CN108712413A - A kind of method and apparatus of authentication - Google Patents
A kind of method and apparatus of authentication Download PDFInfo
- Publication number
- CN108712413A CN108712413A CN201810461586.XA CN201810461586A CN108712413A CN 108712413 A CN108712413 A CN 108712413A CN 201810461586 A CN201810461586 A CN 201810461586A CN 108712413 A CN108712413 A CN 108712413A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- identity
- intended application
- historical behavior
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Abstract
The purpose of the application is to provide a kind of method and apparatus of authentication, and the historical behavior information for the user that the application is got by basis determines the identity msu message of the user;The identity msu message is sent to the user equipment of the user, and receives the authentication information for carrying out verification generation to the identity msu message returned by the user equipment;The authentication information is verified, when being verified, the feedback information of log-on message is sent to the user equipment.By analyzing automatically user's history behavior, and output verification information carries out subscriber identity information certification for user, not only simple but also efficient, and is participated in without artificial, is conducive to user and service provider.
Description
Technical field
This application involves computer realm more particularly to a kind of method and apparatus of authentication.
Background technology
With the development of development of Mobile Internet technology, application program is installed by mobile terminal devices such as mobile phones and is become as development
One of gesture, in order to ensure that the safety of terminal user's related data, application server limit each user after registering
Corresponding program could be accessed, in registration user setting user's name and password is accessed, needs to input user name when logging on
Progress password is needed to give for change if user forgets login password or replaces using terminal with access password.Currently, some passwords
It gives for change and generally passes through following steps:Cell-phone number is given for change, instant messaging application is given for change, mailbox is given for change, and in some cases, such as
A applications are that login is directly registered by cell-phone number, and unbound any other information of association, at this point, if cellphone changing number or
Person's mobile phone is lost, then can not carry out password through the above way and give for change, then can not log in A applications;Some applications can then pass through people
Work appeals approach to solve the above problems, but either for service provider or user, and artificial cost of appealing is higher,
For a user, it needs to fill in a pile data, or upload ID card information etc., one side information solicitation is more troublesome, separately
On the one hand the ID card information of user can be exposed;For service provider, full-time staff to be arranged to carry out complaint material
Audit, cost of labor expense are larger.
Invention content
The purpose of the application is to provide a kind of method and apparatus of authentication, solves in the prior art by artificial
The cost of labor expense that complaint approach is brought is larger, and the problem of password is given for change is revealed and cannot be carried out to user information.
According to the one side of the application, a kind of method in the authentication of network equipment end is provided, this method includes:
The identity msu message of the user is determined according to the historical behavior information of the user got;
The identity msu message is sent to the user equipment of the user, and receives and to be returned by the user equipment
The authentication information of verification generation is carried out to the identity msu message;
The authentication information is verified, when being verified, the anti-of log-on message is sent to the user equipment
Feedforward information.
Further, the historical behavior information of the user includes:History row of the user in the intended application
The historical behavior information for being information and/or the user in the associated application of the intended application.
Further, the identity msu message of the user is determined according to the historical behavior information of the user got, is wrapped
It includes:
The identity audit of the user is determined according to the type of the historical behavior information of the user got and intended application
Information.
Further, the identity msu message of the user is determined according to the historical behavior information of the user got, is wrapped
It includes:
Using duration and make according in historical behavior information of the user in the associated application of the intended application
The degree of association between the associated application and the intended application is determined with frequency;
According to historical behavior information of the user in the intended application, the historical behavior in the associated application
Information and the degree of association determine the identity msu message of the user.
Further, the identity msu message of the user is determined according to the historical behavior information of the user got, is wrapped
It includes:
When logging in the intended application from one or more users according to the historical behavior information of the user got
Login position in choose target log in position;
The identity msu message that position determines the user is logged according to the target.
Further, the feedback information of the log-on message includes:
For logging in described in the original password of the intended application, the reset information of the password of target reference and permission
User logs in the clearance information of the intended application.
Further, the identity msu message includes:Asked questions for being putd question to the user, wherein
The asked questions include:First rights concerns and the second rights concerns.
Further, the method includes:
The secret weight of first rights concerns is set according to the secret degree of first rights concerns.
Further, the authentication information includes the user to the close guarantor answer of first rights concerns and institute
The close guarantor for stating the second rights concerns answers, wherein the authentication information is authenticated, including:
According to the user to the close guarantor answer of multiple first rights concerns and its corresponding secret weight and/or to described
The close guarantor of second rights concerns, which answers, judges whether the authentication information is legal.
On the other hand according to the application, a kind of method in the authentication of user equipment end, this method packet are additionally provided
It includes:
User is logged in into the logging request of intended application or gives the request hair of the password for logging in the intended application for change
It send to the network equipment;
The identity msu message of the user of network equipment transmission is verified, authentication information is generated,
Wherein, the identity msu message of the user is determined by the network equipment according to the historical behavior information of the user;
The authentication information is back to the network equipment to be verified to the authentication information, is received
The feedback information for the log-on message that the network equipment is sent.
Further, the feedback information of the log-on message includes:Original password, institute for logging in the intended application
It states the reset information of the password of target reference and the user is allowed to log in the clearance information of the intended application.
Further, the identity msu message includes:Asked questions for being putd question to the user, wherein
The asked questions include:First rights concerns and the second rights concerns.
Further, the identity msu message of the user sent to the network equipment is verified, and identity is generated
Verification information, including:
The first rights concerns after second rights concerns and setting secret weight that are sent according to the network equipment,
It includes the close authentication information protected and answered to generate.
According to the application another aspect, a kind of computer-readable medium is additionally provided, is stored thereon with computer-readable
Instruction, the computer-readable instruction can be executed by processor to realize the aforementioned method.
On the other hand according to the application, a kind of network equipment of authentication is additionally provided, wherein the network equipment packet
It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed
Execute a kind of operation of method in the authentication of network equipment end as described in aforementioned.
On the other hand according to the application, a kind of user equipment of authentication is additionally provided, wherein the user equipment packet
It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed
Execute a kind of operation of method in the authentication of user equipment end as described in aforementioned.
Compared with prior art, the application according to the historical behavior information of the user got by determining the user's
Identity msu message;The identity msu message is sent to the user equipment of the user, and is received by the user equipment
What is returned carries out the identity msu message authentication information of verification generation;The authentication information is tested
Card sends the feedback information of log-on message to the user equipment when being verified.By being carried out automatically to user's history behavior
Analysis, and output verification information carries out subscriber identity information certification for user, it is not only simple but also efficient, and participated in without artificial,
Be conducive to user and service provider.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of in the method flow of network equipment end authentication to be shown according to what the one side of the application provided
It is intended to;
Fig. 2 shows additionally provide a kind of method flow in the authentication of user equipment end on the other hand according to the application
Schematic diagram.
Same or analogous reference numeral represents same or analogous component in attached drawing.
Specific implementation mode
The application is described in further detail below in conjunction with the accompanying drawings.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more
Processor (CPU), input/output interface, network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, magnetic tape disk storage or other magnetic storage apparatus or
Any other non-transmission medium can be used for storage and can be accessed by a computing device information.As defined in this article, computer
Readable medium does not include non-temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Fig. 1 shows a kind of in the method flow of network equipment end authentication to be shown according to what the one side of the application provided
It is intended to, this method includes:Step S11~step S13, wherein in step s 11, according to the historical behavior of the user got
Information determines the identity msu message of the user;In step s 12, the identity msu message is sent to the user's
User equipment, and receive and believed by the authentication for carrying out verification generation to the identity msu message that the user equipment returns
Breath;In step s 13, the authentication information is verified, when being verified, is sent to the user equipment and log in letter
The feedback information of breath.Not only simple but also efficient, and participated in without artificial, be conducive to user and service provider.
Specifically, in step s 11, determine that the identity of the user is examined according to the historical behavior information of the user got
Nuclear information;Here, the historical behavior information of the user includes:Historical behavior information of the user in the intended application
And/or historical behavior information of the user in the associated application of the intended application, such as user using intended application into
The historical behaviors information such as row shopping, browsing information, friend-making chat, the identity msu message of the user are the history for user
What behavioural information determined, for example user is putd question to about information such as user's history shopping environment, good friend's situations, with to user
Identity is audited.The associated application of intended application license to intended application so that the user by the account of intended application just
Associated application can be logged in, when the password for carrying out intended application is given for change, collects history row of the user in the associated application
For information, for example, when needing to give the password using A for change, identity msu message is in addition to including history row of the user in application A
For, further include by application A log in other application.To improve the safety of identity msu message, user is more directed to
Property.
Specifically, in step s 12, the identity msu message is sent to the user equipment of the user, and received
The authentication information that verification generation is carried out to the identity msu message returned by the user equipment;Here, by basis
The identity msu message that historical behavior information of the user in application generates is sent to user equipment, so that user is to the identity
Msu message carries out audit and generates authentication information.For example, being generated for the historical behavior information in the application of user several
Asked questions, using user to the answer of each asked questions as authentication information.Then, in step s 13, to the body
Part verification information is verified, and when being verified, the feedback information of log-on message is sent to the user equipment.Here, to
Family is verified about the answer of asked questions, judges whether that clearance user or original password give for change, reset password etc., work as verification
By when, the feedback information of log-on message is sent to user equipment, wherein the feedback information of the log-on message include be used for
It logs in described in the original password of the intended application, the reset information of the password of the intended application and permission user's login
The clearance information of intended application.
In one embodiment of the application, when determining the identity msu message of the user in step s 11, root can be passed through
The identity msu message of the user is determined according to the historical behavior information of the user got and the type of intended application.Here,
The type of intended application is different, and the behavioural information emphasis chosen from the historical behavior information of user is different, for example, intended application
Type be shopping class, then the chat content in historical behavior information (such as with businessman's) carry out generation user not as emphasis
Identity msu message, but carried out generating identity msu message according to the history shopping environment of user, for example history bought
Article, the article etc. bought recently;And be instant messaging class for the type of intended application, it can be according to chat content, intimate
Identity msu message is arranged in the information such as good friend, and the type for intended application is game class, the trip that can be used according to user's history
The setting identity msu messages such as play role, game good friend.
In one embodiment of the application, in step s 11, can also according to the user the intended application association
Being determined between the associated application and the intended application using duration and frequency of use in the historical behavior information in
The degree of association;According to historical behavior information of the user in the intended application, the history row in the associated application
The identity msu message of the user is determined for information and the degree of association.Here, the user uses the account of intended application
Associated application is logged in, determines that user carries out login associated application using the account of intended application from the historical behavior information of user
Frequency, determine using information such as durations the degree of association of associated application and intended application, determined further according to the degree of association and use user
The historical behavior information of historical behavior information and use in associated application in intended application generates identity msu message
Proportion determines quantity shared in the asked questions quantity of each comfortable identity msu message, and then generates about going through in target
The identity msu message of the user of historical behavior information in history behavioural information and associated application.For example, determining associated application
Association between intended application is more frequent, and the degree of association is higher, then it is 0.5 that the corresponding weight of associated application, which can be arranged, target
It is 0.5 using corresponding weight, when being configured identity msu message, 10 asked questions is such as set, then 5 is that basis is being closed
What the historical behavior information in connection application generated, 5 are generated according to the historical behavior information in intended application.
In one embodiment of the application, in step s 11, can also according to the historical behavior information of user got from
Target, which is chosen, in login position when one or more users log in the intended application logs in position;According to described
Target logs in the identity msu message that position determines the user.Here, the historical behavior according to user in intended application
Information or the historical behavior information in associated application determine login location information when the activity of the user is relatively high, can be with
Determine the target location letter that access times are most in login location information when one or more liveness are relatively high
Breath can generate identity msu message for the target position information according to corresponding ambient condition information, or by the target position
Confidence ceases location information unrelated with other and is used as puing question to user, and user is allowed to select the most frequently used asked questions for logging in ground.Than
Such as, target position information is the family location of user, then can generate asked questions according to the ambient condition information in family location,
The asked questions that can also be generated are the family location for allowing user to select oneself in several geographical locations.It should be noted that
The historical behavior information according to user described in the embodiment of the present application determines the method for determination of the identity msu message of user only
For citing.
In one embodiment of the application, the network equipment verifies the authentication information of user, when being verified,
Password can be carried out with consenting user to give for change, wherein it can give the user for change for logging in the intended application that password, which is given for change,
Original password;Can also be password of the user resetting for logging in the intended application.Here, when user carries out password
When giving for change, original password can be back to user equipment according to the verification of authentication information, user steps on clearance
Record intended application;Can also be to allow user to reset the password for logging in intended application when being verified.
In one embodiment of the application, the identity msu message includes:Enquirement for being putd question to the user
Problem, wherein the asked questions include:First rights concerns and the second rights concerns.Here, for the historical behavior of user
Information, can generate the identity msu message putd question to user, and asked questions can be set as the first rights concerns and second
Rights concerns, wherein the first rights concerns are privacy concerns, and the second rights concerns are general problem, here, passing through privacy
The setting of problem can prevent life from intersecting more different user and obtain same authentication information.
Further, the method includes:First permission is arranged according to the secret degree of first rights concerns to ask
The secret weight of topic.Here, the weight of each problem can be arranged according to the secret degree of privacy concerns, secret degree is higher to ask
Topic, weight is bigger, to improve the safety of user information.When identity msu message includes for being carried to the user
When the first rights concerns asked and the second rights concerns, authentication information may include that the user asks first permission
The close guarantor of topic answers and the close guarantor of second rights concerns answers, then in step s 13, according to the user to multiple first
Described in the close guarantors of rights concerns answers and its corresponding secret weight and/or answer the close guarantor of second rights concerns judges
Whether authentication information is legal.Here, comprehensive descision authentication information can be carried out whether according to the weight of different problems
It is legal, for example, it may be whether verification user is all correct to the answer of each problem, when each problem is all correct, the user
Identity is legal, can also be verify user's problem larger to weight answer it is whether correct, when the larger problem of weight return
When answering correct, the answer of the very small problem of weight can allow erroneous answers;Assignment, root can also be carried out to each problem
Answer according to each problem and weight calculation answer score, when answer score is more than the threshold value of setting, it can be determined that the user
Identity be legal, let pass the user or agree to its carry out password give for change.
Fig. 2 shows additionally provide a kind of method flow in the authentication of user equipment end on the other hand according to the application
Schematic diagram, this method include:Step S21~step S23, wherein
In the step s 21, user is logged in into the logging request of intended application or given for change for logging in the intended application
The request of password is sent to the network equipment;Here, user forgets that the password of intended application or replacement mobile device need to step on again
Intended application is recorded, by logging request or password request can be given for change is sent to the network equipment, request, which is let pass, to be logged in or given for change
Password Operations.Wherein, the password given for change for logging in the intended application, including:It obtains and uses from the network equipment
In the original password for logging in the intended application;Or, according to the resetting password notification that the network equipment is sent, reset for stepping on
Record the password of the intended application.Here, it can be that original password is obtained from the network equipment that password, which is given for change, can also be network
The resetting password notification that equipment returns carries out resetting Password Operations, with again in resetting cryptographic interface or resetting password short message
Log in intended application.
In step S22, the identity msu message of the user of network equipment transmission is verified, body is generated
Part verification information, wherein the identity msu message of the user is believed by the network equipment according to the historical behavior of the user
Breath determines;Here, the identity msu message generated according to the historical behavior information of user that the network equipment is sent is received, to the body
Part msu message carries out verification and generates corresponding authentication information, for example, the network equipment is for the history in the application of user
Behavioural information generates several asked questions, and as identity msu message, user equipment receives the identity including asked questions and examines
After nuclear information, each asked questions are answered, answer content is as authentication information.It then, will in step S23
The authentication information is back to the network equipment to be verified to the authentication information, receives the network and sets
The feedback information for the log-on message that preparation is sent.Here, it is back to the network equipment using answer content as authentication information, so that
The network equipment verifies the answer content, receives the feedback information for the log-on message that the network equipment is sent, wherein logs in letter
The feedback information of breath include for log in the original password of the intended application, the target reference password reset information and
The user is allowed to log in the clearance information of the intended application.When being verified, user equipment just may be used according to feedback information
It logs in intended application or gives password for change, wherein it can be obtained from the network equipment for logging in the mesh to give password for change
Mark the original password of application;It can also be that the resetting password notification sent according to the network equipment, resetting are described for logging in
The password of intended application.
In one embodiment of the application, the identity msu message includes:Enquirement for being putd question to the user
Problem, wherein the asked questions include:First rights concerns and the second rights concerns.Wherein, the first rights concerns can be
Privacy concerns, the second rights concerns can be general problem, by the setting of privacy concerns can prevent life intersect compared with
More different users obtains same authentication information.When identity msu message includes for being putd question to the user
When the first rights concerns and the second rights concerns, in step S23, the identity of the user of network equipment transmission is examined
Nuclear information is verified, can be according to second rights concerns of the network equipment transmission when generating authentication information
And the first rights concerns after setting secret weight, it includes the close authentication information protected and answered to generate.Here, network equipment root
The weight of each problem is set according to the secret degree of privacy concerns, and the higher problem of secret degree, weight is bigger, to improve use
The safety of family information.User equipment receives the asked questions after the setting secret weight that the network equipment is sent, and is asked for enquirement
It includes the close authentication information protected and answered that topic, which answer and generated, and is back to the network equipment, so that the network equipment can root
It is whether legal that comprehensive descision authentication information is carried out according to the weight of different problems.
By the method for the application authentication described above, by analyzing automatically user's history behavior, and
It generates verification information and carries out subscriber identity information certification for user, it is not only simple but also efficient, and participated in without artificial, be conducive to use
Family and service provider avoid user from carrying out filling in cumbersome complaint material content and upload personal identity card information, do not need
Service provider arranges full-time staff to carry out the audit of complaint material, saves cost of labor expense.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, it is stored thereon with computer-readable instruction,
The computer-readable instruction can be executed by processor to realize the aforementioned method.
On the other hand according to the application, a kind of network equipment of authentication is additionally provided, wherein the network equipment packet
It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed
Execute a kind of operation of method in the authentication of network equipment end as described in aforementioned;For example, computer-readable instruction is being held
Make one or more of processors when row:
The identity msu message of the user is determined according to the historical behavior information of the user got;
The identity msu message is sent to the user equipment of the user, and receives and to be returned by the user equipment
The authentication information of verification generation is carried out to the identity msu message;
The authentication information is verified, when being verified, the anti-of log-on message is sent to the user equipment
Feedforward information.
It should be noted that the above-mentioned network equipment can be a server, can also be by the more of LAN connection
Platform server or the multiple servers connected by internet, can also be the cloud being made of multiple servers.Here, cloud by
A large amount of computers or network server based on cloud computing (Cloud Computing) are constituted, wherein cloud computing is distributed meter
One kind of calculation, a super virtual computer being made of the computer collection of a group loose couplings.
On the other hand according to the application, a kind of user equipment of authentication is additionally provided, wherein the user equipment packet
It includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed
Execute a kind of operation of method in the authentication of user equipment end as described in aforementioned;For example, computer-readable instruction is being held
Make one or more of processors when row:
User is logged in into the logging request of intended application or gives the request hair of the password for logging in the intended application for change
It send to the network equipment;
The identity msu message of the user of network equipment transmission is verified, authentication information is generated,
Wherein, the identity msu message of the user is determined by the network equipment according to the historical behavior information of the user;
The authentication information is back to the network equipment to be verified to the authentication information, is received
The feedback information for the log-on message that the network equipment is sent.
Obviously, those skilled in the art can carry out the application essence of the various modification and variations without departing from the application
God and range.In this way, if these modifications and variations of the application belong to the range of the application claim and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt
With application-specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment
In, the software program of the application can be executed by processor to realize steps described above or function.Similarly, the application
Software program (including relevant data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory,
Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example
Such as, coordinate to execute the circuit of each step or function as with processor.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt
When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution.
And the program instruction of the present processes is called, it is possibly stored in fixed or moveable recording medium, and/or pass through
Broadcast or the data flow in other signal loaded mediums and be transmitted, and/or be stored according to described program instruction operation
In the working storage of computer equipment.Here, including a device according to one embodiment of the application, which includes using
Memory in storage computer program instructions and processor for executing program instructions, wherein when the computer program refers to
When order is executed by the processor, method and/or skill of the device operation based on aforementioned multiple embodiments according to the application are triggered
Art scheme.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power
Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims
Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple
Unit or device can also be realized by a unit or device by software or hardware.The first, the second equal words are used for table
Show title, and does not represent any particular order.
Claims (16)
1. a kind of method in the authentication of network equipment end, wherein the method includes:
The identity msu message of the user is determined according to the historical behavior information of the user got;
The identity msu message is sent to the user equipment of the user, and receive by the user equipment return to institute
State the authentication information that identity msu message carries out verification generation;
The authentication information is verified, when being verified, the feedback letter of log-on message is sent to the user equipment
Breath.
2. according to the method described in claim 1, wherein, the historical behavior information of the user includes:The user is described
The historical behavior letter of historical behavior information and/or the user in the associated application of the intended application in intended application
Breath.
3. method according to claim 1 or 2, wherein according to the determination of the historical behavior information of the user got
The identity msu message of user, including:
The identity msu message of the user is determined according to the type of the historical behavior information of the user got and intended application.
4. according to the method described in claim 2, wherein, the user is determined according to the historical behavior information of the user got
Identity msu message, including:
Duration is used according in historical behavior information of the user in the associated application of the intended application and using frequency
Rate determines the degree of association between the associated application and the intended application;
According to historical behavior information of the user in the intended application, the historical behavior information in the associated application
And the degree of association determines the identity msu message of the user.
5. according to the method described in claim 2, wherein, the user is determined according to the historical behavior information of the user got
Identity msu message, including:
Stepping on when logging in the intended application from one or more users according to the historical behavior information of the user got
It records and chooses target login position in position;
The identity msu message that position determines the user is logged according to the target.
6. according to the method described in claim 1, wherein, the feedback information of the log-on message includes:
For log in the intended application original password,
The reset information of the password of the intended application and
The user is allowed to log in the clearance information of the intended application.
7. according to the method described in claim 1, wherein, the identity msu message includes:For being carried to the user
The asked questions asked, wherein the asked questions include:First rights concerns and the second rights concerns.
8. according to the method described in claim 7, wherein, the method includes:
The secret weight of first rights concerns is set according to the secret degree of first rights concerns.
9. method according to claim 7 or 8, wherein the authentication information includes the user to described first
The close guarantor of rights concerns answers and the close guarantor of second rights concerns answers, wherein recognizes the authentication information
Card, including:
According to the user to the close guarantor answer of multiple first rights concerns and its corresponding secret weight and/or to described second
The close guarantor of rights concerns, which answers, judges whether the authentication information is legal.
10. a kind of method in the authentication of user equipment end, wherein the method includes:
The request that user is logged in the logging request of intended application or gives the password for logging in the intended application for change is sent to
The network equipment;
The identity msu message of the user of network equipment transmission is verified, authentication information is generated, wherein
The identity msu message of the user is determined by the network equipment according to the historical behavior information of the user;
The authentication information is back to the network equipment to be verified to the authentication information, described in reception
The feedback information for the log-on message that the network equipment is sent.
11. according to the method described in claim 10, wherein, the feedback information of the log-on message includes:It is described for logging in
The reset information for the password that the original password of intended application, the target are quoted and the permission user log in the intended application
Clearance information.
12. according to the method described in claim 10, wherein, the identity msu message includes:For being carried out to the user
The asked questions of enquirement, wherein the asked questions include:First rights concerns and the second rights concerns.
13. the method stated according to claim 12, wherein to the identity msu message for the user that the network equipment is sent
It is verified, generates authentication information, including:
The first rights concerns after second rights concerns and setting secret weight that are sent according to the network equipment, generate
The authentication information answered is protected including close.
14. a kind of computer-readable medium, is stored thereon with computer-readable instruction, the computer-readable instruction can be handled
Device is executed to realize the method as described in any one of claim 1 to 13.
15. a kind of network equipment of authentication, wherein the network equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction when executed executes the processor
Such as the operation of any one of claim 1 to 9 the method.
16. a kind of user equipment of authentication, wherein the user equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction when executed executes the processor
Such as the operation of any one of claim 10 to 13 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810461586.XA CN108712413B (en) | 2018-05-15 | 2018-05-15 | Identity verification method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810461586.XA CN108712413B (en) | 2018-05-15 | 2018-05-15 | Identity verification method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108712413A true CN108712413A (en) | 2018-10-26 |
CN108712413B CN108712413B (en) | 2021-08-31 |
Family
ID=63868002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810461586.XA Active CN108712413B (en) | 2018-05-15 | 2018-05-15 | Identity verification method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108712413B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109326156A (en) * | 2018-11-20 | 2019-02-12 | 左凌云 | A kind of Training Methodology and its device |
CN109753621A (en) * | 2019-01-04 | 2019-05-14 | 北京字节跳动网络技术有限公司 | User information processing method, device, electronic equipment and readable storage medium storing program for executing |
CN110033168A (en) * | 2019-03-12 | 2019-07-19 | 平安普惠企业管理有限公司 | A kind of order allocation method and relevant device based on data processing |
CN110691093A (en) * | 2019-10-08 | 2020-01-14 | 迈普通信技术股份有限公司 | Password retrieving method and device, network equipment and computer readable storage medium |
CN111368273A (en) * | 2020-03-17 | 2020-07-03 | 汉海信息技术(上海)有限公司 | Identity verification method and device |
CN111949954A (en) * | 2020-07-10 | 2020-11-17 | 深圳市信锐网科技术有限公司 | Login verification method, system and computer storage medium |
CN112121412A (en) * | 2020-09-15 | 2020-12-25 | 北京智明星通科技股份有限公司 | Quick login method and system for game account and game equipment |
CN112717418A (en) * | 2021-01-19 | 2021-04-30 | 王怡 | Online game login system and method based on big data |
CN113411182A (en) * | 2019-07-10 | 2021-09-17 | 创新先进技术有限公司 | Account information updating method, device, equipment and storage medium |
CN113704738A (en) * | 2021-08-31 | 2021-11-26 | 潍柴动力股份有限公司 | Terminal identity verification method based on historical map and related equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100122329A1 (en) * | 2008-11-13 | 2010-05-13 | Palo Alto Research Center Incorporated | Authentication based on user behavior |
CN104462311A (en) * | 2014-11-28 | 2015-03-25 | 北京奇虎科技有限公司 | Information displaying method and device |
CN104580193A (en) * | 2014-12-30 | 2015-04-29 | 北京奇虎科技有限公司 | Data processing method and device |
CN105809023A (en) * | 2014-12-29 | 2016-07-27 | 中兴通讯股份有限公司 | Password verification method and device |
CN106470109A (en) * | 2015-08-21 | 2017-03-01 | 阿里巴巴集团控股有限公司 | A kind of personal identification method and equipment |
CN107018138A (en) * | 2017-04-11 | 2017-08-04 | 百度在线网络技术(北京)有限公司 | Method and apparatus for defining the competence |
WO2017210857A1 (en) * | 2016-06-07 | 2017-12-14 | 华为技术有限公司 | Method for improving information security and terminal |
CN107645467A (en) * | 2016-07-20 | 2018-01-30 | 平安科技(深圳)有限公司 | Password amending method and device |
-
2018
- 2018-05-15 CN CN201810461586.XA patent/CN108712413B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100122329A1 (en) * | 2008-11-13 | 2010-05-13 | Palo Alto Research Center Incorporated | Authentication based on user behavior |
CN104462311A (en) * | 2014-11-28 | 2015-03-25 | 北京奇虎科技有限公司 | Information displaying method and device |
CN105809023A (en) * | 2014-12-29 | 2016-07-27 | 中兴通讯股份有限公司 | Password verification method and device |
CN104580193A (en) * | 2014-12-30 | 2015-04-29 | 北京奇虎科技有限公司 | Data processing method and device |
CN106470109A (en) * | 2015-08-21 | 2017-03-01 | 阿里巴巴集团控股有限公司 | A kind of personal identification method and equipment |
WO2017210857A1 (en) * | 2016-06-07 | 2017-12-14 | 华为技术有限公司 | Method for improving information security and terminal |
CN107645467A (en) * | 2016-07-20 | 2018-01-30 | 平安科技(深圳)有限公司 | Password amending method and device |
CN107018138A (en) * | 2017-04-11 | 2017-08-04 | 百度在线网络技术(北京)有限公司 | Method and apparatus for defining the competence |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109326156A (en) * | 2018-11-20 | 2019-02-12 | 左凌云 | A kind of Training Methodology and its device |
CN109753621A (en) * | 2019-01-04 | 2019-05-14 | 北京字节跳动网络技术有限公司 | User information processing method, device, electronic equipment and readable storage medium storing program for executing |
CN110033168A (en) * | 2019-03-12 | 2019-07-19 | 平安普惠企业管理有限公司 | A kind of order allocation method and relevant device based on data processing |
CN113411182B (en) * | 2019-07-10 | 2023-09-01 | 创新先进技术有限公司 | Information processing method, device, equipment and storage medium |
CN113411182A (en) * | 2019-07-10 | 2021-09-17 | 创新先进技术有限公司 | Account information updating method, device, equipment and storage medium |
CN110691093B (en) * | 2019-10-08 | 2022-04-08 | 迈普通信技术股份有限公司 | Password retrieving method and device, network equipment and computer readable storage medium |
CN110691093A (en) * | 2019-10-08 | 2020-01-14 | 迈普通信技术股份有限公司 | Password retrieving method and device, network equipment and computer readable storage medium |
CN111368273A (en) * | 2020-03-17 | 2020-07-03 | 汉海信息技术(上海)有限公司 | Identity verification method and device |
CN111368273B (en) * | 2020-03-17 | 2023-06-20 | 汉海信息技术(上海)有限公司 | Identity verification method and device |
CN111949954A (en) * | 2020-07-10 | 2020-11-17 | 深圳市信锐网科技术有限公司 | Login verification method, system and computer storage medium |
CN112121412A (en) * | 2020-09-15 | 2020-12-25 | 北京智明星通科技股份有限公司 | Quick login method and system for game account and game equipment |
CN112717418A (en) * | 2021-01-19 | 2021-04-30 | 王怡 | Online game login system and method based on big data |
CN113704738A (en) * | 2021-08-31 | 2021-11-26 | 潍柴动力股份有限公司 | Terminal identity verification method based on historical map and related equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108712413B (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108712413A (en) | A kind of method and apparatus of authentication | |
US11138300B2 (en) | Multi-factor profile and security fingerprint analysis | |
CN103916244B (en) | Verification method and device | |
JP5429912B2 (en) | Authentication system, authentication server, service providing server, authentication method, and program | |
CN104270386B (en) | Across application system user (asu) information integrating method and identity information management server | |
US20140237570A1 (en) | Authentication based on social graph transaction history data | |
US20090064303A1 (en) | Transferable restricted security tokens | |
US9355233B1 (en) | Password reset using hash functions | |
US20160191498A1 (en) | User authentication based on personal access history | |
CN113542201B (en) | Access control method and equipment for Internet service | |
CN106550004A (en) | The recommendation method and device of business object | |
CN105516133A (en) | User identity verification method, server and client | |
CN106341234A (en) | Authorization method and device | |
CN105022939B (en) | Information Authentication method and device | |
CN112769684B (en) | Method and device for adding friends | |
CN106953831A (en) | A kind of authorization method of user resources, apparatus and system | |
CN108337210A (en) | Equipment configuration method and device, system | |
CN108055238A (en) | A kind of account verification method and system | |
CN110457629A (en) | Permission processing, authority control method and device | |
CN107967185A (en) | A kind of interface call method, device, equipment and computer-readable recording medium | |
CN110706143A (en) | Identity authentication method and device based on government affair service | |
US10038689B1 (en) | Dynamic password generation | |
WO2014043360A1 (en) | Multi-factor profile and security fingerprint analysis | |
CN107105103A (en) | A kind of information solicitation method and information solicitation device | |
CN105141586B (en) | A kind of method and system verified to user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |