by the terminal device during user's use
According to feature vector train to obtain the feature vector including being formed according to the data of the user and the data of the terminal device,
Using algorithm of support vector machine to the default classifier training, the grader is obtained, the grader is used for defeated every time
The feature vector of the data entered carries out authentication.
In accordance with an embodiment of the present disclosure, if the above method further includes authentication failure, continued by predetermined manner
The identity of the currently used terminal user of certification.
Another aspect of the disclosure provides a kind of identification authentication system, including:Acquisition module is set for obtaining terminal
The standby data generated during user's use;Processing module obtains the spy of the data for handling the data
Sign vector;First authentication module, for carrying out authentication according to the feature vector of the data using grader;Wherein, institute
The feature vector for stating the data that grader is generated by the terminal device during user's use trains to obtain.
In accordance with an embodiment of the present disclosure, the acquisition module is additionally operable to, in user's using terminal equipment, pass through the end
The sensor of end equipment obtains the data of the data and the terminal device of the user.
In accordance with an embodiment of the present disclosure, the data of the user include that the user is clicking and/or sliding the terminal
The data of the data generated when device screen, the terminal device include acceleration of gravity, angular speed, magnetic field state.
In accordance with an embodiment of the present disclosure, the processing module includes:Extraction module, the user for extracting the data are special
Sign, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics;Generation module, it is special based on the user characteristics, time domain
Sign, frequency domain character, velocity characteristic and/or slope characteristics generate the feature vector of the data.
In accordance with an embodiment of the present disclosure, the feature of the data generated during user's use by the terminal device to
It includes the feature vector formed according to the data of the user and the data of the terminal device that amount training, which obtains grader, is used
Algorithm of support vector machine obtains the grader to the default classifier training, and the grader is used for inputting every time
The feature vector of the data carries out authentication.
In accordance with an embodiment of the present disclosure, above-mentioned apparatus further includes:Second authentication module leads to if authentication fails
Cross the identity that predetermined manner continues the currently used terminal user of certification.
Another aspect of the present disclosure provides a kind of identification authentication system.Described device includes one or more processors,
And storage device.The storage device is for storing one or more programs.Wherein, when one or more of programs are by institute
When stating one or more processors execution so that one or more of processors execute identity identifying method as described above.
Another aspect of the present disclosure provides a kind of computer-readable medium, is stored thereon with executable instruction, the instruction
Processor is set to execute identity identifying method as described above when being executed by processor.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to
It enables, described instruction is when executed for realizing identity identifying method.
In accordance with an embodiment of the present disclosure, the identity identifying method that can solve the prior art at least partly needs to use householder
It is dynamic that setting interface is gone to be configured.For example, user name password, pattern, fingerprint are required for user to enter the specific boundary of smart machine
It being configured in face of it, user needs fill message, described information that may be related to the privacy of user in the provisioning process, to
May result in the problem of user information is leaked, loss of assets is caused to user, and it is achieved that verification process user just
It is often used smart machine, user is not needed and passively coordinates, whole process user's unaware, to improve user experience.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
Fig. 1 diagrammatically illustrates the flow chart of the identity identifying method according to the embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment;
Fig. 3 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment;
Fig. 4 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment;
Fig. 5 diagrammatically illustrates the block diagram of the identification authentication system according to the embodiment of the present disclosure;
Fig. 6 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure;
Fig. 7 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure;
Fig. 8 diagrammatically illustrates the block diagram of the computer system of the authentication according to the embodiment of the present disclosure.
Specific implementation mode
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary
, and it is not intended to limit the scope of the present disclosure.In addition, in the following description, descriptions of well-known structures and technologies are omitted, with
Avoid unnecessarily obscuring the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein
The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of
Or other one or more features of addition, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood
Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification
Meaning, without should by idealization or it is excessively mechanical in a manner of explain.
It, in general should be according to this using " in A, B and C etc. at least one " such statement is similar to
Field technology personnel are generally understood the meaning of the statement to make an explanation (for example, " with system at least one in A, B and C "
Should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C, and/or
System etc. with A, B, C).Using " in A, B or C etc. at least one " such statement is similar to, it is general come
Say be generally understood the meaning of the statement to make an explanation (for example, " having in A, B or C at least according to those skilled in the art
One system " should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have
B and C, and/or system etc. with A, B, C).It should also be understood by those skilled in the art that substantially arbitrarily indicating two or more
The adversative conjunction and/or phrase of optional project shall be construed as either in specification, claims or attached drawing
It gives including one of these projects, the possibility of these projects either one or two projects.For example, phrase " A or B " should
It is understood to include the possibility of " A " or " B " or " A and B ".
Embodiment of the disclosure provides a kind of identity identifying method, including:It obtains terminal device and uses process in user
The data of middle generation;The data are handled, the feature vector of the data is obtained;Using grader according to the data
Feature vector carry out authentication;Wherein, the grader is generated by the terminal device during user's use
The feature vector of data trains to obtain.
By the above-mentioned means, the identity identifying method of the embodiment of the present disclosure, can solve the prior art at least partly
Identity identifying method needs user that setting interface is actively gone to be configured.For example, user name password, pattern, fingerprint are required for using
The specific interface that family enters smart machine is configured it, and user needs fill message, described information can in the provisioning process
It can be related to the privacy of user, consequently, it is possible to the problem of causing user information to be leaked, loss of assets is caused to user, and because
This realizes verification process user's normal use smart machine, does not need user and passively coordinates, whole process user's unaware, from
And improve user experience.
Fig. 1 diagrammatically illustrates the flow chart of the identity identifying method according to the embodiment of the present disclosure.
As shown in Figure 1, identity identifying method includes step S101~step S103.
In step S101, the data that terminal device generates during user's use are obtained.
In step s 102, the data are handled, obtains the feature vector of the data.
In step s 103, authentication is carried out according to the feature vector of the data using grader.
The data that this method is generated by obtaining terminal device during user's use, and the data are handled,
Can obtain the feature vector of the data, in such a case, it is possible to using grader according to the feature vectors of the data into
Row authentication.Being authenticated by this way to the identity of user can be to avoid the privacy of leakage user, to protect use
The assets security at family, and without user terminal device specific interface (for example, setting unlocking pin interface, setting
Input of secret number etc.) passive input data, and then improve user experience.
In some embodiments of the present disclosure, data that terminal device generates during user's use can refer to user and exist
The data generated in operating process are carried out to terminal device in daily life.For example, terminal device is smart mobile phone, the data
The data that user generates whens making smart mobile phone make a phone call, taking pictures, play game, read novel etc. can be referred to.In short, with
As long as family can obtain terminal device during user's use in using terminal equipment, using disclosed method and produce in real time
Raw data, and will not relate in gathered data the privacy information of user, passively coordinate without user, entirely obtain number
User's unaware during.
In accordance with an embodiment of the present disclosure, grader described above can use process in user by the terminal device
In the feature vector of data of generation train.
In some embodiments of the present disclosure, grader is instructed by data of terminal device during user's use
It may include the feature vector formed according to the data of the user and the data of the terminal device to get, using support to
Amount machine algorithm obtains the grader to the default classifier training, and the grader is used for the number to inputting every time
According to feature vector carry out authentication.
For example, the identity identifying method using the disclosure can in use be generated by obtaining terminal user
Mass data, and mass data is handled, obtains a large amount of feature vector.Using algorithm of support vector machine according to a large amount of
Feature vector preset grader is trained, when preset grader is in convergence state, deconditioning.This
In the case of, user identity can be authenticated using the grader, help to improve the safety in verification process in this way.
Because identity identifying method in the prior art needs user to be configured in advance in the specific interface of terminal device.For example, with
Family when being unlocked to terminal device must in advance in the setting interface of terminal device be arranged unlocking pin, the unlocking pattern,
Unlock fingerprint etc..And set-up mode is that passively cooperation is configured user in this way, and therefore, user is in the provisioning process
It can perceive.But it is trained by obtaining the feature vector for the data that user generates in routine use terminal device
Grader, it is that user perceives less than because user does not have to obtain the data that user generates in using terminal equipment by this method
Passive cooperation, to improve user experience.
Fig. 2 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment.
As shown in Fig. 2, the step S101 of Fig. 1 descriptions can be specifically step S201.
In step s 201, in user's using terminal equipment, the use is obtained by the sensor of the terminal device
The data of the data at family and the terminal device.
According to the embodiment of the present disclosure, the data of the user, which include the user, to be set clicking and/or slide the terminal
The data generated when standby screen, the data of the terminal device include acceleration of gravity, angular speed, magnetic field state.
In some embodiments of the present disclosure, above-mentioned data can be obtained by terminal device self-sensor device.For example,
Above-mentioned data are obtained using acceleration transducer, gyroscope, gravity accelerometer, magnetometric sensor etc. sensor,
But not limited to this.
In some embodiments of the present disclosure, user can be obtained by acceleration transducer in using terminal equipment,
The size of the acceleration of the terminal device.User can be obtained by gyroscope in using terminal equipment, the terminal device
The size of angular speed.User can be obtained by gravity accelerometer in using terminal equipment, the weight of the terminal device
The size of power acceleration.User can be obtained by magnetometric sensor in using terminal equipment, the magnetic field shape of the terminal device
The variation of state.
In some embodiments of the present disclosure, user's using terminal equipment may include the screen that user clicks terminal device
And/or user slides the screen etc. of terminal device.User click terminal device screen when, can obtain user's finger with
Finger area, user when screen contact click the pressure generated to screen when terminal device.Terminal device is slided in user
When screen, user's finger sliding trace on the screen can be obtained, user slides the pressure generated to screen when terminal device.
The data of the user generated in user's using terminal equipment of above-mentioned example shown and/or terminal device
Data are to help the technical solution those skilled in the art understand that the disclosure.In addition to the data enumerated, further include due to
Family using terminal equipment and other data generated, it is numerous to list herein.
It should be understood that the data of above-mentioned user and the data of/above-mentioned terminal device be all user's perception less than
In the case of obtain, that is to say, that do not need the passive input data of user.
Fig. 3 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment.
As described in Figure 3, the step S102 of Fig. 1 embodiments description includes step S301 and step S302.
In step S301, the user characteristics of the data, temporal signatures, frequency domain character, velocity characteristic and/or tiltedly are extracted
Rate feature.
In step s 302, it is special that the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope are based on
Sign, generates the feature vector of the data.
This method user characteristics based on the data, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics
The feature vector of the data can be generated, the feature vector of the data can reflect user in using terminal to the end
The operating habit of end equipment.That is the identity identifying method of the disclosure can be according to user to the operating habit of terminal device
The identity of user is authenticated using grader.The identity of user is authenticated by this method and will not relate to the hidden of user
Private, therefore will not cause damages to the assets of user.
In some embodiments of the present disclosure, the user characteristics of the data, temporal signatures, frequency domain character, speed are extracted
Feature and/or slope characteristics can calculate separately user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope spy
Maximum value, minimum value, average value, variance, the difference of maxima and minima of sign.
In some embodiments of the present disclosure, pass through acceleration transducer, gyroscope, gravity accelerometer, magnetic force
The data that sensor etc. sensor obtains can be three groups of vectors on three axis of x, y, z, for example, three groups on three axis of x, y, z
Vector can be x=[x1,x2,x3,…,xn], y=[y1,y2,y3,…,yn], z=[z1,z2,z3,…,zn].According to the disclosure
Embodiment, maximum value, minimum value, average value, variance, the difference of maxima and minima for calculating temporal signatures can be calculate
Maximum value, minimum value, average value, variance, the difference of maxima and minima of the x, y, z of the data, to obtain the number
According to temporal signatures feature vector.
In some embodiments of the present disclosure, three groups of vectors on three axis of x, y, z are done into discrete Fourier transform, obtain three
Group vector xfft、yfft、zfft.In accordance with an embodiment of the present disclosure, calculate the maximum value of frequency domain character, minimum value, average value, variance,
The difference of maxima and minima can be the x for calculating the datafft、yfft、zfftMaximum value, minimum value, average value, variance,
The difference of maxima and minima, to obtain the data frequecy characteristic feature vector.
In some embodiments of the present disclosure, maximum value, minimum value, average value, variance, the maximum value of user characteristics are calculated
To screen when difference with minimum value can be the finger area and user's click terminal device when calculating user's finger and screen contact
Maximum value, minimum value, average value, variance, the difference of maxima and minima for the pressure that curtain generates, to obtain the data
The feature vector of user characteristics.
In some embodiments of the present disclosure, to user the screen of terminal device sliding trace coordinate extraction rate,
Slope characteristics.Sliding trace is a vector being made of abscissa x, ordinate y and time t three-dimensional coordinate, and form is
[(x1,y1,t1),(x2,y2,t2),(x3,y3,t3),…,(xn,yn,tn)].Wherein, velocity characteristic is that former and later two coordinates ask Europe
Formula distance is then divided by time difference, slope are the difference of the ordinate of former and later two points divided by the difference of abscissa, and formula is (yn-
yn-1)/(xn-xn-1).The velocity characteristic vector sum slope characteristics vector of the data can be obtained by this method.
It in accordance with an embodiment of the present disclosure, can be with temporal signatures based on the data vector, frequency domain character vector, Yong Hute
Sign vector, velocity characteristic vector sum slope characteristics vector generate a feature vector in training set, i.e., as in training set
One training data includes the data of user in training set, is labeled as 1, and the data of non-user are labeled as 0.It should
Understand, grader is for input every time, probability value of the output value range 0 to 1, output valve closer to 1, then for 1 possibility
Property it is bigger, closer to 0, then for it is non-I possibility it is bigger.
For example, when user's using terminal equipment, user is in terminal device screen sliding trace coordinate, user's finger for acquisition
Area, user touch finger pressure, acceleration, angular speed, magnetic field state, the acceleration of gravity of screen, are obtained to data processing
Multiple feature vectors are spliced into one group of one-dimensional vector, grader are input to, according to the output of grader by multiple feature vectors
Value carries out the authentication of user and non-user.
Fig. 4 diagrammatically illustrates the flow chart of the identity identifying method according to the disclosure another embodiment.
As shown in figure 4, this method further includes step S401 other than step S101~step S103 that Fig. 1 is described.
In step S101, the data that terminal device generates during user's use are obtained.
In step s 102, the data are handled, obtains the feature vector of the data.
In step s 103, authentication is carried out according to the feature vector of the data using grader.
In step S401, if authentication fails, the currently used terminal of certification is continued by predetermined manner
The identity of equipment user.
It, can be with if carrying out authentication failure according to the feature vector of the data using grader in this method
Continue the identity of the currently used terminal user of certification by predetermined manner.For example, can be by short message verification code, logical
The input authentication modes such as password are crossed to continue to be authenticated the identity of the user of the currently used terminal device, it in this way can be into
The assets for protecting user of one step are not suffered a loss.
The above method is described below by a specific application scenarios.
For example, by Jingdone district financial product exempt from close payment scene for, two kinds of air control grades of scene settings thus:Certification is logical
It crosses to add with short message and tests or input password, when user is in use Jingdone district finance app, the sensor real-time collecting user of terminal device
Finger area, user touch the finger pressure of screen, the acceleration of terminal device, the angular speed of terminal device, terminal device
The data such as magnetic field state, the acceleration of gravity of terminal device, screen sliding trace coordinate, when user transfers accounts or pays,
One-dimensional feature vector is obtained by the original data processing being collected into sensor, and is entered into trained grader
In, grader provides the fractional value that a section is 0 to 1, such as the fractional value that this grader provides is 0.9, and grader is set
Fixed threshold value is 0.5, it is clear that 0.9 is more than 0.5, therefore grader judges that this time operation operates as user, and user can carry out
Without close payment, when the score that grader provides is relatively low, for example, 0.1, it is less than threshold value 0.5, the result that grader judges is non-
People operates, and needs to add carrying out short message to user to test or carry out by way of input password plus test, if short-message verification or inputting close
Code passes through, then user's certification passes through, and otherwise refusal passes through.
Fig. 5 diagrammatically illustrates the block diagram of the identification authentication system according to the embodiment of the present disclosure.
As shown in figure 5, identification authentication system 500 includes acquisition module 510, processing module 520 and the first authentication module
530。
Acquisition module 510, the data generated during user's use for obtaining terminal device.
Processing module 520 obtains the feature vector of the data for handling the data.
First authentication module 530, for carrying out authentication according to the feature vector of the data using grader,
In, the feature vector for the data that the grader is generated by the terminal device during user's use trains to obtain.
In accordance with an embodiment of the present disclosure, the authentication side that identification authentication system 500 describes for realizing Fig. 1 embodiments
Method.
The device 500 can by obtaining the data that be generated during user's use of terminal device, and to the data into
Row processing, can obtain the feature vector of the data, in such a case, it is possible to using grader according to the feature of the data
Vector carries out authentication.Being authenticated by this way to the identity of user can be to avoid the privacy of leakage user, to protect
Protected the assets security of user, and without user terminal device specific interface (for example, the boundary of setting unlocking pin
Face, the input etc. that secret number is set) passive input data, and then improve user experience.
Fig. 6 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure.
As shown in fig. 6, the processing module 520 of Fig. 5 embodiments description includes extraction module 521 and generation module 522.
Extraction module 521, for extract the user characteristics of the data, temporal signatures, frequency domain character, velocity characteristic and/
Or slope characteristics.
Generation module 522 is based on the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics,
Generate the feature vector of the data.
In accordance with an embodiment of the present disclosure, the identification authentication system 500 of Fig. 6 embodiments description is retouched for realizing Fig. 3 embodiments
The identity identifying method stated.
Fig. 7 diagrammatically illustrates the block diagram of the identification authentication system according to another embodiment of the disclosure.
As shown in fig. 7, in addition to acquisition module 510, processing module 520 and the first authentication module 530 of the description of Fig. 5 embodiments
Except, identification authentication system 600 further includes the second authentication module 610.
Second authentication module 610 continues the certification currently used end if authentication fails by predetermined manner
The identity of end equipment user.
It is understood that acquisition module 510, processing module 520, extraction module 521, generation module 522, the first certification
Module 530 and the second authentication module 610, which may be incorporated in a module, to be realized or any one module therein can
To be split into multiple modules.Alternatively, at least partly function of one or more of these modules module can be with other moulds
At least partly function of block is combined, and is realized in a module.According to an embodiment of the invention, acquisition module 510, processing
At least one in module 520, extraction module 521, generation module 522, the first authentication module 530 and the second authentication module 610
It is a to be at least implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array
(PLA), system on chip, the system on substrate, the system in encapsulation, application-specific integrated circuit (ASIC), or can with to circuit into
Row is integrated or the hardware such as any other rational method of encapsulation or firmware are realized, or with three kinds of software, hardware and firmware
The appropriately combined of realization method is realized.Alternatively, acquisition module 510, processing module 520, extraction module 521, generation module
522, at least one of the first authentication module 530 and the second authentication module 610 can at least be implemented partly as calculating
Machine program module can execute the function of corresponding module when the program is run by computer.
Fig. 8 diagrammatically illustrates the block diagram of the computer system of the authentication according to the embodiment of the present disclosure.Fig. 8 is shown
Computer system be only an example, any restrictions should not be brought to the function and use scope of the embodiment of the present disclosure.
As shown in figure 8, include processor 701 according to the computer system 700 of the identity identifying method of the embodiment of the present disclosure,
It can be loaded into random access storage according to the program being stored in read-only memory (ROM) 702 or from storage section 708
Program in device (RAM) 703 and execute various actions appropriate and processing.Processor 701 for example may include general microprocessor
Device (such as CPU), instruction set processor and/or related chip group and/or special microprocessor are (for example, application-specific integrated circuit
(ASIC)), etc..Processor 701 can also include the onboard storage device for caching purposes.Processor 701 may include using
In the different single treatment units acted for executing the method flow according to the embodiment of the present disclosure with reference to figure 1~Fig. 4 description or
Person is multiple processing units.
In RAM 703, it is stored with system 700 and operates required various programs and data.Processor 701, ROM 702 with
And RAM 703 is connected with each other by bus 704.Processor 701 is held by executing the program in ROM 702 and/or RAM 703
Various steps of the row above with reference to Fig. 1~Fig. 4 identity identifying methods described.It is removed it is noted that the program can also be stored in
In one or more memories other than ROM 702 and RAM 703.Processor 701 can also be stored in this by executing
Or the program in multiple memories executes the various steps above with reference to Fig. 1~Fig. 4 identity identifying methods described.
In accordance with an embodiment of the present disclosure, system 700 can also include input/output (I/O) interface 707, input/output
(I/O) interface 707 is also connected to bus 704.System 700 can also include be connected to I/O interfaces 705 with one in lower component
Item is multinomial:Importation 706 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD)
Deng and loud speaker etc. output par, c 707;Storage section 708 including hard disk etc.;And including such as LAN card, modulatedemodulate
Adjust the communications portion 709 of the network interface card of device etc..Communications portion 709 executes communication process via the network of such as internet.
Driver 710 is also according to needing to be connected to I/O interfaces 705.Detachable media 711, such as disk, CD, magneto-optic disk, semiconductor
Memory etc. is mounted on driver 710, as needed in order to be pacified as needed from the computer program read thereon
It is packed into storage section 708.
In accordance with an embodiment of the present disclosure, it may be implemented as computer software journey above with reference to the method for flow chart description
Sequence.For example, embodiment of the disclosure includes a kind of computer program product comprising carry meter on a computer-readable medium
Calculation machine program, the computer program include the program code for method shown in execution flow chart.In such embodiments,
The computer program can be downloaded and installed by communications portion 709 from network, and/or be pacified from detachable media 711
Dress.When the computer program is executed by processor 701, the above-mentioned function of being limited in the system of the embodiment of the present disclosure is executed.Root
According to embodiment of the disclosure, system as described above, unit, module, unit etc. can by computer program module come
It realizes.
It should be noted that computer-readable medium shown in the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two arbitrarily combines.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or arbitrary above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more conducting wires, just
It takes formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type and may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, can be any include computer readable storage medium or storage journey
The tangible medium of sequence, the program can be commanded the either device use or in connection of execution system, device.And at this
In open, computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated,
Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By instruction execution system, device either device use or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to:Wirelessly, electric wire, optical cable, RF etc. or above-mentioned
Any appropriate combination.In accordance with an embodiment of the present disclosure, computer-readable medium may include above-described ROM 702
And/or one or more memories other than RAM 703 and/or ROM 702 and RAM 703.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part for a part for one module, program segment, or code of table, above-mentioned module, program segment, or code includes one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
As on the other hand, the disclosure additionally provides a kind of computer-readable medium, which can be
Included in equipment described in above-described embodiment;Can also be individualism, and without be incorporated the equipment in.Above-mentioned calculating
Machine readable medium carries one or more program, when said one or multiple programs are executed by the equipment, makes
Obtain identity card method of the equipment execution according to the embodiment of the present disclosure.This method includes:Terminal device is obtained to use in user
The data generated in journey;The data are handled, the feature vector of the data is obtained;Using grader according to the number
According to feature vector carry out authentication;Wherein, the grader is generated by the terminal device during user's use
The feature vectors of data train to obtain.
Embodiment of the disclosure is described above.But the purpose that these embodiments are merely to illustrate that, and
It is not intended to limit the scope of the present disclosure.Although respectively describing each embodiment above, but it is not intended that each reality
Use cannot be advantageously combined by applying the measure in example.The scope of the present disclosure is defined by the appended claims and the equivalents thereof.It does not take off
From the scope of the present disclosure, those skilled in the art can make a variety of alternatives and modifications, these alternatives and modifications should all be fallen at this
Within scope of disclosure.
Claims (14)
1. a kind of identity identifying method, including:
Obtain the data that terminal device generates during user's use;
The data are handled, the feature vector of the data is obtained;
Authentication is carried out according to the feature vector of the data using grader;
Wherein, the feature vectors of the data that the grader is generated by the terminal device during user's use is trained
It arrives.
2. according to the method described in claim 1, wherein, obtaining the data packet that terminal device generates during user's use
It includes:
In user's using terminal equipment, the data of the user and the terminal are obtained by the sensor of the terminal device
The data of equipment.
3. according to the method described in claim 2, wherein, the data of the user include that the user is clicking and/or sliding
The data of the data generated when the terminal device screen, the terminal device include acceleration of gravity, angular speed, magnetic field shape
State.
4. according to the method described in claim 1, wherein, handling the data, the feature vector of the data is obtained
Including:
Extract user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or the slope characteristics of the data;
Based on the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics, the spy of the data is generated
Sign vector.
5. according to the method described in claim 2, wherein, the grader is by the terminal device during user's use
The feature vector of the data of generation train including:
According to the feature vector that the data of the user and the data of the terminal device are formed, using algorithm of support vector machine pair
The default classifier training, obtains the grader, the grader be used for the features of the data inputted every time to
Amount carries out authentication.
6. according to the method described in claim 1, further including:
If authentication fails, continue the identity of the currently used terminal user of certification by predetermined manner.
7. a kind of identification authentication system, including:
Acquisition module, the data generated during user's use for obtaining terminal device;
Processing module obtains the feature vector of the data for handling the data;
First authentication module, for carrying out authentication according to the feature vector of the data using grader;
Wherein, the feature vectors of the data that the grader is generated by the terminal device during user's use is trained
It arrives.
8. device according to claim 7, wherein the acquisition module is additionally operable to:
In user's using terminal equipment, the data of the user and the terminal are obtained by the sensor of the terminal device
The data of equipment.
9. device according to claim 8, wherein the data of the user include that the user is clicking and/or sliding
The data of the data generated when the terminal device screen, the terminal device include acceleration of gravity, angular speed, magnetic field shape
State.
10. device according to claim 7, wherein the processing module includes:
Extraction module, user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or the slope for extracting the data are special
Sign;
Generation module is based on the user characteristics, temporal signatures, frequency domain character, velocity characteristic and/or slope characteristics, generates institute
State the feature vector of data.
11. device according to claim 7, wherein the number generated during user's use by the terminal device
According to feature vector train to obtain grader include:The spy formed according to the data of the user and the data of the terminal device
Sign vector obtains the grader using algorithm of support vector machine to the default classifier training, the grader for pair
The feature vector of the data inputted every time carries out authentication.
12. device according to claim 7, further includes:
Second authentication module continues the currently used terminal device of certification if authentication fails by predetermined manner
The identity of user.
13. a kind of identity witness device, including:
One or more processors;And
Storage device, for storing one or more programs,
Wherein, when one or more of programs are executed by one or more of processors so that one or more of
Processor executes the method according to claim 1~6 any one.
14. a kind of computer-readable medium, is stored thereon with executable instruction, which makes processor hold when being executed by processor
Method of the row according to claim 1~6 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810401962.6A CN108600237A (en) | 2018-04-28 | 2018-04-28 | Identity identifying method, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810401962.6A CN108600237A (en) | 2018-04-28 | 2018-04-28 | Identity identifying method, device and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108600237A true CN108600237A (en) | 2018-09-28 |
Family
ID=63619276
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810401962.6A Pending CN108600237A (en) | 2018-04-28 | 2018-04-28 | Identity identifying method, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108600237A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614777A (en) * | 2018-11-23 | 2019-04-12 | 第四范式(北京)技术有限公司 | The user ID authentication method and device of smart machine and smart machine |
CN110321689A (en) * | 2019-07-08 | 2019-10-11 | 深圳大学 | A kind of personal identification method and system based on snap |
CN111563746A (en) * | 2020-04-30 | 2020-08-21 | 中国工商银行股份有限公司 | Method, device, electronic equipment and medium for user identity authentication |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7356168B2 (en) * | 2004-04-23 | 2008-04-08 | Hitachi, Ltd. | Biometric verification system and method utilizing a data classifier and fusion model |
CN103595538A (en) * | 2013-11-25 | 2014-02-19 | 中南大学 | Identity verification method based on mobile phone acceleration sensor |
CN103886341A (en) * | 2014-03-19 | 2014-06-25 | 国家电网公司 | Gait behavior recognition method based on feature combination |
CN104408341A (en) * | 2014-11-13 | 2015-03-11 | 西安交通大学 | Smart phone user identity authentication method based on gyroscope behavior characteristics |
CN104765995A (en) * | 2015-04-24 | 2015-07-08 | 福建师范大学 | Intelligent device identity authentication method and client side based on touch screen operation |
CN105530095A (en) * | 2014-09-29 | 2016-04-27 | 中移电子商务有限公司 | Method and device for user identity authentication |
CN106127103A (en) * | 2016-06-12 | 2016-11-16 | 广州广电运通金融电子股份有限公司 | A kind of off-line identity authentication method and device |
CN107153780A (en) * | 2017-05-05 | 2017-09-12 | 西安交通大学苏州研究院 | The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist |
CN107273728A (en) * | 2017-05-05 | 2017-10-20 | 西安交通大学苏州研究院 | Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic |
-
2018
- 2018-04-28 CN CN201810401962.6A patent/CN108600237A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7356168B2 (en) * | 2004-04-23 | 2008-04-08 | Hitachi, Ltd. | Biometric verification system and method utilizing a data classifier and fusion model |
CN103595538A (en) * | 2013-11-25 | 2014-02-19 | 中南大学 | Identity verification method based on mobile phone acceleration sensor |
CN103886341A (en) * | 2014-03-19 | 2014-06-25 | 国家电网公司 | Gait behavior recognition method based on feature combination |
CN105530095A (en) * | 2014-09-29 | 2016-04-27 | 中移电子商务有限公司 | Method and device for user identity authentication |
CN104408341A (en) * | 2014-11-13 | 2015-03-11 | 西安交通大学 | Smart phone user identity authentication method based on gyroscope behavior characteristics |
CN104765995A (en) * | 2015-04-24 | 2015-07-08 | 福建师范大学 | Intelligent device identity authentication method and client side based on touch screen operation |
CN106127103A (en) * | 2016-06-12 | 2016-11-16 | 广州广电运通金融电子股份有限公司 | A kind of off-line identity authentication method and device |
CN107153780A (en) * | 2017-05-05 | 2017-09-12 | 西安交通大学苏州研究院 | The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist |
CN107273728A (en) * | 2017-05-05 | 2017-10-20 | 西安交通大学苏州研究院 | Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614777A (en) * | 2018-11-23 | 2019-04-12 | 第四范式(北京)技术有限公司 | The user ID authentication method and device of smart machine and smart machine |
CN110321689A (en) * | 2019-07-08 | 2019-10-11 | 深圳大学 | A kind of personal identification method and system based on snap |
CN111563746A (en) * | 2020-04-30 | 2020-08-21 | 中国工商银行股份有限公司 | Method, device, electronic equipment and medium for user identity authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230281612A1 (en) | Virtual pos terminal method and apparatus | |
EP3332372B1 (en) | Apparatus and method for trusted execution environment based secure payment transactions | |
CN105874494B (en) | Disabling mobile payment for lost electronic devices | |
TWI710971B (en) | Method and device for scene-based storage of facial information based on blockchain | |
KR20160100151A (en) | Processing for secure information | |
CN110493039A (en) | Device management method and equipment management system based on block chain | |
CN106465126A (en) | Verifying a secure connection between a network beacon and a user computing device | |
CN108055132A (en) | The method, apparatus and equipment of a kind of service authorization | |
CN108600237A (en) | Identity identifying method, device and medium | |
CN105635168B (en) | A kind of application method of offline transaction device and its security key | |
CN109408250A (en) | Call application programming interface API approach, device, electronic equipment | |
CN109063653A (en) | Image processing method and device | |
CN105791277B (en) | A kind of identity authentication method | |
CN110175474A (en) | Merging method, device, medium, server and the user terminal of Electronic Signature | |
CN109977839A (en) | Information processing method and device | |
CN108415653A (en) | Screen locking method and device for terminal device | |
CN106464502A (en) | Methods and systems for authentication of a communication device | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
CN109033784A (en) | Identity identifying method and device in a communication network | |
CN110189252A (en) | The method and apparatus for generating average face image | |
CN105578384B (en) | A kind of business information storage method and device | |
US20230281600A1 (en) | System and method for indicating entry of personal identification number | |
US20220108008A1 (en) | Platform health verification | |
CN109635558A (en) | Access control method, device and system | |
CN110048831A (en) | The distribution method and diostribution device of POS terminal master key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Daxing District, Beijing Applicant after: Jingdong Digital Technology Holding Co., Ltd. Address before: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176 Applicant before: Beijing Jingdong Financial Technology Holding Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180928 |