CN108712413A - A kind of method and apparatus of authentication - Google Patents

A kind of method and apparatus of authentication Download PDF

Info

Publication number
CN108712413A
CN108712413A CN201810461586.XA CN201810461586A CN108712413A CN 108712413 A CN108712413 A CN 108712413A CN 201810461586 A CN201810461586 A CN 201810461586A CN 108712413 A CN108712413 A CN 108712413A
Authority
CN
China
Prior art keywords
user
information
identity
intended application
historical behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810461586.XA
Other languages
Chinese (zh)
Other versions
CN108712413B (en
Inventor
陈晓磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201810461586.XA priority Critical patent/CN108712413B/en
Publication of CN108712413A publication Critical patent/CN108712413A/en
Application granted granted Critical
Publication of CN108712413B publication Critical patent/CN108712413B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The purpose of the application is to provide a kind of method and apparatus of authentication, and the historical behavior information for the user that the application is got by basis determines the identity msu message of the user;The identity msu message is sent to the user equipment of the user, and receives the authentication information for carrying out verification generation to the identity msu message returned by the user equipment;The authentication information is verified, when being verified, the feedback information of log-on message is sent to the user equipment.By analyzing automatically user's history behavior, and output verification information carries out subscriber identity information certification for user, not only simple but also efficient, and is participated in without artificial, is conducive to user and service provider.

Description

A kind of method and apparatus of authentication
Technical field
This application involves computer realm more particularly to a kind of method and apparatus of authentication.
Background technology
With the development of development of Mobile Internet technology, application program is installed by mobile terminal devices such as mobile phones and is become as development One of gesture, in order to ensure that the safety of terminal user's related data, application server limit each user after registering Corresponding program could be accessed, in registration user setting user's name and password is accessed, needs to input user name when logging on Progress password is needed to give for change if user forgets login password or replaces using terminal with access password.Currently, some passwords It gives for change and generally passes through following steps:Cell-phone number is given for change, instant messaging application is given for change, mailbox is given for change, and in some cases, such as A applications are that login is directly registered by cell-phone number, and unbound any other information of association, at this point, if cellphone changing number or Person's mobile phone is lost, then can not carry out password through the above way and give for change, then can not log in A applications;Some applications can then pass through people Work appeals approach to solve the above problems, but either for service provider or user, and artificial cost of appealing is higher, For a user, it needs to fill in a pile data, or upload ID card information etc., one side information solicitation is more troublesome, separately On the one hand the ID card information of user can be exposed;For service provider, full-time staff to be arranged to carry out complaint material Audit, cost of labor expense are larger.
Invention content
The purpose of the application is to provide a kind of method and apparatus of authentication, solves in the prior art by artificial The cost of labor expense that complaint approach is brought is larger, and the problem of password is given for change is revealed and cannot be carried out to user information.
According to the one side of the application, a kind of method in the authentication of network equipment end is provided, this method includes:
The identity msu message of the user is determined according to the historical behavior information of the user got;
The identity msu message is sent to the user equipment of the user, and receives and to be returned by the user equipment The authentication information of verification generation is carried out to the identity msu message;
The authentication information is verified, when being verified, the anti-of log-on message is sent to the user equipment Feedforward information.
Further, the historical behavior information of the user includes:History row of the user in the intended application The historical behavior information for being information and/or the user in the associated application of the intended application.
Further, the identity msu message of the user is determined according to the historical behavior information of the user got, is wrapped It includes:
The identity audit of the user is determined according to the type of the historical behavior information of the user got and intended application Information.
Further, the identity msu message of the user is determined according to the historical behavior information of the user got, is wrapped It includes:
Using duration and make according in historical behavior information of the user in the associated application of the intended application The degree of association between the associated application and the intended application is determined with frequency;
According to historical behavior information of the user in the intended application, the historical behavior in the associated application Information and the degree of association determine the identity msu message of the user.
Further, the identity msu message of the user is determined according to the historical behavior information of the user got, is wrapped It includes:
When logging in the intended application from one or more users according to the historical behavior information of the user got Login position in choose target log in position;
The identity msu message that position determines the user is logged according to the target.
Further, the feedback information of the log-on message includes:
For logging in described in the original password of the intended application, the reset information of the password of target reference and permission User logs in the clearance information of the intended application.
Further, the identity msu message includes:Asked questions for being putd question to the user, wherein The asked questions include:First rights concerns and the second rights concerns.
Further, the method includes:
The secret weight of first rights concerns is set according to the secret degree of first rights concerns.
Further, the authentication information includes the user to the close guarantor answer of first rights concerns and institute The close guarantor for stating the second rights concerns answers, wherein the authentication information is authenticated, including:
According to the user to the close guarantor answer of multiple first rights concerns and its corresponding secret weight and/or to described The close guarantor of second rights concerns, which answers, judges whether the authentication information is legal.
On the other hand according to the application, a kind of method in the authentication of user equipment end, this method packet are additionally provided It includes:
User is logged in into the logging request of intended application or gives the request hair of the password for logging in the intended application for change It send to the network equipment;
The identity msu message of the user of network equipment transmission is verified, authentication information is generated, Wherein, the identity msu message of the user is determined by the network equipment according to the historical behavior information of the user;
The authentication information is back to the network equipment to be verified to the authentication information, is received The feedback information for the log-on message that the network equipment is sent.
Further, the feedback information of the log-on message includes:Original password, institute for logging in the intended application It states the reset information of the password of target reference and the user is allowed to log in the clearance information of the intended application.
Further, the identity msu message includes:Asked questions for being putd question to the user, wherein The asked questions include:First rights concerns and the second rights concerns.
Further, the identity msu message of the user sent to the network equipment is verified, and identity is generated Verification information, including:
The first rights concerns after second rights concerns and setting secret weight that are sent according to the network equipment, It includes the close authentication information protected and answered to generate.
According to the application another aspect, a kind of computer-readable medium is additionally provided, is stored thereon with computer-readable Instruction, the computer-readable instruction can be executed by processor to realize the aforementioned method.
On the other hand according to the application, a kind of network equipment of authentication is additionally provided, wherein the network equipment packet It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed Execute a kind of operation of method in the authentication of network equipment end as described in aforementioned.
On the other hand according to the application, a kind of user equipment of authentication is additionally provided, wherein the user equipment packet It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed Execute a kind of operation of method in the authentication of user equipment end as described in aforementioned.
Compared with prior art, the application according to the historical behavior information of the user got by determining the user's Identity msu message;The identity msu message is sent to the user equipment of the user, and is received by the user equipment What is returned carries out the identity msu message authentication information of verification generation;The authentication information is tested Card sends the feedback information of log-on message to the user equipment when being verified.By being carried out automatically to user's history behavior Analysis, and output verification information carries out subscriber identity information certification for user, it is not only simple but also efficient, and participated in without artificial, Be conducive to user and service provider.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of in the method flow of network equipment end authentication to be shown according to what the one side of the application provided It is intended to;
Fig. 2 shows additionally provide a kind of method flow in the authentication of user equipment end on the other hand according to the application Schematic diagram.
Same or analogous reference numeral represents same or analogous component in attached drawing.
Specific implementation mode
The application is described in further detail below in conjunction with the accompanying drawings.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, magnetic tape disk storage or other magnetic storage apparatus or Any other non-transmission medium can be used for storage and can be accessed by a computing device information.As defined in this article, computer Readable medium does not include non-temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Fig. 1 shows a kind of in the method flow of network equipment end authentication to be shown according to what the one side of the application provided It is intended to, this method includes:Step S11~step S13, wherein in step s 11, according to the historical behavior of the user got Information determines the identity msu message of the user;In step s 12, the identity msu message is sent to the user's User equipment, and receive and believed by the authentication for carrying out verification generation to the identity msu message that the user equipment returns Breath;In step s 13, the authentication information is verified, when being verified, is sent to the user equipment and log in letter The feedback information of breath.Not only simple but also efficient, and participated in without artificial, be conducive to user and service provider.
Specifically, in step s 11, determine that the identity of the user is examined according to the historical behavior information of the user got Nuclear information;Here, the historical behavior information of the user includes:Historical behavior information of the user in the intended application And/or historical behavior information of the user in the associated application of the intended application, such as user using intended application into The historical behaviors information such as row shopping, browsing information, friend-making chat, the identity msu message of the user are the history for user What behavioural information determined, for example user is putd question to about information such as user's history shopping environment, good friend's situations, with to user Identity is audited.The associated application of intended application license to intended application so that the user by the account of intended application just Associated application can be logged in, when the password for carrying out intended application is given for change, collects history row of the user in the associated application For information, for example, when needing to give the password using A for change, identity msu message is in addition to including history row of the user in application A For, further include by application A log in other application.To improve the safety of identity msu message, user is more directed to Property.
Specifically, in step s 12, the identity msu message is sent to the user equipment of the user, and received The authentication information that verification generation is carried out to the identity msu message returned by the user equipment;Here, by basis The identity msu message that historical behavior information of the user in application generates is sent to user equipment, so that user is to the identity Msu message carries out audit and generates authentication information.For example, being generated for the historical behavior information in the application of user several Asked questions, using user to the answer of each asked questions as authentication information.Then, in step s 13, to the body Part verification information is verified, and when being verified, the feedback information of log-on message is sent to the user equipment.Here, to Family is verified about the answer of asked questions, judges whether that clearance user or original password give for change, reset password etc., work as verification By when, the feedback information of log-on message is sent to user equipment, wherein the feedback information of the log-on message include be used for It logs in described in the original password of the intended application, the reset information of the password of the intended application and permission user's login The clearance information of intended application.
In one embodiment of the application, when determining the identity msu message of the user in step s 11, root can be passed through The identity msu message of the user is determined according to the historical behavior information of the user got and the type of intended application.Here, The type of intended application is different, and the behavioural information emphasis chosen from the historical behavior information of user is different, for example, intended application Type be shopping class, then the chat content in historical behavior information (such as with businessman's) carry out generation user not as emphasis Identity msu message, but carried out generating identity msu message according to the history shopping environment of user, for example history bought Article, the article etc. bought recently;And be instant messaging class for the type of intended application, it can be according to chat content, intimate Identity msu message is arranged in the information such as good friend, and the type for intended application is game class, the trip that can be used according to user's history The setting identity msu messages such as play role, game good friend.
In one embodiment of the application, in step s 11, can also according to the user the intended application association Being determined between the associated application and the intended application using duration and frequency of use in the historical behavior information in The degree of association;According to historical behavior information of the user in the intended application, the history row in the associated application The identity msu message of the user is determined for information and the degree of association.Here, the user uses the account of intended application Associated application is logged in, determines that user carries out login associated application using the account of intended application from the historical behavior information of user Frequency, determine using information such as durations the degree of association of associated application and intended application, determined further according to the degree of association and use user The historical behavior information of historical behavior information and use in associated application in intended application generates identity msu message Proportion determines quantity shared in the asked questions quantity of each comfortable identity msu message, and then generates about going through in target The identity msu message of the user of historical behavior information in history behavioural information and associated application.For example, determining associated application Association between intended application is more frequent, and the degree of association is higher, then it is 0.5 that the corresponding weight of associated application, which can be arranged, target It is 0.5 using corresponding weight, when being configured identity msu message, 10 asked questions is such as set, then 5 is that basis is being closed What the historical behavior information in connection application generated, 5 are generated according to the historical behavior information in intended application.
In one embodiment of the application, in step s 11, can also according to the historical behavior information of user got from Target, which is chosen, in login position when one or more users log in the intended application logs in position;According to described Target logs in the identity msu message that position determines the user.Here, the historical behavior according to user in intended application Information or the historical behavior information in associated application determine login location information when the activity of the user is relatively high, can be with Determine the target location letter that access times are most in login location information when one or more liveness are relatively high Breath can generate identity msu message for the target position information according to corresponding ambient condition information, or by the target position Confidence ceases location information unrelated with other and is used as puing question to user, and user is allowed to select the most frequently used asked questions for logging in ground.Than Such as, target position information is the family location of user, then can generate asked questions according to the ambient condition information in family location, The asked questions that can also be generated are the family location for allowing user to select oneself in several geographical locations.It should be noted that The historical behavior information according to user described in the embodiment of the present application determines the method for determination of the identity msu message of user only For citing.
In one embodiment of the application, the network equipment verifies the authentication information of user, when being verified, Password can be carried out with consenting user to give for change, wherein it can give the user for change for logging in the intended application that password, which is given for change, Original password;Can also be password of the user resetting for logging in the intended application.Here, when user carries out password When giving for change, original password can be back to user equipment according to the verification of authentication information, user steps on clearance Record intended application;Can also be to allow user to reset the password for logging in intended application when being verified.
In one embodiment of the application, the identity msu message includes:Enquirement for being putd question to the user Problem, wherein the asked questions include:First rights concerns and the second rights concerns.Here, for the historical behavior of user Information, can generate the identity msu message putd question to user, and asked questions can be set as the first rights concerns and second Rights concerns, wherein the first rights concerns are privacy concerns, and the second rights concerns are general problem, here, passing through privacy The setting of problem can prevent life from intersecting more different user and obtain same authentication information.
Further, the method includes:First permission is arranged according to the secret degree of first rights concerns to ask The secret weight of topic.Here, the weight of each problem can be arranged according to the secret degree of privacy concerns, secret degree is higher to ask Topic, weight is bigger, to improve the safety of user information.When identity msu message includes for being carried to the user When the first rights concerns asked and the second rights concerns, authentication information may include that the user asks first permission The close guarantor of topic answers and the close guarantor of second rights concerns answers, then in step s 13, according to the user to multiple first Described in the close guarantors of rights concerns answers and its corresponding secret weight and/or answer the close guarantor of second rights concerns judges Whether authentication information is legal.Here, comprehensive descision authentication information can be carried out whether according to the weight of different problems It is legal, for example, it may be whether verification user is all correct to the answer of each problem, when each problem is all correct, the user Identity is legal, can also be verify user's problem larger to weight answer it is whether correct, when the larger problem of weight return When answering correct, the answer of the very small problem of weight can allow erroneous answers;Assignment, root can also be carried out to each problem Answer according to each problem and weight calculation answer score, when answer score is more than the threshold value of setting, it can be determined that the user Identity be legal, let pass the user or agree to its carry out password give for change.
Fig. 2 shows additionally provide a kind of method flow in the authentication of user equipment end on the other hand according to the application Schematic diagram, this method include:Step S21~step S23, wherein
In the step s 21, user is logged in into the logging request of intended application or given for change for logging in the intended application The request of password is sent to the network equipment;Here, user forgets that the password of intended application or replacement mobile device need to step on again Intended application is recorded, by logging request or password request can be given for change is sent to the network equipment, request, which is let pass, to be logged in or given for change Password Operations.Wherein, the password given for change for logging in the intended application, including:It obtains and uses from the network equipment In the original password for logging in the intended application;Or, according to the resetting password notification that the network equipment is sent, reset for stepping on Record the password of the intended application.Here, it can be that original password is obtained from the network equipment that password, which is given for change, can also be network The resetting password notification that equipment returns carries out resetting Password Operations, with again in resetting cryptographic interface or resetting password short message Log in intended application.
In step S22, the identity msu message of the user of network equipment transmission is verified, body is generated Part verification information, wherein the identity msu message of the user is believed by the network equipment according to the historical behavior of the user Breath determines;Here, the identity msu message generated according to the historical behavior information of user that the network equipment is sent is received, to the body Part msu message carries out verification and generates corresponding authentication information, for example, the network equipment is for the history in the application of user Behavioural information generates several asked questions, and as identity msu message, user equipment receives the identity including asked questions and examines After nuclear information, each asked questions are answered, answer content is as authentication information.It then, will in step S23 The authentication information is back to the network equipment to be verified to the authentication information, receives the network and sets The feedback information for the log-on message that preparation is sent.Here, it is back to the network equipment using answer content as authentication information, so that The network equipment verifies the answer content, receives the feedback information for the log-on message that the network equipment is sent, wherein logs in letter The feedback information of breath include for log in the original password of the intended application, the target reference password reset information and The user is allowed to log in the clearance information of the intended application.When being verified, user equipment just may be used according to feedback information It logs in intended application or gives password for change, wherein it can be obtained from the network equipment for logging in the mesh to give password for change Mark the original password of application;It can also be that the resetting password notification sent according to the network equipment, resetting are described for logging in The password of intended application.
In one embodiment of the application, the identity msu message includes:Enquirement for being putd question to the user Problem, wherein the asked questions include:First rights concerns and the second rights concerns.Wherein, the first rights concerns can be Privacy concerns, the second rights concerns can be general problem, by the setting of privacy concerns can prevent life intersect compared with More different users obtains same authentication information.When identity msu message includes for being putd question to the user When the first rights concerns and the second rights concerns, in step S23, the identity of the user of network equipment transmission is examined Nuclear information is verified, can be according to second rights concerns of the network equipment transmission when generating authentication information And the first rights concerns after setting secret weight, it includes the close authentication information protected and answered to generate.Here, network equipment root The weight of each problem is set according to the secret degree of privacy concerns, and the higher problem of secret degree, weight is bigger, to improve use The safety of family information.User equipment receives the asked questions after the setting secret weight that the network equipment is sent, and is asked for enquirement It includes the close authentication information protected and answered that topic, which answer and generated, and is back to the network equipment, so that the network equipment can root It is whether legal that comprehensive descision authentication information is carried out according to the weight of different problems.
By the method for the application authentication described above, by analyzing automatically user's history behavior, and It generates verification information and carries out subscriber identity information certification for user, it is not only simple but also efficient, and participated in without artificial, be conducive to use Family and service provider avoid user from carrying out filling in cumbersome complaint material content and upload personal identity card information, do not need Service provider arranges full-time staff to carry out the audit of complaint material, saves cost of labor expense.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, it is stored thereon with computer-readable instruction, The computer-readable instruction can be executed by processor to realize the aforementioned method.
On the other hand according to the application, a kind of network equipment of authentication is additionally provided, wherein the network equipment packet It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed Execute a kind of operation of method in the authentication of network equipment end as described in aforementioned;For example, computer-readable instruction is being held Make one or more of processors when row:
The identity msu message of the user is determined according to the historical behavior information of the user got;
The identity msu message is sent to the user equipment of the user, and receives and to be returned by the user equipment The authentication information of verification generation is carried out to the identity msu message;
The authentication information is verified, when being verified, the anti-of log-on message is sent to the user equipment Feedforward information.
It should be noted that the above-mentioned network equipment can be a server, can also be by the more of LAN connection Platform server or the multiple servers connected by internet, can also be the cloud being made of multiple servers.Here, cloud by A large amount of computers or network server based on cloud computing (Cloud Computing) are constituted, wherein cloud computing is distributed meter One kind of calculation, a super virtual computer being made of the computer collection of a group loose couplings.
On the other hand according to the application, a kind of user equipment of authentication is additionally provided, wherein the user equipment packet It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed Execute a kind of operation of method in the authentication of user equipment end as described in aforementioned;For example, computer-readable instruction is being held Make one or more of processors when row:
User is logged in into the logging request of intended application or gives the request hair of the password for logging in the intended application for change It send to the network equipment;
The identity msu message of the user of network equipment transmission is verified, authentication information is generated, Wherein, the identity msu message of the user is determined by the network equipment according to the historical behavior information of the user;
The authentication information is back to the network equipment to be verified to the authentication information, is received The feedback information for the log-on message that the network equipment is sent.
Obviously, those skilled in the art can carry out the application essence of the various modification and variations without departing from the application God and range.In this way, if these modifications and variations of the application belong to the range of the application claim and its equivalent technologies Within, then the application is also intended to include these modifications and variations.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With application-specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, the software program of the application can be executed by processor to realize steps described above or function.Similarly, the application Software program (including relevant data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example Such as, coordinate to execute the circuit of each step or function as with processor.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution. And the program instruction of the present processes is called, it is possibly stored in fixed or moveable recording medium, and/or pass through Broadcast or the data flow in other signal loaded mediums and be transmitted, and/or be stored according to described program instruction operation In the working storage of computer equipment.Here, including a device according to one embodiment of the application, which includes using Memory in storage computer program instructions and processor for executing program instructions, wherein when the computer program refers to When order is executed by the processor, method and/or skill of the device operation based on aforementioned multiple embodiments according to the application are triggered Art scheme.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Unit or device can also be realized by a unit or device by software or hardware.The first, the second equal words are used for table Show title, and does not represent any particular order.

Claims (16)

1. a kind of method in the authentication of network equipment end, wherein the method includes:
The identity msu message of the user is determined according to the historical behavior information of the user got;
The identity msu message is sent to the user equipment of the user, and receive by the user equipment return to institute State the authentication information that identity msu message carries out verification generation;
The authentication information is verified, when being verified, the feedback letter of log-on message is sent to the user equipment Breath.
2. according to the method described in claim 1, wherein, the historical behavior information of the user includes:The user is described The historical behavior letter of historical behavior information and/or the user in the associated application of the intended application in intended application Breath.
3. method according to claim 1 or 2, wherein according to the determination of the historical behavior information of the user got The identity msu message of user, including:
The identity msu message of the user is determined according to the type of the historical behavior information of the user got and intended application.
4. according to the method described in claim 2, wherein, the user is determined according to the historical behavior information of the user got Identity msu message, including:
Duration is used according in historical behavior information of the user in the associated application of the intended application and using frequency Rate determines the degree of association between the associated application and the intended application;
According to historical behavior information of the user in the intended application, the historical behavior information in the associated application And the degree of association determines the identity msu message of the user.
5. according to the method described in claim 2, wherein, the user is determined according to the historical behavior information of the user got Identity msu message, including:
Stepping on when logging in the intended application from one or more users according to the historical behavior information of the user got It records and chooses target login position in position;
The identity msu message that position determines the user is logged according to the target.
6. according to the method described in claim 1, wherein, the feedback information of the log-on message includes:
For log in the intended application original password,
The reset information of the password of the intended application and
The user is allowed to log in the clearance information of the intended application.
7. according to the method described in claim 1, wherein, the identity msu message includes:For being carried to the user The asked questions asked, wherein the asked questions include:First rights concerns and the second rights concerns.
8. according to the method described in claim 7, wherein, the method includes:
The secret weight of first rights concerns is set according to the secret degree of first rights concerns.
9. method according to claim 7 or 8, wherein the authentication information includes the user to described first The close guarantor of rights concerns answers and the close guarantor of second rights concerns answers, wherein recognizes the authentication information Card, including:
According to the user to the close guarantor answer of multiple first rights concerns and its corresponding secret weight and/or to described second The close guarantor of rights concerns, which answers, judges whether the authentication information is legal.
10. a kind of method in the authentication of user equipment end, wherein the method includes:
The request that user is logged in the logging request of intended application or gives the password for logging in the intended application for change is sent to The network equipment;
The identity msu message of the user of network equipment transmission is verified, authentication information is generated, wherein The identity msu message of the user is determined by the network equipment according to the historical behavior information of the user;
The authentication information is back to the network equipment to be verified to the authentication information, described in reception The feedback information for the log-on message that the network equipment is sent.
11. according to the method described in claim 10, wherein, the feedback information of the log-on message includes:It is described for logging in The reset information for the password that the original password of intended application, the target are quoted and the permission user log in the intended application Clearance information.
12. according to the method described in claim 10, wherein, the identity msu message includes:For being carried out to the user The asked questions of enquirement, wherein the asked questions include:First rights concerns and the second rights concerns.
13. the method stated according to claim 12, wherein to the identity msu message for the user that the network equipment is sent It is verified, generates authentication information, including:
The first rights concerns after second rights concerns and setting secret weight that are sent according to the network equipment, generate The authentication information answered is protected including close.
14. a kind of computer-readable medium, is stored thereon with computer-readable instruction, the computer-readable instruction can be handled Device is executed to realize the method as described in any one of claim 1 to 13.
15. a kind of network equipment of authentication, wherein the network equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction when executed executes the processor Such as the operation of any one of claim 1 to 9 the method.
16. a kind of user equipment of authentication, wherein the user equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction when executed executes the processor Such as the operation of any one of claim 10 to 13 the method.
CN201810461586.XA 2018-05-15 2018-05-15 Identity verification method and equipment Active CN108712413B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810461586.XA CN108712413B (en) 2018-05-15 2018-05-15 Identity verification method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810461586.XA CN108712413B (en) 2018-05-15 2018-05-15 Identity verification method and equipment

Publications (2)

Publication Number Publication Date
CN108712413A true CN108712413A (en) 2018-10-26
CN108712413B CN108712413B (en) 2021-08-31

Family

ID=63868002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810461586.XA Active CN108712413B (en) 2018-05-15 2018-05-15 Identity verification method and equipment

Country Status (1)

Country Link
CN (1) CN108712413B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326156A (en) * 2018-11-20 2019-02-12 左凌云 A kind of Training Methodology and its device
CN109753621A (en) * 2019-01-04 2019-05-14 北京字节跳动网络技术有限公司 User information processing method, device, electronic equipment and readable storage medium storing program for executing
CN110033168A (en) * 2019-03-12 2019-07-19 平安普惠企业管理有限公司 A kind of order allocation method and relevant device based on data processing
CN110691093A (en) * 2019-10-08 2020-01-14 迈普通信技术股份有限公司 Password retrieving method and device, network equipment and computer readable storage medium
CN111368273A (en) * 2020-03-17 2020-07-03 汉海信息技术(上海)有限公司 Identity verification method and device
CN111949954A (en) * 2020-07-10 2020-11-17 深圳市信锐网科技术有限公司 Login verification method, system and computer storage medium
CN112121412A (en) * 2020-09-15 2020-12-25 北京智明星通科技股份有限公司 Quick login method and system for game account and game equipment
CN112717418A (en) * 2021-01-19 2021-04-30 王怡 Online game login system and method based on big data
CN113411182A (en) * 2019-07-10 2021-09-17 创新先进技术有限公司 Account information updating method, device, equipment and storage medium
CN113704738A (en) * 2021-08-31 2021-11-26 潍柴动力股份有限公司 Terminal identity verification method based on historical map and related equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100122329A1 (en) * 2008-11-13 2010-05-13 Palo Alto Research Center Incorporated Authentication based on user behavior
CN104462311A (en) * 2014-11-28 2015-03-25 北京奇虎科技有限公司 Information displaying method and device
CN104580193A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Data processing method and device
CN105809023A (en) * 2014-12-29 2016-07-27 中兴通讯股份有限公司 Password verification method and device
CN106470109A (en) * 2015-08-21 2017-03-01 阿里巴巴集团控股有限公司 A kind of personal identification method and equipment
CN107018138A (en) * 2017-04-11 2017-08-04 百度在线网络技术(北京)有限公司 Method and apparatus for defining the competence
WO2017210857A1 (en) * 2016-06-07 2017-12-14 华为技术有限公司 Method for improving information security and terminal
CN107645467A (en) * 2016-07-20 2018-01-30 平安科技(深圳)有限公司 Password amending method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100122329A1 (en) * 2008-11-13 2010-05-13 Palo Alto Research Center Incorporated Authentication based on user behavior
CN104462311A (en) * 2014-11-28 2015-03-25 北京奇虎科技有限公司 Information displaying method and device
CN105809023A (en) * 2014-12-29 2016-07-27 中兴通讯股份有限公司 Password verification method and device
CN104580193A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Data processing method and device
CN106470109A (en) * 2015-08-21 2017-03-01 阿里巴巴集团控股有限公司 A kind of personal identification method and equipment
WO2017210857A1 (en) * 2016-06-07 2017-12-14 华为技术有限公司 Method for improving information security and terminal
CN107645467A (en) * 2016-07-20 2018-01-30 平安科技(深圳)有限公司 Password amending method and device
CN107018138A (en) * 2017-04-11 2017-08-04 百度在线网络技术(北京)有限公司 Method and apparatus for defining the competence

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326156A (en) * 2018-11-20 2019-02-12 左凌云 A kind of Training Methodology and its device
CN109753621A (en) * 2019-01-04 2019-05-14 北京字节跳动网络技术有限公司 User information processing method, device, electronic equipment and readable storage medium storing program for executing
CN110033168A (en) * 2019-03-12 2019-07-19 平安普惠企业管理有限公司 A kind of order allocation method and relevant device based on data processing
CN113411182B (en) * 2019-07-10 2023-09-01 创新先进技术有限公司 Information processing method, device, equipment and storage medium
CN113411182A (en) * 2019-07-10 2021-09-17 创新先进技术有限公司 Account information updating method, device, equipment and storage medium
CN110691093B (en) * 2019-10-08 2022-04-08 迈普通信技术股份有限公司 Password retrieving method and device, network equipment and computer readable storage medium
CN110691093A (en) * 2019-10-08 2020-01-14 迈普通信技术股份有限公司 Password retrieving method and device, network equipment and computer readable storage medium
CN111368273A (en) * 2020-03-17 2020-07-03 汉海信息技术(上海)有限公司 Identity verification method and device
CN111368273B (en) * 2020-03-17 2023-06-20 汉海信息技术(上海)有限公司 Identity verification method and device
CN111949954A (en) * 2020-07-10 2020-11-17 深圳市信锐网科技术有限公司 Login verification method, system and computer storage medium
CN112121412A (en) * 2020-09-15 2020-12-25 北京智明星通科技股份有限公司 Quick login method and system for game account and game equipment
CN112717418A (en) * 2021-01-19 2021-04-30 王怡 Online game login system and method based on big data
CN113704738A (en) * 2021-08-31 2021-11-26 潍柴动力股份有限公司 Terminal identity verification method based on historical map and related equipment

Also Published As

Publication number Publication date
CN108712413B (en) 2021-08-31

Similar Documents

Publication Publication Date Title
CN108712413A (en) A kind of method and apparatus of authentication
US11138300B2 (en) Multi-factor profile and security fingerprint analysis
CN103916244B (en) Verification method and device
JP5429912B2 (en) Authentication system, authentication server, service providing server, authentication method, and program
CN104270386B (en) Across application system user (asu) information integrating method and identity information management server
US20140237570A1 (en) Authentication based on social graph transaction history data
US20090064303A1 (en) Transferable restricted security tokens
US9355233B1 (en) Password reset using hash functions
US20160191498A1 (en) User authentication based on personal access history
CN113542201B (en) Access control method and equipment for Internet service
CN106550004A (en) The recommendation method and device of business object
CN105516133A (en) User identity verification method, server and client
CN106341234A (en) Authorization method and device
CN105022939B (en) Information Authentication method and device
CN112769684B (en) Method and device for adding friends
CN106953831A (en) A kind of authorization method of user resources, apparatus and system
CN108337210A (en) Equipment configuration method and device, system
CN108055238A (en) A kind of account verification method and system
CN110457629A (en) Permission processing, authority control method and device
CN107967185A (en) A kind of interface call method, device, equipment and computer-readable recording medium
CN110706143A (en) Identity authentication method and device based on government affair service
US10038689B1 (en) Dynamic password generation
WO2014043360A1 (en) Multi-factor profile and security fingerprint analysis
CN107105103A (en) A kind of information solicitation method and information solicitation device
CN105141586B (en) A kind of method and system verified to user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant