CN107623696A - A kind of user ID authentication method and device based on user behavior feature - Google Patents
A kind of user ID authentication method and device based on user behavior feature Download PDFInfo
- Publication number
- CN107623696A CN107623696A CN201710940479.0A CN201710940479A CN107623696A CN 107623696 A CN107623696 A CN 107623696A CN 201710940479 A CN201710940479 A CN 201710940479A CN 107623696 A CN107623696 A CN 107623696A
- Authority
- CN
- China
- Prior art keywords
- behavioural characteristic
- quantized value
- value
- user
- quantized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Telephonic Communication Services (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
This application discloses a kind of user ID authentication method and device based on user behavior feature, can obtain the quantized value that user to be verified triggers behavioural characteristic when pre-set business operates, and determines the behavioural characteristic mark of the behavioural characteristic;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and click on behavioural characteristic;Identified according to the behavioural characteristic, the quantized value excursion with the corresponding behavioural characteristic of behavioural characteristic mark is obtained in subordinate act feature database;According to the quantized value of the behavioural characteristic and the relation of quantized value excursion got, the legitimacy of the user to be verified is determined.It is different to hold the posture of same terminal and operating habit due to different user, this make it that the quantized value excursion of the behavioural characteristic of the same business operation of different user triggering is also different, and it is not easy to be cracked, imitates, therefore, this method and device can improve the security of subscriber authentication.
Description
Technical field
The application is related to field of computer technology, more particularly to a kind of subscriber authentication side based on user behavior feature
Method and device.
Background technology
With the rapid development of mobile Internet, user carries out the operation of all kinds of " internet+" business by mobile terminal
It is very common.For example, user can carry out net purchase by shopping website APP on mobile phone, or user can be with
Transferred accounts, paid by the financial APP on mobile phone, etc..
However, the popularization of all kinds of movement " internet+" business, although bringing facility for user, there is also more
Security risk.For example, in " internet+finance " business, account and password that validated user often occur are stolen by malicious user
Or situation about cracking, after account and the password of validated user are stolen or cracked to malicious user, validated user can be pretended to be to log in legal
The account of user, the business operation such as transferred accounts, paid, makes the property of validated user sustain a loss.
In view of the above-mentioned problems, prior art often user perform related service operation when, it is desirable to user input short-message verification
Code or other dynamic passwords (answer for the problem of such as presetting), checking is made with the identity to user.
But this mode verified only by short message verification code or other dynamic passwords, because of short message verification code
Or other dynamic passwords may be fished by fishing software and taken, and easily cracked by disabled user.It can be seen that existing user to be verified
There is larger potential safety hazard in auth method, how to lift the security of user ID authentication method to be verified, be urgently
The technical problem of solution.
The content of the invention
The embodiment of the present application provides a kind of user ID authentication method and device based on user behavior feature, to improve
The security of subscriber authentication.
In a first aspect, the embodiment of the present application provides a kind of user ID authentication method based on user behavior feature, including:
The quantized value that user to be verified triggers behavioural characteristic when pre-set business operates is obtained, determines the behavioural characteristic
Behavioural characteristic identifies;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and
Click on behavioural characteristic;
Identified according to the behavioural characteristic, it is special that behavior corresponding with behavioural characteristic mark is obtained in subordinate act feature database
The quantized value excursion of sign;Wherein, behavioural characteristic mark is stored with the behavioural characteristic storehouse and the behavior of validated user is special
The corresponding relation of the quantized value excursion of sign;
According to the quantized value of the behavioural characteristic and the relation of the quantized value excursion got, determine described to be verified
The legitimacy of user.
Second aspect, a kind of behavioural characteristic storehouse method for building up, it is characterised in that methods described includes:
The first set pre-saved is obtained, is included in the first set:During validated user triggering pre-set business operation
The quantized value of behavioural characteristic identified with corresponding behavioural characteristic;
Quantized value in the first set is screened, it is special to obtain the user of validated user described in energy accurate characterization
The quantized value of sign is added in second set;
According to the quantized value in the second set, the quantized value of behavioural characteristic corresponding to the behavioural characteristic mark is determined
Excursion;
The quantized value excursion of the behavioural characteristic mark and the behavioural characteristic is accordingly stored, it is described to obtain
Behavioural characteristic storehouse.
The third aspect, the embodiment of the present application also provide a kind of subscriber authentication device based on user behavior feature, institute
Stating device includes:
First acquisition module, the quantized value of behavioural characteristic when pre-set business operates is triggered for obtaining user to be verified,
Determine the behavioural characteristic mark of the behavioural characteristic;Wherein, the behavioural characteristic includes one or more of:Gyroscope fluctuates
Behavioural characteristic, slide behavioural characteristic and click on behavioural characteristic;
Second acquisition module, obtained for being identified according to the behavioural characteristic, in subordinate act feature database special with the behavior
The quantized value excursion of behavioural characteristic corresponding to sign mark;Wherein, behavioural characteristic mark is stored with the behavioural characteristic storehouse
With the corresponding relation of the quantized value excursion of the behavioural characteristic of validated user;
First determining module, for the quantized value according to the behavioural characteristic and the pass of the quantized value excursion got
System, determine the legitimacy of the user to be verified.
Device is established in fourth aspect, a kind of behavioural characteristic storehouse, it is characterised in that including:
3rd acquisition module, for obtaining the first set pre-saved, included in the first set:Validated user touches
The quantized value of behavioural characteristic when sending out pre-set business operation identifies with corresponding behavioural characteristic;
Data processing module, the quantized value in the first set is screened, can be closed with obtaining described in accurate characterization
The quantized value of the user characteristics of method user is added in second set;
Excursion determining module, for the quantized value in the second set, determine the behavioural characteristic mark
The quantized value excursion of corresponding behavioural characteristic;
Feature database establishes module, for accordingly storing the quantized value of the behavioural characteristic mark and the behavioural characteristic
Excursion, to obtain the behavioural characteristic storehouse.
Due under same business operation, different user hold the posture of same terminal and operating habit be it is different,
This make it that the quantized value excursion of the behavioural characteristic of the same business operation of different user triggering is also different, and is not easy to be broken
Solution, imitate.Therefore, above-mentioned at least one technical scheme that the embodiment of the present application uses, it can identify that triggering is default exactly
The legitimacy of the user of business operation, improve the security of subscriber authentication.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen
Schematic description and description please is used to explain the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is a kind of a kind of tool for user ID authentication method based on user behavior feature that the embodiment of the present application provides
The schematic flow sheet of body embodiment;
Fig. 2 is the schematic diagram that user carries out sliding trace caused by slide using left hand and the right hand;
Fig. 3 is a kind of a kind of flow of the embodiment for behavioural characteristic storehouse method for building up that the embodiment of the present application provides
Schematic diagram;
Fig. 4 is that a kind of user ID authentication method based on user behavior feature that the embodiment of the present application provides actually should
Schematic flow sheet in;
Fig. 5 is that a kind of user ID authentication method based on user behavior feature that the embodiment of the present application provides actually should
System structure diagram in;
Fig. 6 is a kind of a kind of tool for subscriber authentication device based on user behavior feature that the embodiment of the present application provides
The structural representation of body embodiment;
Fig. 7 is a kind of structure for embodiment that device is established in a kind of behavioural characteristic storehouse that the embodiment of the present application provides
Schematic diagram;
Fig. 8 is the structural representation for a kind of electronic equipment that the embodiment of the present application provides.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one
Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out under the premise of creative work the every other embodiment obtained, belong to the scope of the application protection.
The low technical problem of security, the embodiment of the present application are identified to solve subscriber authentication scheme of the prior art
A kind of user ID authentication method and device based on user behavior feature are provided, is described with reference to the drawings separately below.
A kind of user ID authentication method based on user behavior feature first provided below the embodiment of the present application is carried out
Introduce.
The executive agent of the user ID authentication method based on user behavior feature that the embodiment of the present application provides can be
Server can also be terminal, when executive agent is server, specifically can be perform the embodiment of the present application provide based on
The server of the fail-safe software of the user ID authentication method of user behavior feature or the third party provider of plug-in unit or
The server of the service provider of " internet+" business service is provided.Described executive agent does not form the limit to the application
It is fixed.For convenience of explanation, the embodiment of the present application is mainly introduced so that executive agent is server as an example.
As shown in figure 1, a kind of user ID authentication method based on user behavior feature that the embodiment of the present application provides, can
To comprise the following steps:
S101, the quantized value that user to be verified triggers behavioural characteristic when pre-set business operates is obtained, determine the behavior
The behavioural characteristic mark of feature;
Wherein, the behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and
Click on behavioural characteristic, etc..
Accordingly, the quantized value of gyroscope fluctuation behavioural characteristic can specifically include:Data are fluctuated according to gyroscope to calculate
Obtained magnitude of angular velocity etc..One or more of can specifically be included by sliding the quantized value of behavioural characteristic:The end of sliding trace
Put relative to the one or more in the abscissa offset and ordinate offset, sliding distance and sliding speed of starting point,
Etc..Clicking on the quantized value of behavioural characteristic can specifically include:Coordinate value corresponding to click location etc..
Behavioural characteristic identifies, it can be understood as is the mark that can distinguish variety classes behavioural characteristic.Also, having
When body is realized, the mark of behavioural characteristic according to the attribute of the quantized value of the behavioural characteristic got, can be specifically determined.Wherein,
The attribute of the quantized value of behavioural characteristic, such as can be the unit of quantized value, number range of quantized value etc..Specifically, such as
Fruit says that the unit of the quantized value got is rad/s, then it is magnitude of angular velocity that can determine the quantized value, and corresponding behavioural characteristic should
The feature of behavior is fluctuated for gyroscope, can thus be identified accordingly based upon the attribute of the quantized value prestored with behavioural characteristic
Corresponding relation, determine the mark of behavioural characteristic.
Certainly, in actual applications, the mark of behavioural characteristic can also be determined by other means, and aforesaid way is only
Citing.
For example, gyroscope fluctuation behavioural characteristic, slip behavioural characteristic and the behavioural characteristic mark for clicking on behavioural characteristic
Can be respectively:001st, Serial No. as 002 and 003.
Above-mentioned pre-set business operation, can be that the business that the predetermined any required identity to user is verified is grasped
Make, for example, log in be arranged on terminal on APP register, in terminal log in mailbox operation, phase is logged in terminal
Operation that the operation of pass website, the screen to terminal are unlocked, etc..
Above-mentioned terminal can be the mobile terminals such as smart mobile phone, tablet personal computer, notebook computer or electric paper book.On also,
Gyroscope and touch-screen can be provided with by stating in terminal.
In specific implementation, the application programming interface (Application in the operating system of terminal can be passed through
Programming Interface, API) function obtains the quantized value of above-mentioned behavioural characteristic, for example, can pass through
MotionEvent functions obtain quantized value --- the magnitude of angular velocity on gyroscope fluctuation behavior.
S102, identify according to the behavioural characteristic, obtain in subordinate act feature database corresponding with behavioural characteristic mark
The quantized value excursion of behavioural characteristic;
Wherein, the quantized value that behavioural characteristic mark and the behavioural characteristic of validated user are stored with the behavioural characteristic storehouse becomes
Change the corresponding relation of scope.
Exemplarily, above-mentioned corresponding relation can be stored in behavioural characteristic storehouse in the form of following:(behavioural characteristic identifies,
The excursion of excursion // quantized value 3 of excursion // quantized value 2 of quantized value 1 // ...), wherein symbol " // " is used for
Different quantized values corresponding to same behavior feature are separated.
For example, according to above, if gyroscope fluctuation behavioural characteristic is identified as 001, gyroscope fluctuates behavioural characteristic
Quantized value is magnitude of angular velocity, then, above-mentioned corresponding relation can be expressed as:(001,1~2rad/s);If slide behavioural characteristic
Be identified as 002, the quantized value for sliding behavioural characteristic be respectively slip behavior terminal relative to starting point abscissa offset
Amount and ordinate offset, sliding distance and sliding speed, then, above-mentioned corresponding relation can be expressed as:(002,2~
2.5cm//3~3.5cm//3.5~4cm//4~4.5cm/s).
Due in actual applications, validated user may possess multiple different terminals simultaneously, and validated user may be
Pre-set business operation is triggered in its any terminal possessed, but the screen size of different terminals and different terminals are used
Gyroscope be possible to different;Also, the type of pre-set business operation can also more than one.Therefore, in detail, behavioural characteristic
In storehouse, the behavior of terminal iidentification, the type identification of pre-set business operation, behavioural characteristic value mark and validated user can be stored with
Corresponding relation between the quantized value excursion of feature, and specifically can be stored by following form:(terminal iidentification, preset industry
The type identification of business operation, behavioural characteristic mark, excursion // quantized value 3 of excursion // quantized value 2 of quantized value 1
Excursion // ...).
Further, since validated user is also different using left hand and using the quantized value of behavioural characteristic caused by the right hand
, the most it will be evident that as shown in Fig. 2 when behavioural characteristic is slides behavioural characteristic, user uses the sliding trace that left hand is formed
For the first circular arc 1 of left opening, the sliding trace that user is formed using the right hand is the second circular arc 2 of right opening.Therefore, in behavior
In feature database, the quantization of the behavioural characteristic of the validated user of the left hand for corresponding respectively to validated user and the right hand can also be stored with
The corresponding relation of value changes scope.For example, following corresponding relation can be stored with behavioural characteristic storehouse:(left hand or right hand mark,
Terminal iidentification, the type identification of pre-set business operation, behavioural characteristic mark, the change of excursion // quantized value 2 of quantized value 1
The excursion of scope // quantized value 3 // ...).
S103, quantized value and the relation of the quantized value excursion got according to the behavioural characteristic, it is determined that described
The legitimacy of user to be verified.
Specifically, step S103 can include:When the quantized value of the behavioural characteristic falls into the quantized value change got
When changing scope, or, when the quantized value and the absolute value of the difference of the quantized value excursion got of the behavioural characteristic are small
When five preset values, the user to be verified is defined as validated user.Wherein, the 5th preset value can be artificial as needed
Setting.
In more detail, step S103 can specifically include:When each quantized value of each behavioural characteristic of acquisition falls
When entering in the quantized value excursion of corresponding behavioural characteristic, or, quantized value and acquisition when each behavioural characteristic of acquisition
To the absolute value of difference of quantized value excursion be respectively less than corresponding five preset value when, the user to be verified is determined
For validated user;Otherwise, the user to be verified is defined as disabled user.
Alternatively, in another embodiment, due in addition to the verification mode that the embodiment of the present application provides, generally going back
Ensure also to match using the username and password of account, could finally be verified, therefore, step S103 can specifically be wrapped
Include:When the quantized value of the behavioural characteristic falls into the quantized value excursion got, and the user of the user to be verified
Name and password authentification by the user to be verified by being defined as validated user.Or step S103 can specifically include:When
When the absolute value of the difference of the quantized value of the behavioural characteristic and the quantized value excursion got is less than five preset values, and
The username and password of the user to be verified is verified, and the user to be verified is defined as into validated user.
Further, when it is that validated user is legal that obtained the result, which is the user to be verified, can subsequently ring
Above-mentioned pre-set business operation and should be performed;When it is disabled user that obtained the result, which is the user to be verified, then do not ring
The pre-set business is answered to operate.Assuming that the pre-set business operation is register, when obtained the result is described to be tested
When card user is illegal, then interface of logging off, or ejection login failure interface etc., to prevent the data of pairing method user
And property safety causes damage.
Due under same business operation, different user hold the posture of same terminal and operating habit be it is different,
This cause different user triggered in same terminal the behavioural characteristic of same business operation quantized value excursion it is also different, and
And it is not easy to be imitated, cracks.Therefore, a kind of user based on user behavior feature that the embodiment shown in the application Fig. 1 provides
Auth method, the legitimacy of the user of triggering pre-set business operation can be identified exactly, user identity is improved and tests
The security of card.
Further, it is to be appreciated that when corresponding to the type of behavioural characteristic and/or the behavioural characteristic of each type obtained
When the type of quantized value is more, the user ID authentication method based on user behavior feature of the embodiment of the present application offer cracks
Difficulty is bigger, and the result drawn is more accurate, can more improve the security of user identity identification.
Further, when operating different terminals using different hand due to validated user as previously described, obtained different behaviors
The quantized value excursion of behavioural characteristic corresponding to signature identification is different, therefore, alternatively, in a kind of specific embodiment party
In formula:
Before step S102, a kind of subscriber authentication side based on user behavior feature of the embodiment of the present application offer
Method can also include:
Step 1, determine that user to be verified triggers following one or more parameters when pre-set business operates:It is described to be verified
It is the identifying of terminal used in user, the mark of the hand of the user to be verified (being used to distinguish left hand or the right hand), described pre-
If the type identification of business operation;
Wherein, the mark of user terminal can be the model of terminal.
Step 2, judge in the behavioural characteristic storehouse to whether there is and one or more of parameters and behavior spy
The quantized value excursion of the corresponding behavioural characteristic of sign mark;If it is, perform step S102;Otherwise, directly by described in
User to be verified is defined as disabled user.
Also, corresponding, step S102 can specifically include:It is special according to one or more of parameters and the behavior
Sign is identified, and it is special that behavior corresponding with one or more of parameters and behavioural characteristic mark is obtained in subordinate act feature database
The quantized value excursion of sign;Wherein, the mark of hand, terminal iidentification, pre-set business operation are stored with the behavioural characteristic storehouse
Type identification, behavioural characteristic mark and validated user behavioural characteristic quantized value excursion corresponding relation.
It can be seen that the embodiment of the present application, except the quantized value according to the behavioural characteristic and the quantization value changes model got
Outside the relation enclosed, the identifying of used terminal when pre-set business operates, user to be verified are also triggered by user to be verified
Mark of hand etc., the legitimacy of user to be verified is judged from multiple dimensions, therefore, the security of authentication is higher.For example, such as
In fruit behavioural characteristic storehouse, only the corresponding validated user that stores triggers pre-set business by the right hand in the terminal that terminal iidentification is X
Corresponding relation during operation, sliding behavior 002 and quantized value excursion, then pass through left hand when getting user to be verified
When triggering pre-set business operation in the terminal that terminal iidentification is X, the user to be verified is clearly illegal, can be directly true
The fixed user to be verified is illegal.
As shown in figure 3, the embodiment of the present application additionally provides a kind of behavioural characteristic storehouse method for building up, it is to be understood that should
Behavioural characteristic storehouse method for building up can also be referenced to a kind of user based on user behavior feature of the embodiment of the present application offer
In auth method.Behavior feature database method for building up can include (it is also understood that before above-mentioned steps S102,
A kind of user ID authentication method based on user behavior feature that the embodiment of the present application provides can also include):
S301, the first set pre-saved is obtained, included in the first set:Validated user triggering pre-set business behaviour
The quantized value of behavioural characteristic when making identifies with corresponding behavioural characteristic;
In step s 103, behavior of the validated user when triggering pre-set business operation in default terminal can specifically be obtained
The first set that the quantized value of feature is formed.
Validated user, can be the corresponding owner or lawful owner using account of the pre-set business operation, wherein,
For example can be Alipay account, Net silver account, etc. using account.
In actual applications, validated user can trigger pre-set business operation with continuous several times, to obtain above-mentioned first set,
Pre-set business operation can also be discontinuously triggered, to obtain above-mentioned first set.Specifically can be by nearly one week of validated user
The quantized value of caused behavioural characteristic value or the nearly internal trigger in month of validated user are pre- when triggering pre-set business operation
If the quantized value of caused behavioural characteristic value during business operation, it can also be that validated user is nearly M times (M can be more than or equal to 10)
The quantized value of caused behavioural characteristic value, the application are not limited this when triggering pre-set business operation.
S302, the quantized value in the first set is screened, to obtain validated user described in energy accurate characterization
The quantized value of user characteristics is added in second set;
Specifically, step S302 can include:The irregular data in first set is removed using preset algorithm, to obtain
Obtain the quantized value of the user characteristics of validated user can be added in second set described in accurate characterization.So-called irregular data, can
With the difference larger quantization value being not understood as in first set with benchmark quantized value.
Above-mentioned preset algorithm can be the filtering algorithm based on mean algorithm or the filtering algorithm based on radiation area algorithm, etc.
Deng.Wherein, the filtering algorithm based on mean algorithm, can specifically refer to remove in first set, with first set respectively quantifying
The algorithm of the average value larger quantization value of value.Filtering algorithm based on radiation area, it can specifically refer to, first according to first
The basic distribution of part quantized value structure quantized value in set, then remove in first set not within the scope of this
The algorithm of quantized value.
Alternatively, temporal information caused by the quantized value of behavioural characteristic is also included in the first set, a kind of specific
In embodiment, step S302 can specifically include:
Step 1, the quantized value in the first set, determine benchmark quantized value;
Wherein, benchmark quantized value includes earliest quantized value of caused time or the first set in the first set
In each quantized value average value;
Step 2, each quantized value is calculated in the first set relative to the relative value of the benchmark quantized value;Wherein, institute
State difference or ratio of the relative value for each quantized value relative to the benchmark quantized value;
Step 3, choose the quantized value for meeting the first preparatory condition in the first set, using as can accurate characterization it is legal
The quantized value of the user characteristics of user is added in second set;Wherein, first preparatory condition includes:The relative value is less than
The duration away from current time is less than preset duration at the time of first preset value and/or quantized value produce.
First preset value can be rule of thumb manually set, and it is to be appreciated that difference and corresponding to ratio
One preset value can be different.The quantized value (magnitude of angular velocity) that behavior is fluctuated using the quantized value that is stored in first set as gyroscope is
For example, the span of the first preset value corresponding to above-mentioned difference can be between 2~3rad/s, the corresponding to above-mentioned ratio
The span of one preset value can be between 0.9~1.1.
Above-mentioned preset duration can also be manually set, such as can be one week, one month, etc..Above-mentioned current time tool
At the time of body can be that user triggers step S101.
It can be appreciated that this embodiment can screen out the irregular data in first set well, it is follow-up
The checking for carrying out user identity is laid a good foundation.
Alternatively, temporal information caused by the quantized value of behavioural characteristic is also included in the first set, has in another kind
In body embodiment, step S302 can specifically include:
Step 1, according to the sequencing of time caused by quantized value the quantized value in the first set is ranked up;
Step 2, by first quantized value in the first set after sequence, be defined as benchmark quantized value;
Step 3, circulation perform given step, until the quantized value in the first set after having traveled through sequence;It is described
Given step includes:
Sub-step 1, calculate relative value of the current quantisation value relative to benchmark quantized value;The relative value is current quantisation value
Relative to the difference or ratio of benchmark quantized value;
Sub-step 2, the current quantisation value that the relative value is less than the second preset value is chosen, to be used as energy accurate characterization
The quantized value of the user characteristics of validated user is added in second set;
After the current quantisation value of selection is added in the second set, when currently being preserved in the second set
The quantity of quantized value when being more than or equal to predetermined number, the given step also includes:
Sub-step 3, redefine the benchmark quantized value;Wherein, redefining the benchmark quantized value includes, by described in
The average value of currently stored each quantized value in second set, as the benchmark quantized value after redefining.
It can not be accurately reflected it is also understood that another embodiment also can be screened out preferably in first set
The irregular data of validated user operating habit, have laid a good foundation, contribute to for the follow-up checking for carrying out user identity
Improve the security of subscriber authentication.
It should be noted that in actual applications, screening is carried out to the quantized value in first set and obtains second set
Mode can be not limited to above two, and other modes for screening out irregular quantized value are also applied for the embodiment of the present application.
S303, the quantized value in the second set, determine behavioural characteristic corresponding to the behavioural characteristic mark
Quantized value excursion;
In a kind of embodiment, step S303 can specifically include:According to quantized value in the second set
Maximum and minimum value, determine the first number range;By first number range, it is corresponding to be defined as the behavioural characteristic mark
Behavioural characteristic quantized value excursion.
In another embodiment, step S303 can specifically include:Build the quantized value in second set
Normal distribution model, it is determined that the quantized value of the center section of the normal distribution model is distributed in, and according to the center section
The maximum and minimum value of quantized value determine second value scope;By the second value scope, it is defined as the behavioural characteristic
The quantized value excursion of behavioural characteristic corresponding to mark.
S304, the quantized value excursion for accordingly storing the behavioural characteristic mark and the behavioural characteristic, with
To the behavioural characteristic storehouse.
, therefore, can be according to being actually needed further, since validated user may possess multiple different terminals simultaneously, pin
The one or more terminals possessed validated user perform above-mentioned steps S301 to S304 respectively, so that in behavioural characteristic storehouse, deposit
Contain the above-mentioned corresponding relation for different terminals.And/or according to being actually needed, left hand and the right hand point for validated user
Not Zhi Hang above-mentioned steps S301 to S304 so that in behavioural characteristic storehouse, be stored with the left hand for being directed to user respectively and the right hand
Above-mentioned corresponding relation.
It is conceivable that the behavioural characteristic established according to a kind of the embodiment of the present application offer behavioural characteristic storehouse method for building up
Storehouse, the situation of change of the quantized value of behavioural characteristic of the validated user when triggering pre-set business operation can be reflected exactly, be
It is follow-up to identify the corresponding relation with the quantized value of behavioural characteristic to user's according to the behavioural characteristic stored in behavior feature database
Identity carries out checking and had laid a good foundation, and is favorably improved the security of subscriber authentication.
With reference to practical application scene a kind of user identity based on user behavior feature is provided to the embodiment of the present application
Verification method illustrates.
Fig. 4 and Fig. 5 are refer to, Fig. 4 is a kind of user identity based on user behavior feature that the embodiment of the present application provides
The schematic flow sheet of verification method in actual applications.Fig. 5 is that one kind that the embodiment of the present application provides is based on user behavior feature
User ID authentication method system structure diagram in actual applications.As shown in Figure 4 and Figure 5, in actual applications, it is real
Three equipment can be included by applying the system of this method, and these three equipment are respectively:Corresponding to terminal 3, server 4 and pre-set business
Server 5.
In order to make it easy to understand, needing to illustrate in advance, in Fig. 4, diamond represents data, and rectangle frame represents and performs step
Suddenly.Specifically as shown in figure 4, this method may include steps of:
S401, user's operation:It can be specifically the slip that user to be verified makes triggering pre-set business operation in terminal 3
Operation such as operation and/or click, etc.;
S402, behavior are collected:It can be specifically the type that terminal 3 determines the pre-set business operation that user to be verified is triggered
Mark, and the behavioural characteristic obtained when user to be verified triggers pre-set business operation identifies and the quantized value A of behavioural characteristic, and
The mark of terminal 3;
S403, terminal 3 will include the type identification of identified pre-set business operation, behavioural characteristic identifies, behavior is special
The quantized value of sign and the first information of the mark of terminal 3 are sent to server 4;
Server 4 can be understood as being to provide the service of the software of the method for identifying ID or the provider of plug-in unit
Device.
S404 and S405, data preparation and statistics:Server 4 is arranged and counted to the first information, is therefrom extracted
The effectively letter of mark of type identification, behavioural characteristic mark, the quantized value of behavioural characteristic and terminal 3 that pre-set business operates etc. first
Breath;
S406, data analysis:Server 4 is according to the mark of terminal 3, the type identification and behavioural characteristic of pre-set business operation
Mark, in subordinate act feature database, obtain and the identifying of terminal 3, the type identification and behavioural characteristic mark of pre-set business operation
The quantized value excursion of the behavioural characteristic of validated user corresponding to knowledge;And the quantized value according to each behavioural characteristic and corresponding amount
Change the matching relationship of value changes scope, draw the result B.
S407, server 4 are sent the result B drawn as the second information to server 5 corresponding to pre-set business;
Wherein, pre-set business can be business corresponding to the operation of above-mentioned pre-set business.For example, pre-set business operation can
To be logged on the business operation of Net silver, corresponding pre-set business can be ebanking services.So server corresponding to pre-set business,
It then can be understood as providing the server of the provider of ebanking services.
S408, data preparation:Server 5 corresponding to pre-set business is carried out to the data content in the second information for receiving
Arrange, determine the second effective information;
Wherein, the second effective information, can be the result.
S409, data are won:Server 5 corresponding to pre-set business is won out above-mentioned second from the second information and effectively believed
Breath;
Server 5 corresponding to S410, pre-set business determines whether user to be verified is legal according to the second effective information, and
According to result is determined, step S411 is performed;
5 pairs of server corresponding to S411, pre-set business determines that result is shown.
Such a specific application scenarios of Net silver are logged in for example with user to be verified, step S411 can specifically be wrapped
Include:Server 5 corresponding to pre-set business determines that result is shown in Net silver login interface on pair, also, when determination result is
When user to be verified is illegal, prompt message as " login failure " can be shown;When it is determined that result is closed for user to be verified
During method, login interface can be skipped and switch to Net silver operation interface.For example, Net silver operation interface can be query interface,
Transfer accounts interface, payment interface etc..
Exemplarily given in Fig. 5 content performed by terminal 3, server 4 and server 5 corresponding to pre-set business and
Mutual interactive relation, substantially process is similar with the process shown in Fig. 4 for it, carries out brief description below.
In Figure 5, user to be verified interacts triggering pre-set business operation with terminal 3;Terminal 3 triggers according to user to be verified
Pre-set business operation carry out behavioural characteristic the data such as quantized value collection, and the data being collected into are sent to server 4.
After server 4 receives data, arranged, counted, and quantized value and the behavioural characteristic storehouse that the behavioural characteristic after counting will be arranged
The corresponding quantization value changes scope of middle storage is matched, and draws the result, and the result drawn is sent to default
Server 5 corresponding to business;Meanwhile server 4 is sending the result to server 5 corresponding to pre-set business, also needs
Cache management is carried out to the result;Further, since server 4 need it is corresponding with terminal 3 and pre-set business by network
Server 5 carries out data transmission, and therefore, network management is also carried out in server 4.Server 5 docks corresponding to pre-set business
The result received carries out data and wins and show.
Corresponding to above method embodiment, the embodiment of the present application additionally provides a kind of user's body based on user behavior feature
Part checking device, is illustrated below in conjunction with the accompanying drawings.
As indicated with 6, a kind of subscriber authentication device based on user behavior feature that the embodiment of the present application provides, can be with
Including:First acquisition module 601, the second acquisition module 602 and the first determining module 603.
First acquisition module 601, the quantization of behavioural characteristic when pre-set business operates is triggered for obtaining user to be verified
Value, determine the behavioural characteristic mark of the behavioural characteristic;
Wherein, the behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and
Click on behavioural characteristic, etc..
Second acquisition module 602, for being identified according to the behavioural characteristic, obtained and the behavior in subordinate act feature database
The quantized value excursion of behavioural characteristic corresponding to signature identification;
Wherein, the quantized value that behavioural characteristic mark and the behavioural characteristic of validated user are stored with the behavioural characteristic storehouse becomes
Change the corresponding relation of scope;
First determining module 603, for the quantized value according to the behavioural characteristic and the quantized value excursion got
Relation, determine the legitimacy of the user to be verified.
Above-mentioned first determining module 603, specifically it can be used for when the quantized value of the behavioural characteristic falls into the amount got
When changing value changes scope, or, when the behavioural characteristic quantized value and the difference of quantized value excursion that gets it is exhausted
When being less than five preset values to value, the user to be verified is defined as validated user.Wherein, the 5th preset value can be according to need
It is manually set.
In more detail, above-mentioned first determining module 603, specifically can be used for when obtain each behavioural characteristic it is each
When quantized value is each fallen within the quantized value excursion of corresponding behavioural characteristic, or, when the amount of each behavioural characteristic of acquisition
, will be described to be tested when change value is respectively less than corresponding five preset value with the absolute value of the difference of the quantized value excursion got
Card user is defined as validated user;Otherwise, the user to be verified is defined as disabled user.
Alternatively, in another embodiment, due in addition to the verification mode that the embodiment of the present application provides, generally going back
Ensure also to match using the username and password of account, could finally be verified, therefore, above-mentioned first determining module 603,
Specifically it can be used for when the quantized value of the behavioural characteristic falls into the quantized value excursion got, and the use to be verified
The username and password at family is verified, and the user to be verified is defined as into validated user.Or above-mentioned first determining module
603, it specifically can be used for the absolute value when the quantized value of the behavioural characteristic and the difference of the quantized value excursion got
During less than five preset values, and the username and password of the user to be verified is verified, and the user to be verified is determined
For validated user.
Due under same business operation, different user hold the posture of same terminal and operating habit be it is different,
This cause different user triggered in same terminal the behavioural characteristic of same business operation quantized value excursion it is also different, and
And it is not easy to be imitated, cracks.Therefore, a kind of user based on user behavior feature that the embodiment shown in the application Fig. 6 provides
Authentication means, the legitimacy of the user to be verified of triggering pre-set business operation can be identified exactly, improves user
The security of authentication.
Further, it is to be appreciated that when corresponding to the type of behavioural characteristic and/or the behavioural characteristic of each type obtained
When the type of quantized value is more, the subscriber authentication device based on user behavior feature of the embodiment of the present application offer cracks
Difficulty is bigger, and the result drawn is more accurate, can more improve the security of user identity identification.
Further, when operating different terminals using different hand due to validated user as previously described, obtained different behaviors
The quantized value excursion of behavioural characteristic corresponding to signature identification is different, therefore, alternatively, in a kind of specific embodiment party
In formula, a kind of subscriber authentication device based on user behavior feature that the embodiment of the present application provides can also include:
Second determining module, for being identified according to the behavioural characteristic, obtained and the behavior in subordinate act feature database
Before the quantized value excursion of behavioural characteristic corresponding to signature identification, determine when user to be verified triggers pre-set business operation with
Next or multiple parameters:The identifying of terminal used in the user to be verified, the mark of the hand of the user to be verified (are used
In distinguishing left hand or the right hand), the type identification of pre-set business operation;
Judge module, for judging to whether there is and one or more of parameters, Yi Jisuo in the behavioural characteristic storehouse
State the quantized value excursion of behavioural characteristic corresponding to behavioural characteristic mark;If it is, the second acquisition module 602 of triggering;Otherwise,
The user to be verified is directly defined as disabled user.
Also, corresponding, now the second acquisition module 602, specifically can be used for according to one or more of parameters with
Obtain and the behavioural characteristic identifies, in subordinate act feature database and identified with one or more of parameters and the behavioural characteristic
The quantized value excursion of corresponding behavioural characteristic;Wherein, be stored with the behavioural characteristic storehouse mark of hand, terminal iidentification,
The type identification of pre-set business operation, behavioural characteristic identify and the correspondence of the quantized value excursion of the behavioural characteristic of validated user
Relation.
It can be seen that the embodiment of the present application, except the quantized value according to the behavioural characteristic and the quantization value changes model got
Outside the relation enclosed, the mark of used terminal, mark of hand of user etc. when pre-set business operates also are triggered by user, from
Multiple dimensions judge the legitimacy of user, and therefore, the security of authentication is higher.It is if only right for example, in behavioural characteristic storehouse
Validated user should be stored when pre-set business operates, slip behavior 002 is being triggered by the right hand in the terminal that terminal iidentification is X
With the corresponding relation of corresponding quantized value excursion, then when getting user to be verified by left hand be X in terminal iidentification
Terminal on trigger pre-set business operation when, it is clear that be illegal, can directly determine that the user to be verified is illegal.
As shown in fig. 7, the embodiment of the present application, which additionally provides a kind of behavioural characteristic storehouse, establishes device, it is to be understood that should
Device is established in behavioural characteristic storehouse can also be referenced to a kind of user based on user behavior feature of the embodiment of the present application offer
In authentication means.Behavior feature database, which establishes device, can be included (it is also understood that the one of the embodiment of the present application offer
Subscriber authentication device of the kind based on user behavior feature can also include):3rd acquisition module 701, data processing module
702nd, excursion determining module 703 and feature database establish module 704.
3rd acquisition module 701, for obtaining the first set pre-saved, included in the first set:Legal use
The quantized value of behavioural characteristic during family triggering pre-set business operation identifies with corresponding behavioural characteristic;
Data processing module 702, for being screened to the quantized value in the first set, to obtain energy accurate characterization
The quantized value of the user characteristics of the validated user is added in second set;
Specifically, data processing module 702, specifically can be used for removing not advising in first set using preset algorithm
Then data, the quantized value of the user characteristics of validated user it can be added to obtaining described in accurate characterization in second set.It is so-called not
Regular data, it can be understood as be the difference larger quantization value with benchmark quantized value in first set.
Alternatively, temporal information caused by the quantized value of behavioural characteristic is also included in the first set, a kind of specific
In embodiment, the data processing module 702, it can include:
First reference value determination sub-module, for the quantized value in the first set, determine benchmark quantized value;Institute
Stating benchmark quantized value includes each quantized value in earliest quantized value of caused time in the first set or the first set
Average value;
First calculating sub module, for calculating in the first set each quantized value relative to the phase of the benchmark quantized value
To value;Wherein, the relative value is difference or ratio of each quantized value relative to the benchmark quantized value;
First data decimation submodule, meet the quantized value of the first preparatory condition in the first set for choosing, with
Quantized value as the user characteristics of energy accurate characterization validated user is added in second set;Wherein, first preparatory condition
Including:When the duration away from current time is less than default at the time of the relative value is less than the first preset value and/or quantized value generation
It is long.
It can be appreciated that this embodiment can screen out the irregular data in first set well, it is follow-up
The checking for carrying out user identity is laid a good foundation.
Alternatively, temporal information caused by the quantized value of behavioural characteristic is also included in the first set, has in another kind
In body embodiment, the data processing module 702, it can specifically include:
Sorting sub-module, for the sequencing according to the time caused by quantized value to the quantized value in the first set
It is ranked up;
Second a reference value determination sub-module, for by first quantized value in the first set after sequence, it is determined that
On the basis of quantized value;
Submodule is triggered, for circulating the second calculating sub module of triggering, the second data decimation submodule and a reference value renewal
Submodule, the quantized value in the first set after having traveled through sequence:
Second calculating sub module, for calculating relative value of the current quantisation value relative to benchmark quantized value;The phase
To being worth difference or ratio for current quantisation value relative to benchmark quantized value;
The second data decimation submodule, the current quantisation of the second preset value is less than for choosing the relative value
Value, added using the quantized value of the user characteristics as energy accurate characterization validated user in second set;
The a reference value updates submodule, for being added by the current quantisation value of selection in the second set
Afterwards, when the quantity of the quantized value currently preserved in the second set is more than or equal to predetermined number, the base is redefined
Quasi- quantized value;Wherein, redefining the benchmark quantized value includes, by each quantized value currently stored in the second set
Average value, as the benchmark quantized value after redefining.
It can not be accurately reflected it is also understood that another embodiment also can be screened out preferably in first set
The irregular data of validated user operating habit, have laid a good foundation, contribute to for the follow-up checking for carrying out user identity
Improve the accuracy of subscriber authentication.
It should be noted that in actual applications, screening is carried out to the quantized value in first set and obtains second set
Mode can be not limited to above two, and other modes for screening out irregular quantized value are also applied for the embodiment of the present application.
Excursion determining module 703, for the quantized value in the second set, determine the behavioural characteristic mark
The quantized value excursion of behavioural characteristic corresponding to knowledge;
In a kind of embodiment, the excursion determining module 703, specifically it can be used for according to described second
The maximum and minimum value of quantized value, determine the first number range in set;By first number range, it is defined as the row
It is characterized the quantized value excursion of behavioural characteristic corresponding to mark.
In another embodiment, the excursion determining module 703, it specifically can be used for the collection of structure second
The normal distribution model of quantized value in conjunction, it is determined that the quantized value of the center section of the normal distribution model is distributed in, and root
Second value scope is determined according to the maximum and minimum value of the quantized value of the center section;By the second value scope, it is determined that
For the quantized value excursion of behavioural characteristic corresponding to behavioural characteristic mark.
Feature database establishes module 704, for accordingly storing the amount of the behavioural characteristic mark and the behavioural characteristic
Change value changes scope, to obtain the behavioural characteristic storehouse.
, therefore, can be according to being actually needed further, since validated user may possess multiple different terminals simultaneously, pin
The one or more terminals possessed validated user trigger above-mentioned module 701 to 704 respectively, so that in behavioural characteristic storehouse, storage
There is the above-mentioned corresponding relation for different terminals.And/or according to being actually needed, left hand and right hand difference for validated user
Above-mentioned module 701 to 704 is triggered, so that in behavioural characteristic storehouse, is stored with the above-mentioned of the left hand for being directed to user respectively and the right hand
Corresponding relation.
It is conceivable that providing a kind of behavioural characteristic storehouse according to the embodiment of the present application establishes the behavioural characteristic that device is established
Storehouse, the situation of change of the quantized value of behavioural characteristic of the validated user when triggering pre-set business operation can be reflected exactly, be
It is follow-up to identify the corresponding relation with the quantized value of behavioural characteristic to user's according to the behavioural characteristic stored in behavior feature database
Identity carries out checking and had laid a good foundation, and is favorably improved the security of subscriber authentication.
Fig. 8 shows the structural representation for a kind of electronic equipment for being the embodiment of the present application offer.Fig. 8 is refer to, hard
Part aspect, the electronic equipment include processor, alternatively also include internal bus, network interface, memory.Wherein, memory
Internal memory, such as high-speed random access memory (Random-Access Memory, RAM) may be included, it is also possible to also including non-
Volatile memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, the electronic equipment may be used also
The hardware required for other business can be included.
Processor, network interface and memory can be connected with each other by internal bus, and the internal bus can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..For ease of representing, only represented in Fig. 8 with a four-headed arrow, it is not intended that an only bus or a type of
Bus.
Memory, for depositing program.Specifically, program can include program code, and described program code includes calculating
Machine operational order.Memory can include internal memory and nonvolatile memory, and provide instruction and data to processor.
Processor read from nonvolatile memory corresponding to computer program into internal memory then run, in logical layer
Network covering property characterization apparatus is formed on face.Processor, the program that memory is deposited is performed, and it is following specifically for performing
Operation:
The quantized value that user to be verified triggers behavioural characteristic when pre-set business operates is obtained, determines the behavioural characteristic
Behavioural characteristic identifies;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and
Click on behavioural characteristic;
Identified according to the behavioural characteristic, it is special that behavior corresponding with behavioural characteristic mark is obtained in subordinate act feature database
The quantized value excursion of sign;Wherein, behavioural characteristic mark is stored with the behavioural characteristic storehouse and the behavior of validated user is special
The corresponding relation of the quantized value excursion of sign;
According to the quantized value of the behavioural characteristic and the relation of the quantized value excursion got, determine described to be verified
The legitimacy of user.
The subscriber authentication device based on user behavior feature disclosed in the above-mentioned embodiment illustrated in fig. 8 such as the application performs
Method can apply in processor, or realized by processor.Processor is probably a kind of IC chip, has letter
Number disposal ability.In implementation process, each step of the above method can pass through the integration logic electricity of the hardware in processor
The instruction of road or software form is completed.Above-mentioned processor can be general processor, including central processing unit (Central
Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be Digital Signal Processing
Device (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated
Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other can
Programmed logic device, discrete gate or transistor logic, discrete hardware components.It can realize or perform the application implementation
Disclosed each method, step and logic diagram in example.General processor can be that microprocessor or the processor can also
It is any conventional processor etc..The step of method with reference to disclosed in the embodiment of the present application, can be embodied directly in hardware decoding
Computing device is completed, or performs completion with the hardware in decoding processor and software module combination.Software module can position
In random access memory, flash memory, read-only storage, programmable read only memory or electrically erasable programmable memory, register
Deng in the ripe storage medium in this area.The storage medium is located at memory, and processor reads the information in memory, with reference to it
Hardware completes the step of above method.
The embodiment of the present application also proposed a kind of computer-readable recording medium, the computer-readable recording medium storage one
Individual or multiple programs, one or more programs include instruction, and the instruction is held when the electronic equipment for being included multiple application programs
During row, the electronic equipment can be made to perform the subscriber authentication device based on user behavior feature in embodiment illustrated in fig. 8 and held
Capable method, and specifically for performing:
The quantized value that user to be verified triggers behavioural characteristic when pre-set business operates is obtained, determines the behavioural characteristic
Behavioural characteristic identifies;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and
Click on behavioural characteristic;
Identified according to the behavioural characteristic, it is special that behavior corresponding with behavioural characteristic mark is obtained in subordinate act feature database
The quantized value excursion of sign;Wherein, behavioural characteristic mark is stored with the behavioural characteristic storehouse and the behavior of validated user is special
The corresponding relation of the quantized value excursion of sign;
According to the quantized value of the behavioural characteristic and the relation of the quantized value excursion got, determine described to be verified
The legitimacy of user.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the application can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
It should be noted that each embodiment in the application is described by the way of related, between each embodiment
Identical similar part is mutually referring to what each embodiment stressed is the difference with other embodiment.Especially
Its, for device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part
Illustrate referring to the part of embodiment of the method.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping
Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element
Other identical element in process, method, commodity or equipment also be present.
Embodiments herein is these are only, is not limited to the application.To those skilled in the art,
The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution,
Improve etc., it should be included within the scope of claims hereof.
Claims (14)
1. a kind of user ID authentication method based on user behavior feature, it is characterised in that methods described includes:
The first set pre-saved is obtained, is included in the first set:Row during validated user triggering pre-set business operation
The quantized value being characterized identifies with corresponding behavioural characteristic;
According to the quantized value in the first set, benchmark quantized value is determined;The benchmark quantized value includes the first set
In in earliest quantized value of caused time or the first set each quantized value average value;
Each quantized value is calculated in the first set relative to the relative value of the benchmark quantized value;Wherein, the relative value is
Each quantized value relative to the benchmark quantized value difference or ratio;
The quantized value for meeting the first preparatory condition in the first set is chosen, using the user as energy accurate characterization validated user
The quantized value of feature is added in second set;Wherein, first preparatory condition includes:The relative value is less than the first preset value
And/or the duration away from current time is less than preset duration at the time of quantized value generation;
According to the quantized value in the second set, the quantization value changes of behavioural characteristic corresponding to the behavioural characteristic mark are determined
Scope;
The quantized value excursion of the behavioural characteristic mark and the behavioural characteristic is accordingly stored, to obtain behavioural characteristic
Storehouse;
The quantized value that user to be verified triggers behavioural characteristic when pre-set business operates is obtained, determines the behavior of the behavioural characteristic
Signature identification;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and click
Behavioural characteristic;
Identify according to the behavioural characteristic, obtained and the corresponding behavioural characteristic of behavioural characteristic mark in subordinate act feature database
Quantized value excursion;Wherein, behavioural characteristic mark and the behavioural characteristic of validated user are stored with the behavioural characteristic storehouse
The corresponding relation of quantized value excursion;
According to the quantized value of the behavioural characteristic and the relation of the quantized value excursion got, the user to be verified is determined
Legitimacy.
2. a kind of user ID authentication method based on user behavior feature, it is characterised in that methods described includes:
The first set pre-saved is obtained, is included in the first set:Row during validated user triggering pre-set business operation
The quantized value being characterized identifies with corresponding behavioural characteristic;
The quantized value in the first set is ranked up according to the sequencing of time caused by quantized value;
By first quantized value in the first set after sequence, it is defined as benchmark quantized value;
Circulation performs given step, until the quantized value in the first set after having traveled through sequence;The given step bag
Include:Calculate relative value of the current quantisation value relative to benchmark quantized value;The relative value is current quantisation value relative to datum quantity
The difference or ratio of change value;The current quantisation value that the relative value is less than the second preset value is chosen, to be used as the accurate table of energy
The quantized value for levying the user characteristics of validated user is added in second set;The current quantisation value of selection is being added described the
After in two set, when the quantity of the quantized value currently preserved in the second set is more than or equal to the first predetermined number, institute
Stating given step also includes:Redefine the benchmark quantized value;Wherein, redefining the benchmark quantized value includes, by institute
The border for the touch area that each quantized value currently stored in second set limits is stated, is quantified as the benchmark after redefining
Value;
According to the quantized value in the second set, the quantization value changes of behavioural characteristic corresponding to the behavioural characteristic mark are determined
Scope;
The quantized value excursion of the behavioural characteristic mark and the behavioural characteristic is accordingly stored, to obtain behavioural characteristic
Storehouse;
The quantized value that user to be verified triggers behavioural characteristic when pre-set business operates is obtained, determines the behavior of the behavioural characteristic
Signature identification;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and click
Behavioural characteristic;
Identify according to the behavioural characteristic, obtained and the corresponding behavioural characteristic of behavioural characteristic mark in subordinate act feature database
Quantized value excursion;Wherein, behavioural characteristic mark and the behavioural characteristic of validated user are stored with the behavioural characteristic storehouse
The corresponding relation of quantized value excursion;
According to the quantized value of the behavioural characteristic and the relation of the quantized value excursion got, the user to be verified is determined
Legitimacy.
3. a kind of user ID authentication method based on user behavior feature, it is characterised in that methods described includes:
The quantized value that user to be verified triggers behavioural characteristic when pre-set business operates is obtained, determines the behavior of the behavioural characteristic
Signature identification;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic, slide behavioural characteristic and click
Behavioural characteristic;
Identify according to the behavioural characteristic, obtained and the corresponding behavioural characteristic of behavioural characteristic mark in subordinate act feature database
Quantized value excursion;Wherein, behavioural characteristic mark and the behavioural characteristic of validated user are stored with the behavioural characteristic storehouse
The corresponding relation of quantized value excursion;
According to the quantized value of the behavioural characteristic and the relation of the quantized value excursion got, the user to be verified is determined
Legitimacy.
4. according to the method for claim 3, it is characterised in that the process of establishing in the behavioural characteristic storehouse includes:
The first set pre-saved is obtained, is included in the first set:Row during validated user triggering pre-set business operation
The quantized value being characterized identifies with corresponding behavioural characteristic;
Quantized value in the first set is screened, to obtain the user characteristics of validated user described in energy accurate characterization
Quantized value is added in second set;
According to the quantized value in the second set, the quantization value changes of behavioural characteristic corresponding to the behavioural characteristic mark are determined
Scope;
The quantized value excursion of the behavioural characteristic mark and the behavioural characteristic is accordingly stored, to obtain the behavior
Feature database.
5. according to the method for claim 4, it is characterised in that also include the quantized value of behavioural characteristic in the first set
Caused temporal information;
The quantized value in the first set screens, special to obtain the user of validated user described in energy accurate characterization
The quantized value of sign is added in second set, including:
According to the quantized value in the first set, benchmark quantized value is determined;The benchmark quantized value includes the first set
In in earliest quantized value of caused time or the first set each quantized value average value;
Each quantized value is calculated in the first set relative to the relative value of the benchmark quantized value;Wherein, the relative value is
Each quantized value relative to the benchmark quantized value difference or ratio;
The quantized value for meeting the first preparatory condition in the first set is chosen, using the user as energy accurate characterization validated user
The quantized value of feature is added in second set;Wherein, first preparatory condition includes:The relative value is less than the first preset value
And/or the duration away from current time is less than preset duration at the time of quantized value generation.
6. according to the method for claim 4, it is characterised in that also include the quantized value of behavioural characteristic in the first set
Caused temporal information;
The quantized value in the first set screens, special to obtain the user of validated user described in energy accurate characterization
The quantized value of sign is added in second set, including:
The quantized value in the first set is ranked up according to the sequencing of time caused by quantized value;
By first quantized value in the first set after sequence, it is defined as benchmark quantized value;
Circulation performs given step, until the quantized value in the first set after having traveled through sequence;The given step bag
Include:
Calculate relative value of the current quantisation value relative to benchmark quantized value;The relative value is current quantisation value relative to datum quantity
The difference or ratio of change value;
The current quantisation value that the relative value is less than the second preset value is chosen, using the use as energy accurate characterization validated user
The quantized value of family feature is added in second set;
After the current quantisation value of selection is added in the second set, when the amount currently preserved in the second set
When the quantity of change value is more than or equal to the first predetermined number, the given step also includes:Redefine the benchmark quantized value;
Wherein, redefining the benchmark quantized value includes, the touch that each quantized value currently stored in the second set is limited
The border in region, as the benchmark quantized value after redefining.
7. according to the method described in claim any one of 4-6, it is characterised in that the quantization in the second set
Value, the quantized value excursion of behavioural characteristic corresponding to the behavioural characteristic mark is determined, including:
According to the maximum and minimum value of quantized value in the second set, the first number range is determined;By first numerical value
Scope, it is defined as the quantized value excursion of behavioural characteristic corresponding to the behavioural characteristic mark.
8. according to the method for claim 1, it is characterised in that
The quantized value of the gyroscope fluctuation behavioural characteristic includes:The magnitude of angular velocity being calculated according to gyroscope fluctuation data;
The quantized value for sliding behavioural characteristic includes:The terminal of sliding trace is relative to the abscissa offset of starting point and vertical
One or more in coordinate offset amount, sliding distance and sliding speed;
The quantized value for clicking on behavioural characteristic includes:Coordinate value corresponding to click location.
9. according to the method for claim 1, it is characterised in that according to the quantized value of the behavioural characteristic and the amount got
Change the relation of value changes scope, determine the legitimacy of the user to be verified, including:
When the quantized value of the behavioural characteristic falls into the quantized value excursion got, or, when the behavioural characteristic
When the absolute value of the difference of quantized value and the quantized value excursion got is less than five preset values, by the user to be verified
It is defined as validated user.
10. a kind of behavioural characteristic storehouse method for building up, it is characterised in that methods described includes:
The first set pre-saved is obtained, is included in the first set:Row during validated user triggering pre-set business operation
The quantized value being characterized identifies with corresponding behavioural characteristic;
Quantized value in the first set is screened, to obtain the user characteristics of validated user described in energy accurate characterization
Quantized value is added in second set;
According to the quantized value in the second set, the quantization value changes of behavioural characteristic corresponding to the behavioural characteristic mark are determined
Scope;
The quantized value excursion of the behavioural characteristic mark and the behavioural characteristic is accordingly stored, to obtain the behavior
Feature database.
11. a kind of subscriber authentication device based on user behavior feature, it is characterised in that described device includes:
3rd acquisition module, for obtaining the first set pre-saved, included in the first set:Validated user triggering is pre-
If the quantized value of behavioural characteristic during business operation identifies with corresponding behavioural characteristic;
First reference value determination sub-module, for the quantized value in the first set, determine benchmark quantized value;The base
Quasi- quantized value includes in the first set the flat of each quantized value in earliest quantized value of caused time or the first set
Average;
First calculating sub module, for calculating in the first set each quantized value relative to the relative of the benchmark quantized value
Value;Wherein, the relative value is difference or ratio of each quantized value relative to the benchmark quantized value;
First data decimation submodule, meet the quantized value of the first preparatory condition in the first set for choosing, using as
The quantized value of the user characteristics of energy accurate characterization validated user is added in second set;Wherein, first preparatory condition includes:
The duration away from current time is less than preset duration at the time of the relative value is less than the first preset value and/or quantized value generation;
Excursion determining module, for the quantized value in the second set, determine that the behavioural characteristic mark is corresponding
Behavioural characteristic quantized value excursion;
Feature database establishes module, for accordingly storing the quantization value changes of the behavioural characteristic mark and the behavioural characteristic
Scope, to obtain behavioural characteristic storehouse;
First acquisition module, the quantized value of behavioural characteristic when pre-set business operates is triggered for obtaining user to be verified, it is determined that
The behavioural characteristic mark of the behavioural characteristic;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic,
Slide behavioural characteristic and click on behavioural characteristic;
Second acquisition module, for being identified according to the behavioural characteristic, obtained and the behavioural characteristic mark in subordinate act feature database
The quantized value excursion of behavioural characteristic corresponding to knowledge;Wherein, behavioural characteristic mark is stored with the behavioural characteristic storehouse and is closed
The corresponding relation of the quantized value excursion of the behavioural characteristic of method user;
First determining module, for the quantized value according to the behavioural characteristic and the relation of quantized value excursion got,
Determine the legitimacy of the user to be verified.
12. a kind of subscriber authentication device based on user behavior feature, it is characterised in that described device includes:
3rd acquisition module, for obtaining the first set pre-saved, included in the first set:Validated user triggering is pre-
If the quantized value of behavioural characteristic during business operation identifies with corresponding behavioural characteristic;
Sorting sub-module, the quantized value in the first set is carried out for the sequencing according to the time caused by quantized value
Sequence;
Second a reference value determination sub-module, for by first quantized value in the first set after sequence, being defined as base
Quasi- quantized value;
Submodule is triggered, for circulating the second calculating sub module of triggering, the second data decimation submodule and a reference value renewal submodule
Block, the quantized value in the first set after having traveled through sequence:
Second calculating sub module, for calculating relative value of the current quantisation value relative to benchmark quantized value;The relative value
Difference or ratio for current quantisation value relative to benchmark quantized value;
The second data decimation submodule, the current quantisation value of the second preset value is less than for choosing the relative value,
Added using the quantized value of the user characteristics as energy accurate characterization validated user in second set;
The a reference value updates submodule, for being more than or equal to when the quantity of the quantized value currently preserved in the second set
During predetermined number, the benchmark quantized value is redefined;Wherein, redefining the benchmark quantized value includes, by described second
The average value of currently stored each quantized value in set, as the benchmark quantized value after redefining;
Excursion determining module, for the quantized value in the second set, determine that the behavioural characteristic mark is corresponding
Behavioural characteristic quantized value excursion;
Feature database establishes module, for accordingly storing the quantization value changes of the behavioural characteristic mark and the behavioural characteristic
Scope, obtain behavioural characteristic storehouse;
First acquisition module, the quantized value of behavioural characteristic when pre-set business operates is triggered for obtaining user to be verified, it is determined that
The behavioural characteristic mark of the behavioural characteristic;The behavioural characteristic includes one or more of:Gyroscope fluctuation behavioural characteristic,
Slide behavioural characteristic and click on behavioural characteristic;
Second acquisition module, for being identified according to the behavioural characteristic, obtained and the behavioural characteristic mark in subordinate act feature database
The quantized value excursion of behavioural characteristic corresponding to knowledge;Wherein, behavioural characteristic mark is stored with the behavioural characteristic storehouse and is closed
The corresponding relation of the quantized value excursion of the behavioural characteristic of method user;
First determining module, for the quantized value according to the behavioural characteristic and the relation of quantized value excursion got,
Determine the legitimacy of the user to be verified.
13. a kind of subscriber authentication device based on user behavior feature, it is characterised in that described device includes:
First acquisition module, the quantized value of behavioural characteristic when pre-set business operates is triggered for obtaining user to be verified, it is determined that
The behavioural characteristic mark of the behavioural characteristic;Wherein, the behavioural characteristic includes one or more of:Gyroscope fluctuates behavior
Feature, slide behavioural characteristic and click on behavioural characteristic;
Second acquisition module, for being identified according to the behavioural characteristic, obtained and the behavioural characteristic mark in subordinate act feature database
The quantized value excursion of behavioural characteristic corresponding to knowledge;Wherein, behavioural characteristic mark is stored with the behavioural characteristic storehouse and is closed
The corresponding relation of the quantized value excursion of the behavioural characteristic of method user;
First determining module, for the quantized value according to the behavioural characteristic and the relation of quantized value excursion got,
Determine the legitimacy of the user to be verified.
14. device is established in a kind of behavioural characteristic storehouse, it is characterised in that including:
3rd acquisition module, for obtaining the first set pre-saved, included in the first set:Validated user triggering is pre-
If the quantized value of behavioural characteristic during business operation identifies with corresponding behavioural characteristic;
Data processing module, the quantized value in the first set is screened, to obtain legal use described in energy accurate characterization
The quantized value of the user characteristics at family is added in second set;
Excursion determining module, for the quantized value in the second set, determine that the behavioural characteristic mark is corresponding
Behavioural characteristic quantized value excursion;
Feature database establishes module, for accordingly storing the quantization value changes of the behavioural characteristic mark and the behavioural characteristic
Scope, to obtain the behavioural characteristic storehouse.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710940479.0A CN107623696B (en) | 2017-09-30 | 2017-09-30 | User identity verification method and device based on user behavior characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710940479.0A CN107623696B (en) | 2017-09-30 | 2017-09-30 | User identity verification method and device based on user behavior characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107623696A true CN107623696A (en) | 2018-01-23 |
CN107623696B CN107623696B (en) | 2020-11-24 |
Family
ID=61091233
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710940479.0A Active CN107623696B (en) | 2017-09-30 | 2017-09-30 | User identity verification method and device based on user behavior characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107623696B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019148815A1 (en) * | 2018-02-05 | 2019-08-08 | Beijing Elex Technology Co., Ltd | Method and apparatus for identity authentication, server and computer readable medium |
CN112492090A (en) * | 2020-11-27 | 2021-03-12 | 南京航空航天大学 | Continuous identity authentication method fusing sliding track and dynamic characteristics on smart phone |
CN112784224A (en) * | 2019-11-08 | 2021-05-11 | 中国电信股份有限公司 | Terminal safety protection method, device and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070236330A1 (en) * | 2006-04-06 | 2007-10-11 | Sungzoon Cho | System and method for performing user authentication based on user behavior patterns |
JP2009175984A (en) * | 2008-01-23 | 2009-08-06 | Nippon Telegr & Teleph Corp <Ntt> | Principal authentication device, principal authentication method and principal authentication program |
CN103927471A (en) * | 2014-04-18 | 2014-07-16 | 电子科技大学 | Authentication method and device |
CN104301286A (en) * | 2013-07-15 | 2015-01-21 | 中国移动通信集团黑龙江有限公司 | User login authentication method and device |
CN104318138A (en) * | 2014-09-30 | 2015-01-28 | 杭州同盾科技有限公司 | Method and device for verifying identity of user |
CN105844123A (en) * | 2015-01-14 | 2016-08-10 | 中兴通讯股份有限公司 | Method and device for identity authentication on terminal, and terminal |
CN106022030A (en) * | 2016-06-30 | 2016-10-12 | 深圳卡通新技术有限公司 | Identity authentication system and method based on user habit behavior features |
JP2017134750A (en) * | 2016-01-29 | 2017-08-03 | ヤフー株式会社 | Authentication device, authentication method and authentication program |
-
2017
- 2017-09-30 CN CN201710940479.0A patent/CN107623696B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070236330A1 (en) * | 2006-04-06 | 2007-10-11 | Sungzoon Cho | System and method for performing user authentication based on user behavior patterns |
JP2009175984A (en) * | 2008-01-23 | 2009-08-06 | Nippon Telegr & Teleph Corp <Ntt> | Principal authentication device, principal authentication method and principal authentication program |
CN104301286A (en) * | 2013-07-15 | 2015-01-21 | 中国移动通信集团黑龙江有限公司 | User login authentication method and device |
CN103927471A (en) * | 2014-04-18 | 2014-07-16 | 电子科技大学 | Authentication method and device |
CN104318138A (en) * | 2014-09-30 | 2015-01-28 | 杭州同盾科技有限公司 | Method and device for verifying identity of user |
CN105844123A (en) * | 2015-01-14 | 2016-08-10 | 中兴通讯股份有限公司 | Method and device for identity authentication on terminal, and terminal |
JP2017134750A (en) * | 2016-01-29 | 2017-08-03 | ヤフー株式会社 | Authentication device, authentication method and authentication program |
CN106022030A (en) * | 2016-06-30 | 2016-10-12 | 深圳卡通新技术有限公司 | Identity authentication system and method based on user habit behavior features |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019148815A1 (en) * | 2018-02-05 | 2019-08-08 | Beijing Elex Technology Co., Ltd | Method and apparatus for identity authentication, server and computer readable medium |
CN110120928A (en) * | 2018-02-05 | 2019-08-13 | 北京智明星通科技股份有限公司 | A kind of identity authentication method, device, server and computer-readable medium |
US11429698B2 (en) | 2018-02-05 | 2022-08-30 | Beijing Elex Technology Co., Ltd. | Method and apparatus for identity authentication, server and computer readable medium |
CN112784224A (en) * | 2019-11-08 | 2021-05-11 | 中国电信股份有限公司 | Terminal safety protection method, device and system |
CN112784224B (en) * | 2019-11-08 | 2024-01-30 | 中国电信股份有限公司 | Terminal safety protection method, device and system |
CN112492090A (en) * | 2020-11-27 | 2021-03-12 | 南京航空航天大学 | Continuous identity authentication method fusing sliding track and dynamic characteristics on smart phone |
Also Published As
Publication number | Publication date |
---|---|
CN107623696B (en) | 2020-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107657156A (en) | User ID authentication method and device based on user operation habits and contact pressure area | |
CN107632722A (en) | A kind of various dimensions user ID authentication method and device | |
CN107612922A (en) | User ID authentication method and device based on user operation habits and geographical position | |
EP2748781B1 (en) | Multi-factor identity fingerprinting with user behavior | |
CN107451819A (en) | A kind of auth method and device based on user's operation behavior feature | |
CN108540431A (en) | The recognition methods of account type, device and system | |
WO2020211247A1 (en) | Account information login method and device, computer device and computer storage medium | |
CN104320375B (en) | A kind of method and apparatus for preventing from illegally registering | |
CN105100029B (en) | The method and apparatus that authentication is carried out to user | |
CN107784504B (en) | Method for generating return visit event of client and terminal equipment | |
CN107623696A (en) | A kind of user ID authentication method and device based on user behavior feature | |
CN106027520A (en) | Method and device for detecting and processing stealing of website accounts | |
CN106372977B (en) | A kind of processing method and equipment of virtual account | |
CN109547426A (en) | Service response method and server | |
CN109559215A (en) | Business datum accounting method, device, equipment and computer readable storage medium | |
CN107516218A (en) | A kind of user ID authentication method and device based on multiple features | |
CN109582668A (en) | Service data management method, device, equipment and computer readable storage medium | |
CN110930161A (en) | Method for determining operation time of business operation and self-service business operation equipment | |
CN107679383B (en) | Identity verification method and device based on geographic position and touch area | |
CN110224851A (en) | Merging method, device, computer equipment and the computer storage medium of account information | |
CN109670929A (en) | Control method, device, equipment and the computer readable storage medium of loan early warning | |
CN110992139B (en) | Bidding price realizing method and related product | |
CN108399266A (en) | Data pick-up method, apparatus, electronic equipment and computer readable storage medium | |
WO2018166142A1 (en) | Authentication processing method and apparatus | |
CN107679865B (en) | Identity verification method and device based on touch area |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |