CN103955637A - Identification method and device for user identity of mobile terminal - Google Patents
Identification method and device for user identity of mobile terminal Download PDFInfo
- Publication number
- CN103955637A CN103955637A CN201410140870.9A CN201410140870A CN103955637A CN 103955637 A CN103955637 A CN 103955637A CN 201410140870 A CN201410140870 A CN 201410140870A CN 103955637 A CN103955637 A CN 103955637A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- user
- current
- operation information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012795 verification Methods 0.000 claims description 48
- 238000005070 sampling Methods 0.000 claims description 12
- 238000000605 extraction Methods 0.000 claims description 5
- 239000000284 extract Substances 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 238000003066 decision tree Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The invention provides an identification method and device for the user identity of a mobile terminal. The identification method for the user identity of the mobile terminal comprises the steps of acquiring the current operation information of a current user to the mobile terminal and extracting current feature data from the current operation information; using the current feature data to match a feature database; when the current feature data and the feature database are successfully matched, identifying the current user as a legalized user of the mobile terminal; when the match of the current feature data and the feature database is failed, identifying the current user of as an illegalized user of the mobile terminal. According to the identification method and device for the user identity of the mobile terminal provided by the embodiment, the obtained current feature data are used for matching the feature database, the user identify is automatically identified according to the match result without the support of extra hardware, and the identification method is easy to realize and high in accuracy.
Description
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a method and a device for identifying the identity of a mobile terminal user.
Background
In order to secure personal subscriber information in a mobile terminal, it is necessary to authenticate a user of the mobile terminal before using the mobile terminal.
Currently, in a mobile terminal, a user of the mobile terminal may be authenticated by means of a fingerprint and a password/gesture. These approaches all have a common feature, namely, the user is required to manually store a fingerprint and password/gesture, then to collect input data during verification, and to compare the input data with the stored fingerprint and password/gesture, thereby determining the identity of the user. This method is a conventional method, and requires manual intervention, so that all users of the mobile terminal, including the owner of the mobile terminal, need to pass authentication before using the mobile terminal. A valid user of the mobile terminal needs to input authentication information such as a fingerprint, a password, a gesture and the like before using the mobile terminal every time, and the authentication information is frequently input, so that the experience of the valid user is not ideal. And, fingerprinting requires corresponding hardware support.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art. Therefore, an object of the present invention is to provide a method and an apparatus for automatically identifying the identity of a user of a mobile terminal, which is capable of automatically identifying whether the current user is a valid user of the mobile terminal.
According to a first aspect of the present invention, an embodiment provides a method for identifying a mobile terminal user identity, including: acquiring current operation information of a current user on the mobile terminal, and extracting current characteristic data from the current operation information; matching a feature database using the current feature data; and when the matching of the current characteristic data and the characteristic database is successful, identifying the current user as a legal user of the mobile terminal, and when the matching of the current characteristic data and the characteristic database is failed, identifying the current user as an illegal user of the mobile terminal.
The method for identifying the identity of the mobile terminal user, provided by the embodiment of the invention, uses the obtained current feature data to match the feature database, and automatically identifies the identity of the user according to the matching result, without the support of extra hardware, and is simple to implement and high in accuracy.
The embodiment of the second aspect of the present invention provides an apparatus for identifying the identity of a mobile terminal user, including: the extraction module is used for acquiring current operation information of a current user on the mobile terminal and extracting current characteristic data from the current operation information; a matching module for matching a feature database using the current feature data; and the identification module is used for identifying the current user as a legal user of the mobile terminal when the matching of the current characteristic data and the characteristic database is successful, and identifying the current user as an illegal user of the mobile terminal when the matching of the current characteristic data and the characteristic database is unsuccessful.
The device for identifying the identity of the mobile terminal user, provided by the embodiment of the invention, has the advantages that the current characteristic data obtained by the extraction module is used for matching the characteristic database by the matching module, the identity of the user is automatically identified by the identification module according to the matching result, the support of extra hardware is not required, and the device is simple to implement, high in accuracy and strong in flexibility.
The embodiment of the third aspect of the invention provides a mobile terminal, which comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged inside a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the mobile terminal; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the steps of: acquiring current operation information of a current user on the mobile terminal, and extracting current characteristic data from the current operation information; matching a feature database using the current feature data; and when the matching of the current characteristic data and the characteristic database is successful, identifying the current user as a legal user of the mobile terminal, and when the matching of the current characteristic data and the characteristic database is failed, identifying the current user as an illegal user of the mobile terminal.
The mobile terminal of the embodiment of the invention matches the feature database by using the obtained current feature data, automatically identifies the identity of the user according to the matching result, does not need the support of extra hardware, and has simple realization and high accuracy.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which,
FIG. 1 is a flow chart of a method for identifying the identity of a mobile terminal user according to one embodiment of the invention;
fig. 2 is a flowchart of a method for identifying the identity of a user of a mobile terminal according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for identifying the identity of a user of a mobile terminal according to an embodiment of the present invention; and
fig. 4 is a schematic structural diagram of an apparatus for identifying the identity of a user of a mobile terminal according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The following describes a method and an apparatus for identifying a mobile terminal user identity according to an embodiment of the present invention with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for identifying a user identity of a mobile terminal according to an embodiment of the present invention, in which the mobile terminal may be a device such as a mobile phone or a tablet computer. As shown in fig. 1, the method for identifying the identity of the mobile terminal user includes:
s101, obtaining current operation information of a current user on the mobile terminal, and extracting current characteristic data from the current operation information.
And after obtaining the operation information of the current user, the mobile terminal processes the operation information and extracts corresponding characteristic data.
And S102, matching the feature database by using the current feature data.
Before executing S102, the method may further include: and acquiring sampling data, and establishing a feature database according to the sampling data. Wherein the feature database is established based on sampled data of a legitimate user of the mobile terminal, e.g. a host of the mobile terminal.
Specifically, the matching degree of the current feature data and the feature database may be obtained based on a fuzzy matching manner, for example, the matching degree is 0.7.
S103, when the matching of the current feature data and the feature database is successful, the current user is identified as a legal user of the mobile terminal, and when the matching of the current feature data and the feature database is failed, the current user is identified as an illegal user of the mobile terminal.
In this embodiment, a matching threshold may be set, for example, to be 0.6, and if the matching degree is greater than the matching threshold, it is considered that the current feature data is successfully matched with the feature database, and at this time, the current user may be identified as a valid user of the mobile terminal; similarly, if the matching degree is smaller than the matching threshold, the current feature data is considered to be not successfully matched with the feature database, and at this time, the current user can be identified as an illegal user of the mobile terminal.
Optionally, after the current user is determined to be a valid user of the mobile terminal, the operation corresponding to the current operation information may be directly executed without popping up an authentication page requiring the user to input authentication information, so that the user may directly use the mobile terminal without inputting authentication information such as a password, a fingerprint, or a gesture, which brings great convenience to the user.
Similarly, after determining that the current user is an illegal user of the mobile terminal, such as a thief, the privacy protection mode can be opened, and a verification page needing to input verification information is popped up, and the illegal user does not know the verification information of the user, so that the verification cannot be passed, and the mobile terminal cannot be used, so that the security of application programs in the mobile terminal, such as a payment treasure, a balance treasure and the like, and the security of personal information, such as short message content, are ensured.
In addition, after the current user is determined to be an illegal user of the mobile terminal, an alarm can be given, wherein the ring tone of the alarm can be set by the user, for example, the ring tone can be sensitive to the user, so that when other users want to steal and watch the information in the mobile terminal of the current user, the alarm can be given to remind the user, and the privacy of the user can be better protected.
According to the embodiment of the identification method of the mobile terminal user identity, the obtained current feature data is used for matching the feature database, the identity of the user is automatically identified according to the matching result, the support of extra hardware is not needed, and the method is simple to implement and high in accuracy.
Fig. 2 is a flowchart of a method for identifying the identity of a user of a mobile terminal according to another embodiment of the present invention. As shown in fig. 2, the method includes:
and S200, acquiring sampling data, and establishing a feature database according to the sampling data.
Wherein, the S200 may include: the method comprises the steps of obtaining operation information of a legal user of the mobile terminal on the mobile terminal under a preset condition, extracting feature data from the operation information, and establishing a feature database according to the feature data.
Specifically, obtaining the operation information of the valid user of the mobile terminal on the mobile terminal under the preset condition may be: obtaining operation information of a legal user, such as the owner of the mobile phone, on the mobile terminal within a preset time period, for example, obtaining data of the operation screen of the owner of the mobile phone within half an hour; the following steps can be also included: obtaining the operation information of a legal user on the mobile terminal for N times continuously, wherein N is larger than a preset value, for example, sliding operation input by a host of a mobile phone for 10 times continuously can be obtained; the preset value can be set according to requirements, and is, for example, 6, 10, 20, and the like.
In this embodiment, the operation information of the mobile terminal by the user may include, but is not limited to, the following information: holding information of the mobile terminal and operation information on the screen of the mobile terminal. Wherein, holding the information of the mobile terminal may include: the holding angle is the posture of the user holding the mobile phone, and the posture can be obtained through a gyroscope; the holding habits of each user are different, some users are used to hold the phone with the left hand, and some users are used to hold the phone with the right hand. The operation information on the screen of the mobile terminal may include: one or more of a sliding track, a speed, a starting point and an ending point. Specifically, the manner in which different users operate the screen is different, and in the case of sliding upwards, the gesture starting point, the sliding track and the speed of the user may be different.
In this embodiment, after the operation information of the user is obtained, the feature data may be extracted from the operation information, and then the feature database may be established based on an algorithm such as a clustering algorithm or a decision tree, where many feature data of the legitimate user are extracted, and then the feature data may be subjected to clustering analysis based on the clustering algorithm to obtain feature data with higher similarity, thereby establishing the feature database of the legitimate user.
Because the content of the operation information is more, the established feature database is more perfect, and the subsequent matching identification is facilitated.
In addition, with the increase of user operation, the characteristic database can be adjusted or modified to improve the identification accuracy.
S201, obtaining current operation information of a current user on the mobile terminal, and extracting current characteristic data from the current operation information.
And after obtaining the operation information of the current user, the mobile terminal processes the operation information and extracts corresponding characteristic data.
And S202, matching the feature database by using the current feature data.
Specifically, the matching degree of the current feature data and the feature database may be obtained based on a fuzzy matching manner, for example, the matching degree is 0.4.
S203, when the matching of the current characteristic data and the characteristic database is successful, the current user is identified as a legal user of the mobile terminal, and when the matching of the current characteristic data and the characteristic database is failed, the current user is identified as an illegal user of the mobile terminal.
In this embodiment, the matching threshold is set to 0.6, and since the matching degree 0.4 is smaller than the matching threshold 0.6, it is considered that the current feature data is not successfully matched with the feature database, and at this time, it is possible to automatically identify that the current user is an illegal user of the mobile terminal.
In addition, after the current user is determined to be an illegal user of the mobile terminal, such as a thief, a privacy protection mode can be started, and a verification page needing to input verification information is popped up.
According to the embodiment of the identification method of the mobile terminal user identity, the obtained current feature data is used for matching the feature database, the identity of the user is automatically identified according to the matching result, the support of extra hardware is not needed, and the method is simple to implement and high in accuracy.
In order to implement the above embodiment, the present invention further provides an apparatus for identifying the identity of a mobile terminal user.
As shown in fig. 3, the apparatus for identifying the identity of the mobile terminal user comprises: an extraction module 31, a matching module 32 and a recognition module 33, wherein:
the extracting module 31 is configured to obtain current operation information of a current user on the mobile terminal, and extract current feature data from the current operation information; the matching module 32 is used for matching the feature database by using the current feature data; the identification module 33 is configured to identify the current user as a valid user of the mobile terminal when the current feature data is successfully matched with the feature database, and identify the current user as an invalid user of the mobile terminal when the current feature data is not successfully matched with the feature database.
In addition, the apparatus may further include: a creating module 30, as shown in fig. 4, the creating module 30 is configured to obtain sample data before the matching module 32 matches the feature database with the current feature data, and create the feature database according to the sample data.
Specifically, the establishing module 30 may obtain operation information of a valid user of the mobile terminal on the mobile terminal under a preset condition, extract feature data from the operation information, and establish the feature database according to the feature data. The obtaining of the operation information of the valid user of the mobile terminal on the mobile terminal under the preset condition may be: obtaining operation information of the legal user, such as the owner of the mobile phone, on the mobile terminal within a preset time period, for example, obtaining data of the operation screen of the owner of the mobile phone within half an hour; the following steps can be also included: obtaining the operation information of the legal user to the mobile terminal for N times continuously, wherein N is greater than a preset value, for example, sliding operation input by the owner of the mobile phone for 10 times continuously can be obtained; the preset value can be set according to requirements, and is, for example, 6, 10, 20, and the like.
In this embodiment, the operation information of the user on the mobile terminal may include, but is not limited to, the following information: and the information of the mobile terminal and the operation information of the screen of the mobile terminal are held. Wherein, holding the information of the mobile terminal may include: the holding angle is the posture of the user holding the mobile phone, and the posture can be obtained through a gyroscope; the holding habits of each user are different, some users are used to hold the phone with the left hand, and some users are used to hold the phone with the right hand. The operation information on the screen of the mobile terminal may include: one or more of a sliding track, a speed, a starting point and an ending point. Specifically, the manner in which different users operate the screen is different, and in the case of sliding upwards, the gesture starting point, the sliding track and the speed of the user may be different.
In this embodiment, after obtaining the operation information of the valid user, the establishing module 30 may extract feature data from the operation information, and then establish the feature database based on an algorithm such as a clustering algorithm or a decision tree.
Further, the apparatus may further include: an executing module 34 and a verifying module 35, wherein the executing module 34 is configured to execute an operation corresponding to the current operation information after the identifying module 33 identifies that the current user is a valid user of the mobile terminal; the verification module 35 is configured to pop up a verification page requiring to input verification information after the identification module 33 identifies that the current user is an illegal user of the mobile terminal. If the current user inputs correct verification information on the verification page, the current user is indicated to be a legal user, and the identification is wrong. To correct for the identification of errors, the apparatus may further comprise: a calibration module 36, where the calibration module 36 is configured to receive the verification information after the verification module 35 pops up a verification page where verification information needs to be input, compare the verification information with a pre-stored verification code, and if the verification information is consistent with the pre-stored verification code, add the current feature data to the feature database, and re-determine the current user as a valid user of the mobile terminal.
Therefore, after the current user is determined to be the legal user of the mobile terminal, the operation corresponding to the current operation information can be directly executed without popping up an authentication page requiring the user to input authentication information, so that the user can directly use the mobile terminal without inputting authentication information such as passwords, fingerprints or gestures, and great convenience is brought to the user. After the current user is determined to be an illegal user of the mobile terminal, such as a thief, a privacy protection mode can be opened, and a verification page needing to input verification information is popped up. In addition, after the current user is determined to be an illegal user of the mobile terminal, an alarm can be given, wherein the ring tone of the alarm can be set by the user, for example, the ring tone can be sensitive to the user, so that when other users want to steal and see the information in the mobile terminal of the current user, the alarm can be given to remind the user, and the privacy of the user can be better protected.
The above-mentioned device may be located in a mobile terminal, and the process of identifying the user identity may refer to fig. 1 and fig. 2, which are not described herein again.
According to the embodiment of the identification device for the mobile terminal user identity, the current characteristic data obtained by the extraction module is matched with the characteristic database by the matching module through the current characteristic data, the identity of the user is automatically identified according to the matching result through the identification module, the support of extra hardware is not needed, and the identification device is simple to implement, high in accuracy and strong in flexibility.
In order to implement the above embodiments, the present invention further provides a mobile terminal, which includes a housing, a processor, a memory, a circuit board, and a power circuit, wherein the circuit board is disposed inside a space enclosed by the housing, and the processor and the memory are disposed on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the mobile terminal; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to execute the following steps:
s101', current operation information of a current user on the mobile terminal is obtained, and current characteristic data are extracted from the current operation information.
And after obtaining the operation information of the current user, the mobile terminal processes the operation information and extracts corresponding characteristic data.
S102', matching the feature database by using the current feature data.
Before executing S102', the method may further include: and acquiring sampling data, and establishing a feature database according to the sampling data. Wherein the feature database is established based on sampled data of a legitimate user of the mobile terminal, e.g. a host of the mobile terminal.
Specifically, the matching degree of the current feature data and the feature database may be obtained based on a fuzzy matching manner, for example, the matching degree is 0.7.
S103', when the matching of the current characteristic data and the characteristic database is successful, the current user is identified as a legal user of the mobile terminal, and when the matching of the current characteristic data and the characteristic database is failed, the current user is identified as an illegal user of the mobile terminal.
In this embodiment, a matching threshold may be set, for example, to be 0.6, and if the matching degree is greater than the matching threshold, it is considered that the current feature data is successfully matched with the feature database, and at this time, the current user may be identified as a valid user of the mobile terminal; similarly, if the matching degree is smaller than the matching threshold, the current feature data is considered to be not successfully matched with the feature database, and at this time, the current user can be identified as an illegal user of the mobile terminal.
Optionally, after the current user is determined to be a valid user of the mobile terminal, the operation corresponding to the current operation information may be directly executed without popping up an authentication page requiring the user to input authentication information, so that the user may directly use the mobile terminal without inputting authentication information such as a password, a fingerprint, or a gesture, which brings great convenience to the user.
Similarly, after determining that the current user is an illegal user of the mobile terminal, such as a thief, the privacy protection mode can be opened, and a verification page needing to input verification information is popped up, and the illegal user does not know the verification information of the user, so that the verification cannot be passed, and the mobile terminal cannot be used, so that the security of application programs in the mobile terminal, such as a payment treasure, a balance treasure and the like, and the security of personal information, such as short message content, are ensured.
In addition, after the current user is determined to be an illegal user of the mobile terminal, an alarm can be given, wherein the ring tone of the alarm can be set by the user, for example, the ring tone can be sensitive to the user, so that when other users want to steal and watch the information in the mobile terminal of the current user, the alarm can be given to remind the user, and the privacy of the user can be better protected.
According to the embodiment of the mobile terminal, the obtained current feature data is used for matching the feature database, the identity of the user is automatically identified according to the matching result, extra hardware support is not needed, and the mobile terminal is simple to implement and high in accuracy.
To describe the technical solution of the present invention in more detail, the processor is further configured to perform the following steps:
s200', acquiring sampling data, and establishing a feature database according to the sampling data.
Wherein, the S200' may include: the method comprises the steps of obtaining operation information of a legal user of the mobile terminal on the mobile terminal under a preset condition, extracting feature data from the operation information, and establishing a feature database according to the feature data.
Specifically, obtaining the operation information of the valid user of the mobile terminal on the mobile terminal under the preset condition may be: obtaining operation information of a legal user, such as the owner of the mobile phone, on the mobile terminal within a preset time period, for example, obtaining data of the operation screen of the owner of the mobile phone within half an hour; the following steps can be also included: obtaining the operation information of a legal user on the mobile terminal for N times continuously, wherein N is larger than a preset value, for example, sliding operation input by a host of a mobile phone for 10 times continuously can be obtained; the preset value can be set according to requirements, and is, for example, 6, 10, 20, and the like.
In this embodiment, the operation information of the mobile terminal by the user may include, but is not limited to, the following information: holding information of the mobile terminal and operation information on the screen of the mobile terminal. Wherein, holding the information of the mobile terminal may include: the holding angle is the posture of the user holding the mobile phone, and the posture can be obtained through a gyroscope; the holding habits of each user are different, some users are used to hold the phone with the left hand, and some users are used to hold the phone with the right hand. The operation information on the screen of the mobile terminal may include: one or more of a sliding track, a speed, a starting point and an ending point. Specifically, the manner in which different users operate the screen is different, and in the case of sliding upwards, the gesture starting point, the sliding track and the speed of the user may be different.
In this embodiment, after the operation information of the user is obtained, the feature data may be extracted from the operation information, and then the feature database may be established based on an algorithm such as a clustering algorithm or a decision tree, where many feature data of the legitimate user are extracted, and then the feature data may be subjected to clustering analysis based on the clustering algorithm to obtain feature data with higher similarity, thereby establishing the feature database of the legitimate user.
Because the content of the operation information is more, the established feature database is more perfect, and the subsequent matching identification is facilitated.
In addition, with the increase of user operation, the characteristic database can be adjusted or modified to improve the identification accuracy.
S201', current operation information of a current user on the mobile terminal is obtained, and current characteristic data are extracted from the current operation information.
And after obtaining the operation information of the current user, the mobile terminal processes the operation information and extracts corresponding characteristic data.
S202', the current feature data is used for matching the feature database.
Specifically, the matching degree of the current feature data and the feature database may be obtained based on a fuzzy matching manner, for example, the matching degree is 0.4.
S203', when the matching of the current characteristic data and the characteristic database is successful, the current user is identified as a legal user of the mobile terminal, and when the matching of the current characteristic data and the characteristic database is failed, the current user is identified as an illegal user of the mobile terminal.
In this embodiment, the matching threshold is set to 0.6, and since the matching degree 0.4 is smaller than the matching threshold 0.6, it is considered that the current feature data is not successfully matched with the feature database, and at this time, it is possible to automatically identify that the current user is an illegal user of the mobile terminal.
In addition, after the current user is determined to be an illegal user of the mobile terminal, such as a thief, a privacy protection mode can be started, and a verification page needing to input verification information is popped up.
According to the embodiment of the mobile terminal, the obtained current feature data is used for matching the feature database, the identity of the user is automatically identified according to the matching result, extra hardware support is not needed, and the mobile terminal is simple to implement and high in accuracy.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (20)
1. A method for identifying the identity of a mobile terminal user is characterized by comprising the following steps:
acquiring current operation information of a current user on the mobile terminal, and extracting current characteristic data from the current operation information;
matching a feature database using the current feature data;
and when the matching of the current characteristic data and the characteristic database is successful, identifying the current user as a legal user of the mobile terminal, and when the matching of the current characteristic data and the characteristic database is failed, identifying the current user as an illegal user of the mobile terminal.
2. The method of claim 1, further comprising, prior to said matching a feature database using said current feature data:
and acquiring sampling data, and establishing the characteristic database according to the sampling data.
3. The method according to claim 1, further comprising, after said identifying said current user as a valid user of said mobile terminal:
and executing the operation corresponding to the current operation information.
4. The method according to claim 1, further comprising, after said identifying that the current user is an illegal user of the mobile terminal:
and popping up a verification page needing to input verification information.
5. The method of claim 2, wherein obtaining sample data from which the feature database is built comprises:
and obtaining operation information of a legal user of the mobile terminal on the mobile terminal under a preset condition, extracting feature data from the operation information, and establishing the feature database according to the feature data.
6. The method according to claim 4, wherein after the popping up the verification page requiring the input of verification information, the method further comprises:
and receiving verification information, comparing the verification information with a prestored verification code, if the verification information is consistent with the prestored verification code, adding the current characteristic data to the characteristic database, and re-determining the current user as a legal user of the mobile terminal.
7. The method according to claim 5, wherein the obtaining operation information of the valid user of the mobile terminal on the mobile terminal under a preset condition comprises:
obtaining the operation information of the legal user to the mobile terminal in a preset time period; or,
and obtaining the operation information of the legal user on the mobile terminal for N times continuously, wherein N is greater than a preset value.
8. The method according to claim 7, wherein the operation information on the mobile terminal comprises:
and holding the information of the mobile terminal and the operation information of the screen of the mobile terminal.
9. The method according to claim 8, wherein the operation information on the screen of the mobile terminal comprises: one or more of a sliding track, a speed, a starting point and an ending point.
10. The method according to claim 8, wherein the obtaining the operation information of the legitimate user on the mobile terminal for a predetermined period of time or N consecutive times comprises:
and obtaining the angle information of the legal user holding the mobile terminal for N times in a preset time period or continuously through a gyroscope.
11. An apparatus for identifying the identity of a mobile terminal user, comprising:
the extraction module is used for acquiring current operation information of a current user on the mobile terminal and extracting current characteristic data from the current operation information;
a matching module for matching a feature database using the current feature data;
and the identification module is used for identifying the current user as a legal user of the mobile terminal when the matching of the current characteristic data and the characteristic database is successful, and identifying the current user as an illegal user of the mobile terminal when the matching of the current characteristic data and the characteristic database is unsuccessful.
12. The apparatus of claim 11, further comprising:
and the establishing module is used for obtaining sampling data before the matching module uses the current characteristic data to match the characteristic database, and establishing the characteristic database according to the sampling data.
13. The apparatus of claim 11, further comprising:
and the execution module is used for executing the operation corresponding to the current operation information after the identification module identifies that the current user is a legal user of the mobile terminal.
14. The apparatus of claim 11, further comprising:
and the verification module is used for popping up a verification page needing to input verification information after the identification module identifies that the current user is an illegal user of the mobile terminal.
15. The apparatus according to claim 12, wherein the establishing module is specifically configured to:
and obtaining operation information of a legal user of the mobile terminal on the mobile terminal under a preset condition, extracting feature data from the operation information, and establishing the feature database according to the feature data.
16. The apparatus of claim 14, further comprising:
and the calibration module is used for receiving verification information after the verification module pops up a verification page needing to input the verification information, comparing the verification information with a prestored verification code, if the verification information is consistent with the prestored verification code, adding the current characteristic data to the characteristic database, and re-determining the current user as a legal user of the mobile terminal.
17. The apparatus of claim 15, wherein the establishing module is specifically configured to:
obtaining the operation information of the legal user to the mobile terminal in a preset time period; or,
and obtaining the operation information of the legal user on the mobile terminal for N times continuously, wherein N is greater than a preset value.
18. The apparatus of claim 17, wherein the operation information for the mobile terminal comprises:
and holding the information of the mobile terminal and the operation information of the screen of the mobile terminal.
19. The apparatus of claim 18, wherein the operation information on the screen of the mobile terminal comprises: one or more of a sliding track, a speed, a starting point and an ending point.
20. The apparatus of claim 18, wherein the establishing module is specifically configured to:
and obtaining the angle information of the legal user holding the mobile terminal for N times in a preset time period or continuously through a gyroscope.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410140870.9A CN103955637A (en) | 2014-04-09 | 2014-04-09 | Identification method and device for user identity of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410140870.9A CN103955637A (en) | 2014-04-09 | 2014-04-09 | Identification method and device for user identity of mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103955637A true CN103955637A (en) | 2014-07-30 |
Family
ID=51332912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410140870.9A Pending CN103955637A (en) | 2014-04-09 | 2014-04-09 | Identification method and device for user identity of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103955637A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049421A (en) * | 2015-06-24 | 2015-11-11 | 百度在线网络技术(北京)有限公司 | Authentication method based on use behavior characteristic of user, server, terminal, and system |
CN105094666A (en) * | 2015-06-26 | 2015-11-25 | 小米科技有限责任公司 | Method, device and terminal for safety protection of terminal |
WO2016054988A1 (en) * | 2014-10-09 | 2016-04-14 | 阿里巴巴集团控股有限公司 | Method and apparatus for identifying intelligent device users |
CN105847562A (en) * | 2016-03-29 | 2016-08-10 | 乐视控股(北京)有限公司 | Anti-theft method and device for intelligent terminal |
WO2016183937A1 (en) * | 2015-05-19 | 2016-11-24 | 中兴通讯股份有限公司 | Identity authentication method, device and system, and user terminal |
CN107026731A (en) * | 2016-01-29 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of method and device of subscriber authentication |
CN107194213A (en) * | 2016-03-14 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of personal identification method and device |
CN107222489A (en) * | 2017-06-19 | 2017-09-29 | 微梦创科网络科技(中国)有限公司 | A kind of method and device for excavating abnormal flow in security information modification daily record |
CN107277263A (en) * | 2017-07-10 | 2017-10-20 | 中国联合网络通信集团有限公司 | terminal control method and device |
CN107392192A (en) * | 2017-09-19 | 2017-11-24 | 信利光电股份有限公司 | A kind of personal identification method, device and multi-cam module |
CN107909050A (en) * | 2017-11-29 | 2018-04-13 | 中科新松有限公司 | A kind of personnel identity information determines method, system, equipment and storage medium |
CN108269084A (en) * | 2017-01-03 | 2018-07-10 | 阿里巴巴集团控股有限公司 | A kind of method and device for progress barcode scanning payment on the mobile apparatus |
CN108347527A (en) * | 2018-01-19 | 2018-07-31 | 维沃移动通信有限公司 | A kind of income prompting method and mobile terminal |
CN109272320A (en) * | 2018-08-16 | 2019-01-25 | 阿里巴巴集团控股有限公司 | Personal identification method, device and equipment based on user behavior characteristics |
CN109618342A (en) * | 2018-12-27 | 2019-04-12 | 上海碳蓝网络科技有限公司 | It is a kind of for determining the method and apparatus of the operation permission information of user |
CN110769424A (en) * | 2018-07-27 | 2020-02-07 | 中国联合网络通信集团有限公司 | Illegal terminal identification method and device |
CN112989295A (en) * | 2019-12-16 | 2021-06-18 | 北京沃东天骏信息技术有限公司 | User identification method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002084456A2 (en) * | 2001-04-12 | 2002-10-24 | Netdesigns Limited | User identity verification system |
JP2004362045A (en) * | 2003-06-02 | 2004-12-24 | Sony Corp | Group identification system, server device, program, recording medium and group identification method |
CN101408928A (en) * | 2007-10-12 | 2009-04-15 | 宏碁股份有限公司 | Object executive system and method combining with biological characteristic identification |
CN101664311A (en) * | 2008-09-05 | 2010-03-10 | 富士通株式会社 | Biometric authentication device, fake body judgment device, and biometric authentication method |
CN101697514A (en) * | 2009-10-22 | 2010-04-21 | 中兴通讯股份有限公司 | Method and system for identity authentication |
CN102647508A (en) * | 2011-12-15 | 2012-08-22 | 中兴通讯股份有限公司 | Mobile terminal and user identity identification method |
-
2014
- 2014-04-09 CN CN201410140870.9A patent/CN103955637A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002084456A2 (en) * | 2001-04-12 | 2002-10-24 | Netdesigns Limited | User identity verification system |
JP2004362045A (en) * | 2003-06-02 | 2004-12-24 | Sony Corp | Group identification system, server device, program, recording medium and group identification method |
CN101408928A (en) * | 2007-10-12 | 2009-04-15 | 宏碁股份有限公司 | Object executive system and method combining with biological characteristic identification |
CN101664311A (en) * | 2008-09-05 | 2010-03-10 | 富士通株式会社 | Biometric authentication device, fake body judgment device, and biometric authentication method |
CN101697514A (en) * | 2009-10-22 | 2010-04-21 | 中兴通讯股份有限公司 | Method and system for identity authentication |
CN102647508A (en) * | 2011-12-15 | 2012-08-22 | 中兴通讯股份有限公司 | Mobile terminal and user identity identification method |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016054988A1 (en) * | 2014-10-09 | 2016-04-14 | 阿里巴巴集团控股有限公司 | Method and apparatus for identifying intelligent device users |
WO2016183937A1 (en) * | 2015-05-19 | 2016-11-24 | 中兴通讯股份有限公司 | Identity authentication method, device and system, and user terminal |
CN106301778A (en) * | 2015-05-19 | 2017-01-04 | 中兴通讯股份有限公司 | Auth method, device, system and user terminal |
CN105049421A (en) * | 2015-06-24 | 2015-11-11 | 百度在线网络技术(北京)有限公司 | Authentication method based on use behavior characteristic of user, server, terminal, and system |
CN105094666A (en) * | 2015-06-26 | 2015-11-25 | 小米科技有限责任公司 | Method, device and terminal for safety protection of terminal |
CN105094666B (en) * | 2015-06-26 | 2018-10-12 | 小米科技有限责任公司 | Terminal safety protection method, device and terminal |
CN107026731A (en) * | 2016-01-29 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of method and device of subscriber authentication |
CN107194213A (en) * | 2016-03-14 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of personal identification method and device |
CN105847562A (en) * | 2016-03-29 | 2016-08-10 | 乐视控股(北京)有限公司 | Anti-theft method and device for intelligent terminal |
US10990957B2 (en) | 2017-01-03 | 2021-04-27 | Advanced New Technologies Co., Ltd. | Scan and pay method and device utilized in mobile apparatus |
CN108269084A (en) * | 2017-01-03 | 2018-07-10 | 阿里巴巴集团控股有限公司 | A kind of method and device for progress barcode scanning payment on the mobile apparatus |
CN107222489A (en) * | 2017-06-19 | 2017-09-29 | 微梦创科网络科技(中国)有限公司 | A kind of method and device for excavating abnormal flow in security information modification daily record |
CN107277263A (en) * | 2017-07-10 | 2017-10-20 | 中国联合网络通信集团有限公司 | terminal control method and device |
CN107392192A (en) * | 2017-09-19 | 2017-11-24 | 信利光电股份有限公司 | A kind of personal identification method, device and multi-cam module |
CN107909050A (en) * | 2017-11-29 | 2018-04-13 | 中科新松有限公司 | A kind of personnel identity information determines method, system, equipment and storage medium |
CN108347527A (en) * | 2018-01-19 | 2018-07-31 | 维沃移动通信有限公司 | A kind of income prompting method and mobile terminal |
CN108347527B (en) * | 2018-01-19 | 2020-07-28 | 维沃移动通信有限公司 | Incoming call prompting method and mobile terminal |
CN110769424A (en) * | 2018-07-27 | 2020-02-07 | 中国联合网络通信集团有限公司 | Illegal terminal identification method and device |
CN110769424B (en) * | 2018-07-27 | 2023-05-26 | 中国联合网络通信集团有限公司 | Illegal terminal identification method and device |
CN109272320A (en) * | 2018-08-16 | 2019-01-25 | 阿里巴巴集团控股有限公司 | Personal identification method, device and equipment based on user behavior characteristics |
CN109618342A (en) * | 2018-12-27 | 2019-04-12 | 上海碳蓝网络科技有限公司 | It is a kind of for determining the method and apparatus of the operation permission information of user |
CN112989295A (en) * | 2019-12-16 | 2021-06-18 | 北京沃东天骏信息技术有限公司 | User identification method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103955637A (en) | Identification method and device for user identity of mobile terminal | |
US8959358B2 (en) | User-based identification system for social networks | |
US10223512B2 (en) | Voice-based liveness verification | |
EP3147768A1 (en) | Screen interface unlocking method and screen interface unlocking device | |
US20190130411A1 (en) | Method and system for data processing | |
US10644887B2 (en) | Identity validity verification method, apparatus and system | |
US20170098073A1 (en) | Method and apparatus for identifying malicious operation in mobile terminal | |
US9449163B2 (en) | Electronic device and method for logging in application program of the electronic device | |
CN104050406A (en) | Method and terminal equipment for carrying out authentication through fingerprint combinations | |
US20130305324A1 (en) | Incremental Password Barriers to Prevent Malevolent Intrusions | |
CN107615301B (en) | Secure storage of fingerprint related elements | |
CN107533598B (en) | Input method and device of login password of application program and terminal | |
US20160234024A1 (en) | Leveraging Multiple Biometrics For Enabling User Access To Security Metadata | |
CN107908940B (en) | Fingerprint identification method and terminal equipment | |
CN107145772B (en) | Terminal equipment security control method and device and terminal equipment | |
US12051055B2 (en) | Financial payment method and payment system using mobile device | |
US20140137221A1 (en) | Image meta data driven device authentication | |
WO2017016032A1 (en) | Fingerprint verification method, fingerprint verification device and terminal | |
JP2019527868A (en) | Biological feature identification apparatus and method, and biological feature template registration method | |
US20200204365A1 (en) | Apparatus, system and method for application-specific biometric processing in a computer system | |
WO2018227584A1 (en) | Method, device, and equipment for fingerprint recognition | |
WO2016078429A1 (en) | Identity recognition method and apparatus | |
CN106529243A (en) | Identity authentication method, device and terminal | |
US10133471B2 (en) | Biometric shortcuts | |
CN107704746B (en) | Screen unlocking method based on palm biological information, mobile device and medium product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140730 |
|
RJ01 | Rejection of invention patent application after publication |