CN107070871A - A kind of method and device of authentication - Google Patents

A kind of method and device of authentication Download PDF

Info

Publication number
CN107070871A
CN107070871A CN201710021775.0A CN201710021775A CN107070871A CN 107070871 A CN107070871 A CN 107070871A CN 201710021775 A CN201710021775 A CN 201710021775A CN 107070871 A CN107070871 A CN 107070871A
Authority
CN
China
Prior art keywords
account
information
verified
learned
safety problem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710021775.0A
Other languages
Chinese (zh)
Other versions
CN107070871B (en
Inventor
江璇
幼青
林述民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN202010415706.XA priority Critical patent/CN111611558B/en
Priority to CN201710021775.0A priority patent/CN107070871B/en
Publication of CN107070871A publication Critical patent/CN107070871A/en
Application granted granted Critical
Publication of CN107070871B publication Critical patent/CN107070871B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

This application discloses a kind of method and device of authentication, account to be verified and the corresponding each safety problem of the account to be verified are determined first, the checking scene of the current time checking account is determined again, then according to the corresponding relation of default information and checking scene, according to the corresponding relation of default information and safety problem, it is determined that the safety problem unconnected to the accounts information being currently learned, or the safety problem associated with the information not being learned currently, and therefrom selection safety problem carries out authentication to the account to be verified.It can be seen that, by determining checking scene, it is determined that the information being learned and/or the information not being learned, using the safety problem that the information to being learned is unconnected, or the safety problem associated with the information not being learned carries out authentication, using the security of safety problem when improving authentication, the accuracy of authentication is improved.

Description

A kind of method and device of authentication
Technical field
The application is related to areas of information technology, more particularly to a kind of method and device of authentication.
Background technology
With the development of information technology, the business performed by network is more and more, and in order to improve during execution business Security, generally can carry out authentication to account.
In the prior art, a kind of conventional auth method is safety problem to be sent to account to be verified, according to this Answer result and the matching result of correct option that account to be verified is returned, carry out authentication.It can be seen that, the quality of safety problem There is very big relation with the accuracy of authentication, e.g., the safety problem of setting is outdoor except holding using for the account to be verified, There is no other users to know, then the accuracy using safety problem progress authentication is very high.
Generally, there are two class methods in the setting of safety problem, and first kind safety problem is the private letter set according to user Breath, generates safety problem, for example, " names of high school teachers ", " the first album title of purchase ", " city name of birth " Etc., also, for the security of the safety problem that improves generation, so the personal information can be user's frequency of use compared with The fact that low information, then the personal information due to the number of times of appearance and time it is all seldom, so leakage possibility it is relatively low, generation Safety problem security it is higher.
Equations of The Second Kind safety problem, is the historical behavior data according to account, generates safety problem, for example " whether yesterday steps on Recorded account ", " that account is your good friend ", the thing of purchase " nearest one month " etc., the safety problem of generation answers Case is determined according to the historical behavior data of the account, and is generally only held the user of the account and just be will appreciate that, is made The answer of safety problem no longer has a uniqueness, but visual actual conditions and change, improve the safety of safety problem Property.
But, for first kind safety problem, because the safety problem is related to less conventional personal information, user is to this The memory of class problem is relatively low, causes the ease for use of safety problem relatively low.For Equations of The Second Kind safety problem, by being then based on user Historical behavior data generations, and listed account can determine the use at any time by checking the accounts information of the account The historical behavior data (e.g., checking order record, buddy list etc.) at family, so using such safety problem to listed The confidence level that account carries out authentication is relatively low, i.e. the degree of accuracy is low.For example, criminal is usurped by cracking login password The account of certain user, to carry out authentication to the account when performing business after login, then for Equations of The Second Kind safety problem, Because the criminal can determine correct option by checking the accounts information of the account so that the result of authentication is accurate True property is low.Essentially, it is due to the situation of Equations of The Second Kind safety problem existence information leakage, causes the accurate of authentication Property reduction.
Further, if by taking the checking scene after login as an example, because the account can know the account after the login All accounts informations, so not using the behavior by user generally in checking scene after login in the prior art The safety problem of data generation carries out authentication, causes the choice of the safety problem of the checking scene after logging in small, peace Full problem is excessively single, causes the utilization rate of safety problem to substantially reduce so that resource utilization is reduced, and causes the wasting of resources.
It can be seen that existing auth method, due to the possibility that existence information is revealed, causes what is used during authentication The accuracy reduction of safety problem, causes the accuracy of authentication to reduce, confidence level is reduced, risk is improved.
The content of the invention
The embodiment of the present application provides a kind of method of authentication, for solving due to the possibility that existence information is revealed, When allowing to carry out authentication there is limitation in used safety problem, the problems such as causing the accuracy of authentication and reduce.
The embodiment of the present application provides a kind of device of authentication, for solving due to the possibility that existence information is revealed, When allowing to carry out authentication there is limitation in used safety problem, the problems such as causing the accuracy of authentication and reduce.
The embodiment of the present application uses following technical proposals:
A kind of method of authentication, including:
Determine the current corresponding checking scene of account to be verified;
According to the checking scene, the information being learned and/or the letter not being learned in the account to be verified are determined Breath;
When it is determined that be learned information when, using the safety problem unconnected to the information being learned to institute State account to be verified and carry out authentication, when it is determined that be not learned information when, using related to the information not being learned The safety problem of connection carries out authentication to the account to be verified
A kind of device of authentication, including:
First determining module, determines the current corresponding checking scene of the account to be verified;
Second determining module, according to the checking scene, determines the information being learned in the account to be verified, and/ Or the information not being learned;
Authentication module, when it is determined that be learned information when, using unconnected to the information being learned Safety problem authentication is carried out to the account to be verified, when it is determined that be not learned information when, using with it is described not by The safety problem that the information known is associated carries out authentication to the account to be verified.
A kind of method of authentication, including:
Determine the current corresponding checking scene of account to be verified;
For the safety problem prestored, according to formulaCalculate the safety Score A of the problem in the checking scene;
The safety problem being not zero using score A, authentication is carried out to the account to be verified;
Wherein, IjJ-th of accounts information in the account to be verified is represented, M represents the account letter of the account to be verified Cease total quantity;As the accounts information IjWhen unconnected to the correct option of the safety problem, R (Ij)=1, otherwise R (Ij) =0;As the accounts information IjWhen not would know that in the checking scene, K (Ij)=1, otherwise K (Ij)=0;When the account Family information IjIt is not out-of-date by the account access to be verified in the preset time period, V (Ij)=1, otherwise V (Ij)=0.
A kind of device of authentication, including:
Determining module, determines the current corresponding checking scene of account to be verified;
Scoring modules, for the safety problem prestored, according to formulaMeter Calculate score A of the safety problem in the checking scene;
Authentication module, the safety problem being not zero using score A carries out authentication to the account to be verified;
Wherein, IjJ-th of accounts information in the account to be verified is represented, M represents the account letter of the account to be verified Cease total quantity;As the accounts information IjWhen unconnected to the correct option of the safety problem, R (Ij)=1, otherwise R (Ij) =0;As the accounts information IjWhen not would know that in the checking scene, K (Ij)=1, otherwise K (Ij)=0;When the account Family information IjIt is not out-of-date by the account access to be verified in the preset time period, V (Ij)=1, otherwise V (Ij)=0.
At least one above-mentioned technical scheme that the embodiment of the present application is used can reach following beneficial effect:
Account to be verified and the corresponding each safety problem of the account to be verified are determined first, determine current time again afterwards The checking scene of the checking account, then according to the corresponding relation of default information and checking scene, determines the account to be verified The information being learned under current authentication scene and/or the information not being learned, when it is determined that be learned information when, use The safety problem unconnected to the information being learned carries out authentication to the account to be verified, and vice versa. It can be seen that, in the method that the application is provided, since it is determined checking scene, it is determined that there is the possible information of leakage, go forward side by side one Step determines that leakage may greatly information (that is, the information being learned), then determine associated with the information that has been learned Safety problem, when selecting safety problem, the safety problem unconnected to the accounts information being learned to may be selected, Or the safety problem associated with the information not being learned carries out identity and tested, and improves the safety problem selected during authentication Security, improve the accuracy of authentication.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen Schematic description and description please is used to explain the application, does not constitute the improper restriction to the application.In the accompanying drawings:
A kind of process for authentication that Fig. 1 provides for the embodiment of the present application;
A kind of structural representation of the device for authentication that Fig. 2 provides for the embodiment of the present application;
The structural representation of the device for another authentication that Fig. 3 provides for the embodiment of the present application.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, belong to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
A kind of process for authentication that Fig. 1 provides for the embodiment of the present application, specifically includes following steps:
S101:Determine the corresponding checking scene of account to be verified described in current time.
In the prior art, no matter the initiator of authentication process itself is user or service provider, but for body Part checking the problem of be generally all stored in server, and be also required to by server send to terminal carry out identity test Card, that is to say, that be that account to be verified is determined by server, and select corresponding safety problem in usual authentication process itself Send to the terminal of the Account Logon to be verified, carry out authentication process itself.Similarly, in the embodiment of the present application, can be by taking Business device determines account to be verified, and each safety problem corresponding with the account to be verified.
Specifically, the server can determine the account for needing to carry out authentication using method same as the prior art, It is used as account to be verified.For example, when any account in long-time without usage record, and when there is login behavior suddenly, it is determined that The account needs to carry out authentication, and it is account to be verified to determine the account, or, when any account is initiated to be related to privacy information Service request when, determine the account need carry out authentication, determine the account be account to be verified, or, when any When the behavior of account records far from each other with historical behavior, determine that the account needs to carry out authentication, determine the account to treat Account etc. is verified, the service implement body determines that the account the application to be verified is not limited using which kind of mode, can use A variety of methods same as the prior art.
Further, since in the prior art, in order to improve the flexibility set a question during authentication and for authentication Safety problem security, generally each account can correspond to multiple safety problems.And needing to test account progress identity During card, the server can determine corresponding multiple safety problems according to the mark of the account, then select from each safety problem to refer to The safety problem of fixed number amount is used for authentication, so that safety problem when carrying out authentication every time can incomplete one Cause, both added the flexibility set a question, the exposure rate of each safety problem is reduced again, security is improved.
Similarly, in this application, the server also can determine that the corresponding each safety problem of the account to be verified, so as to follow-up Operation.Specifically, the server can be according to the mark of the account to be verified of determination, from the mark of stored each account Know in the corresponding relation with the mark of each safety problem, determine the mark of each safety problem of mark correspondence of the account to be verified, And each safety problem corresponding with the account to be verified is determined by the mark of each safety problem, certainly, the server can also be adopted Each safety problem corresponding with the account to be verified is determined in other ways, and the application is not limited this, and is repeated no more.
It should be noted that in the embodiment of the present application, the server can be a single equipment or again The system of multiple devices composition, i.e. distributed server.
Further, as it was noted above, due to the correct option of different safety problems, may be deposited under different scenes In the possibility being learned, (e.g., the account after login, due to may browse through most of accounts information in the account, causes one The possibility increase that the correct option of Partial security problem is learned), and in order to avoid causing peace because accounts information is learned The situation that the accuracy of full problem declines occurs, in the embodiment of the present application, when the server determine the account to be verified with And after the corresponding each safety problem of the account to be verified, the server can also determine the corresponding checking field of the account to be verified Scape, i.e. the scene when carrying out authentication residing for the account to be verified, so as to the progress of follow-up step.
Specifically, because the server is it is determined that after the account to be verified, the account to be verified generally only carries out body Business can be just continued executing with after part checking, or the process that the account to be verified exits authentication does not continue to perform industry Business, so after the server determines the account to be verified, the scene residing for the general account to be verified is in authentication knot It will not change before beam.Then, in this application, the server can determine that this is to be tested according to default checking scene classification Demonstrate,prove the checking scene residing for account current time.
Wherein, the default checking scene classification at least includes:The checking scene of login and the checking for performing business Scape.The checking scene of the login, i.e. when the account to be verified is not yet logined successfully, the server is carried out to the account to be verified The scene of authentication.The checking scene of the execution business, i.e. the account to be verified has logged on success, and in executable During the state of business, the server carries out the scene of authentication to the account to be verified.Also, the default checking scene Classification can be by staff according to being set the need for practical application, for example, it is assumed that for each account, the account is calling Need to use password A during the account corresponding shopping list, and call the account corresponding personal information be need to use it is close Code B, then the server can also add checking scenario A and checking scenario B, correspond respectively to the account call shopping list it Checking scene and the account afterwards have invoked the checking scene after personal information.
That is, in this application, the division of the checking scene be able to can currently be called based on the account with the account The corresponding accounts information in family difference and divide.By taking the checking scene of login and the scene of execution business checking as an example, this is to be tested Card account can not obtain each accounts information corresponding with the account to be verified before registration, then can determine that the checking in the login The possibility that each accounts information of the account to be verified has been learned under scape is relatively low, and under the scene of the execution business, this is to be tested Card account can access the corresponding each accounts information of the account to be verified, so each accounts information of the account to be verified is The possibility being learned is higher.Certainly, in addition to the checking scene of login and the checking scene of execution business, the checking How scape can also divide the application and be not specifically limited, as it was previously stated, can be by staff rule of thumb or practical application The need for be configured.
It should be noted that in this application, calling after accounts information, then account information, which can be corresponded to, has an access Record, to show that account information was called.
S102:According to the checking scene, the information being learned in the account to be verified is determined, and/or do not obtained The information known.
In the embodiment of the present application, as described in step S101, because under different checking scenes, this is to be verified Probability that the corresponding different accounts information of account has been learned is different, and the safety problem generated by prior art Correct option, is possible to what is determined or be inferred to by the corresponding each accounts information of the account to be verified.For example, according to The correct option of the safety problem for the fact that the be of little use information generation that family is known, it is possible to by being stored in the account to be verified User personal information be inferred to (e.g., for safety problem " your City of birth ", then can be by being set in the account to be verified " location " in the personal information put is inferred to), and the correct option of the safety problem of generation is recorded by the access of user, It can then determine (e.g., for safety problem " the selection film that last week, you watched ", then may be used by the access record of the account to be verified Determined by the purchaser record of the user), so the server can determine that the accounts information being learned, so as to subsequent operation.
Specifically, in this application, the server can be according to corresponding pass of the default accounts information with checking scene first System, it is determined that under the checking scene that the account to be verified is presently in, in the corresponding all accounts informations of the account to be verified, deposits In the possible accounts information of leakage, i.e. the information that would know that.
Afterwards, because the accounts information that under different checking scenes, the account to be verified would know that is different, but it can obtain It is not meant to that account information has been learned.And the accounts information that would know that for each, if the account that would know that Information is not by the account access mistake to be verified, then the possibility that accounts information can be called to be learned is still smaller, institute It can also be determined with the server in preset time period, the access record of the account to be verified.
Then, the server can also be recorded according to the access, determine that the account to be verified is visited within the default period The accounts information asked, the then accounts information that the account did not access in preset time period, although in current checking scene Under can be accessed, but be not accessed yet, then the probability that the accounts information not accessed has been learned is relatively low.
Then, the server can be recorded according to access of the account to be verified in preset time period, from current authentication In the accounts information that would know that under scene, it is determined that the accounts information being learned, that is, the information being learned.
Wherein, the default accounts information and the corresponding relation of checking scene can use formulaRepresent, K Accounts information and the corresponding relation of checking scene are represented, S represents to verify scene, and i represents the numbering of different checking scenes, SiI.e. I-th of checking scene is represented, I represents accounts information, IjRepresent j-th of accounts information, K (Si, IjThe numeral of)=1 represents IjAccount Information is in SiIt not would know that under checking scene, K (Si, IjThe numeral of)=0 represents IjAccounts information is in SiIt would know that under checking scene.
And access record of the account to be verified in preset time period, formula can be used Represent, V represents accessed accounts information and the corresponding relation of the account to be verified, U represents account to be verified, UiRepresent i-th The account to be verified in account to be verified, i.e. the application, T represents preset time period, TkRepresent kth kind preset time period, I tables Show accounts information, IjRepresent j-th of accounts information, V (Ui, Tk, Ij)=1 represents IjAccounts information is in TkIn preset time period not by UiAccount access mistake to be verified, V (Ui, Tk, Ij)=0 represents IjAccounts information is in TkBy U in preset time periodiAccount to be verified Accessed, wherein, the TkWith the SiThere is corresponding relation, and can be set by staff, wherein, when the checking scene needs to make Authentication (that is, the low safety problem of correct option has been learned possibility) is carried out with the higher safety problem of security, The then TkDuration can be longer, vice versa.
In addition, in this application, the default accounts information and the corresponding relation of checking scene, can by staff according to The demand setting of experience or practical application.For convenience of description, the information that the application determines to be learned with the server continues Subsequent step S103 explanation, the server determines the process for the information not being learned, it is seen that subsequent descriptions.
S103:When it is determined that be learned information when, asked using the safety unconnected to the information being learned Topic carries out authentication to the account to be verified, when it is determined that be not learned information when, using with the letter not being learned The safety problem of manner of breathing association carries out authentication to the account to be verified.
In the embodiment of the present application, when the server determines the corresponding accounts information being learned of the account to be verified After (that is, the information being learned), due to the corresponding each safety problem of accounts information and this account to be verified being learned Correct option have and can be associated, and if the correct option of any safety problem is associated with the accounts information being learned, The accuracy of the safety problem is relatively low, is unsuitable for being used for authentication, so what the server was also an option that and had been learned The unconnected safety problem of accounts information, i.e. the safety problem of answer can not be obtained by the accounts information being learned is right The account to be verified carries out authentication.
Specifically, the server can be directed to the account to be verified each safety problem, according to default accounts information with The corresponding relation of safety problem, it is determined that the accounts information associated with the correct option of the safety problem, afterwards, the server can The associated accounts information of correct option and the account being learned determined in step s 103 of the safety problem are judged again Whether family information matches, if, it is determined that the safety problem is associated with the accounts information being learned, if not, it is determined that should Safety problem is unconnected to the accounts information being learned.Also, due to the server determine in step s 103 by The accounts information known can be several, as long as so the server can determine any accounts information being learned with being somebody's turn to do The correct option of safety problem is associated, you can determine that the safety problem is associated with the accounts information being learned.
Wherein, the default accounts information and the corresponding relation of safety problem can use formulaRepresent, R represents accounts information and the corresponding relation of safety problem, and Q represents safety problem, QiI-th of safety problem is represented, I represents account Information, IjRepresent j-th of accounts information, R (Qi, IjThe numeral of)=1 represents IjAccounts information and QiThe correct option of safety problem is not It is associated, R (Qi, IjThe numeral of)=0 represents IjAccounts information and QiThe correct option of safety problem is associated, wherein, accounts information It is associated with correct option, represent to determine or be inferred to the correct option by account information.
It should be noted that the beginning and ending time of the preset time period can be set by staff, for example, being opened from current time Begin to recall, determine the default period.
Further, because the server can determine the corresponding K (S of the account to be verified in step s 103i, Ij) with And V (Ui, Tk, Ij), so when the server determines the corresponding R (Q of the account to be verifiedi, Ij) after, the server just can lead to Cross formula For each peace Full problem, calculates the score of the safety problem, wherein, M represents account U to be verifiediAccounts information total quantity.When the score When being not 0, i.e. A (Ui, Sj, Qk)>When 0, determine that the possibility that the correct option of the safety problem has been learned is relatively low, can be used for Authentication, wherein, A (Ui, Sj, Qk) represent account U to be verifiediSafety problem QkIn checking scene SjUnder score.
Finally, when the server determine available for authentication each safety problem after, just can be used any one or The multiple safety problems that should be available for authentication of person, authentication is carried out to the account to be verified.
In addition, in this application, the corresponding relation of the default accounts information and safety problem, can by staff according to The demand setting of experience or practical application.
By the method for authentication as shown in Figure 1, the server is determining account to be verified and this is to be verified After the corresponding each safety problem of account, the checking scene residing for the account current time to be verified can be first determined, afterwards basis Default accounts information and the corresponding relation of checking scene, are determined under the current time checking scene, the account that may be learned Information, is recorded according to the access of the account to be verified in preset time period, determines that the account to be verified adjusts used accounts information, It is determined that the accounts information being learned, finally, according to default accounts information and the corresponding relation of safety problem, it is determined that correctly answering The case each safety problem associated with the accounts information being learned, and using other safety problems in the account to be verified (that is, the safety problem unconnected to the accounts information being learned), authentication is carried out to the account to be verified.It can be seen that, The method provided by the application, can be recorded according to the access of user, and each accounts information and safety problem correct option Whether be associated, determine current time checking scene under, available safety problem.No longer simply only because verifying scene Difference, and the safety problem of selection is determined, while the record of the access based on user so that the selection of setting a question of safety problem more may be used Letter, while the resource using existing safety problem is improved, also improves the accuracy of safety problem, and then cause identity The result of checking is more credible, and improves the efficiency of authentication.
In addition, in the embodiment of the present application, account information can include:Personal letter corresponding with the account to be verified Breath, the user behaviors log of the account to be verified.Wherein, the corresponding personal information of the account to be verified may include:The account to be verified The user profile (e.g., name, date of birth, sex, marital status etc.) of middle storage, the user for holding the account to be verified are pre- The answer of the safety problem and safety problem that first set, the interlock account of the account to be verified, the good friend of the account to be verified List etc., and the user behaviors log of the account to be verified may include:The account to be verified browses the record of information, the purchase of the account Can the behavior comprising the account to be verified day in thing record, payment record of the account etc., the account access record to be verified Will, still, access record are generally only determined by the server, and behavior daily record can generally pass through the account to be verified It is determined that, for example, for account s, user changes the behavior of personal information, it can be recorded in account s access record, and by The server is determined, but without record in account s user behaviors log, anyone is logged in after account s, can only browse this Account s user behaviors log, determines the account browsed information, and can not know account s personal information and be modified.
It should be noted that in this application in step S103 and step S104, it is determined that the accounts information being learned And the step of determine associated with safety problem accounts information and the relation of absolute sequencing is not present, can be simultaneously It is determined that can also sequentially determine, as long as,, can be with to each safety problem of the account to be verified before authentication is carried out Determine whether the safety problem is associated with the accounts information that has been learned, and using the accounts information with being learned Unconnected safety problem enters authentication.
Another embodiment that the application is provided, it is assumed that user a is in login account U1When, there is provided two safety problems, Q1: Where your birthplace isAnd Q2:Your senior middle school's form master's name, also, use account U in the user a1Process In, server b is according to account U1Access record, generate safety problem, Q3:What the article that you often buy isAnd Q4:Which is your good friend below, then, and account U1The problem of correspondence, can be as shown in table 1.
Problem identification Question text
Q1 Where your birthplace is
Q2 Your senior middle school's form master's name
Q3 What the article that you often buy is
Q4 Which is your good friend below
Table 1
Also, account U1Corresponding accounts information can be as shown in table 2.
Accounts information is identified Accounts information content
I1 Account U1Personal information
I2 Account U1Shopping information
I3 Account U1Buddy list
Table 2
Meanwhile, default checking scene is the checking scene of the checking scene and execution business logged in server b, As shown in table 3.
Verify scene identity Verify scene
S1 The checking scene of login
S2 The checking scene of execution business
Table 3
In addition, corresponding relation of the default accounts information with verifying scene in server b, i.e. K (Si, Ij), can be such as table 4 It is shown.
Table 4
It is visible by table 4, as account U1After login, account U can be accessed1Corresponding all accounts informations, so In scene S2Under, each accounts information I1、I2And I3There is the possibility being learned.
Further, default accounts information and the corresponding relation of safety problem in server b, i.e. R (Qi, Ij), can As shown in table 5.
Table 5
It is visible by table 5, accounts information I1With safety problem Q1Correct option be associated, i.e. pass through account U1In set The personal information put, it may be determined that the birthplace information of the user, accounts information I2With safety problem Q3Correct option it is related Connection, i.e. pass through account U1Shopping information, it may be determined that the commodity that the user buys in the recent period, accounts information I3With safety problem Q4Correct option be associated, i.e. pass through account U1Buddy list, it may be determined that the good friend of the user, that is to say, that logical Cross each accounts information I being learned1、I2、I3, safety problem Q can be obtained respectively1、Q3、Q4Answer.
Finally, server b just can be according to formula To the account U of the user a1Corresponding each safety problem, calculates obtaining for the safety problem Point, then, safety problem Q1It is scored at 0, safety problem Q2It is scored at 1, safety problem Q3It is scored at 0, safety problem Q4 1 is scored at, server b can determine to use safety problem Q2And Q4, to account U1Carry out authentication, i.e. use The safety problem of answer can not be obtained by the accounts information being learned, authentication is carried out.
Further, in another embodiment that the application is provided, due in the embodiment of the present application step S103, the clothes Business device can determine the corresponding information being learned of the account to be verified, so the server can also be true in step s 103 The information not being learned in the fixed account to be verified.Wherein, the information can be the accounts information of the account to be verified.
Then, in the application step S104, the server can also determine correct option with being somebody's turn to do from each safety problem The safety problem for the accounts information matching not being learned, and authentication is carried out to the account to be verified.
Specifically, first, in the application step S103, the server can use formula It is determined that Default accounts information and the corresponding relation of checking scene, wherein, K represents accounts information and the corresponding relation of checking scene, S tables Show checking scene, i represents the numbering of different checking scenes, SiI-th of checking scene is represented, I represents accounts information, IjTable Show j-th of accounts information, K (Si, Ij)=1 represents IjAccounts information is in SiIt would know that under checking scene, K (Si, Ij)=0 represents Ij Accounts information is in SiIt not would know that under checking scene.
Formula can be usedDetermine access note of the account to be verified in preset time period Record, wherein, V represents accessed accounts information and the corresponding relation of the account to be verified, and U represents account to be verified, UiRepresent i-th Individual account to be verified, i.e., the account to be verified in the application, T represents preset time period, TkRepresent kth kind preset time period, I Represent accounts information, IjRepresent j-th of accounts information, V (Ui, Tk, Ij)=1 represents IjAccounts information is in TkQuilt in preset time period UiAccount access mistake to be verified, V (Ui, Tk, Ij)=0 represents IjAccounts information is in TkNot by U in preset time periodiAccount to be verified Accessed, wherein, the TkWith the SiThere is corresponding relation, and can be set by staff, wherein, when the checking scene needs to make Authentication (that is, the low safety problem of correct option has been learned possibility) is carried out with the higher safety problem of security, The then TkDuration can be longer, vice versa.
Secondly, in the application step S104, the server can use formulaDetermine default The corresponding relation of accounts information and safety problem, R represents accounts information and the corresponding relation of safety problem, and Q represents safety problem, QiI-th of safety problem is represented, I represents accounts information, IjRepresent j-th of accounts information, R (Qi, Ij)=1 represents IjAccounts information With QiThe correct option of safety problem is associated, R (Qi, Ij)=0 represents IjAccounts information and QiThe correct option of safety problem is not It is associated, wherein, accounts information is associated with correct option, represents to determine or be inferred to this just by account information True answer.
Finally, the server just can pass through formula For each safety problem, the score of the safety problem is calculated, wherein, M represents account to be verified Family UiAccounts information total quantity.When this is scored at 0, i.e. A (Ui, Sj, QkDuring)=0, it is determined that the account letter not being learned Breath is matched with the correct option of the safety problem, that is to say, that the server can determine that the correct option of the safety problem is obtained The possibility known is relatively low, available for authentication.
Then, when the server determine available for authentication each safety problem after, just can be used any one or The multiple safety problems that should be available for authentication of person, authentication is carried out to the account to be verified.
It can be seen that, the server can also use the correct option each safety problem associated with the accounts information not being learned, Authentication is carried out to the account to be verified.The method provided by the application, can be recorded according to the access of user, and each account Whether family information is associated with the correct option of safety problem, determines under current time checking scene, available safety problem. It is no longer simple and to determine the safety problem of selection only because the difference of checking scene, while the record of the access based on user, makes The selection of setting a question for obtaining safety problem is more credible, while the resource using existing safety problem is improved, also improves peace The accuracy of full problem, and then make it that the result of authentication is more credible, and improve the efficiency of authentication.
It should be noted that the executive agent that the embodiment of the present application provides each step of method may each be same and set It is standby, or, this method is also used as executive agent by distinct device.Such as, step S101 and step S102 executive agent can be with For equipment 1, step S103 executive agent can be equipment 2;Again such as, step S101 executive agent can be equipment 1, step Rapid S102 and step S103 executive agent can be equipment 2;Etc., i.e. the server can be made up of multiple devices Distributed server.Meanwhile, the executive agent of each step for the method that the embodiment of the present application is provided also is not limited to server, Can also be terminal, the terminal can be the equipment such as mobile phone, PC, tablet personal computer.
Based on the authentication process itself shown in Fig. 1, the embodiment of the present application also corresponds to and provides a kind of device of authentication, such as Shown in Fig. 2.
A kind of structural representation of the device for authentication that Fig. 2 provides for the embodiment of the present application, including:
First determining module 201, determines the current corresponding checking scene of the account to be verified;
Second determining module 202, according to the checking scene, determines the information being learned in the account to be verified, And/or the information not being learned;
Authentication module 203, when it is determined that be learned information when, using uncorrelated to the information being learned The safety problem of connection carries out authentication to the account to be verified, when it is determined that be not learned information when, using with it is described not The safety problem that the information being learned is associated carries out authentication to the account to be verified.
The checking scene at least includes:The checking scene of execution business after the checking scene of login and login.
Second determining module 202, according to default accounts information with verifying the corresponding relation of scene and described treating The access record of account is verified, it is determined that account corresponding and being accessed within the default period with the checking scene is believed Breath, as the information being learned, and/or determine with it is described verify scene it is corresponding and within the default period not by The accounts information accessed, is used as the information not being learned.
Second determining module 202, according to default checking scene and the corresponding relation of period, determines the checking The scene corresponding period, it is determined that the accounts information being accessed within the checking scene corresponding period, according to default Checking scene and the corresponding relation of period, checking scene corresponding period is determined, it is determined that in the checking scene The accounts information not being accessed in the corresponding period.
The authentication module 203, when it is determined that be learned information when, be learned using correct option with described Information unmatched safety problem authentication is carried out to the account to be verified, when it is determined that be not learned information when, adopt Authentication is carried out to the account to be verified with the safety problem of correct option and the information matches not being learned.
Described information includes:Personal information corresponding with the account to be verified, the user behaviors log of the account to be verified.
Specifically, the device of above-mentioned authentication as shown in Figure 2 can be located in server, the service implement body can be with It is an equipment or the system being made up of multiple devices, i.e. distributed server.
Based on the authentication process itself shown in Fig. 1, the embodiment of the present application also corresponds to the device for providing another authentication, As shown in Figure 3.
A kind of structural representation of the device for authentication that Fig. 3 provides for the embodiment of the present application, including:
Determining module 301, determines the current corresponding checking scene of account to be verified;
Scoring modules 302, for the safety problem prestored, according to formula Calculate score A of the safety problem in the checking scene;
Authentication module 303, the safety problem being not zero using score A is carried out identity to the account to be verified and tested Card;
Wherein, IjJ-th of accounts information in the account to be verified is represented, M represents the account letter of the account to be verified Cease total quantity;As the accounts information IjWhen unconnected to the correct option of the safety problem, R (Ij)=1, otherwise R (Ij) =0;As the accounts information IjWhen not would know that in the checking scene, K (Ij)=1, otherwise K (Ij)=0;When the account Family information IjIt is not out-of-date by the account access to be verified in the preset time period, V (Ij)=1, otherwise V (Ij)=0.
In addition, the formulaAuthentication that specifically can be as shown in Figure 1 During formulaIt is public Formula R (Ij)、K(Ij) and V (Ij) it can specifically distinguish the formula during authentication as shown in Figure 1AndFor above-mentioned formula specifically Bright and calculating process the application is repeated no more.
Specifically, the device of above-mentioned authentication as shown in Figure 3 can be located in server, the service implement body can be with It is an equipment or the system being made up of multiple devices, i.e. distributed server.
In the 1990s, for a technology improvement can clearly distinguish be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (for the improvement of method flow).So And, with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make Special IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming is also used instead mostly " patrols Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should This understands, it is only necessary to slightly programming in logic and be programmed into method flow in integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method flow can be just readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but is not limited to following microcontroller Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out into programming in logic Obtain controller and come real in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions is regarded For that not only can be the software module of implementation method but also can be the structure in hardware component.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity, Or realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., it should be included within the scope of claims hereof.

Claims (14)

1. a kind of method of authentication, it is characterised in that methods described includes:
Determine the current corresponding checking scene of account to be verified;
According to the checking scene, the information being learned and/or the information not being learned in the account to be verified are determined;
When it is determined that be learned information when, treated using the safety problem unconnected to the information being learned to described Verify account carry out authentication, when it is determined that be not learned information when, using associated with the information not being learned Safety problem carries out authentication to the account to be verified.
2. the method as described in claim 1, it is characterised in that the checking scene at least includes:The checking scene of login with And the checking scene of the execution business after logging in.
3. the method as described in claim 1, it is characterised in that according to the checking scene, is determined in the account to be verified The information being learned and/or the information not being learned, are specifically included:
Recorded according to default accounts information with the corresponding relation of checking scene and the access of the account to be verified, it is determined that with The checking scene correspondence and the accounts information being accessed within the default period, are used as the information being learned; And/or, it is determined that accounts information corresponding and not being accessed within the default period with the checking scene, as described The information not being learned.
4. method as claimed in claim 3, it is characterised in that it is determined that the account letter being accessed within the default period Breath, is specifically included:
According to default checking scene and the corresponding relation of period, the checking scene corresponding period is determined;
It is determined that the accounts information being accessed within the checking scene corresponding period;
It is determined that the accounts information not being accessed within the default period, is specifically included:
According to default checking scene and the corresponding relation of period, the checking scene corresponding period is determined;
It is determined that the accounts information not being accessed within the checking scene corresponding period.
5. the method as described in claim 1, it is characterised in that the selection safety unconnected to the information being learned Problem, is specifically included:
Select correct option and the unmatched safety problem of the information being learned;
The selection safety problem associated with the information not being learned, is specifically included:
Select the safety problem of correct option and the information matches not being learned.
6. the method as described in claim 1, it is characterised in that described information includes:Corresponding with the account to be verified The user behaviors log of people's information, the account to be verified.
7. a kind of device of authentication, it is characterised in that including:
First determining module, determines the current corresponding checking scene of the account to be verified;
Second determining module, according to the checking scene, determines the information being learned in the account to be verified, and/or not The information being learned;
Authentication module, when it is determined that be learned information when, using the peace unconnected to the information being learned Full problem carries out authentication to the account to be verified, when it is determined that be not learned information when, be not learned using with described Information associated safety problem authentication is carried out to the account to be verified.
8. device as claimed in claim 7, it is characterised in that the checking scene at least includes:The checking scene of login with And the checking scene of the execution business after logging in.
9. device as claimed in claim 7, it is characterised in that second determining module, according to default accounts information with The corresponding relation of scene and the access record of the account to be verified are verified, it is determined that corresponding and pre- with the checking scene If period in the accounts information that is accessed, be used as the information being learned, and/or determine and the checking scene Correspondence and the accounts information not being accessed within the default period, are used as the information not being learned.
10. device as claimed in claim 9, it is characterised in that second determining module, according to default checking scene with The corresponding relation of period, determines the checking scene corresponding period, it is determined that in the checking scene corresponding period The accounts information being inside accessed, according to default checking scene and the corresponding relation of period, determines the checking scene pair The period answered, it is determined that the accounts information not being accessed within the checking scene corresponding period.
11. device as claimed in claim 7, it is characterised in that the authentication module, when it is determined that the information being learned When, identity is carried out to the account to be verified with the unmatched safety problem of the information being learned using correct option and tested Card, when it is determined that be not learned information when, using the safety problem of correct option and the information matches not being learned to institute State account to be verified and carry out authentication.
12. device as claimed in claim 7, it is characterised in that described information includes:Corresponding with the account to be verified The user behaviors log of people's information, the account to be verified.
13. a kind of method of authentication, it is characterised in that methods described includes:
Determine the current corresponding checking scene of account to be verified;
For the safety problem prestored, according to formulaCalculate the safety problem Score A in the checking scene;
The safety problem being not zero using score A, authentication is carried out to the account to be verified;
Wherein, IjJ-th of accounts information in the account to be verified is represented, M represents the accounts information sum of the account to be verified Amount;As the accounts information IjWhen unconnected to the correct option of the safety problem, R (Ij)=1, otherwise R (Ij)=0;When The accounts information IjWhen not would know that in the checking scene, K (Ij)=1, otherwise K (Ij)=0;When the accounts information IjIt is not out-of-date by the account access to be verified in the preset time period, V (Ij)=1, otherwise V (Ij)=0.
14. a kind of device of authentication, it is characterised in that including:
Determining module, determines the current corresponding checking scene of account to be verified;
Scoring modules, for the safety problem prestored, according to formulaCalculate institute State score A of the safety problem in the checking scene;
Authentication module, the safety problem being not zero using score A carries out authentication to the account to be verified;
Wherein, IjJ-th of accounts information in the account to be verified is represented, M represents the accounts information sum of the account to be verified Amount;As the accounts information IjWhen unconnected to the correct option of the safety problem, R (Ij)=1, otherwise R (Ij)=0;When The accounts information IjWhen not would know that in the checking scene, K (Ij)=1, otherwise K (Ij)=0;When the accounts information IjIt is not out-of-date by the account access to be verified in the preset time period, V (Ij)=1, otherwise V (Ij)=0.
CN201710021775.0A 2017-01-12 2017-01-12 Identity verification method and device Active CN107070871B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010415706.XA CN111611558B (en) 2017-01-12 2017-01-12 Identity verification method and device
CN201710021775.0A CN107070871B (en) 2017-01-12 2017-01-12 Identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710021775.0A CN107070871B (en) 2017-01-12 2017-01-12 Identity verification method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010415706.XA Division CN111611558B (en) 2017-01-12 2017-01-12 Identity verification method and device

Publications (2)

Publication Number Publication Date
CN107070871A true CN107070871A (en) 2017-08-18
CN107070871B CN107070871B (en) 2020-04-24

Family

ID=59598431

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201710021775.0A Active CN107070871B (en) 2017-01-12 2017-01-12 Identity verification method and device
CN202010415706.XA Active CN111611558B (en) 2017-01-12 2017-01-12 Identity verification method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202010415706.XA Active CN111611558B (en) 2017-01-12 2017-01-12 Identity verification method and device

Country Status (1)

Country Link
CN (2) CN107070871B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876386A (en) * 2017-12-08 2018-11-23 北京旷视科技有限公司 Object authentication method and apparatus, method of commerce and device based on object authentication
CN109816512A (en) * 2018-12-14 2019-05-28 深圳壹账通智能科技有限公司 Verification method, device and the computer equipment of reconciliation result
WO2019100771A1 (en) * 2017-11-24 2019-05-31 阿里巴巴集团控股有限公司 Question pushing method and device
CN110889106A (en) * 2018-09-11 2020-03-17 北京京东金融科技控股有限公司 Configuration method, device, system and computer readable storage medium
CN112948785A (en) * 2021-03-25 2021-06-11 支付宝(杭州)信息技术有限公司 Account authentication method, device and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184705A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Verification method, apparatus, server, user data center and system
CN104348822A (en) * 2013-08-09 2015-02-11 深圳市腾讯计算机系统有限公司 Method and device for authentication of Internet account number and server
CN105337928A (en) * 2014-06-24 2016-02-17 阿里巴巴集团控股有限公司 User identity identification method and apparatus, and safety protection problem generation method and apparatus
US9298901B1 (en) * 2014-10-08 2016-03-29 International Business Machines Corporation Credential validation using multiple computing devices
CN106161020A (en) * 2015-03-27 2016-11-23 阿里巴巴集团控股有限公司 A kind of identity authentication method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685106B (en) * 2012-03-27 2015-09-30 北京百纳威尔科技有限公司 A kind of safe verification method and equipment
US8949960B2 (en) * 2013-03-15 2015-02-03 Google Inc. Privacy preserving knowledge and factor possession tests for persistent authentication
CN104598795A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Authentication method and system
WO2016131063A1 (en) * 2015-02-15 2016-08-18 Alibaba Group Holding Limited System and method for user identity verification, and client and server by use thereof
CN105656878A (en) * 2015-11-27 2016-06-08 努比亚技术有限公司 Verification method and device based on mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184705A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Verification method, apparatus, server, user data center and system
CN104348822A (en) * 2013-08-09 2015-02-11 深圳市腾讯计算机系统有限公司 Method and device for authentication of Internet account number and server
CN105337928A (en) * 2014-06-24 2016-02-17 阿里巴巴集团控股有限公司 User identity identification method and apparatus, and safety protection problem generation method and apparatus
US9298901B1 (en) * 2014-10-08 2016-03-29 International Business Machines Corporation Credential validation using multiple computing devices
CN106161020A (en) * 2015-03-27 2016-11-23 阿里巴巴集团控股有限公司 A kind of identity authentication method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
魏梓丞: "面向身份伪冒的主机异常行为检测", 《中国优秀硕士学位论文全文数据库》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019100771A1 (en) * 2017-11-24 2019-05-31 阿里巴巴集团控股有限公司 Question pushing method and device
CN108876386A (en) * 2017-12-08 2018-11-23 北京旷视科技有限公司 Object authentication method and apparatus, method of commerce and device based on object authentication
CN108876386B (en) * 2017-12-08 2022-03-22 北京旷视科技有限公司 Object authentication method and device, and transaction method and device based on object authentication
CN110889106A (en) * 2018-09-11 2020-03-17 北京京东金融科技控股有限公司 Configuration method, device, system and computer readable storage medium
CN109816512A (en) * 2018-12-14 2019-05-28 深圳壹账通智能科技有限公司 Verification method, device and the computer equipment of reconciliation result
CN112948785A (en) * 2021-03-25 2021-06-11 支付宝(杭州)信息技术有限公司 Account authentication method, device and equipment

Also Published As

Publication number Publication date
CN111611558A (en) 2020-09-01
CN107070871B (en) 2020-04-24
CN111611558B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CA3051025C (en) Blockchain system and data storage method and apparatus
CN107257340B (en) A kind of authentication method, authentication data processing method and equipment based on block chain
CN107070871A (en) A kind of method and device of authentication
CN109087106A (en) Identify air control model training, air control method, apparatus and the equipment of secondary account takeover of distributing telephone numbers
US8621209B1 (en) Confidence-based authentication
CN109614545A (en) Page loading method, device and equipment
CN109936525A (en) A kind of abnormal account preventing control method, device and equipment based on graph structure model
US11615169B2 (en) Authentication using cognitive analysis
CN107026838A (en) The distribution method and device of a kind of electronic certificate
CN110276178B (en) Risk control method, device and equipment based on identity verification
CN107294999A (en) Information Authentication processing method, device, system, client and server
CN109389412A (en) A kind of method and device of training pattern
CN110032857A (en) The registration of account, the recognition methods of credible equipment and device
CN109428900A (en) A kind of method and device of data processing
CN109800582A (en) Multiparty data processing method, device and the equipment that can be traced to the source
CN108959865A (en) A kind of verification method and device
CN107451036A (en) Input reminding method, device and equipment
CN110224851A (en) Merging method, device, computer equipment and the computer storage medium of account information
CN113408254A (en) Page form information filling method, device, equipment and readable medium
TW201926087A (en) Question pushing method and device
CN107918863A (en) Preposition processing and collocation method, device and equipment based on financial product
CN109582834B (en) Data risk prediction method and device
CN109063967B (en) Processing method and device for wind control scene feature tensor and electronic equipment
CN110516918A (en) A kind of Risk Identification Method and device
CN112910896B (en) Account authentication method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201016

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201016

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right